Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. @onphiya CJ - I'm going to send you a quick email and help out here. This is a super strange issue for sure.
  3. Thanks for the report. This pc has BitDefender. Q: Did you do a scan with BitDefender ? [ 2 ] Close the opened programs that you do not need to be running at this time. Then do a special scan with Malwarebytes for Windows. Run a scan with Malwarebytes. Start Malwarebytes from the Start menu. Click Settings. Then click the Protection tab. Scroll down and lets be sure the line in SCAN OPTIONs for "Scan for rootkits" is ON Click it to get it ON Click the SCAN button. Select a Threat Scan ( which should be the default). When the scan phase is done, be real sure you Review and have all detected lines items check-marked on each line on the left. That too is very critical. Then click on Quarantine selected. Be sure all items were removed. When that is completed, kindly send the report. In Malwarebytes. Click the Reports button ( on the left ) Look for the "Scan Report" that has the most recent Date and time. When located, click the check box for it and click on View Report. Then click the Export button at the bottom left. Then select Text File (*.txt) Put in a name for that file and remember where the file is created. Then attach that file with your reply. Thank you. .
  4. If it is Malwarebytes for Windows, or Malwarebytes Adwcleaner then I can help and review those. I suspect you mean a special Techbench tool.
  5. I ran those commands before you posted the bat ran it again and nothing. Will post the results for ipconfig /all in a few hours. That's why I posted here for possible malware because it had a bunch cleaned with the toolkit and then stopped working that's when I ran frst couldn't see anything but I'm still new with frst and posted to see if it was anything possible but Malwarebytes and adw cleaner don't see anything. It had McAfee and Symantec and both have been removed. Head been spinning. Installed new hdd and installed new os and connection works. When I plug in the old hdd no internet connection.
  6. Hello belij17 and welcome to Malwarebytes, Continue.... Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix" NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work. Nect, If you do not have Malwarebytes installed do the following: Download Malwarebytes version 3 from the following link: https://www.malwarebytes.com/mwb-download/thankyou/ Double click on the installer and follow the prompts. If necessary select the Blue Help tab for video instructions.... When the install completes or Malwarebytes is already installed do the following: Open Malwarebytes, select > "settings" > "protection tab" Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on.... Go back to "DashBoard" select the Blue "Scan Now" tab...... When the scan completes quarantine any found entries... To get the log from Malwarebytes do the following: Click on the Report tab > from main interface. Double click on the Scan log which shows the Date and time of the scan just performed. Click Export > From export you have two options: Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply… Next, Download AdwCleaner by Malwarebytes onto your Desktop. Or from this Mirror Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users) Accept the EULA (I accept), then click on Scan Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply Next, Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop Ensure to get the correct version for your system.... https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window In the "Scan Type" window, select Quick Scan Perform a scan and Click Finish when the scan is done. Retrieve the MSRT log as follows, and post it in your next reply: 1) Select the Windows key and R key together to open the "Run" function 2) Type or Copy/Paste the following command to the "Run Line" and Press Enter: notepad c:\windows\debug\mrt.log The log will include log details for each time MSRT has run, we only need the most recent log by date and time.... let me see those logs in your reply... Thank you, Kevin.. fixlist.txt
  7. Did you run the suggestion I mad on IPCONFIG /ALL I suggest doing that and capturing that information. Press Windows-key and hold and the tap the X key to then choose Command prompt ( Admin ) in the elevated command prompt, type in ipconfig /all What I can help you on, is, to check for malware and remove it, if it is found by a security tool. Outside of that, I will have to refer you elsewhere. What it seems to me is that this Windows configuration is missing the required settings for internet communication. I had you run a procedure before on Tuesday to rebuild the Windows winsock for the internet communication.
  8. Reply #2 for this Friday. You wrote Please understand, the setting for Action Center / Security Center is not related to anything of the Malwarebytes website protection 's "block notices".
  9. Greetings, Are these detections coming from Malwarebytes 3 or JRT (Junkware Removal Tool)? I ask because this area of the forums is for JRT support, not Malwarebytes 3. Either way, I'd suggest starting by running a scan with ADWCleaner and having it remove anything it finds, then restarting the system if prompted to do so to complete the removal process. Once that is done, if anything was detected/removed by ADWCleaner, go ahead and perform another scan with Malwarebytes to see if any detections remain. If they do, and if they are associated with Google Chrome then I would suggest following the instructions found in this topic to see if that resolves the issue. After that, if the problem still persists then please follow the instructions in this topic and then create a new topic in the malware removal area by clicking here including the requested logs and information and one of our malware removal specialists will assist you in checking and clearing the system of any remaining threats as soon as one becomes available.
