Jump to content

1PW

Trusted Advisors
  • Content Count

    10,034
  • Joined

Everything posted by 1PW

  1. Hello @Ztruker: 1. The False Positive (FP) reporting process has been highly mechanized for MB4. Please use the appropriate fp-tracker utility for this and future reports. 2. Post editing was removed for the lower member ranks until you have reached the next ranking. This was done to impede spam attacks. Thank you for taking the time to test the MB4 beta.
  2. Hello @tepitts: Malwarebytes official stance on such products are summed up rather nicely in the Malwarebytes Labs Blog: Registry Cleaners: Digital Snake Oil Hence, similar products would be rightly regarded as a PUP and would be flagged and quarantined by the Malwarebytes for Windows product. Thank you for your understanding.
  3. Hello @AlbertM and Sharing your MB4.Beta2 experiences is highly appreciated. Would you please document your observations with screenshots and logs? The Malwarebytes' staff/devs need hard data to resolve this issue. Thank you.
  4. Hello @Enkopa: You need not Quote my entire post to you. Just begin typing in the Reply to this topic... box. Per my request, could you please send an example .kvag encrypted file to the Sample Encrypted File section of Uploaded Files at ID Ransomware and then post the complete report in your next reply to this topic? Please do not send the file to me. Your patience and understanding are greatly appreciated. Thank you.
  5. Hello @Enkopa and A request to forum management has been made to move your topic to the more appropriate Windows Malware Removal Help & Support sub-forum. In the meantime, please satisfy all the information requests by uploading the following: Ransom Note - The file that displays the ransom and payment information. Sample Encrypted File - A file which has been encrypted, and cannot be opened. Addresses - Optionally, you may enter any email addresses or hyperlinks the ransomware gives you for contact (if there is no ransom note). Upload the appropriate effected files to the "Upload Files" section of the ID Ransomware site and then post all three (3) complete results in a reply to this topic. Please do not summarize what the ID Ransomware site reports. Instead, please provide the entire reports. Thank you.
  6. Hello @Nicolas7: I would recommend that Windows Defender Exploit Protection be enabled. Thank you.
  7. Hello @Nicolas7: If you are referring to Malwarebytes' Exploit protection (AE module), I would council against disabling the AE module on a long-term basis. The AE module was developed, and has succeeded, as one of the finest defense tools within Malwarebytes for Windows. As to disabling the AE module for testing purposes on a short-term basis - okay. Congratulations on solving your system's issues. Unless you are advised differently by Malwarebytes' AE staff, you may select "Other" for the Program type. Thank you.
  8. Hello @Nicolas7: This can be pursued after a Malwarebytes Support Tool - Repair (below) is performed. For now please disable both of them temporarily. Note: Please avoid using the Microsoft Edge browser due to errors noted in the data you have posted. Please use Internet Explorer 11 instead. Please delete any/all previous copies of mb-support-x.x.x.xxx.exe Please download and sequentially follow the steps within the Troubleshoot issues with Malwarebytes for Windows document. This will attempt to correct a MB3 anti-exploit module error also noted. At the conclusion of the MBST-Repair, please sequentially follow steps 1 through 8 in the Upload Malwarebytes Support Tool logs manually document. Then, attach the fresh mbst-grab-results.zip archive file in your next reply to this topic. Thank you.
  9. Hello @Nicolas7: Based on your statement that "problems are gone", if permitted, please run Malwarebytes, update the databases followed by a Malwarebytes' Threat Scan and direct all that is found to be quarantined but do not delete the quarantine content until requested. Then, please ATTACH the Threat Scan output text report file in your next reply to this topic. Thank you.
  10. Hello @Nicolas7 and As an acceptable alternative, please try downloading/running Farbar's FRST64.exe from: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html If successful, please only ATTACH the FRST.txt and Additional.txt output report files in your next reply to this topic. Thank you.
  11. Hello @MAM: Since the following applications already seem to be installed on this W7 system, please ATTACH scan reports from as many as is possible: Malwarebytes 3 for Windows TDSSKiller Zemana G Data Internet Security Please consider running these, and others, in Windows Safe Mode if failing in Windows Normal Mode. As previously requested, can you please add any other related infection observations to the narrative in your next reply. Thank you.
  12. Hello @MAM: It would be best if forum management is requested to move your topic to the Windows Malware Removal Help & Support sub-forum for expert analysis and remediation. In the meantime, please carefully study the locked/pinned topic I'm infected - What do I do now? To the three (3) files requested, it would be helpful to also ATTACH a Scan Report from Malwarebytes AdwCleaner as the fourth (4) report in a reply to this topic. Also, please provide a good narrative of the symptoms of the infection experienced. Thank you.
