Jump to content

Deleted Malware comes back after rebooting laptop

Recommended Posts

Hello Kevinf80 I saw your replies to the people in the community and your advise and expertise really helped them and I hope you could help me. I downloaded an unexpected malicious file and now I've been tinkering with my laptop for almost 3hrs and Im using Malwarebytes to remove it but then after removing it at the app. I rebooted my laptop to see if it is really gone but then malwarebytes showed it is still here in my laptop.

Here are my logs


-Log Details-
Scan Date: 8/22/21
Scan Time: 1:41 AM
Log File: 1466070a-02a7-11ec-9626-b4b686d9bc4e.json

-Software Information-
Components Version: 1.0.1358
Update Package Version: 1.0.44258
License: Trial

-System Information-
OS: Windows 10 (Build 18363.719)
CPU: x64
File System: NTFS
User: DESKTOP-AO413S9\Windows 10

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 304576
Threats Detected: 10
Threats Quarantined: 10
Time Elapsed: 2 min, 44 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 6
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServicea, Quarantined, 5172, 954951, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiceb, Quarantined, 5172, 954952, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiced, Quarantined, 5172, 954954, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServicea\PARAMETERS, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiceb\PARAMETERS, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiced\PARAMETERS, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 

Registry Value: 3
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServicea\PARAMETERS|SERVICEDLL, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiceb\PARAMETERS|SERVICEDLL, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 
Backdoor.Farfli, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\AppServiced\PARAMETERS|SERVICEDLL, Quarantined, 5172, 954916, 1.0.44258, , ame, , , 

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 1
Backdoor.Farfli, C:\WINDOWS\SYSTEM32\6Y8RD65696.TMP, Quarantined, 5172, 954951, , , , , 8074F73F7742309B033676CD03EB0928, BE94DF270ACFC8E5470FA161B808D0DE1C9E85EFEEFF4A5D82F5FD09629AFA8E

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)



I hope you could help me this laptop is all I have for my online classes. Thank you and I hope this message finds you well.

FRST.txt Addition.txt

Link to post
Share on other sites

Hiya skytyler15,

Continue with the following:

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.

NOTE. It's important that both files, FRST or FRSTEnglish, and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed.

The following directories are emptied:
  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

user posted image

The system will be rebooted after the fix has run.


Open Malwarebytes, select > small cog wheel top right hand corner, that will open "settings" from there select "Security" tab.

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Close out the settings window, this will take you back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
  • Open Malwarebytes
  • Click on the Detection History tab > from main interface.
  • Then click on "History" that will open to a historical list
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

  • Please use "Text file (*.txt), then name the file and save to a place of choice, recommend "Desktop" then attach to reply


Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
  • Right-click on AdwCleaner.exe and select http://i.imgur.com/Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Download "Microsoft's Safety Scanner" and save direct to the desktop

Ensure to get the correct version for your system....


Right click on the Tool, select Run as Administrator the tool will expand to the options Window
In the "Scan Type" window, select Full Scan
Perform a scan and Click Finish when the scan is done.

Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\msert.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your reply...

Thank you,



Link to post
Share on other sites

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection



Link to post
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.