Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About drinx

  • Rank
    New Member
  1. Hi, Detected as Phishing: IP: Domain: d-15.winudf.com Link: hxxps://d-15.winudf.com/b/apk/b3JnLndhdGVyZm94cHJvamVjdC53YXRlcmZveF8yMDE1NTc2OTAwXzZjNDZlYTM2?_fn=V2F0ZXJmb3ggV2ViIEJyb3dzZXIgT3BlbiBGcmVlIGFuZCBQcml2YXRlX3Y2MC4xLjBfYXBrcHVyZS5jb20uYXBr&_p=b3JnLndhdGVyZm94cHJvamVjdC53YXRlcmZveA&am=U2nT8CrEjWJhGHjAjgex1w&at=1622928447&k=81c57d6e7a3b0ad2c128b414934ae56060bd3e6a
  2. Hi, as title. AdbWinApi.zip Scan log - AdbWinApi.dll _.txt
  3. Hi, I will do that, I just read about that elsewhere. Thank you.
  4. 48 files detected in C:\Windows\assembly False positives?. .NET files I assume?, but after restoring them all back out of quarantine all of the file paths lead nowhere, so I am unable to upload them. Advise?. C Windows assembly log.txt
  5. Hi, both the log file and the .exe file are in the zip. Log & DivX Uninstaller.zip
  6. I just re-scanned the files before tying your suggestion and the files are now no longer detected. Does the cache flush itself after a while?, I also ran some cleaning programs before making a system restore and updating by browser, I'm unsure if that might of deleted the cache. Thanks for you help. If I get any further detection's of those files I will do as you suggested though.
  7. Hi thanks, but the .zip file that I sent to you is still being detected on its own, it might of been detected after I changed the zip file name, I can't recall now, but after changing the name back again it is still being detected and the .paff file is still being detected (depending on how many files I choose to scan together at once) as it is not detected anymore if it is scanned on its own which seems odd. Please see the new log files [New Histrory, scan logs] of MediaInfo Portable (Multilingual).zip
  8. Malwarebytes History and the detected file are included in the zip file Reported by Malwarebytes as: Malware.Generic.4280996595 virustotal picks up nothing: https://www.virustotal.com/gui/file/68ae0d768e56558dfde75cbce7fd556c64f67352978ca99997adb3ac68d21ccd/detection So false positive?. Thanks MEDIAINFOPORTABLE_0.7.64.PAF.EXE [Malware.Generic.4280996595].zip
  9. Hi, advise please as to if this website block by Malwarebytes is a false positive or not?. hxxps://ohsw7kcq3.qnssl.com/file/14984687013583gjox1savd4.zip The zip file is attached to this post. Log: -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Category: Trojan Domain: ohsw7kcq3.qnssl.com IP Address: Port: [49897] Type: Outbound .. The IP address changes though!. The link that was blocked is a firmware update and update program/tool which runs on Windows, but the firmware is for a non win
  10. *Update: (literally) it is now updating again, the Main database updated but the Rootkit database stayed the same, I presume that there is just no update for the Rootkit database?.
  11. Hi, update failed, it was working earlier today, any problems with the server?.
  12. I did try that a few times myself on Windows 7 Ultimate but the service wouldn't stop, it just got stuck on "stopping". I also tried to turn off "Start Malwarebytes at Windows Startup" in the Malwarebytes/settings/Protection Tab, but that didn't work either as it just kept resetting itself back to On so I uninstalled it and reinstalled it later.
  13. It was throwing up Windows memory low errors for me within about 6 to 8 minutes (at a guess) after each reboot making my PC unusable *see pic at the bottom of my post.. yikes!. Web protection said it was off on my system and on my friends, it's back on again now since it's been fixed. After figuring out that it was MBAMService doing it I quit Malwarebytes but MBAMService couldn't be stopped, it was stuck on stopping and it wouldn't stop manually so it never did, nor obviously did the memory problem. I watched MBAMService slowly eating up all of the memory on my PC via Resource M
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.