Jump to content

miekiemoes

Staff
  • Content Count

    9,476
  • Joined

8 Followers

About miekiemoes

  • Rank
    Forum Deity
  • Birthday 07/19/1975

Contact Methods

  • MSN
    notimetochat
  • Website URL
    http://miekiemoes.blogspot.com

Profile Information

  • Location
    Belgium

Recent Profile Visitors

43,996 profile views
  1. Hi, Can you zip and attach the file please? Also read here about our machinelearning detection: Thanks!!
  2. Hi, This is detected by our MachineLearning engine, which helps to protect even better against 0day threats. Unfortunately, as this is a heuristic engine, it's possible False Positives happen. Also see here for more explanation: https://forums.malwarebytes.com/topic/238670-machinelearninganomalous-detections-and-explanation/ Thanks for reporting these, as this helps to finetune the engine, so these won't be detected in the future anymore. Can you zip and attach the exact file that was detected? (voopoo.exe) Thanks!
  3. Hi, It's only the installer though. What it installs is totally fine (if additional offers are unchecked) In other words, for Fusioncore: the installer might show additional install screens where it offers additional products, with as a result that these additional programs often end up installed as well (or changes to the browser/startpage..) if this is not unchecked during the install screens. https://blog.malwarebytes.com/detections/adware-fusioncore/
  4. Hi, This appears to be a valid detection and not an FP. It's a PUP called Fusioncore. Detection will be adjusted to name this properly to PUP instead. Thanks for reporting!
  5. Hi, Thanks for reporting. We will review and remove detection if needed.
  6. Hi, While this isn't malicious by itself, it's a patchtool which is always a risk as it might lower the default programs security settings. So always be careful with these.
  7. Hi, You can create an exclusion for it: https://support.malwarebytes.com/docs/DOC-1130
  8. Good to hear - thanks for the feedback!
  9. Thanks. I see this was fixed yesterday already on this file. Do you still have a detection on it? If so, Quit malwarebytes from the systemtray, Then navigate to the following folder: C:\ProgramData\Malwarebytes\MBAMService In there, locate the file HubbleCache and delete it. Restart Malwarebytes again. A new Hubblecache will then be created again, so it will properly pick it up and remember to not detect this anymore.
  10. Hi, Since you're having issues to zip and attach the exe file, would you mind to upload the exe file (SPFLITE2.EXE) to Virustotal instead? https://virustotalcloud.appspot.com/nui/index.html#/home/upload That way, we can collect it from there. Please post the link of the virustotal results here afterwards. Thanks!
  11. Thanks. It was the 64bits version that was whitelisted before. I've now whitelisted the 32bits version. This should no longer be detected anymore.
  12. Hi, Please see above how to add an exclusion. Additionally, Please zip and attach the exact file that was blocked, as it might be different than above one. Thanks!
  13. Hi, This is detected by our MachineLearning engine, which helps to protect even better against 0day threats. Unfortunately, as this is a heuristic engine, it's possible False Positives happen. Also see here for more explanation: https://forums.malwarebytes.com/topic/238670-machinelearninganomalous-detections-and-explanation/ Thanks for reporting these, as this helps to finetune the engine, so these won't be detected in the future anymore. This should be fixed by now. Please give it some time (max 10 minutes) in order to have it populate, so detection won't happen anymore.
  14. Hi, This will be reviewed and detection removed if necessary. Thanks for reporting!
  15. Hi, This is behavior detection, but has been fixed in a meanwhile. Thanks for reporting!
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.