Jump to content


Honorary Members
  • Posts

  • Joined

  • Last visited


0 Neutral
  1. I use Windows 10, Norton Antiviris. and Malwarebytes Premium. I just bought a new computer and wondered if there is a recommended order for installing them. After the initial set up of Windows 10, should I install Norton and Malwarebytes before doing the windows updates , or should I check for and download windows updates first (without Norton Antiviris and Malwarebytes installed and running? I ask because now days it takes a couple of hours or more for all the windows updates needed for a new computer. Or does it not really matter? Thanks for any recommendations.
  2. If i may ask one more question. From a former thread, it sounds ike the vendor information goes to a malwarebytes page because the malwarenet page is no longer used. When malwarenet was being used the vendor information link to malwarenet would actually show who or what program the PUP was coming from, and I could decide if I wanted to remove it. As it is going to a malwarbytes page, it led me to believe it was coming from some part of the malwarebytes program (which would be fine with me, and I would just ignore it). Is there anyway I can know what program these three PUPs are coming from. They arent being removed when I check them and restart. Here is the link to a former thread https://forums.malwarebytes.org/index.php?showtopic=107093 where excile360 says "Formerly we had MalwareNET, which would take you to a link on our website providing the vendor name and a brief description of the infection. Currently we are working on recreating this and making it much more detailed (formerly the information provided was extremely generic). I have no ETA at this time on when that will be complete. Based on the image posted, I can tell you that the item detected was a PUP, which means Potentially Unwanted Program. The vendor name is BundledInstaller from the looks of it, which would indicate that it is a component of the installer that may be undesirable, for example a toolbar or some form of adware/spyware." I only ask because I am not very knowlegeable about such things,, and want to know if there is any security risks from them. How do I know where they came from?
  3. Thank you very much for taking the time to reply.
  4. It seems there are at least two more people who question about getting the same results in a scan. Here is one. https://forums.malwarebytes.org/index.php?showtopic=142622 Are they safe to leave or ignore?
  5. I guess my question is, are the three findings realy from part of a malwarebytes program, so it would be safe to put them in the ignore list? I keep checking them for removal, restart, then run a scan again, and the same three are detected.
  6. PS I submitted the question so fast i hadn't included a title. One must have bee added. I know malwarebytes is never a potentially unwanted program
  7. I downloaded Malwarebytes but chose not to try the trial version of pro. Is it possible that an on demand scan detects some aspect of Malwarebytes as a PUP? When i did a quick scan today it found three items. Under Vendor all three say PUP.Optional.B... Under category one says "folder" and the othe two say" file" Under Item the first says C:\ProgramData\boost_interprocess the second says c:\programdata\boost_interprocess\nobu64a... and the third says c:\programdata\boost_interprocess\nobu64tr... When I right click on any of them and click on vendor information, they all go to a Malwarebytes page http://www.malwarebytes.org/pro/?name=PUP.Optional.BoostInterProcess.A Is this normal, a malwarebytes scan picks up itself as a PUP? And I should not worry? Or can something I should be concerened about disguise itself and have vendor information go back to a malwarebytes page to make it look safe? When I click jump to location for the three I get boost_ interprocess created 2/12/2014 Nobu64AgentService created 2/12/2014 and Nobu64TrayIcon created 2/12/2014
  8. On only one computer I have, it takes almost two minutes, while "connecting to server" to get updates for malwarebytes. It eventualy does update (if i don't just try to close it, then the notice comes up that the program is not responding, and i click end program). Scans come up clean. I tried to use the Chamelean tool to check if it opened malwarebytes and updated, but each time i click one of the 12 buttons, each just comes up with a green check mark and says "tested". The other computers update pretty fast. I even removed the version of malwarebytes i had and reinstalled a new version, but still it is very slow to connect to server for updates. If scans come up clean is it ok, that it is taking so long? And what is Chamelean supose to do?
  9. It says the manufacturer is Microsoft. Should it be blocked or is it safe to allow or create rules using preset. It's the same computer I've had all along, but i have been getting these pop ups a few times a day for the last few weeks. Does anyone know what they are?
  10. I have a paid version of Malwarebytes on a net book. If i put the flash drive in a usb port, and started a scan, will Malwarebytes scan the flash drive? As I've already used the flashdrive at the SaveOn photo center to print the photos.
  11. If you take your flash drive to a "photo center" like at Save On,or Rite Aid, to print out photos you have on the flash drive, is there any way you might get a virus?
  12. Thank you, for taking time to reply and explain.
  13. Outpost Firewall 2009 (free) and the firewall that comes with Norton 360. Just so i understand. When I run an on demand scan with Malwarebytes (as it is the free version on this computer) , one of the firewalls is asking me if i want to let Malwarebytes do something? And I assume it is always alright to let Malwarebytes do whatever it is attempting, so I just click allow?
  14. So that pop up that i have to answer is coming from the firewall, or is it coming from malwarebytes?
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.