deucy14

Members
  • Content count

    71
  • Joined

  • Last visited

About deucy14

  • Rank
    Regular Member

Recent Profile Visitors

995 profile views
  1. Exile360 it has been said many times it is better to be lucky than smart. You have a dual-fecta going in that you are both ! Congrats on the good luck even if you were using the portable. Just keep practicing the good luck ......... it comes in handy ! Thank you for the link. After Aura's post leading me to information about the discovery, I was fascinated by it and spent more time attending to the topic; I found the info at your link back then. Reading the blog was interesting, too. Just yesterday I read about the current growth of hacking into home routers which include not just potential compromising of conventional computers but makes vulnerable the many contemporary, other home appliances dependent on the router. It's becoming more frequent to have drive-by hackers invading your home. This is made all the more easier with the typical, kindergarten grade passwords used for that device. In another article, a respectable source stated in actuality, you have to have your head on a swivel stick to be circumspect of every thing around you these days you think is password coded. This is particularly the case where the big targets are ..... your bank, your use of credit cards on line, fragments of your personal identity getting accumulated, etc. There was attention given in the article that the successes are so wide spread that the population growth of hacking dwarfs the year prior and the year prior to that. It is a growth industry easy to be seduced into. Thanks for your post, Exile 360.
  2. Aura....PERFECT ! Thank YOU. MWB DID quarantine in a timely fashion. Your referenced link was probably an outlier in terms of the exception to "it's just another trojan." Shocking to learn how CCleaner got infiltrated and the subsequent millions of users downstream like me were the receiver of this trojan. Because of quite a robust exchange--and a very constructive one for me--earlier this year that started with the discussion of "clean installs" that morphed into the pros and cons of routine "cleaning" of a computer, I modified my routine in a few different ways. One way happened to be not using CCleaner almost daily as I used to. Nevertheless, by chance, I updated to the contaminated version. A second well used computer in the house only irregularly gets updated to most recent version of CCleaner and is still a few versions behind the affected one. Nice to know now that computer can leapfrog over the bad version. I missed any warning from MWB about this seriously large in scope--over 2 million users-- being on the receiving end of a CCleaner, contaminated, version update. I am still surprised I could not find anything about this trojan from the well know sites one would think would have given a shout-out on it. Perhaps I did go sites that addressed it, but I overlooked it. Thanks much, Aura !
  3. Dave..... Thank you for your very informative reply. I read it with interest, and I do appreciate the education. Every bit helps. I just replied to Aura (above) with the log from the detections on a single scan.
  4. Thank you Aura.....Your request is replied to as copied off my computer clipboard and posted below. BTW....the two trojan.niyeta are still in my quarantine, and in a few days it will be one month the quarantine commenced. Am I confusing this with Windows Defender or something else that if left alone in quarantine for 30 days they are automatically released ? As always, I am grateful to you ! Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 9/18/17 Scan Time: 11:28 AM Log File: Administrator: Yes -Software Information- Version: 3.1.2.1733 Components Version: 1.0.160 Update Package Version: 1.0.2833 License: Premium -System Information- OS: Windows 8.1 CPU: x64 File System: NTFS User: System -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 391238 Threats Detected: 2 Threats Quarantined: 2 Time Elapsed: 16 min, 11 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 2 Trojan.Nyetya, C:\$RECYCLE.BIN\S-1-5-21-3330058123-2019430083-2832955609-1004\$RPKRCB9.EXE, Quarantined, [8818], [436218],1.0.2833 Trojan.Nyetya, C:\USERS\PATTI STANDARD\DOWNLOADS\CCSETUP533.EXE, Quarantined, [8818], [436221],1.0.2833 Physical Sector: 0 (No malicious items detected) (end)
