Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. Okay, Please run the following steps and post back the logs as an attachment when ready. STEP 01 If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. If you don't have Malwarebytes 3 installed yet please download it from here and install it. Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply. If Malwarebytes won't run then please skip to the next step and let me know on your next reply. STEP 02 Please download AdwCleaner by Malwarebytes and save the file to your Desktop. Right-click on the program and select Run as Administrator to start the tool. Accept the Terms of use. Wait until the database is updated. Click Scan Now. When finished, please click Clean & Repair. Your PC should reboot now if any items were found. After reboot, a log file will be opened. Copy its content into your next reply. RESTART THE COMPUTER Before running Step 3 STEP 03 Please download the Farbar Recovery Scan Tool and save it to your desktop. Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit Double-click to run it. When the tool opens, click Yes to disclaimer. Press the Scan button. It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply. The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here. Please attach the Additions.txt log to your reply as well. Thanks Ron
  3. The answer really comes down to what you want to protect imho. My daughters use only Malwarebytes on their macs...and that likely is good enough. But I would never rely solely on malwarebytes on my windows computer...why? because I use my computer for work and not only would downtime cost me money, but would make available confidential information for my clients. I can't and won't take that chance..so I use malwarebytes for secondary protection and rely on what I believe is the best security out there...kaspersky, with 30 levels of protection..far better than windows defender as far as I am concerned. Kaspersky also finds and eliminates most email malicious links which malwarebytes does not check. I.e., the issue is what is your risk if your security is breached. If it is simply a matter of having to reinstall your operating system, may not be that much of a big deal. If it is a matter of downtime and loss of confidential info...much bigger deal. I learned my lesson years ago when I relied only on Symantec endpoint, and then did not update the virus engine as the years went by, only updating the signature database.......penny wise pound foolish...that cost me a lot. Never again.
  4. Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks
  5. Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks
  6. Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks
  7. Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks
  8. Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks
  9. I was installing some files and didn't realized that avast free antivirus got installed too with a chrome add-on. I tried to uninstall all avast files with avastclear.exe in safe mode but the avlaunch still bugs me in the startup menu. Nevertheless it made me realized that there were uninvited application in my pc so I start lookig everywhere. Believe me I tried avastclear in safe mode and regedit. I hear it is a virus and suffocates the pc making it eventually die. So reply fast people. find the screen shot right here: https://drive.google.com/open?id=1PjRFYKien-UqNtfPB7OVxjo-tZrdjKN7
  10. I have a license for Malwarebytes on my old computer, but that computer isn't working anymore. Is it possible to move that license and key to my new computer?
  11. Today
  12. Thanks. Believe i should of stated the FQDN spamconsole.belairinternet.com I saw on another thread that malwarebytes was blocking the site via changing dns resolution to a local loopback address. https://forums.malwarebytes.com/topic/200478-malwarebytes-breaks-dns-resolution/ Also have screenshots attached showing malicious website block from my cloud console. by both public ip and dns. I've test this issue on a computer without malware bytes and i am able to resolve spamconsole.belairinternet.com correctly but no on computers with malwarebytes. Any ideas?
  13. Normally, it propagates immediately, but for some users, where the detection was happening already, it might still show as detected. I think it has to do with the ISP and if it does proxycaching as well. In either way, any user who didn't have a detection already on these won't get it either. (Hence why I couldn't reproduce detection on my end either)
  14. @miekiemoes, thank you, I can confirm that deleting HubbleCache causes MalwareBytes to no longer warn about this application. Thank you. Any idea how long it would take for this change to normally propagate, so that you don't have to delete it (on other machines, for other people etc.)
  15. Ron, I did all of this and found no infection.
  16. Hello and Welcome back... (glad you found your answer) Yes Anti-Exploit as well as Anit-Ransomware is now part of MB3 Premium with an active license
  17. Hi, This was detected by our MachineLearning engine, which helps to protect even better against 0day threats. Unfortunately, as this is a heuristic engine, it's possible False Positives happen. Also see here for more explanation: However, I can't reproduce detection anymore, so this might have been fixed already. If it's still detected on your end, then Quit malwarebytes from the systemtray. Then navigate to the following folder: C:\ProgramData\Malwarebytes\MBAMService In there, locate the file HubbleCache and delete it. Restart Malwarebytes again. A new Hubblecache will then be created again, so it will properly pick it up and remember to not detect this anymore.
  18. Hello Mnickolas, I reached out and have verified that www.belairinternet.com is not being blocked by Malwarebytes. Warm Regards,
  19. Hello, We have a client who's website is being blocked by malware bytes due to trojan. Just want to confirm it's not a mistake before we go ahead and contact them. belairinternet.com Thanks.
  20. If you download the Deploy.zip from this project: https://github.com/Ben136KBC/CodeXCavator2 Then malwarebytes identifies it as a machine learning thread. This is a code indexing tool, I work on developing it, all the code everything is available, there is nothing malicious. (The same goes for the original version which you can get from here: https://sourceforge.net/p/codexcavator/wiki/Home/ ) Please see if there is a way to avoid this false positive? Thank you.
  21. Thankxx, I will follow-up on your advice.
  22. This is purely a scam and they send those emails out en masse hoping one or two bite at the bait. Just delete the email and then change your email password to a new Strong Password just to make sure. Additionally, you can enter your email address(es) in the following site and it will check to see if that email address was part of a known breach. https://haveibeenpwned.com/ Please reference: ----------------- US FBI PSA - Extortionists Increasingly Using Recipients' Personal Information To Intimidate Victims US FTC Consumer Information - How to avoid a Bitcoin blackmail scam MyOnlinesecurity - attempted-blackmail-scam-watching-porn BleepingComputer - Beware of Extortion Scams Stating They Have Video of You on Adult Sites Malwarebytes' Blog - Sextortion emails: They’re probably not watching you Malwarebytes Forum sample thread - Got strange threating email. Malwarebytes Forum FYI thread - FYI: Email Ransom Scam still current
  23. As secretary of a foundation for the common good one of my email- addresses is mentioned on the website of the foundation. Since two weeks I'll receive - apparently from myself- a notification that my account is hacked and I have to provide bitcoins to some nutter. Malwarebytes does not recognize this as an apparent hack- attempt. Still I wonder, is there anything to prevent this daily nuisance?
  1. Load more activity
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.