  13. Hello @Pramod2209 and I am sorry to read that your computer has been attacked. This may be a recent variant of a previous ransomware scheme. You and your thread would be best served by our requesting forum management move your topic to the Windows Malware Removal Help & Support sub-forum for expert & qualified assistance. In the meantime, please satisfy one or more information requests by uploading an appropriate effected file(s) to the "Upload Files" section of the ID Ransomware site and then post the complete result(s) in a reply to this topic. Hopefully your topic will have been moved by then. Thank you.
  14. Hello @celtics and I am sorry to read that your computer has been attacked. This may be a recent variant of a previous ransomware scheme. You and your thread would be best served by our requesting forum management move your topic to the Windows Malware Removal Help & Support sub-forum for expert & qualified assistance. In the meantime, please satisfy one or more information requests by uploading an appropriate effected file(s) to the "Upload Files" section of the ID Ransomware site and then post the complete result(s) in a reply to this topic. Hopefully your topic will have been moved by then. Thank you.
  15. Hello @Ashley100 and Please use the Submitting False Positives utility which will properly document, validate and greatly streamline the reporting of false positives. Trying the MB4 public beta is greatly appreciated. Thank you for your patience and understanding.
  16. Hello @JRKY and Thank you for taking the time to try this public beta and also for taking time to report your observations. You are correct. The only language supported in the early MB4 beta tests is the English language. This is both temporary and is called out by Erix above as item number seven in the Known Issues list. This has frequently been a practice of the developers in the early project stages as a long list of foreign language responses must be translated from the most matured versions of MB4. MB3 has been translated to dozens of languages, including Japanese. I would expect no less for MB4. Your efforts are appreciated and please do keep watching and trying MB4. HTH
  17. Hello @NeilA and Congratulations on your success and thank you too for your tenacity! It would be quite helpful to capture a MBST-Gather of the first two failed upgrades before that valuable info is lost: Please follow only steps 1 thru 8 in the Upload Malwarebytes Support Tool logs manually procedure. Then, please attach the mbst-grab-results.zip archive file in your next reply to this topic for analysis by staff/Devs. Thank you. cc: @LiquidTension @nikhils
  18. Hello @liewcake: We will need to wait for the BSOD expert/analyst. It may simply be a heretofore issue with the SysnativeFileCollectionApp software then. EDIT: An investigation of other computer user's archives in other forums does reveal a likely unresolved issue with the Sysnative collection utility. Thank you for your thoroughness.
  19. Hello @liewcake: Please recheck the date/time within your motherboard's BIOS settings as well as in Windows 10. The data and timestamp of the files within the archive you attached are not valid. Is the motherboard's CMOS battery installed correctly and not depleted? Erroneous date & timestamp example: December 30, 1979 at 23:00 Thank you.
  20. Hello @liewcake: A request has been made to forum management to move your topic to the BSOD, Crashes, Kernel Debugging sub-forum. As a general rule-of-thumb, the use of third-party utilities such as Driver Booster should be strictly avoided. Instead, the hardware manufacturer's recommendations should be your final guide. Please carefully read the content of the locked/pinned topic at Blue Screen of Death (BSOD) Posting Instructions - Windows and sequentially follow the instructions within. Then, attach the requested files to this topic. Some likelihood exists that updated drivers and/or firmware are required to resolve your system's issue but please await expert replies before taking any further corrective action. Thank you.
  21. Hello @HifiTollo and The specific Malwarebytes AdwCleaner version you attempted to download has been updated several times and is now obsolete. You would better served by downloading from the generic URL for the current release version: https://adwcleaner.malwarebytes.com Thank you.
  22. 1PW

    Yahoo Finance Ads.

    Hello @rakka: Update: As was previously reported many months ago in the then Malwarebytes Browser Extension Beta sub-forum, the current MBG extension's error counter still will dramatically up-count for https://finance.yahoo.com/ during scrolling unless the Ads / Trackers protection toggle switch is set to disable, for that Yahoo domain, or its ad site's URLs/IPs are added to global exclusions. Of course similar observances can be made for other media sites, the Yahoo Finance site is still particularly active with detectable ads. HTH
  23. Hello @share3141: He has stated so before and recently he was quoted, about a month ago. Alexandru Dici, WFC's Developer, when asked if Windows Firewall Control would be integrated into MBAM: https://www.wilderssecurity.com/threads/windows-firewall-control-wfc-by-binisoft-org.347370/page-204#post-2845932 HTH
  24. Hello @AdvancedSetup: Yes - it's progressing nicely. I am beta testing MBTS at a minor level and I am working with Alex on an issue or two. Thank you.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.