Jump to content

Recommended Posts

Hi.

Yesterday morning I received the exact same message from Avira as described in the discussion below

 


I managed to quarantine + delete the file using Avira and I also ran a Malware Bytes scan to remove the infected registry keys + files. Here's the Malware Bytes log:

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 10/29/23
Scan Time: 12:19 PM
Log File: 0413ec22-760a-11ee-b607-08bfb82fe68a.json

-Software Information-
Version: 4.6.5.293
Components Version: 1.0.2181
Update Package Version: 1.0.76694
License: Trial

-System Information-
OS: Windows 11 (Build 22621.2428)
CPU: x64
File System: NTFS
User: DESKTOP-1QD2V84\USER

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 242485
Threats Detected: 30
Threats Quarantined: 0
Time Elapsed: 10 min, 38 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 3
Trojan.PowerShell.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\WCM\WiFiTaskcxCNfjIQw, No Action By User, 11002, 1092540, , , , , , 
Trojan.PowerShell.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7283441D-8BB3-4E98-B6BF-3FD5045B88AC}, No Action By User, 11002, 1092540, , , , , , 
Trojan.PowerShell.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{7283441D-8BB3-4E98-B6BF-3FD5045B88AC}, No Action By User, 11002, 1092540, , , , , , 

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 8
PUP.Optional.PushNotifications.Generic, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 9653, 1094562, , , , , , 
PUP.Optional.PushNotifications.Generic, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 9653, 1094562, , , , , , 
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 33, 455059, , , , , , 
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 2195, 479120, , , , , , 
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 33, 455059, , , , , , 
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 2195, 479120, , , , , , 
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 33, 455059, , , , , , 
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Sync Data\LevelDB, No Action By User, 2195, 479120, , , , , , 

File: 19
Trojan.PowerShell.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\WCM\WiFiTaskcxCNfjIQw, No Action By User, 11002, 1092540, , , , , C915065066E7EED8B8BEC18DEE6E0118, E7E0E40988D60234BB27BE39B8CE3507E4BB8069DEFE444688A460E4C2B29A0C
Trojan.PowerShell.Generic, C:\WINDOWS\SYSTEM32\0F527CF7-99C3-484C-8F21-5A4181FF399A.ps1, No Action By User, 11002, 1092540, 1.0.76694, , ame, , 37B178BA81C694302628B3FD78ABB484, 3895D270F48971736EB737ED7CFAAD838423E3D1248ED7979C534D12B8D098BB
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\000005.ldb, No Action By User, 9653, 1094562, , , , , 0015559D7AE11692757E4E7088CE4025, 09B173E539AA59AD6B4A9209D0AE58CD761ED41C87F880CAAB15C98E6CA5F43D
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\000265.ldb, No Action By User, 9653, 1094562, , , , , B1C1BDA2E26619AEFC020078A449D0E8, 9B6F83DCD2E5CE0B53B0D1077893AAA097B90F0370C60C72E2772F593ACABD07
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\000266.log, No Action By User, 9653, 1094562, , , , , 177D04B87B9B078368066159BBFD2385, 4FA3C472C31107622A4BC228F409DBD3E88272C00A655F5F72D6669CAE503ED1
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\000267.ldb, No Action By User, 9653, 1094562, , , , , 0D5AC5E6C3C07487242235B5ABD26E41, FDD5B23EC303ACE8EED11A3227BEDD98B4E3D1B85E1C918B5FC8391A85793F62
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\CURRENT, No Action By User, 9653, 1094562, , , , , 46295CAC801E5D4857D09837238A6394, 0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\LOCK, No Action By User, 9653, 1094562, , , , , , 
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\LOG, No Action By User, 9653, 1094562, , , , , 8E37ED383EB7ADFE6E2B6937F0B9384D, A7BD12C547614B74648CEBB5CE29DD97760A58545D5FD8017ECCB92D0749354A
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\LOG.old, No Action By User, 9653, 1094562, , , , , E41F710B3E2095240CB4852973D23306, C791DE6DA48B26769C27DDCD3AD3337652DEBCB9F4FB8510236D3D120A35D7E2
PUP.Optional.PushNotifications.Generic, C:\Users\USER\AppData\Local\Google\Chrome\User Data\Profile 2\Sync Data\LevelDB\MANIFEST-000001, No Action By User, 9653, 1094562, , , , , 471BA0BFA20A8CA3804C1B99339D7D3F, 891CC10B5CD686F55FE8313B8EEA055D17424A4D9DE817685575DB5E3F74A475
PUP.Optional.PushNotifications.Generic, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 9653, 1094562, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.PushNotifications.Generic, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 9653, 1094562, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 33, 455059, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 2195, 479120, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 33, 455059, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 2195, 479120, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Babylon, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 33, 455059, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2
PUP.Optional.Claro, C:\USERS\USER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Profile 2\Web Data, No Action By User, 2195, 479120, 1.0.76694, , ame, , D4C8EF312651AC93DBDCA0D99E3396FB, 9B947CA00A56AC4577B27EAE174749B709910CCF51D816B7588BDD11EB6D98C2

