-
Posts
199 -
Joined
-
Last visited
Content Type
Events
Profiles
Forums
Everything posted by MrBiz
-
Hi guys, combofix file version 14.10.15.1 is detected as trojan by malwarebytes latest update as seen here (also flagged by 7 other companies) https://www.virustotal.com/en/file/7eb33176971f48e73c91a76665cef35f74486ff282bd7bfd2a747589269fa157/analysis/1413705161/ SHA256: 7eb33176971f48e73c91a76665cef35f74486ff282bd7bfd2a747589269fa157 i downloaded this combofix from bleepingcomputer attached the file below password: virus ComboFix.7z
-
Source: https://forum.eset.com/topic/2590-security-incident-on-forumesetcom/
-
Its back to normal thx
-
Saw this on malwaretips Sad, i expected a ddos attack and not for it to be hacked, let hope all gets well soon since this is my main antivirus company
-
hi i left malware bytes pro running in realtime as usual (and t does schedule scan for time to time), now today i went to bed to find the program off and its shows its scanning but when i go to scan menu its not (it said scan failed) The question i have is why it terminated? zemana doesnt block it, avast doesnt, comodo hasnt take a look at this all protection enabled but i still get the "fix" message and when i click it it does nothing I'm gonna do a clean reinstall, just worried i cant leave a realtime protection software on and not have to worry about it also i'm sure i also told you about svchost and high ram and cpu usage but its related to windows update see: attached a roguekiller log (Yes, if anthing suspicous happens i run it to see if it can find or terminate anything) RKreport0_S_05272014_032720.txt
-
Hi i know this isn't the place to talk about malware but wanted to post this for you and avast guys since i use your products Got these in spam, i was wondering if i should open these email in sandboxie and see if malwarebytes detects anything or should stuff like these only be tried in a Virtual Machine? also that 74636363636.jpg i wonder if its a ransomeware, my pc is set to show all extensions so i was wondering if that setting only applies to files on my desktop or does the setting extend to the internet?
-
Malwarebytes Anti-Malware Update to 2.0.1
MrBiz replied to RubbeR DuckY's topic in Malwarebytes News
could not edit my original post so i had to post it here -
Hey, i saw on the old malwarebytes you had a password setting to protect the settings and stuff, ok for a little back story, i used it but the problem was it only asked to be enter once and i did and wrote down the password, only to realize that when i entered it once a program called keyscrambler was bugged out and was encrypting my key strokes at the time, so i entered a bunch of gibberish and cant change the setting so the only way to go around that was either uninstall and reinstall or update (which i did) so i suggest have a password confirmation system (where you enter it twice to confirm, like how google and other service let you set password)
-
Malwarebytes Anti-Malware Update to 2.0.1
MrBiz replied to RubbeR DuckY's topic in Malwarebytes News
Finally jumped the ship an had a successful install and everything is back to normal why i say normal is that i set a password for the settings menu and forgot it in the old version (because keyscrambler bugged out and was encrypting my keystroke) but now everything is accessible edit: about the password setting lock, can you have an option that you have to enter the password 2 times? enter the password and then verify it again a second time, that way if something was buggy i would have to enter it twice and since it needs the password to be matching i would see that something is wrong and i'm loving the new look and advanced setting and the backup adverts are ok with me because a pc is only as good as its last backup about the functionality: it still uses high RAM (170mb when scanning) and cpu (up to 60% when scanning) all this on: - Intel e3300 celeron processor - Windows 7 32 bit - 3GB ram -
https://helpdesk.malwarebytes.org/entries/21195891-Why-does-Malwarebytes-Anti-Malware-block-BitTorrent-or-other-Peer-to-Peer-Clients-
-
https://www.youtube.com/watch?v=nHU3ujyw_sQ Looks interesting, from my limited knowledge he shows how hackers can use rogue servers to intercept information on big corps and how to prevent it I'm sure the security guys here understand it, if any of you see it can you tell me if its a prevalent method you see used today?
-
Thank you again
-
Hi, will the pro version or any version include scanning of network or network drives in the near future?
-
You have the real time protection on? (Malwarebytes pro) <------ why i ask is because the realtime protection has stop hackers for me more than once You use p2p stuff? Windows and programs updated? You use firewall? You connected to a network of pc's? Have you had your pc clean by the malware experts here? https://forums.malwarebytes.org/index.php?showtopic=9573 just saw your post and wanted to add my 2 cents an expert will addresses you shorty
-
[SOLVED] "Beta testing period has finished" dialog box
MrBiz replied to John L. Galt's topic in Anti-Exploit Beta
followed the instructions and got this, also avast hardenmode blocks the installation (i added this on to the exception list) -
[SOLVED] "Beta testing period has finished" dialog box
MrBiz replied to John L. Galt's topic in Anti-Exploit Beta
I have this too on my PC OS: Windows 7 Ultimate 32bit when i try to run it the message pops up and opens internet explorer , when i exit the message, it says IE isnt working and i should force close -
Luther Vandross - There's Nothing Better Than Love
-
avast detecting malwarebytes as malware again lol did the quick scan and found nothing
-
Scanned with the latest update and found this Malwarebytes Anti-Malware (PRO) 1.75.0.1300www.malwarebytes.org Database version: v2013.12.25.04 Windows 7 Service Pack 1 x86 NTFSInternet Explorer 11.0.9600.16476PatricK :: PATRICK-PC [administrator] Protection: Enabled 12/25/2013 3:41:18 AMMBAM-log-2013-12-25 (08-46-20).txt Scan type: Full scan (C:\|F:\|)Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUMScan options disabled: P2PObjects scanned: 427097Time elapsed: 1 hour(s), 45 minute(s), 46 second(s) Memory Processes Detected: 0(No malicious items detected) Memory Modules Detected: 0(No malicious items detected) Registry Keys Detected: 0(No malicious items detected) Registry Values Detected: 0(No malicious items detected) Registry Data Items Detected: 0(No malicious items detected) Folders Detected: 0(No malicious items detected) Files Detected: 1C:\Windows\WindowsUpdate.log (Extension.Mismatch) -> No action taken. (end) i deleted it and restarted yet when i search the location i still see it there (note in the result above it said no action taken but the log was created before i removed it, which required a restart) https://www.virustotal.com/en/file/96cd27a6f91870e17d615c7bc5d0eecaf8daedec3678ab420df928d215c5cddf/analysis/1388025689/ SHA256: 96cd27a6f91870e17d615c7bc5d0eecaf8daedec3678ab420df928d215c5cddf File name: WindowsUpdate.log Detection ratio: 0 / 49 Analysis date: 2013-12-26 02:41:29 UTC ( 1 minute ago ) WindowsUpdate.log
-
Happy holidays to all and may this company continue to excel
-
Indeed, great product and great team btw that's the same setup i use, i call them layers of steel
-
Thanks for the input for me i got rid of adobe completely (for mom ill have to direct them to google chrome or comodo dragon only) meaning i dont use IE i only use adobe plugin for google chrome, which is update by google only