Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. What is Video Converterz?The Malwarebytes research team has determined that Video Converterz is a search hijacker. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice.This particular one is a search hijacker and uses a web push notifications service that is blocked by Malwarebytes for fraud.How do I know if my computer is affected by Video Converterz?You may see this entry in your list of installed Chrome extensions:and these warnings during install:You will see this icon in your Chrome menu-bar:and these changed settings:How did Video Converterz get on my computer?Browser hijackers use different methods for distributing themselves. This particular one was downloaded from the webstore:after a redirect from their website:How do I remove Video Converterz?Our program Malwarebytes can detect and remove this potentially unwanted program. Please download Malwarebytes to your desktop. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program. Then click Finish. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure. When the scan is complete, make sure that all Threats are selected, and click Remove Selected. Restart your computer when prompted to do so. Is there anything else I need to do to get rid of Video Converterz? No, Malwarebytes removes Video Converterz completely. If you have allowed the notifications you can read here how to disable them. How would the full version of Malwarebytes help protect me?We hope our application and this guide have helped you eradicate this hijacker.As you can see below the full version of Malwarebytes would have protected you against the Video Converterz hijacker. It would have blocked their notifications service, giving you a chance to stop before it became too late. Technical details for expertsPossible signs in FRST logs: CHR DefaultSearchURL: Default -> hxxps://feed.videoconverterz.com/?q={searchTerms}&publisher=videoconverterz&barcodeid=551050000000000 CHR DefaultSearchKeyword: Default -> VideoConverterz CHR DefaultSuggestURL: Default -> hxxps://api.videoconverterz.com/suggest/get?q={searchTerms} CHR Extension: (VideoConverterz) - C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc [2019-06-24] Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0 Adds the file closer.js"="8/7/2018 11:31 AM, 15 bytes, A Adds the file manifest.json"="6/24/2019 8:41 AM, 2327 bytes, A Adds the file popup.html"="4/15/2019 10:48 AM, 1163 bytes, A Adds the file tab.html"="8/7/2018 11:31 AM, 165 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\_metadata Adds the file computed_hashes.json"="6/24/2019 8:41 AM, 2561 bytes, A Adds the file verified_contents.json"="4/15/2019 10:48 AM, 2947 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images Adds the file how-1.png"="4/15/2019 10:48 AM, 2862 bytes, A Adds the file how-2.png"="4/15/2019 10:48 AM, 3247 bytes, A Adds the file logo-small.png"="4/15/2019 10:48 AM, 1577 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\icons Adds the file 128x128.png"="6/24/2019 8:41 AM, 5263 bytes, A Adds the file 16x16.png"="6/24/2019 8:41 AM, 815 bytes, A Adds the file 64x64.png"="6/24/2019 8:41 AM, 3194 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts Adds the file background.js"="4/16/2019 10:40 AM, 31445 bytes, A Adds the file jquery-3.3.1.min.js"="4/15/2019 10:48 AM, 86927 bytes, A Adds the file popup.js"="4/15/2019 10:48 AM, 596 bytes, A Adds the file sitecontent.js"="4/15/2019 10:48 AM, 77 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\styles Adds the file popup.css"="4/15/2019 10:48 AM, 1270 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_cneljajjfkddgnfjcaihdcjnhikieogc Adds the file Video Converterz.ico"="6/24/2019 8:41 AM, 178487 bytes, A Adds the file Video Converterz.ico.md5"="6/24/2019 8:41 AM, 16 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings] "cneljajjfkddgnfjcaihdcjnhikieogc"="REG_SZ", "5057F526C32F5005AE628DE09472E9BF9C23C10F038839718682382436868359" Malwarebytes log: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 6/24/19 Scan Time: 9:06 AM Log File: 88abe368-964e-11e9-bf9d-00ffdcc6fdfc.json -Software Information- Version: 3.7.1.2839 Components Version: 1.0.586 Update Package Version: 1.0.11214 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 236289 Threats Detected: 29 Threats Quarantined: 29 Time Elapsed: 6 min, 57 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 1 PUP.Optional.VideoConverterz, HKCU\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|cneljajjfkddgnfjcaihdcjnhikieogc, Quarantined, [413], [680329],1.0.11214 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 7 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\icons, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\_metadata, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\styles, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\CNELJAJJFKDDGNFJCAIHDCJNHIKIEOGC, Quarantined, [413], [680329],1.0.11214 File: 21 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\CNELJAJJFKDDGNFJCAIHDCJNHIKIEOGC\1.0.0_0\MANIFEST.JSON, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\icons\128x128.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\icons\16x16.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\icons\64x64.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\how-1.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\how-2.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\images\logo-small.png, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts\background.js, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts\jquery-3.3.1.min.js, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts\popup.js, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\scripts\sitecontent.js, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\styles\popup.css, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\_metadata\computed_hashes.json, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\_metadata\verified_contents.json, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\closer.js, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\popup.html, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\cneljajjfkddgnfjcaihdcjnhikieogc\1.0.0_0\tab.html, Quarantined, [413], [680329],1.0.11214 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [413], [680332],1.0.11214 PUP.Optional.VideoConverterz, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [413], [680332],1.0.11214 Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat.We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.