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)


---

After this I restarted the system, performed additional checks using Avira, MB and Eset and ran Adware Cleaner and they all say my system is clean now but I wanted to know if you can help me know for sure.

 

Thank you.

Lauren

Link to post
Share on other sites

  • Root Admin

Hello  and  :welcome:    @laurenmor

 

My screen name is AdvancedSetup and I will assist you with your system issues.
 

Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Removing pesky malware can be an involved set of tasks over separate runs. Have much patience. Follow my directions. 
  • Please follow all steps in the provided order and post back all requested logs.
  • Please attach all log files to your post, unless otherwise requested.
  • Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
  • Searching, detecting, and removing malware isn't instantaneous and there is no guarantee to repair every system.
  • Before we start, please make sure that you have an external backup of all private data.
  • Do not run online games while your case is ongoing. Do not do any free-wheeling of risky web-surfing.
  • Only run the tools I guide you to use. Please don't run any other scans, download, install or uninstall any programs while I'm working with you unless requested.
  • Cracked, Hacked, or Pirated programs are not only illegal but also can make a computer a malware victim.
    Having such programs installed is the easiest way to get infected. It is the leading cause of ransomware encryption. It is at times also a big source of current Trojan infections. 
    If there are any on the system you should uninstall them before we proceed.  
  • If your system is running Discord, or P2P Torrent software, please be sure to Exit out of it while this case is on-going.


Do these two steps so that ALL Folders & Files are set to SHOW, plus also, Turn OFF Windows Fast start.

Show-Hidden-Folders-Files-Extensions
https://forums.malwarebytes.com/topic/299345-show-hidden-folders-files-extensions/

Disable-Fast-Startup
https://forums.malwarebytes.com/topic/299350-disable-fast-startup/
 

  • Next, please restart Windows

  • Please be patient and stick with me until I give you the "all clear" or otherwise indicate all is good

 

 

Please run the following ESET Online Scanner and perform a Full Scan

 

Click the following link to save the installer for ESET Online Scanner

https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe

  • It will start a download of "esetonlinescanner.exe"
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get started. 
  • When presented with the initial ESET screen, click on "Get Started". Read and accept the Terms of use
  • On the "Before we start..." screen chose if you want to send anonymous data and if you want to provide feedback or not, then click Continue
  • When prompted for scan type, Click on the Full Scan button
  • Enable  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click the Start scan button.
  • Have patience.  The entire process may take a few hours or more.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log and give it a name and location you remember.
  • If something was removed and you know it is a false postive, you may click on the blue ”Restore cleaned files”  ( in blue, at the bottom).
  • Press Continue when all done.  You should click to turn off the offer for “periodic scanning”.
  • Enable "Delete application data on closing" - You do not need to submit feedback unless you want to. Simply ignore and close the program.