  5. In Malwarebytes for Windows I posted 4 days ago which received over 30 views but no reply. Surely someone knows where one can go to get info on a Trojan I have in quarantine. Here is what I posted with fresh edits for this post: I have searched--Symantec and others_ for anything related to this trojan that MB has found (twice in the same scan) and have not come up with any info. They have been in quarantine for two weeks on my computer. This was 4 days ago Monday 25 Sept 2017. BTW... how do I upload a trojan file in quarantine ? I ask this because a various sites there is the opportunity for infected files to be uploaded to the site. Where are the obvious places I have missed for info on this trojan ? Thank you in advance So no one knows location of where to find more on this trojan I have in quarantine ? I posted this 4 days ago. I am interested among other reasons because in one Malwarebytes scan, two of the same trojan were of separate files which I have quarantined. I am surprised by that and want to know more as to how that can be. Maybe I just bone up on trojans which appears to have much exposure in publications on their general nature. But how odd that I can find no info on this one.... trojan.niyeta (looks Russian !)
  6. So no one knows location of where to find more on this trojan I have in quarantine ? I posted this 4 days ago. I am interested among other reasons because in one Malwarebytes scan, two of the same trojan were of separate files which I have quarantined. I am surprised by that and want to know more as to how that can be. Maybe I just bone up on trojans which appears to have much exposure in publications on their general nature. But how odd that I can find no info on this one.... trojan.niyeta (looks Russian !)
  7. I have searched--Symantec and others_ for anything related to this trojan that MB has found (twice in the same scan) and have not come up with any info. They have been in quarantine for two weeks on my computer. BTW... how do I upload a trojan file in quarantine ? Where are the obvious places I have missed for info on this trojan ? Thank you in advance
  8. Computer repair shop where I left the HP laptop yesterday I brought home today with it having been repaired. The registry relating to the firewall had some missing data in some registry key/s. I asked how could this happen and he said lots of ways; even widows downloaded updates have made this occur., he says. Which may explain why had two laptops out, but that is hard to believe for a few reasons. First I think it would have been a big crowd of us affected.....lol....right ? And secondly both computers were actively being used and one had the problem for a few months while the other just occurred. I have had discussions on this site about using registy cleaners. I have only used CCleaner. The personal legacy for my is DON'T use the registy cleaner in CCleaner unless you really know what you are deleting.
  9. Nikhils....TY a lot ! Because I gave the computer to a repair location, it is peace of mind they are not pounding their heads against the wall for something that relates to MWB. Your quick response is very helpful as a "process of elimination" piece of info. Again....thank you very much !
  10. I have a Lenovo laptop that just lost its firewall since I did a MWB clean install of 3.1.2.1733 about two weeks ago. I have used msc.svc to attempt turning firewall on without success. It is a Windows 8.1 with Intel i7 processor and is 2 years old. I have a HP laptop that lost its firewall PRIOR to making a clean install of 3.1.2.1733 a few weeks ago that had the most current version of MWM prior to it having 3.1.2.1733 installed. It had been without firewall for a few months. It went in to the shop for examination yesterday. This HP is Windows 10 that replaced Windows 8 last year. It is with Intel i7 processor and is 3 1/2 years old. I have for the last few years obsessively checked/updated intra-day MWB between auto-updates while using these computers. I really don't think either computer has been infected. MY QUESTION: HAS THERE BEEN ANY OR QUITE A FEW POSTS HERE RELATED TO FIREWALLS GOING INOPERATIVE AND NOT BEING ABLE TO BE RESTORED (EVEN WITH GOING TO MSC.SVC ?
  11. I just learned I could custom scan using malwarebytes. It allowed me not to identify a file but to scan my entire download list. Results were negative findings. (But I know this is a nasty file...not yet opened.) I am asking for the most hygienic way to eliminate it from my computer, please.
  12. Minutes ago I downloaded a fake advisory purporting to be a critical firefox update. I had pulled the trigger to download AND THEN immediately did a web search to determine if such is fake. Conclusion: it is fake. I did those activities in reverse, rather than check first. sigh ! I have not clicked on the downloaded file which is firefox-patch.js JavaScript File 12kb It merely resides in my download folder. What do I do next ? Do I just "delete" to my recycle bin and delete it from there which I suspect it will remain on my hard drive? OR Can I target it with malwarebytes for quarantine and elimination ? My only other defense is Windows Defender. I do have RevoUninstaller but it only has a "junk file" remover which is no better, I think, than me manually deleting. I am using windows 8.1. See attachment. Did I infect myself by downloading ?
  13. Thanks warwagon. All good info and points.
  14. exile360 ! When you post, it is as your last words, it..... "is always a plus ."