  3. Today
  4. In my specific case it doesn't happen that someone accesses my Mac. I simply found it a useful thing since I was aware of its presence in the Windows version (where however limited access to users is not mandatory). However, it would not seem so burdensome to unblock to view / change settings similar to the macOS system settings. Then everyone thinks as he sees fit.
  5. I am totally shocked that you would allow anybody with such intent be allowed to access your Mac. Recent innovation requiring a login password / TouchID / Facial Recognition / Apple Watch proximity in order to access should be more than enough to protect Malwarebytes settings. Clearly there is much more sensitive information that would be available to such an intruder than just harvesting my license key. I would also strongly object to my having to perform an extra step in order to change a setting, something almost no other app require. Off the top of my head, I can only think of selected System Preferences and access to passwords in Keychain, Safari and most password management apps that require an extra step to simply observe or make changes.
  6. @treed I think it would be useful to be able to protect, as in the Windows version, the program settings (in particular the MY ACCOUNT tab where there is the license key) in general with a Pin so that they are not visible / modifiable by anyone accessing the Mac; being able to choose which tabs to protect would be ideal.
  7. Hello Hashan, Please try updating your database and let us know if that helps.
  8. Hi, I've attached the file you are looking for. I have got the report scan for the adware attached as "malwareLog". Best Regardsmbst-grab-results.zipmalwareLog.txt
  9. Domain: 247techies.com, feedback2.247techies.com, cloud.247techies.com Category: False Positive: Fraud Dear Team, Our genuine website URLs are getting blocked by Malwarebytes again, kindly check and whilelist them. 247 Techies is a legit individual and corporate technical support company catering to the US, UK, Canada and Australia. We have an A+ ranking with the BBB and are also Gold Certified Partners with Microsoft (proof links below); Microsoft Pinpoint : https://www.microsoft.com/en-us/solution-providers/partnerdetails/247-techies-private-limited_490f6e88-0318-47a2-96f0-608fd9aa168e/df5e7a54-5b8a-412c-b587-13ac0c7baa33BBB Accredited Business : http://www.bbb.org/southern-nevada/business-reviews/computers-service-and-repair/24-7-techies-in-las-vegas-nv-90019967#bbblogo We identify only as 247 Techies to customers and all our advertisements clearly state our company name and/or URL to our site, which is protected by McAfee (https://www.mcafeesecure.com/verify?host=www.247techies.com) Please feel free to contact us once you have verified the legitimacy of our company or if you require further information. We at 24/7 Techies do our very best to assure Outstanding Computer Support at all times.
  10. Okay, I've moved your topic to the Malware Removal forum where we can work on trying to locate the cause and remove it. Please run the following steps and post back the logs as an attachment when ready. STEP 01 If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. If you don't have Malwarebytes 3 installed yet please download it from here and install it. Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply. If Malwarebytes won't run then please skip to the next step and let me know on your next reply. STEP 02 Please download AdwCleaner by Malwarebytes and save the file to your Desktop. Right-click on the program and select Run as Administrator to start the tool. Accept the Terms of use. Wait until the database is updated. Click Scan Now. When finished, please click Clean & Repair. Your PC should reboot now if any items were found. After reboot, a log file will be opened. Copy its content into your next reply. RESTART THE COMPUTER Before running Step 3 STEP 03 Please download the Farbar Recovery Scan Tool and save it to your desktop. Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit Double-click to run it. When the tool opens, click Yes to disclaimer. Press the Scan button. It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply. The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here. Please attach the Additions.txt log to your reply as well. Thanks Ron
  11. Overall I don't think the computer is infected. We'll try one more cleaning routine and see what that does. If that is no help then I'd highly suggest imaging your computer to an external USB drive so that we can explore some more aggressive possible fixes. Please download the attached fixlist.txt file and save it to the Desktop. NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system. Run FRST or FRST64 and press the Fix button just once and wait. If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply. Note: If the tool warned you about an outdated version please download and run the updated version. fixlist.txt Ron
  12. Seeing the issue on a friends device (can't even activate it from the My Accounts page, with the link that should open Malwarebytes Assistant (Android 9 device) and activate it). Is there an Activation server issue going on as also the same friend Malwarebytes on Windows activation disappeared (had been active for about a year (he got the lifetime ID/key combo) and tried to reactivate it but it fails?
