Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. Normally, it propagates immediately, but for some users, where the detection was happening already, it might still show as detected. I think it has to do with the ISP and if it does proxycaching as well. In either way, any user who didn't have a detection already on these won't get it either. (Hence why I couldn't reproduce detection on my end either)
  3. @miekiemoes, thank you, I can confirm that deleting HubbleCache causes MalwareBytes to no longer warn about this application. Thank you. Any idea how long it would take for this change to normally propagate, so that you don't have to delete it (on other machines, for other people etc.)
  4. Ron, I did all of this and found no infection.
  5. Hello and Welcome back... (glad you found your answer) Yes Anti-Exploit as well as Anit-Ransomware is now part of MB3 Premium with an active license
  6. Hi, This was detected by our MachineLearning engine, which helps to protect even better against 0day threats. Unfortunately, as this is a heuristic engine, it's possible False Positives happen. Also see here for more explanation: However, I can't reproduce detection anymore, so this might have been fixed already. If it's still detected on your end, then Quit malwarebytes from the systemtray. Then navigate to the following folder: C:\ProgramData\Malwarebytes\MBAMService In there, locate the file HubbleCache and delete it. Restart Malwarebytes again. A new Hubblecache will then be created again, so it will properly pick it up and remember to not detect this anymore.
  7. Hello Mnickolas, I reached out and have verified that www.belairinternet.com is not being blocked by Malwarebytes. Warm Regards,
  8. Today
  9. Hello, We have a client who's website is being blocked by malware bytes due to trojan. Just want to confirm it's not a mistake before we go ahead and contact them. belairinternet.com Thanks.
  10. If you download the Deploy.zip from this project: https://github.com/Ben136KBC/CodeXCavator2 Then malwarebytes identifies it as a machine learning thread. This is a code indexing tool, I work on developing it, all the code everything is available, there is nothing malicious. (The same goes for the original version which you can get from here: https://sourceforge.net/p/codexcavator/wiki/Home/ ) Please see if there is a way to avoid this false positive? Thank you.
  11. Thankxx, I will follow-up on your advice.
  12. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  13. As secretary of a foundation for the common good one of my email- addresses is mentioned on the website of the foundation. Since two weeks I'll receive - apparently from myself- a notification that my account is hacked and I have to provide bitcoins to some nutter. Malwarebytes does not recognize this as an apparent hack- attempt. Still I wonder, is there anything to prevent this daily nuisance?
  14. Thanks for your help. I think you may close this thread now.
  15. Yeah I think may be I have very less RAM to run windows 8.1 (only 4Gb). So may that's why even i7 is not performing in full capacity.
  16. Not at the moment. Keep Malwarebytes up to date.
  17. Hi, The program must have been deleted without using the Add/Remove Programs applet. It's only a entry from the Registry. It's not active. If you wish to remove it from the Registry follow these instructions. https://www.bleepingcomputer.com/tutorials/manually-remove-programs-from-add-remove-programs/ === Click on the Fixlist.txt folder in the bottom of my previous post. If you need it the the link is: https://forums.malwarebytes.com/applications/core/interface/file/attachment.php?id=277653
  18. If all is well then your should be good. Glad we could help.
  19. i think quarantine erased data i had put in my calendar. is it possible to restore the information i had put in it?
  20. Hi, This topic has just been published. https://www.bleepingcomputer.com/news/microsoft/windows-april-updates-also-have-problems-with-mcafee-software/ It may not be the reason for your slow boot but who knows. === Check to see if you have received this Windows Update KB91465 Just let me know. It may not apply to you but I just taught I would mention it. p.s. Was McAfee or Avast previously installed on this computer? === Lets check your Master Root Record. Read carefully and follow these steps. TDSS Download TDSSKiller and save it to your Desktop. Doubleclick on TDSSKiller.exe to run the application. Then click on Start Scan. If a suspicious file is detected, the default action will be Skip, click on Continue. If an infected file is detected, the default action will be Cure, click on Continue. Important: Do NOT change the default action on your own unless instructed by a malware Helper! Doing so may render your computer unbootable. It may ask you to reboot the computer to complete the process. Click on Reboot Now. If no reboot is required, click on Report. A log file should appear. Please copy and paste the contents of that file here. If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here. ===
  21. DHCP will obtain DHS servers and the WAN address and the Gateway address. They will be on the Verizon network. You can override the DHCP provided DNS servers with static servers. Such as from the following list of public DNS Servers. Otherwise you do not need to do anything as there is no problem noted from Post #1. - Google - Google - former GTE - former GTE
  22. Finally I would add that - Avast, Superantispyware, Emsisoft Emergency Kit and Spywareblaster all never found two difficult to remove dangerous virus/trojan PUP's PUP.Optional.22ChromeEXT PUP.Optional.Legacy but AdwCleaner did ! With the help of ADWC and a Sync reset, these PUP's were completely removed.
  1. Load more activity
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.