valsi Posted July 1 ID:1575325 Share Posted July 1 I have Malwarebytes premium which detected virus's and trojans, and since that time my chrome:\\Apps page is broken, and when I un/reinstall chrome (which doesn't fix the issue), chrome tries to open a malicious website which malware bytes blocks. Something else new is that malwarebytes browser guard blocks the website "repostexchange" which I've used for years, and tells me it gets too many requests, or something to that affect. The only other computer I have Google Chrome on is an IMac. Virus text.txt Addition.txt FRST.txt Link to post Share on other sites More sharing options...
valsi Posted July 1 Author ID:1575332 Share Posted July 1 The website "repostexchange" gets blocked by browserguard now with the message "Website blocked due to excessive notification requests" This happened since the virus attacks. Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 1 ID:1575348 Share Posted July 1 Hello I will guide you along on looking for remaining malware. Lets keep these principles as we go along. Removing malware can be unpredictable. Do please have lots of patience. Please don't run any other scans, download, install or uninstall any programs while I'm working with you. Only run the tools I guide you to. Do not run online games while case is on-going. Do not do any free-wheeling web-surfing. The removal of malware isn't instantaneous, please be patient. Cracked or or hacked or pirated programs are not only illegal, but also will make a computer a malware victim. Having such programs installed, is the easiest way to get infected. It is the leading cause of ransomware encryptions. It is at times also big source of current trojan infections. Please uninstall them now, if any are here, before we start the cleaning procedure. Please stick with me until I give you the "all clear". If your system is running Discord, please be sure to Exit out of it while this case is on-going. I would like you to begin with what follows. Just keep in mind we will be doing several tasks, over multiple passes / replies / sessions. There is not a one-shot cure. Take these actions so that Windows 11 is set to show all hidden files and folders. Open File Explorer from the taskbar. Select View > Show > Hidden items. Select View → Show → File name extensions If possibly you have a browser issue, can you try using a different web browser? But in any event, always SAVE the downloads I guide you to. Then after download is complete, you go to the file using File Explorer. and only then, launch it from there. Let's do one special run with Malwarebytes Adwcleaner. It will not take much time, Read over all lines before starting so that you have a good understanding of the whole method. Take your time and go careful. I ant to make sure you select all of what I list below - before- pressing the "scan" button. First download & save it guide & download link Then go to where the EXE file is saved. Start Adwcleaner. Do not rush. There are a few first choices to set as I have listed below. Reply YES at the Windows prompt to allow the program to proceed and make changes. That is the usual Windows security prompt. When AdwCleaner starts, on the left side of the window, click on “Settings” and then enable these repair actions on that tab-window by clicking their button to the far-right for ON status Delete IFEO keys Delete tracing keys Delete Prefetch files Reset Proxy Reset IE Policies Reset Chrome policies Reset Winsock Reset HOSTS file ONLY after you have set the selections above ....only after that ..... Now On the left side of the AdwCleaner window, click on “Dashboard” and then click “Scan” to perform a computer scan. This can take several minutes. When the AdwCleaner scan is completed it will display all of the items it has found. Click on the “Quarantine” button To remove what it found. AdwCleaner will now prompt you to save any open files or data as the program will need to close any open programs before it starts to clean. Click on the “Continue” button to finish the removal process. Guide article Attach the clean log from Adwcleaner when all completed. For example AdwCleaner[C00],txt These here are the next steps ( after doing the ones above) if your PC has the Google CHROME browser. Using just the Chrome browser, signin to your Google account ( if not signed in already) https://chrome.google.com/ Then go to https://chrome.google.com/sync? Scroll down the page, press the "CLEAR DATA" button, to clear the Chrome data from your Google account. [ 2 ] for Chrome, while Chrome is running: Press & hold SHIFT+CTRL+Del keys on keyboard to get menu for clearing browsing data: Check mark the line "Browsing history" Check mark the line "Download history" Check mark the lined "Cached images and files" and press Clear Data button ( in blue ) [ 3 ] After that, make real sure that Chrome is "NOT" set to reload the pages from the last session Go into the settings menu of Chrome by first clicking the control icon of Chrome on upper right of the adress bar Then look deeper in SETTINGS Make real sure it is "NOT" set to "continue where you left off" [ 4 ] See this article on our Malwarebytes Bloghttps://blog.malwarebytes.com/security-world/technology/2019/01/browser-push-notifications-feature-asking-abused/ You want to disable the ability of each web browser on this machine from being able to allow "push ads". That means Chrome, Firefox, or Edge browser (on Windows 10), or on Opera. Scroll down to the tips section "How do I disable them". Link to post Share on other sites More sharing options...
