Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. Hello @egrol - yes, this is a false positive. We've released a new version to address this issue. Please see: And > If you don't want to wait for the update to be served automatically please go ahead and retrieve it manually by clicking "Check for updates" under Application Updates in Settings > General.
  4. Hiya emar, Thanks for that log, continue: Open an elevated Command Promt (Admin) At the Command prompt, type or copy/paste SFC /SCANNOW hit the Enter key Wait for the scan to finish - make a note of any error messages - and then reboot. Copy the CBS.log file created (C:\Windows\Logs\CBS\CBS.log) to your desktop (you can't manipulate it directly) and then compress the copy and upload the zip file to your reply. Thanks, Kevin..
  5. Scanning ended, didn't find anything, but yesterday before the electricity went out ESET found 2 issues, but unable to see them, I guess it deleted them. I am attaching the report esetscanreport.txt
  6. Who get's to see the contents of the zip file when I do this? I don't know how much PII data might be in the file. mbst-grab-results.zip
  7. If the registry key creation that Malwarebytes is detecting as Trojan.BlockAV is associated with the Windows firewall, it could be that Glasswire is injecting those. Since no other checks have found any malware so far, how about if I disable Glasswire and check if they return over the next few days? BTW, I did *not* quarantine the two detections from the last Malwarebytes scan.
  8. How many times do I have to tell you that it was dra.dell that was detected, not any .exe or anything other than dra.dell? If you cannot connect to dra.dell, you cannot download DellRemoteAssist. Again, in case you did not carefully read the first paragraph of this reply, the block was for dra.dell.
  9. Thank you Maurice, I'll run daily Defender Full Scans for a few days, see what arises (last night's was clear) and let you know. Regards, Steve
  10. @exile360 The last support ticket to which I received a reply was 2990852, filed three months ago. I requested an update on the issue this morning, but instead received another ticket number, 3105385. Cap
  11. I am just removing it every time I see it. I hope we're gonna make it disappear forever.
  12. Um, now I double my fear, I looked at this dll and it has full permissions to the SYSTEM, and I don't know how to change it... Pls help
  13. Hi @pxwell, I've sent you a private message with follow-up information.
  14. Nome registro: Application Origine: Microsoft-Windows-Wininit Data: 07/07/2020 13:07:05 ID evento: 1001 Categoria attività:Nessuna Livello: Informazioni Parole chiave: Classico Utente: N/D Computer: LAPTOP-8M2DQ3E1 Descrizione: Controllo in corso del file system su 😄 Il file system è di tipo NTFS. L'etichetta del volume è Windows-SSD. Il disco sarà ora controllato come pianificato. Il disco sarà ora controllato. Fase 1: analisi della struttura del file system di base in corso... 1532416 record file elaborati. Verifica file completata. 12271 record di file di grandi dimensioni elaborati. 0 record file non validi elaborati. Fase 2: analisi del collegamento dei nomi file in corso... 1038 record reparse elaborati. 1865578 voci di indice elaborate. Verifica indici completata. 0 file non indicizzati analizzati. 0 file non indicizzati ripristinati nella cartella dei file persi e ritrovati. 1038 record reparse elaborati. Fase 3: analisi dei descrittori di sicurezza in corso... Pulizia di 3157 voci inutilizzate dall'indice $SII del file 0x9. Pulizia di 3157 voci inutilizzate dall'indice $SDH del file 0x9. Pulizia dei descrittori di sicurezza inutilizzati 3157. Verifica descrittori di sicurezza completata. 166582 file di dati elaborati. CHKDSK sta verificando il journal USN... 41626264 byte USN elaborati. Verifica del journal USN completata. Fase 4: ricerca di cluster danneggiati nei dati dei file utente in corso... 1532400 file elaborati. Verifica dei dati del file completata. Fase 5: ricerca di cluster liberi danneggiati in corso... 79448658 cluster liberi elaborati. Verifica dello spazio disponibile completata. Analisi del file system effettuata. Nessun problema rilevato. Non sono necessarie ulteriori azioni. 498799615 KB di spazio totale su disco. 178756128 KB in 1202063 file. 589096 KB in 166583 indici. 0 KB in settori danneggiati. 1659755 KB in uso dal sistema. 65536 KB occupati dal file registro. 317794636 KB disponibili su disco. 4096 byte in ogni unità di allocazione. 124699903 unità totali di allocazione su disco. 79448659 unità di allocazione disponibili su disco. Informazioni interne: 00 62 17 00 50 e2 14 00 20 e2 24 00 00 00 00 00 .b..P... .$..... 