 

Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3

https://support.eset.com/en/kb2915-restore-files-quarantined-by-the-eset-online-scanner

 

Please attach the ESET scan log you saved at the end to your next reply

 

Link to post
Share on other sites

  • Root Admin

Thank you. ESET did not find any issues. Let's double-check using a Microsoft scan as well

 

 

Microsoft Safety Scanner

Please make sure you Exit out of any other program you might have open so that the sole task is to run the following scan.   
That goes especially for web browsers, make sure all are fully exited out of and messenger programs are exited and closed as well
 

STEP 1

Please set File Explorer to SHOW ALL folders, all files, including hidden ones.  Use OPTION ONE or TWO of this article

https://www.tenforums.com/tutorials/7078-turn-off-show-all-folders-windows-10-navigation-pane.html

STEP 2

I suggest a new scan for viruses & other malware. This may take several hours, depending on the number of files on the system and the speed of the computer.

The Microsoft Safety Scanner is a free Microsoft stand-alone virus scanner that can be used to scan for & remove malware or potentially unwanted software from a system. 

The download links & the how-to-run-the tool are at this link at Microsoft 

https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download

 

Look on the Scan Options & select the FULL scan.

Then start the scan. Have lots of patience. It may take several hours.

  • Once you see it has started, take a long long break;  walk away.  Do not pay credence if you see some intermediate early flash messages on the screen display.  The only things that count are the End result at the end of the run.
  • The scan will take several hours.  Leave it alone. It will remove any other remaining threats as it goes along.  Take a very long break, do your normal personal errands .....just do not use the computer during this scan.

This is likely to run for many hours as previously mentioned  ( depending on the number of files on your machine & the speed of the hardware.)

The log is named MSERT.log  and the log will be at C:\Windows\debug\msert.log

Please attach that log with your next reply.

 

It is normal for the Microsoft Safety Scanner to show detections during the scan process.

It is scanning for basically all bread crumbs or traces of files and registry entries that "might" be or have been part of some infection or previous infection.

That DOES NOT mean the computer is infected. Once the scan has been completed it uploads the log to their Cloud service which then uses Artificial Intelligence to determine if in fact any of the traces are an infection or not.

Then it writes into the log on your computer what it found.

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

Great, nothing found there either.

 

Let's go ahead and run a couple of scans and get some updated logs from your system.


Please make the following changes.

 

  • Temporarily disable your antivirus real-time protection or other security software first if it blocks or interferes with the scans or downloads.. Make sure to turn it back on once the scans are completed.
  • Temporarily disable Microsoft SmartScreen to download software below only if needed. Make sure to turn it back on once the scans are completed.
  • Disable-Fast-Startup
  • Show-Hidden-Folders-Files-Extensions

 


Next, run these steps and post back the logs as an attachment when ready.


[ 1 ]

Malwarebytes for Windows

  • If you already have Malwarebytes installed then open Malwarebytes and click on the small gear icon, then click on the "Check for updates" button on the General tab.
  • After any updates, click the middle Scan button from the main page. It will automatically run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed, make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let us know in your next reply that the scanner would not run.

[ 2 ]

Malwarebytes AdwCleaner

  • Please download Malwarebytes AdwCleaner and save the file to your Desktop or Downloads folder.
  • Double-click to run the program - Malwarebytes AdwCleaner guide
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • DO NOT uninstall or remove the Preinstalled software if found. Uncheck any items listed as Preinstalled
  • When finished, if items are found please click Quarantine to finish the cleaning process.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach that log to your next reply.
     
  • If No Detections are found, Click Skip Basic Repair

    WARNING: Do Not click the Run Basic Repair button unless instructed to by a Malwarebytes support agent or authorized helper


 

RESTART THE COMPUTER Before running Step 3

[ 3 ]

Gather MBST Logs

Please do the following so that we may take a closer look at your system for any possible infections.