valsi Posted July 1 Author ID:1575349 Share Posted July 1 AdwCleaner[C00].txt Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 1 ID:1575351 Share Posted July 1 (edited) Thanks for Adwcleaner report. A good run. Do not forget the last parts of my prior reply on Chrome stuff. Note that the last Malwarebytes did remove 1 Chrome browser extension. When you are all caught up.... Next, I would like you to run a custom task. First, please do a Windows Restart. Please run the following custom script. Read all of this before you start. NOTE-1: This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will empty all temporary file areas. It attempts to run MS Defender antivirus scans. It will attempt to remove the Chrome "startup link setting "chrome://apps/". Depending on the speed of your computer this fix may take 50-55 minutes or more. Please Close all open work. Farbar FRST64 program location: Downloads folder Please download the attached fixlist.txt file and save it to Downloads Fixlist.txt <- < - - - - NOTE. It's important that both files, FRST64, and fixlist.txt are in the same location or the fix will not work. RIGHT-click with your mouse on FRST64 and select "Run as Administrator" and be sure you allow to proceed forward. Wait until the GUI window shows and is ready. Then press the Fix button just once and wait. You will see a green-color scroll display while FRST is running. If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Downloads folder (Fixlog.txt) . Please attach or post it to your next reply. Note: If the tool warned you about an outdated version please download and run the updated version. The system will be rebooted after the fix has run. Attach FIXLOG.txt with net reply. NOTICE: For other potential outside readers, This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone. Edited July 1 by Maurice Naggar Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575361 Share Posted July 2 Fixlog.txt Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 2 ID:1575363 Share Posted July 2 Thanks. A good run. I am pleased by the report. We will have more to do later. At this point, I would like you to start (launch) the Google Chrome browser. Then check as to how it starts up. Then do a test. with Chrome open on this here, click on this link https://microsoft.com Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575402 Share Posted July 2 The apps page is still broken. A few of days ago I deleted google in app data under users my user name, it worked for a couple of days, then broke again. Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575404 Share Posted July 2 I'm also still getting this : repostexchange.com (blocked for excessive notification requests) Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 2 ID:1575422 Share Posted July 2 Do a new scan with Malwarebytes for Windows. Do a Check for Update using the Malwarebytes Settings >> General tab. See this Support Guide https://support.malwarebytes.com/hc/en-us/articles/360042187934-Check-for-updates-in-Malwarebytes-for-Windows When it shows a new version available, Accept it and let it proceed forward. Be sure it succeeds. If prompted to do a Restart, just please follow all directions. Let me know how that goes. Next, the Malwarebytes scan Next, click the small x on the Settings line to go to the main Malwarebytes Window. Next click the blue button marked Scan. When the scan phase is done, be real sure you Review and have all detected lines items check-marked on each line on the left. That too is very critical. >>>>>> 👉 You can actually click the topmost left check-box on the very top line to get ALL lines ticked ( all selected). <<<< 💢 Please double verify you have that TOP check-box tick marked. and that then, all lines have a tick-mark Then click on Quarantine button. Then, locate the Scan run report; export out a copy; & then attach in with your reply. See https://support.malwarebytes.com/hc/en-us/articles/360038479194-View-Reports-and-History-in-Malwarebytes-for-Windows-v4 Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575430 Share Posted July 2 Virus Scan.txt Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 2 ID:1575434 Share Posted July 2 The Malwarebytes scan reports no active malware, no threat.-Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 271942 Threats Detected: 0 I must remark that the "manual" change on Chrome was not advisable. You mentioned I deleted google in app data under users my user name As far as Chrome browser is concerned, take some quiet time to do as stated on this post by Advancedsetup.https://forums.malwarebytes.com/topic/258938-resetting-google-chrome-to-clear-unexpected-issues/ Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575441 Share Posted July 2 "I deleted google in app data under users my user name" I did that days before I started working with you. :) Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575467 Share Posted July 2 I did the Force Reset of Google Chrome and when I installed the extension AdBlock for Youtube Malwarebytes blocked an RTB Threat. Please see Attachment. When I uninstalled the Extension Adblock for Youtube "Browser Guard" gave this warning: Website blocked due to riskware Website Blocked: tmp.cnam3.comMalwarebytes Browser Guard blocked this page because it may contain malicious activity. We strongly recommend you do not continue. You may be putting your safety at risk by visiting this site. For more information, visit Malwarebytes Support. Adblock Youtube.txt Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 2 ID:1575468 Share Posted July 2 3 hours ago, valsi said: "I deleted google in app data under users my user name" I did that days before I started working with you. :) I would still recommend that you go forward & proceed to do like outlined by Advancedsetup.https://forums.malwarebytes.com/topic/258938-resetting-google-chrome-to-clear-unexpected-issues/ Link to post Share on other sites More sharing options...