55 03 00 00 b9 00 00 00 00 00 00 00 00 00 00 00 U............... Controllo del disco completato. Attendere il riavvio del computer. XML evento: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Microsoft-Windows-Wininit" Guid="{206f6dea-d3c5-4d10-bc72-989f03c8b84b}" EventSourceName="Wininit" /> <EventID Qualifiers="16384">1001</EventID> <Version>0</Version> <Level>4</Level> <Task>0</Task> <Opcode>0</Opcode> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2020-07-07T11:07:05.306576700Z" /> <EventRecordID>70481</EventRecordID> <Correlation /> <Execution ProcessID="0" ThreadID="0" /> <Channel>Application</Channel> <Computer>LAPTOP-8M2DQ3E1</Computer> <Security /> </System> <EventData> <Data> Controllo in corso del file system su 😄 Il file system è di tipo NTFS. L'etichetta del volume è Windows-SSD. Il disco sarà ora controllato come pianificato. Il disco sarà ora controllato. Fase 1: analisi della struttura del file system di base in corso... 1532416 record file elaborati. Verifica file completata. 12271 record di file di grandi dimensioni elaborati. 0 record file non validi elaborati. Fase 2: analisi del collegamento dei nomi file in corso... 1038 record reparse elaborati. 1865578 voci di indice elaborate. Verifica indici completata. 0 file non indicizzati analizzati. 0 file non indicizzati ripristinati nella cartella dei file persi e ritrovati. 1038 record reparse elaborati. Fase 3: analisi dei descrittori di sicurezza in corso... Pulizia di 3157 voci inutilizzate dall'indice $SII del file 0x9. Pulizia di 3157 voci inutilizzate dall'indice $SDH del file 0x9. Pulizia dei descrittori di sicurezza inutilizzati 3157. Verifica descrittori di sicurezza completata. 166582 file di dati elaborati. CHKDSK sta verificando il journal USN... 41626264 byte USN elaborati. Verifica del journal USN completata. Fase 4: ricerca di cluster danneggiati nei dati dei file utente in corso... 1532400 file elaborati. Verifica dei dati del file completata. Fase 5: ricerca di cluster liberi danneggiati in corso... 79448658 cluster liberi elaborati. Verifica dello spazio disponibile completata. Analisi del file system effettuata. Nessun problema rilevato. Non sono necessarie ulteriori azioni. 498799615 KB di spazio totale su disco. 178756128 KB in 1202063 file. 589096 KB in 166583 indici. 0 KB in settori danneggiati. 1659755 KB in uso dal sistema. 65536 KB occupati dal file registro. 317794636 KB disponibili su disco. 4096 byte in ogni unità di allocazione. 124699903 unità totali di allocazione su disco. 79448659 unità di allocazione disponibili su disco. Informazioni interne: 00 62 17 00 50 e2 14 00 20 e2 24 00 00 00 00 00 .b..P... .$..... 55 03 00 00 b9 00 00 00 00 00 00 00 00 00 00 00 U............... Controllo del disco completato. Attendere il riavvio del computer. </Data> </EventData> </Event>
  15. Greetings, I would like to ensure someone follows up on this for you. If you would, please provide the support ticket # if you still have it handy (it should be in all the emails you received from Support when you reported the issue). Thanks
  16. Greetings, If you haven't done so already, please try reinstalling Malwarebytes Privacy then uninstalling it normally without using Revo, then restart the system and see if the items were removed.
  17. Thanks for that log emar, unfortunately we are still no further forward. All of those entries for Application and System errors are related to a Smart Audio service. Lets run some maintenance checks.. Open and elevated Command Promt (Admin) Accept UAC alert if prompted... At the Command prompt, type CHKDSK /R or copy/paste hit the Enter key. You will get a message that the drive cannot be locked, but that the command can be scheduled to run at the next boot - hit the Y key, press Enter, and then reboot. The CHKDSK may take a few hours depending on the size of the drive, so be patient! After the CHKDSK has run use the following instructions to find the log: Check Disk report: Press the WindowsKey + R on your keyboard at the same time. Type eventvwr into the run box and click OK. In the left panel, expand Windows Logs and then click on Application. Now, on the right side, click on Filter Current Log. Under Event Sources, (expand the drop down arrow) check only Wininit and click OK. You mayl be presented with one or multiple Wininit logs. Click on an entry corresponding to the date and time of the disk check. On the top main menu, click Action > Copy > Copy Details as Text. Paste the contents into your next reply. Thanks, Kevin..
  18. Any idea how I unsubscribe from the "Monthly Security Report"? I didn´t subscribe to it when I bought a premium account (years ago) and it appeared out of nowhere sometime last year. It arrives sporadically (not monthly) in my private inbox and there is NO UNSUBSCRIBE option in the email or on my account page. I started a ticket and Adrian replied, "This is something we tried briefly and are now rolling back out to our clients. You should have the option to unsubscribe from directly within the email itself. If you're not seeing it let me know and I'll see if I can get it over to someone who can assist." I replied that there was no "unsubscribe" option and there was no follow up. Thanks for any help. Cap.
