Jump to content

Daily malware found on my brand new PC

Recommended Posts

I am having an issue, where Malwarebytes finds on my PC a few items that need to be quarantined. You can find logs below.
I have a brand new PC, and I've downloaded all programs on my PC from trusted sources - no torrents, no nothing. 

The files seem to come from Google Chrome, which was also downloaded fresh. Would you propose any solutions?





-Log Details-
Scan Date: 11/20/23
Scan Time: 4:39 PM
Log File: 0f08af10-87bb-11ee-bb95-74563c1bca2a.json

-Software Information-
Components Version: 1.0.2201
Update Package Version: 1.0.77506
License: Trial

-System Information-
OS: Windows 10 (Build 19045.3693)
CPU: x64
File System: NTFS
User: System

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Scheduler
Result: Completed
Objects Scanned: 238086
Threats Detected: 20
Threats Quarantined: 20
Time Elapsed: 0 min, 27 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 4
Adware.Elex.ShrtCln, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 6526, 454728, , , , , , 
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 338, 455071, , , , , , 
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 338, 455071, , , , , , 
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 338, 455071, , , , , , 

File: 16
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000005.ldb, Quarantined, 6526, 454728, , , , , 83B36C1B8C37EC2EEA0905AFC771D556, BF24FF3975F24B62053A2F68EE68004C3A1F117217B2AEB86EDA9F70B29EB19A
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.ldb, Quarantined, 6526, 454728, , , , , 18FC59EA75D7BC7E8A76B63B268B9E6D, 78B8B6A8F186EABE652E3ECD4F448394FB3E460177AD8DD2F2FF211B4760298C
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000009.ldb, Quarantined, 6526, 454728, , , , , B228ADBC27A15D4B9CDB34A7A13C2829, A93FD3C43A2B4CE0EBABA9AB6FDC74A658CFF918B050459D2698382ED60D8BC7
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000011.ldb, Quarantined, 6526, 454728, , , , , EFB09A81D339A092B81D958FEC526A0C, 153C2832DCEE4D7FB5DF72E06E182A5ADE9335377FF41CF9C285B7D76CED0A7E
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000012.log, Quarantined, 6526, 454728, , , , , 567C04018F9D340C122CA5084586F136, E1600EE130FF247FD7794E0585B235B9E187661B3B5EAF3E06083E1D9ECFC900
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000013.ldb, Quarantined, 6526, 454728, , , , , 628A56E0121FB146408ACFE0E8A877BD, 6A3DB8031650487F53EA63FF6E366C39ACA5C8C8BF4EC366F30604C35386F4C5
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT, Quarantined, 6526, 454728, , , , , 46295CAC801E5D4857D09837238A6394, 0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK, Quarantined, 6526, 454728, , , , , , 
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG, Quarantined, 6526, 454728, , , , , 41A5BDC59CCFE18B80058327DFF02991, FD5EE6F0630605C9F24B4E6D6626E0FB500DB09702DB1C309E9DB9CE8002ACDD
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old, Quarantined, 6526, 454728, , , , , BB39182294A6091AA7C26D725E725A37, F5E8D5D3D5AADD88E4B3D85F0EEED3D83D93F0DA22E4CE073E76C8D52CFEF292
Adware.Elex.ShrtCln, C:\Users\PC\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000001, Quarantined, 6526, 454728, , , , , 16465BB3E438C612B529566FB4CC18EA, DAEA1B5BB9471A8808482801A58E9A7EE1D71BECAFFC1AA379A3D73987F5275D
Adware.Elex.ShrtCln, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, 6526, 454728, , , , , 08CC022E30927B866362462F041E074A, 32A24D542F218246E5ACC4A50E1385867F4168A4E16F6E82B2AB088E00BEA01E
Adware.Elex.ShrtCln, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 6526, 454728, 1.0.77506, , ame, , A2D5904BCFDA9805705CAD6CF9501C08, E37FF50331593BECCE365C94C7CBEAF70B4061E2053FB879C885274D9956B240
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 338, 455071, 1.0.77506, , ame, , A2D5904BCFDA9805705CAD6CF9501C08, E37FF50331593BECCE365C94C7CBEAF70B4061E2053FB879C885274D9956B240
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, 338, 455071, 1.0.77506, , ame, , 44A8B44AD86AFA90C7FB094597F1B1DF, B719B0C4F11FC7221D3DEB43BD696963592033EB17AD6341AD28A5DDFA8A74A2
PUP.Optional.Delta, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, 338, 455071, 1.0.77506, , ame, , 44A8B44AD86AFA90C7FB094597F1B1DF, B719B0C4F11FC7221D3DEB43BD696963592033EB17AD6341AD28A5DDFA8A74A2

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)



Best regards,

Link to post
Share on other sites

Hello @xzff_  and  :welcome:


My name is MKDB and I will assist you.



Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Please follow the steps in the given order and post back the log files.
  • Please attach all log files into your post.
  • Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Only run the tools I guide you to. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • As English is not my native language, please do not use slang or idioms. It may be hard for me to understand.
  • If you do not respond within 4 days, your topic will be closed.
  • Cracked or hacked or pirated programs are not only illegal, but also will make a computer a malware victim. Having such programs installed, is the easiest way to get infected. It is the leading cause of ransomware encryptions. It is at times also a big source of current trojan infections. If you are running any kin of illegal software on your system, please uninstall them now, before we start the cleaning procedure.




Adware.Elex.ShrtCln, C:\USERS\PC\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Quarantined, 6526, 454728, , , , , , 

Your sync data on Google's server are infected with Adware/PUP. You have to delete all sync data from all devices (see Step 1).

As long as you do not delete all of your sync data, every system get's infected once you log into your account... again and again... no matter if it's a new system or not.

Moreover, I would like you to run FRST (Step 2) as well to look for hidden PUP/Adware/Malware on your system.



Step 1

Please follow the directions from the following topic for a more extensive article on cleaning Google Chrome:
Resetting Google Chrome to clear unexpected issues

Reboot your system after you have finished that.



Step 2

Please download the suitable version of Farbar Recovery Scan Tool (FRST) and save it to your desktop: 32bit | 64bit




Link to post
Share on other sites


We will use Farbar Recovery Scan Tool (FRST) to run a fix. FRST was downloaded together with MBST and should be located in your download folder: C:\Users\PC\Downloads\FRST64.exe

The fix may take some time, please be very patient and do not interfere.



Step 1

  • Please download the attached fixlist.txt file and save it to your download folder, which is C:\Users\PC\Downloads\ in your case.
  • You will find the file FRSTEnglish.exe (FRST) as well in this folder.

Note: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  • Close all open programs and save your work.
  • Run FRST.
  • Press the Fix button only once and wait. Please be patient and do not interfere, even if FRST does not respond for some time. That's nothing to worry about.
  • Please note: This Fix will remove all temporary files, empty recycle bin and will remove cookies and may result in some websites indicating they do not recognize your computer. It may be necessary to receive and apply a verification code.
  • Please note: This step resets your Firewall settings and you may be asked later to grant permission for legitimate programs to pass through the Firewall. If you recognize the program, agree to the request.
  • If the tool needs a restart, please make sure you let the system restart normally and let the tool complete its run after restart.
  • FRST will create one log now (Fixlog.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.




Link to post
Share on other sites


From the logfile: Windows Resource Protection found corrupt files and successfully repaired them.


Looks good, now please run SecurityCheck.


Step 1

I would like you to run a tool named SecurityCheck to inquire about the current security update status of some applications.

  • Download SecurityCheck by glax24: https://tools.safezone.cc/glax24/SecurityCheck/SecurityCheck.exe
  • If Microsoft SmartScreen blocks the download, click through to save the file
  • This tool is safe.   Smartscreen is overly sensitive.
  • If SmartScreen blocks the file from running click on More info and Run anyway
  • Right-click  with your mouse on the Securitycheck.exe  and select "Run as administrator"  and reply YES to allow to run & go forward
  • Wait for the scan to finish. It will open a text file named SecurityCheck.txt Close the file.  Attach it with your next reply.
  • You can find this file in a folder called SecurityCheck, C:\SecurityCheck\SecurityCheck.txt
Link to post
Share on other sites



Thank you for your cooperation. You can use KpRm to remove FRST and other tools.


Please download KpRm by kernel-panik and save it to your desktop.

  • Right-click kprm_(version).exe and select Run as Administrator.
  • Read and accept the disclaimer.
  • When the tool opens, select Delete Tools under Actions.
  • Under Delete Quarantines select Delete Now, then click Run.
  • Once complete, click OK.
  • A log may open in Notepad titled kprm-(date).txt.  I do not need it. Just close Notepad if it shows up.




A few final recommendations:

  1. Recommend using a Password Manager for all websites, etc. that require a password. Never use the same password on more than one site.
  2. Make sure you're backing up your files https://forums.malwarebytes.com/topic/136226-backup-software/
  3. Keep all software up to date - PatchMyPC - https://patchmypc.com/home-updater#download
  4. Keep your Operating System up to date and current at all times - https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2
  5. Further tips to help protect your computer data and improve your privacy: https://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/


  1. Please consider installing the following Content Blockers for your Web browsers if you haven't done so already. This will help improve overall security

Malwarebytes Browser Guard

uBlock Origin


Further reading if you like to keep up on the malware threat scene: Malwarebytes Blog  https://blog.malwarebytes.com/

Hopefully, we've been able to assist you with correcting your system issues.

Thank you for using Malwarebytes.



Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection.

Thank you.


As this topic seems to be solved, I do not follow it any longer.

Take care!

Link to post
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.