Jump to content

Finding PUP and RootitNecurs but unable to remove it!!

Go to solution Solved by kevinf80,

Recommended Posts

I have two external storage devices attached to my desktop running Windows 10. Malwarebytes is finding PUP and rootkit issues and says they are Quarantined, restarts and when I run the program again, finds more from these very same devices. This process of running is taking over 40 hours - I ran the program now 12 times and it is still not coming up with the all clear; why is it not able to seek and destroy them?

Malwarebytes Scan report 02-20-2021.txt

Link to post
Share on other sites

  • Solution

Well the problems all seem to be in the same folders on each drive:



Are those two folders needed, could they be deleted...

Edited by kevinf80
Link to post
Share on other sites

Yes Kevin, I can see that it is finding these issues in both the F and E drives which are the storage devices; my question is why are these issues not being resolved? Why is Malwarebytes not finding and deleting them? Unplugging the storage devices is counter productive as I use those drives all the time; this is like saying the baby is crying so why not throw the baby out??? no - I need to find out why the program is not deleting these PUPs and root kit issues.

Link to post
Share on other sites

I`m not suggesting the drives are unplugged, I`m only suggest deleting the download folders. Malwarebytes does seem to identify and quarantine the threats, problem is they return...

Do you have any kind of backup software running..

Edited by kevinf80
Link to post
Share on other sites

No I don't have any back up which is automated; I manually back up to these attached storage devices. When you say threat returns, shouldn't the program capture all of the threats and eliminate them? Is there another program other than malwarebytes that can do that? If I start deleting each affected folder, pretty soon I will have none left. If deleting the downloads folder is the only option I will consider it and run the program again.

Link to post
Share on other sites

Yes I understand your concerns, obviously deleting the full folders is not an option when precious pictures are also present.. I`ll go over the logs again and see which entries always seem to return. Will take awhile....

Can you also run the following scan so we can see what else is happening with your system...

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status... Right click on FRST and rename FRSTEnglish if English is not your primary language
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
    user posted image
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.

Thank you,

Link to post
Share on other sites

Those two logs look good, nothing at all untoward... The following entries seem to be the ones that return, we can shift them with FRST...


Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.