  19. Thank you very much for your help and fast replies.
  20. What is Burst Search?The Malwarebytes research team has determined that Burst Search is a search hijacker that changes Chrome policies. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice.How do I know if my computer is affected by Burst Search?You may see this entry in your list of installed Chrome extensions:and these changed settings:You may have noticed these warnings during install:How did Burst Search get on my computer?Browser hijackers use different methods for distributing themselves. This particular one was downloaded from the webstore:but the ones that change the policies are part of certain bundlers.How do I remove Burst Search?Our program Malwarebytes can detect and remove this potentially unwanted program. Please download Malwarebytes for Windows to your desktop. Double-click MBSetup.exe and follow the prompts to install the program. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen. Click on the Get started button. Click Scan to start a Threat Scan. When the scan is finished click Quarantine to remove the found threats. Reboot the system if prompted to complete the removal process. Is there anything else I need to do to get rid of Burst Search? No, Malwarebytes removes Burst Search completely. How would the full version of Malwarebytes help protect me?We hope our application and this guide have helped you eradicate this hijacker.As you can see below Malwarebytes Browser Guard, as well as the full version of Malwarebytes would have protected you against the Burst Search hijacker. It would have blocked their website, giving you a chance to stop it before it became too late. Technical details for expertsPossible signs in FRST logs: CHR HKLM\SOFTWARE\Policies\Google: Restriction <==== ATTENTION CHR DefaultSearchURL: Default -> hxxps://find.burstsearch.com/?q={searchTerms} CHR DefaultSearchKeyword: Default -> Burst CHR Extension: (Burst) - C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh [2020-07-07] Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\1.4_0 Adds the file answ.txt"="7/1/2020 2:28 PM, 4041 bytes, A Adds the file manifest.json"="7/7/2020 9:22 AM, 1697 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\1.4_0\_metadata Adds the file computed_hashes.json"="7/7/2020 9:22 AM, 3381 bytes, A Adds the file verified_contents.json"="7/1/2020 2:35 PM, 2308 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\1.4_0\image Adds the file 128.png"="7/7/2020 9:22 AM, 2587 bytes, A Adds the file 16.png"="7/7/2020 9:22 AM, 563 bytes, A Adds the file 32.png"="7/7/2020 9:22 AM, 1190 bytes, A Adds the file 48.png"="7/7/2020 9:22 AM, 1714 bytes, A Adds the file 64.png"="7/7/2020 9:22 AM, 1746 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\1.4_0\js Adds the file background.js"="7/1/2020 2:34 PM, 3277 bytes, A Adds the file jquery-2.2.4.js"="3/27/2020 8:37 PM, 257286 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\1.4_0\options Adds the file options.html"="7/1/2020 2:31 PM, 2271 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh Adds the file 000003.log"="7/7/2020 9:22 AM, 61 bytes, A Adds the file CURRENT"="7/7/2020 9:22 AM, 16 bytes, A Adds the file LOCK"="7/7/2020 9:22 AM, 0 bytes, A Adds the file LOG"="7/7/2020 9:24 AM, 184 bytes, A Adds the file MANIFEST-000001"="7/7/2020 9:22 AM, 41 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh Adds the file 000003.log"="7/7/2020 9:22 AM, 51 bytes, A Adds the file CURRENT"="7/7/2020 9:22 AM, 16 bytes, A Adds the file LOCK"="7/7/2020 9:22 AM, 0 bytes, A Adds the file LOG"="7/7/2020 9:24 AM, 183 bytes, A Adds the file MANIFEST-000001"="7/7/2020 9:22 AM, 41 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Chromium\ExtensionInstallForcelist] "1"="REG_SZ", "ppihhpfnpapdlfpjgkkkjkoiebdndfoh;https://clients2.google.com/service/update2/crx" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist] "1"="REG_SZ", "ppihhpfnpapdlfpjgkkkjkoiebdndfoh;https://clients2.google.com/service/update2/crx" [HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings] "ppihhpfnpapdlfpjgkkkjkoiebdndfoh"="REG_SZ", "A896BBFAB15F8A2B6AAC19561EFC3D95C6A13E5ECD43765D71498682C1D7F196" Malwarebytes log: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 7/7/20 Scan Time: 9:35 AM Log File: 761d30de-c024-11ea-a046-00ffdcc6fdfc.json -Software Information- Version: 4.1.2.73 Components Version: 1.0.976 Update Package Version: 1.0.26535 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 232126 Threats Detected: 19 Threats Quarantined: 19 Time Elapsed: 4 min, 54 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 3 PUP.Optional.SearchHijack.Generic.ChrPRST, HKLM\SOFTWARE\POLICIES\GOOGLE\CHROME\ExtensionInstallForcelist|1, Quarantined, 15168, 828115, , , , PUP.Optional.SearchHijack.Generic.ChrPRST, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\CHROME\ExtensionInstallForcelist|1, Quarantined, 15168, 828115, , , , PUP.Optional.BurstSearch, HKCU\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|ppihhpfnpapdlfpjgkkkjkoiebdndfoh, Quarantined, 309, 837825, , , , Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 3 PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\EXTENSIONS\ppihhpfnpapdlfpjgkkkjkoiebdndfoh, Quarantined, 309, 837825, 1.0.26535, , ame, File: 15 PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 309, 837825, , , , PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\000003.log, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\CURRENT, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\LOCK, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\LOG, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\LOG.old, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\MANIFEST-000001, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\000003.log, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\CURRENT, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\LOCK, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\LOG, Quarantined, 309, 837825, , , , PUP.Optional.BurstSearch, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ppihhpfnpapdlfpjgkkkjkoiebdndfoh\MANIFEST-000001, Quarantined, 309, 837825, , , , PUP.Optional.SearchHijack.Generic.ChrPRST, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\PPIHHPFNPAPDLFPJGKKKJKOIEBDNDFOH\1.4_0\MANIFEST.JSON, Quarantined, 15194, 828115, 1.0.26535, , ame, PUP.Optional.BurstSearch, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 309, 837824, 1.0.26535, , ame, Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat.We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.