valsi Posted July 2 Author ID:1575475 Share Posted July 2 57 minutes ago, Maurice Naggar said: I would still recommend that you go forward & proceed to do like outlined by Advancedsetup.https://forums.malwarebytes.com/topic/258938-resetting-google-chrome-to-clear-unexpected-issues/ I did everything in that link you sent me. I think the extension Adblock for YouTube was causing the virus issues as per my post quote below. As for the google://apps issue I have no idea. 1 hour ago, valsi said: I did the Force Reset of Google Chrome and when I installed the extension AdBlock for Youtube Malwarebytes blocked an RTB Threat. Please see Attachment. When I uninstalled the Extension Adblock for Youtube "Browser Guard" gave this warning: Website blocked due to riskware Website Blocked: tmp.cnam3.comMalwarebytes Browser Guard blocked this page because it may contain malicious activity. We strongly recommend you do not continue. You may be putting your safety at risk by visiting this site. For more information, visit Malwarebytes Support. Adblock Youtube.txt 725 B · 3 downloads Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 3 ID:1575490 Share Posted July 3 Please don't run any other scans, download, install or uninstall any programs while I'm working with you. Only run the tools I guide you to. Do not run online games while case is on-going. Do not do any free-wheeling web-surfing. The removal of malware isn't instantaneous, please be patient. Cracked or or hacked or pirated programs are not only illegal, but also will make a computer a malware victim. Having such programs installed, is the easiest way to get infected. It is the leading cause of ransomware encryptions. It is at times also big source of current trojan infections. Please uninstall them now, if any are here, before we start the cleaning procedure. Please stick with me until I give you the "all clear". If your system is running Discord, please be sure to Exit out of it while this case is on-going. I would like a report set for review. This is a report only. Please download MALWAREBYTES MBST Support Tool Once you start it click Advanced >>> then Gather Logs Have patience till the run has finished. Attach the mbst-grab-results.zip from the Desktop to your reply.. Link to post Share on other sites More sharing options...
valsi Posted July 3 Author ID:1575497 Share Posted July 3 mbst-grab-results.zip Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 3 ID:1575508 Share Posted July 3 (edited) Next, I would like you to run a custom task. First, please do a Windows Restart. Please run the following custom script. Read all of this before you start. NOTE-1: It will do a new attempt to remove the Chrome "startup link setting "chrome://apps/". It attempt to get more details about Chrome. It attempts to help a bit on the problematic attempts to reach a couple of riskware IP's. Depending on the speed of your computer this fix may take 50-55 minutes or more. Please Close all open work. Farbar FRST64 program location: Downloads folder Please download the attached fixlist.txt file and save it to Downloads Fixlist.txt <- < - - - - NOTE. It's important that both files, FRST64, and fixlist.txt are in the same location or the fix will not work. RIGHT-click with your mouse on FRST64 and select "Run as Administrator" and be sure you allow to proceed forward. Wait until the GUI window shows and is ready. Then press the Fix button just once and wait. You will see a green-color scroll display while FRST is running. If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Downloads folder (Fixlog.txt) . Please attach or post it to your next reply. Note: If the tool warned you about an outdated version please download and run the updated version. The system will be rebooted after the fix has run. Attach FIXLOG.txt with net reply. NOTICE: For other potential outside readers, This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause unforeseen damage to your machine that cannot be undone. Edited July 3 by Maurice Naggar Link to post Share on other sites More sharing options...
