Jump to content

ronzie009

Members
  • Content Count

    26
  • Joined

  • Last visited

Everything posted by ronzie009

  1. Requested file attached. Dxdiag run as administrator in RDP session on server machine. MBAM 4.04 installed and running. 2019-11-12_DxDiag.zip
  2. I was also using RDP and have an AMD card. When I access the pc directly with a monitor/keyboard/mouse connected to it MBAM 4 works fine.
  3. Requested files attached. Note; I have downgraded MBAM to v 3.7.1.2839 so that I can still have protection while connecting to the internet. 2019-11-07_001_MBAM_Troubleshooting.zip
  4. Running FRST.exe produced this error box: "AutoIt Error: Line 10191 (File "C:\Users\ron\Desktop\FRST.exe"): Error: Variable used without being declared." FRST.txt attached, there was no Addition.txt The interface opened in safe mode, the only error was about not being able to contact the license server. FRST.txt
  5. After installing MBAM V 4, a box appeared that said "loadlibrary failed with error 87 the parameter is incorrect". I right clicked on the MBAM icon in the tray and selected "open Malwarebytes" and the same error box popped up. I rebooted, tried again to open MBAM, and got the same error. I downloaded and ran the MBAM troubleshooter, had it clean uninstall MBAM and reinstall, but I still get the error. Files generated by MBAM troubleshooter attached, except for the license key. mbst-clean-results.txt mbst-grab-results.zip
  6. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 7/30/19 Protection Event Time: 7:56 PM Log File: a50cae72-b325-11e9-af20-001e37255085.json -Software Information- Version: 3.8.3.2965 Components Version: 1.0.613 Update Package Version: 1.0.11788 License: Premium -System Information- OS: Windows 10 (Build 18362.267) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Category: Malware Domain: www.googletagmanager.com IP Address: 172.217.26.8 Port: [7068] Type: Outbound File: C:\Program Files\Mozilla Firefox\firefox.exe (end)
  7. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 7/30/19 Protection Event Time: 7:33 PM Log File: 7e3a5270-b322-11e9-910c-0026228a0caa.json -Software Information- Version: 3.8.3.2965 Components Version: 1.0.613 Update Package Version: 1.0.11788 License: Trial -System Information- OS: Windows 10 (Build 18362.239) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Category: Malware Domain: settings-win.data.microsoft.com IP Address: 20.36.218.63 Port: [58792] Type: Outbound File: (end)
  8. Does this mean that this file installed malware on my pc when I ran it five years ago? Malware that neither Windows Defender or MBAM can find?
  9. After a regular scheduled quick scan today, 21 installation files in my Downloads folder were flagged by MBAM as either PUPs or Malware. These files have been there for various lengths of time and never been flagged bad before. They were all originally downloaded while MBAM real time protection was running and not flagged, and I scanned every one of them with MBAM after downloading them and they were not flagged then, so I think it is extremely unlikely that they are dangerous now. I have attached the report, but due to the large number of files involved I have not attached them. 2018-10-06FalsePositives.txt
  10. Same thing here when trying to let VLC update itself. I downloaded the VLC install program from the VLC website, scanned it with MBAM which said it was OK, and manually upgraded with no problems. I think MBAM is somehow seeing the automatic upgrade process as an exploit. Here's the log from the exploit action: Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 9/1/18 Protection Event Time: 6:38 AM Log File: 1e47ec42-add3-11e8-a0fd-001e37255085.json -Software Information- Version: 3.5.1.2522 Components Version: 1.0.421 Update Package Version: 1.0.6595 License: Premium -System Information- OS: Windows 10 (Build 17134.228) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, [0], [392684],0.0.0 -Exploit Data- Affected Application: VLC Player Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: D:\tmp\vlc-3.0.4-win64.exe URL: (end)
  11. Wow, just found this article about it: https://arstechnica.com/information-technology/2018/02/salon-to-ad-blockers-can-we-use-your-browser-to-mine-cryptocurrency/ They never gave me the option to turn off my adblocker, though, as the linked article above claimed they would. MBAM just started blocking it in the last day or so, as far as I can tell, but I don't go there regularly so I can't say for sure when it started. Thanks for the swift reply!
  12. MBAM blocking salon.com for riskware, program claims to be up to date, results from MBAM support tool attached. mbst-grab-results.zip
  13. VirusTotal shows MBAM as the only positive (1/67) on this file. I don't know exactly when this file was installed because the latest Windows 10 update caused the add/remove programs control panel to now show the date of the update as the install date for all applications installed at that time. Windows 10 Home version 1803 OS build 17134.1 2018-05-04_scan_report.txt rpcapd.rar
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.