Jump to content

mlonabaugh

Members
  • Posts

    16
  • Joined

  • Last visited

Reputation

1 Neutral

About mlonabaugh

  • Birthday 07/03/1957

Profile Information

  • Location
    CT

Recent Profile Visitors

578 profile views
  1. Hello, All I did was ask a simple question here. I did not move the topic, or try to contact you here. I would rather stay with you...
  2. Just to be clear... Is that a query you posted? or just a list of names you want me to visually inspect? If you just want a visual inspection, the answer is no to all. I have 7 unknown users that were created right about when this all started. I have disabled all of them. (Not deleted) They are: dcs, help, Mssql, Mssqla, sql, sqlup, web, websa...
  3. Good morning, This forum is a bit easier to use, so if you don't mind let's stay here. I was not aware you had a presence in both places... The only thing I did last night was disable the network connection to prevent any hacking while I slept, I will run your query asap... Thank you!
  4. Thank you for the suggestion... I ran multiple queries and they all returned "(0 row(s) affected)" Thank you!!!
  5. I don't think so... That is one of the items that the AV programs constantly find and remove. But it keeps coming back.
  6. Thank you. I will need to wait until the end of day to do this, but I will get back to you asap. I also discovered that there were 7 sql jobs set to fire off at different times of the day. I am hoping that killing those jobs will do the trick... Thanks again!!!!!
  7. Hello.. The Fix List says "Unavailable" Can you paste the contents into the comments?
  8. Hello, I have been battling a virus for weeks. MWB finds and fixes the problem but it just keeps coming back. I am working with someone from bleeping computers so I don't want to bring to many chefs to the table but I would like to know if you have any helpful advice. I use MWB Nebula... Below is the a report on what keeps coming back. It's always the same 92 infections... Any assistance would be deeply appreciated... Thank you! Hello Mark Lonabaugh, Based on your preferences, you are being notified that a new event has occurred for the following account: Data Capture Solutions Endpoint Name: Nav.Datacapture.prv Domain/Workgroup: Datacapture.prv IP: 192.168.0.17 Scan Date and Time: 08/05/2021 - 03:56:51 PM Scan Type: ThreatScan Detections Cleaned: 92 Severity: warning Group: Default Group Policy: Default Policy Displaying 92 of 92 detections below - additional details can be viewed via the Scan Report. Name Type Category Status Path RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe RiskWare.IFEOHijack Reg, Value Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe|DEBUGGER RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\kvxp.kxp RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP.kxp RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\kvxp.kxp RiskWare.IFEOHijack Reg, Key Malware Quarantined HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP.kxp
  9. Hello. The issue has been solved. Thank you very much... Have a great weekend!
  10. Hello, I have an endpoint that shows 1 Suspicious activities found warring, but when I go into the Suspicious activities window I see "No Suspicious activities found" I have deleted the endpoint, uninstalled and reinstalled MB but the warring returns and still receive "No Suspicious activities found" . Is there a wat to clear the warning? Thanks!
  11. Hello, Management console looks very useful. I will see about upgrading. Thank you very much for such a quick and helpful response!
  12. Hello, I am long time user of MB Corporate edition. I am now seeing this "Malwarebytes Anti-Malware for Business" and I am wondering, is this something I want to switch to? Can I upgrade my account? Any guidance would be deeply appreciated. Thank you...
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.