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to the Public desktop, please upload that file on your next reply

    WARNING: Do Not click the Repair System under Advanced unless requested to by a Malwarebytes support agent or authorized helper

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

Thank you, please follow the steps below

 

[ 1 ]

Please go to Control Panel, Programs, Programs and Features, Uninstall a program

Then right-click and uninstall the following

  • Bonjour

 

 

[ 2 ]

Your current DNS Servers:   210.220.163.82 - 219.250.36.130

Please consider changing your default DNS server settings. Please choose one provider only

DNS is what lets users connect to websites using domain names instead of IP addresses

Pick just one of these 4 providers. And be aware that you need to modify 1 time for IPv4 & a 2nd pass for IPv6

  • Google Public DNSIPv4   8.8.8.8 and 8.8.4.4   IPv6   2001:4860:4860::8888 and 2001:4860:4860::8844
  • CloudflareIPv4   1.1.1.1 and 1.0.0.1   IPv6   2606:4700:4700::1111 and 2606:4700:4700::1001
  • OpenDNSIPv4   208.67.222.222 and 208.67.220.220  IPv6  2620:119:35::35 and 2620:119:53::53
  • DNSWATCHIPv4   84.200.69.80 and 84.200.70.40   IPv6  2001:1608:10:25::1c04:b12f and 2001:1608:10:25::9249:d69b


The Ultimate Guide to Changing Your DNS Server
https://www.howtogeek.com/167533/the-ultimate-guide-to-changing-your-dns-server/

Here is a YouTube video on Changing DNS settings if needed

 

 

RESTART the computer.

 

If you continue to have this block alert then please contact Avira and ask them what's up with it.

 

 

Link to post
Share on other sites

  • Root Admin

The logs are not showing an obvious infection at this point.

 

SecurityCheck by glax24              


I would like you to run a tool named SecurityCheck to inquire about the current security update status of some applications.
CheckSecurity is a utility for quickly checking for the presence of vulnerable applications

  • Temporarily disable Microsoft SmartScreen to download the software
  • Download SecurityCheck by glax24: https://tools.safezone.cc/glax24/SecurityCheck/SecurityCheck.exe
  • If SmartScreen blocks the file from running click on More info and Run anyway
  • This tool is safe.   Smartscreen is overly sensitive. You can check the VirusTotal scan of the tool from here
  • Right-click  with your mouse on the Securitycheck.exe  and select "Run as administrator"  and reply YES to allow to run & go forward
  • Wait for the scan to finish. It will open a text file named SecurityCheck.txt Close the file.  Attach it with your next reply.
  • You can find this file in a folder called SecurityCheckC:\SecurityCheck\SecurityCheck.txt

Checked parameters:

  1. User Account Control (UAC).
  2. Service pack.
  3. IE version.
  4. Automatic OS update. Sets of critical KB patches when updating is disabled.
  5. Antivirus, firewall, other security utilities.
  6. Versions of Java, Oracle Virtualbox.
  7. Version of Adobe Flash Player, Adobe AIR.
  8. Versions of Adobe Reader, Acrobat Reader DC, Foxit Reader.
  9. Versions of media players (iTunes, AIMP, foobar2000).
  10. Versions of messengers (Skype, Pidgin).
  11. Versions of installed browsers (Chrome, Opera, Firefox, Yandex, SeaMonkey).
  12. Versions of mail programs (The Bat, Thunderbird).
  13. Checking running processes and security program services
  14. Searching for installed Adware programs and optimizer programs (More than 5000).

Thank you

 

Link to post
Share on other sites

  • Root Admin

Please update the following

Adobe Acrobat (64-bit) v.22.003.20263 Warning! Download Update | ^Please run Acrobat Reader DC and go Help - Check for updates...^

 

Reference

---------------------------- [ UnwantedApps ] -----------------------------
Avira System Speedup v.6.26.0.18 << Hidden Warning! Suspected demo version of anti-spyware, driver updater or optimizer.

 

 

You may wish to review this post as well and make up your own mind

 

 

Check for any Windows Updates.

 

 

Let's go ahead and do some clean-up work and remove the tools and logs we've run.

Please download KpRm by kernel-panik and save it to your desktop.

  • right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, ensure all boxes under Actions are checked.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt.
  • Please attach that file to your next reply. (not compulsory)

 

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
    https://www.howtogeek.com/240255/password-managers-compared-lastpass-vs-keepass-vs-dashlane-vs-1password/
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://forums.malwarebytes.com/topic/258363-tips-to-help-protect-from-infection/ 
  6. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin

 

Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes

 

Link to post
Share on other sites

  • 3 weeks later...
  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following to help you better protect your computer and privacy Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.