  21. having an issue with Malwarebytes Privacy VPN , when I had to uninstalled prior this topic , it was uninstalled by using Revo Uninstaller software but however Malwarebytes privacy has not been fully uninstalled and the leftover files and folder behind are locked and cannot be deleted even though by using a FRST utility . Fix result of Farbar Recovery Scan Tool (x64) Version: 30-06-2020 Ran by user (02-07-2020 19:51:20) Run:3 Running from C:\Users\user\Downloads Loaded Profiles: user Boot Mode: Normal ============================================== fixlist content: ***************** HKU\S-1-5-21-638610958-711902752-2365392706-1001\...\Run: [Malwarebytes Privacy] => "C:\Program Files\Malwarebytes\Privacy\UI\mbprivacy.exe" nowin S2 MBVpnService; "C:\Program Files\Malwarebytes\Privacy\MBVpnService.exe" [X] S3 MBVpnTunnelService; C:\Program Files\Malwarebytes\Privacy\MBVpnTunnelService.exe [X] S3 wintun; C:\Windows\system32\DRIVERS\wintun.sys [38176 2020-04-09] (WireGuard LLC -> WireGuard LLC) Malwarebytes Privacy version 1.2.0.244 (HKLM\...\{934873BE-C9BC-4F19-B698-9B3E3F8FF07F}_is1) (Version: 1.2.0.244 - Malwarebytes) HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MBVpnService => ""="Service" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MBVpnService => ""="Service" ***************** "HKU\S-1-5-21-638610958-711902752-2365392706-1001\Software\Microsoft\Windows\CurrentVersion\Run\\Malwarebytes Privacy" => removed successfully HKLM\System\CurrentControlSet\Services\MBVpnService => could not remove, key could be protected HKLM\System\CurrentControlSet\Services\MBVpnTunnelService => could not remove, key could be protected HKLM\System\CurrentControlSet\Services\wintun => removed successfully wintun => service removed successfully Malwarebytes Privacy version 1.2.0.244 (HKLM\...\{934873BE-C9BC-4F19-B698-9B3E3F8FF07F}_is1) (Version: 1.2.0.244 - Malwarebytes) => Error: No automatic fix found for this entry. HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal\MBVpnService => removed successfully HKLM\System\CurrentControlSet\Control\SafeBoot\Network\MBVpnService => removed successfully Result of scheduled files to move (Boot Mode: Normal) (Date&Time: 02-07-2020 19:56:31) Result of scheduled keys to remove after reboot: HKLM\System\CurrentControlSet\Services\MBVpnService => could not remove, key could be protected HKLM\System\CurrentControlSet\Services\MBVpnTunnelService => could not remove, key could be protected ==== End of Fixlog 19:56:33 ====
  22. Hello! I am scanning it once again, because yesterday electricity in my house just went out, and I was unable to do something. I will attach the report when it ends
  23. Hi, This is indeed a false positive by our additional machinelearning engine we have implemented. This will get fixed. Thanks for reporting!
  24. Hi, I'm the author of Hekasoft Backup & Restore, my software installer is wrongly reported as generic malware (code 895292642) by Malwarebytes. Best Regards, Claudio Masci Hekasoft Link to the official page: https://www.hekasoft.com/hekasoft-backup-restore/ backup-restore-0.92.zip
  25. The file has been removed. By the way, is there an easy way for me the know in the future what file cause the issue? I can't find it in the logs, so will be hard to find it ourselves.
  26. I have this issue too. Was this ever fixed? I have latest version 4.1.2. Thanks Pete.
  1. Load more activity
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.