  10. Greetings, If you aren't comfortable posting logs publicly you may instead contact Malwarebytes Support directly by filling out the form on the bottom of this page and they will assist you privately via email. I don't recall seeing anyone else experiencing the issue you describe so my guess is that it is likely some problem unique to your system. My first thought just based on your description is that perhaps if you are using some kind of system reset/rollback solution, like perhaps as a form of malware/ransomware protection, that could account for the behavior you're seeing if that tool (assuming you are using such a tool at all of course) rolls back Malwarebytes' configuration files/data files and/or registry data. Other than that it could just be a problem with Malwarebytes itself not writing to its own configuration files properly or perhaps one or more of them being corrupt causing Malwarebytes to restore the clean/original backup copies that it keeps in place for emergencies should such corruption occur. To try and resolve that if that is a possibility, I'd suggest going ahead and doing a clean install of the software and then testing to see if the issue is resolved: Run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Clean button, and allow it to restart your system and then reinstall Malwarebytes, either by allowing the tool to do so when it offers to on restart, or by downloading and installing the latest version from here
  11. @C0nrad I have received your message. I have re-opened the ticket. What I really truly ( also) need to know is, Which web browser is in use ( if any) when the block notices happen, & what the website address is showing on the address bar of the browser. I also need a fresh report. Download Malwarebytes Support Tool Once the file is downloaded, open your Downloads folder/location of the downloaded file Double-click mb-support-1.4.0.623.exe to run the report You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent. Place a checkmark next to Accept License Agreement and click Next You will be presented with a page stating, "Get Started!" Do NOT use the button “Start repair” ! Click the Advanced tab on the left column Click the Gather Logs button A progress bar will appear and the program will proceed with getting logs from your computer Upon completion, click a file named mbst-grab-results.zip will be saved to your Desktop. Click OK Please attach the ZIP file in your next reply. Thank you. NOTE: Some of these block notices are reported as "inbound". The web protection of the Premium Malwarebytes is keeping your pc safe. It STOPPED the inbound attempt. For Your Information: The website Block message indicates that a potential risk was blocked by the malicious website protection. The Malwarebytes web protection, by default, will always show each IP block occurrence. The Malwarebytes Webs protection feature will advise customers when a known or suspected malicious IP is attempted to be reached (outgoing) or is trying access your PC. See our info page https://www.malwarebytes.com/lp/ip-blocking/?ipblock=true Incoming block notice can be ignored, our software is blocking the threat and there is nothing more that can be done. On Outbound blocks, any attempted connection was stopped.
  12. Today
  13. Hello @Jockap I have re-opened the Topic for you. The "bitcoinminer 7" is something flagged by Norton. I very much want to have all possible information that Norton shows as to any name, file-name, location, etc , including a screen grab image. https://lifehacker.com/how-to-take-a-screenshot-or-picture-of-whats-on-your-co-5825771 # 2 Download Malwarebytes Support Tool Once the file is downloaded, open your Downloads folder/location of the downloaded file Double-click mb-support-1.4.0.623.exe to run the report You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent. Place a checkmark next to Accept License Agreement and click Next You will be presented with a page stating, "Get Started!" Do NOT use the button “Start repair” ! Click the Advanced tab on the left column Click the Gather Logs button A progress bar will appear and the program will proceed with getting logs from your computer Upon completion, click a file named mbst-grab-results.zip will be saved to your Desktop. Click OK Please attach the ZIP file in your next reply. Thank you.
  14. Hello everyone Im looking for help. I let my little brother to use my computer while i was away and this is what i got now. Trojan that i cant get rid of. I cant disable it and my Win 10 Security cant do anything about it. http://prntscr.com/ownqz5 Can you guys please help me? Thank you. Addition.txt FRST.txt
  15. Well I gathered the logs and took a short look into it. Basically every program and path on my computer is shown there... Will not upload this here. My privacy is more important than this. If you need something in special then I can post this but not all the log files with private data inside. Have you heard of my problem in the past? Thanks.
  16. Every day Malwarebytes scans my computer (Windows 10), and the same 206 threats are detected for quarantine. I quarantine them daily, but they are detected again the next day. I found a post in the forum with a similar problem, but it was in 2017 and Valinorum stated that the instructions should not be used for any other computer. I would appreciate an update to this fix.
  17. Maybe it's an idea to make sticky topic with reported false positives. It will prevent reporting the same files as it happens now (eg. OOSU10)
  18. You're welcome, I'm glad to help. If there is anything else we might assist you with please let us know. Thanks
  19. Hey, Thanks for your enlightening response exile360. I totally appreciate this.
  20. If you could post a copy of the log we could probably explain it, however my guess is that the date on the log is likely reflecting the data of the signature/database used in detecting/blocking the site and the time is likely reflected in GMT to make it universal.
  21. Thanks for the report, @exile360!
  22. Just to add, I don't believe that Malwarebytes does any kind of traffic injection. As I understand it (having worked on the team that actually developed the browser extension from the very beginning, as I was the Product Manager for this project at the time), the Malwarebytes browser extension works very similarly to a traditional ad blocker like Adblock Plus or uBlock Origin. Kaspersky's method of using a driver embedded in the network stack to inject code and modify packets sent to/from the system over the network connection is very different and operates at a different level of the network stack from the way that a redirecting browser extension like the one developed by Malwarebytes does. This does not mean that there isn't some method as of yet undiscovered to use an installed browser extension to track users across sites, however the method being used to exploit the flaw discovered in Kaspersky's security products would not work to track users of the Malwarebytes browser extension.
  1. Load more activity
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.