valsi Posted July 3 Author ID:1575549 Share Posted July 3 Fixlog.txt Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 3 ID:1575572 Share Posted July 3 Thank you for the log. That is a good run. There should be no more block notices about tmp.cnam3[.]com. For Your Information: The Block notices from Malwarebytes web protection do mean that Malwarebytes is keeping your pc safe from potential harm. A block notice is an advisory of the "block". A "malicious website blocked" is entirely different from a "malware detected" event. The website Block message indicates that a potential risk was blocked by the malicious website protection. The Malwarebytes web protection, by default, will always show each IP block occurrence. The Malwarebytes Web-protection feature will advise customers when a known or suspected malicious IP is attempted to be reached (outgoing) or is trying access your PC. Incoming block notice can be ignored, the Malwarebytes real-time protection is blocking the threat and there is nothing more that can be done. On Outbound blocks, any attempted connection was stopped. No action is required unless you’re also experiencing malware symptoms or there are multiple (different) IPs (ex;123.23.34 and 4.44.56). A browser is not required to be running, just an active Internet connection with processes running, such as Instant messenger clients, DISCORD, or Instagram, SKYPE or Peer-to-peer software, to trigger these alerts. These are also triggered by banner ads running on websites which is the most common form of alert. Link to post Share on other sites More sharing options...
valsi Posted July 3 Author ID:1575583 Share Posted July 3 Ok, thank you for your help. Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 4 ID:1575637 Share Posted July 4 We can do one additional scan. The Microsoft Safety Scanner is a free Microsoft stand-alone virus scanner that can be used to scan for & remove malware or potentially unwanted items from a system. This tool does not install. It is run on-demand. This link is for the 64-bit version of MSERT.exe . Be sure you save the file firsthttps://definitionupdates.microsoft.com/download/DefinitionUpdates/safetyscanner/amd64/MSERT.exe Upon completion of the save, Please make sure you Exit out of any other program you might have open so that the sole task is to run the following scan. That goes especially for web browsers, make sure all are fully exited out of and messenger programs are exited and closed as well Launch MSERT.exe Accept the agreement terms of Microsoft Select CUSTOM scan Look on Scan Options & select CUSTOM scan & then select the C drive to be scanned. Then start the scan. Have lots of patience. Once you start the scan & you see it started, then leave it be. Once you see it has started, take a long long break; walk away. Do not pay credence if you see some intermediate early flash messages on screen display. The only things that count are the End result at the end of the run. Again, any on-screen display about repeat 'infection' is not to be relied on. Ignore those. We only rely on the end result that is on the log-report-file. This is likely to run for many hours ( depending on number of files on your machine & the speed of hardware.) The log is named MSERT.log the log will be at Windows\debug\msert.log Please attach that log with your reply It is normal for the Microsoft Safety Scanner to show 'detections' during the scan process on the screen itself. It is scanning for basically all bread crumbs or traces of files and registry entries that "might" be or have been part of some infection or previous infection. That DOES NOT mean the computer is infected. Once the scan has been completed it uploads the log to their Cloud service which then uses Artificial Intelligence to determine if in fact any of the traces are an infection or not. Link to post Share on other sites More sharing options...
valsi Posted July 4 Author ID:1575726 Share Posted July 4 msert.log Link to post Share on other sites More sharing options...
Maurice Naggar Posted July 4 ID:1575749 Share Posted July 4 Thank you for the report. There was no actual malicious infection. Now some adjustments. Start Malwarebytes. Click Settings ( gear ) icon. Next, lets make real sure that Malwarebytes does NOT register with Windows Security Center Click the Security Tab. Scroll down to "Windows Security Center" Click the selection to the left for the line "Always register Malwarebytes in the Windows Security Center". { We want that to be set as Off .... be sure that line's radio-button selection is all the way to the Left. thanks. } This will not affect any real-time protection of the Malwarebytes for Windows 😃. Close Malwarebytes. ( 2 ) Current DNS Servers: 192.168.1.1 Please consider changing your default DNS Server settings. Please choose one provider only DNS is what lets users connect to websites using domain names instead of IP addresses Pick just one of these 4 providers. And be aware that you need to modify 1 time for IPV4 & a 2nd pass for IPv6 Google Public DNS: IPv4 8.8.8.8 and 8.8.4.4 IPv6 2001:4860:4860::8888 and 2001:4860:4860::8844 Cloudflare: IPv4 1.1.1.1 and 1.0.0.1 IPv6 2606:4700:4700::1111 and 2606:4700:4700::1001 OpenDNS: IPv4 208.67.222.222 and 208.67.220.220 IPv6 2620:119:35::35 and 2620:119:53::53 DNSWATCH: IPv4 84.200.69.80 and 84.200.70.40 IPv6 2001:1608:10:25::1c04:b12f and 2001:1608:10:25::9249:d69b The Ultimate Guide to Changing Your DNS Serverhttps://www.howtogeek.com/167533/the-ultimate-guide-to-changing-your-dns-server/ Here is a YouTube video on Changing DNS settings if needed Link to post Share on other sites More sharing options...
Recommended Posts