  13. I don't disagree with you, but I will say that the no nag days of software from 10 years ago or more are gone. Almost all free versions of software that also have a paid version do market their paid version. The mobile industry is multiple times worse than the PC industry. We have changed marketing within the product many times already and I'm sure we'll continue to make many changes but I don't think it will be removed. In all honesty if you install, scan, and uninstall you cannot see hardly any nags. After install it alerts that it has enabled a 14 day trial I clicked "Get Started" - then clicked on Scan and it's already on Threat Scan so you just need to click to run it. There is an Ad in the lower portion of the program but I would not consider that a nag as there is no popup, no button you have to click, etc. walk away and let the scan finish and it will complete without interruption. Unlike many other programs where a nag forces you to click something Then when the scan is complete it again has an Ad to say that using the paid version will block threats before they get on the computer. Again, that is an Ad not a nag and you don't have to click anything to move forward. Then you go to Control Panel, Programs, Add/Remove and uninstall. So though I do agree that completely nag and ad free programs would be great - that's just not a reasonable business model to expect. Thank you for your feedback though and as Exile360 said the team still reviews all feedback. Ron
  14. We've simply started enforcing the one license usage. As to extending, I've been with the company for over 10 years now and I do not recall extending the lifetime license to more than one. We have sold single license subscription that were for 3 systems but not the older lifetime ones. The Helpdesk can assist you in looking up all your license information Thank you again Ron
  15. Please start out by running the following again Please run the following steps and post back the logs as an attachment when ready. STEP 01 If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. If you don't have Malwarebytes 3 installed yet please download it from here and install it. Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button. Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply. If Malwarebytes won't run then please skip to the next step and let me know on your next reply. STEP 02 Please download AdwCleaner by Malwarebytes and save the file to your Desktop. Right-click on the program and select Run as Administrator to start the tool. Accept the Terms of use. Wait until the database is updated. Click Scan Now. When finished, please click Clean & Repair. Your PC should reboot now if any items were found. After reboot, a log file will be opened. Copy its content into your next reply. RESTART THE COMPUTER Before running Step 3 STEP 03 Please download the Farbar Recovery Scan Tool and save it to your desktop. Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit Double-click to run it. When the tool opens, click Yes to disclaimer. Press the Scan button. It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply. The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here. Please attach the Additions.txt log to your reply as well. Thanks Ron
  16. I’m relying on a not-so reliable memory here, but it seems to me that several years ago I upgraded the account to more than 1 device, then went through the SHARE protocol in order to place licensed protection on second (laptop) device. Now, does this explanation make any sense to those on this thread? Trying to account for same lic. key and lic. ID appearing on two Windows devices.
  17. In d:\System Volume Information\ i find this file tracking.log, heavily encrypted that my procmonitor point it to my totalcomander NOW, but im sure i've catch svchost.exe reading/writing from it like 50 times per second. But im afraid this virus is using poor totalcomander like a puppet now. I think is the virus making it because in my life i never seen that "tracking.log" in that folder, and i use totalcomander for a long time. Ai ai ai.... This is black majik, i tell you. 4_tracking.log hidden from System Volume Information.zip
  18. Whoops, here are the flies... Thank you!! Addition.txt AdwCleaner[S02].txt FRST.txt mbytes scan summary.txt
  19. My computer has had no known problems and has run great. I just noticed an odd thing recently when I went to start my video game .exe. I would click on it, and something would run, but my game wouldn't load. I would like the .exe and it would run, the second time. I also noticed my computer fan was running constantly and my computer game was running a bit slow. I traced it back to the dll file. When I click the game .exe file the first time, that dll file opens and starts hogging memory. Still, after going through all of these steps (thanks by the way!), these same problems still occur. I've attached my files.
  20. here is when is firing - i mean, after i just executed an installer (in this case 7z vers1602.exe archiver) what is curious is that is 1- creating File, 2-Query information; or Set Information, 3-read file, 4-close file. And is loading some "images" - most probably some copies of himself in different directories. . . . Also, imediatly after i executed the installer, its using some sort of command line inside an environment... at this point im lost... but i kind of getting it. He is using some sort of shell thing. I really hope all this is helping you somehow.
  21. it will be BEST for us to be able to edit the posts we are making here, because if i mistake something ill have to add another answer and it will aglomerate the page. Not very smart not having that option. 2_windowsBasicVirus MB-ScanLog.txt Here is the scan log from that first windows scan:
  22. As an aside, as mentioned in my other thread, downloaded and installed beta 3.8.1 on laptop, and it went smoothly, no reversion to *trial* or *free* versions, all license key and license ID data retained, and full IPv6 connectivity.
  23. mode in depth action i did so far, please look at All the pictures i made. This is a screenshot of basic scan immediately after i just installed a fresh windows. But also after i installed the malwarebytes from D drive too and is very probable this action was initiating the virus. But i managed to effectively clean the C drive, restart computer, and scan again. It takes 20seconds to find this 4 findings. I also manually looked into c:\windows folder to spot if its anything there and it was clean. But, if i installed some other (random) installer from D drive... the svchost.exe reappeared in c:\windows folder again, under my eyes. I dont have to scan it, i just keep that folder open and see when something is reappearing there. This is 1 step i did to learn more about this virus.
  24. Hello everyone, I am here to inform you that I have not been able to open malwarebytes on my windows computer nor was I able to open any other app. All files, videos and pictures look white and have .DALLE extension and cannot be opened. I tried to boot into safe mode, use malwarebytes chameleon, but nothing worked and the app doesn't run. Can anyone please help me solves this issue. It's 4:30 AM, haven't slept and I am typing from my phone because I am unable to use my PC. Please help!! :(
  25. Downloaded 3.8 Beta, and have restored all IPv6 connections...well done all!
  1. Load more activity
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.