-
Posts
21 -
Joined
-
Last visited
Content Type
Events
Profiles
Forums
Posts posted by mlonabaugh
-
-
Thank you!
Have a great weekend :)
-
-
Hi,
I'm not with the machine the file was found on so it may take little time for me to acquire.
I love MWB and have been a customer since your inception, but the false positives are brutal.
Thanks for the responce.
-
MXDGROUPCAB.CAB is not a virus.
-
Hello,
All I did was ask a simple question here. I did not move the topic, or try to contact you here. I would rather stay with you...
-
Just to be clear... Is that a query you posted? or just a list of names you want me to visually inspect?
If you just want a visual inspection, the answer is no to all. I have 7 unknown users that were created right about when this all started. I have disabled all of them. (Not deleted)
They are: dcs, help, Mssql, Mssqla, sql, sqlup, web, websa...
-
Good morning,
This forum is a bit easier to use, so if you don't mind let's stay here. I was not aware you had a presence in both places...
The only thing I did last night was disable the network connection to prevent any hacking while I slept, I will run your query asap...
Thank you!
-
6 hours ago, AdvancedSetup said:
If there is an actual stored procedure or job calling it you might want to search out the stored procedures and see what they're doing.
https://jesspomfret.com/searching-stored-procedures/
Thank you for the suggestion...
I ran multiple queries and they all returned "(0 row(s) affected)"
Thank you!!!
-
I don't think so... That is one of the items that the AV programs constantly find and remove.
But it keeps coming back.
-
Thank you. I will need to wait until the end of day to do this, but I will get back to you asap.
I also discovered that there were 7 sql jobs set to fire off at different times of the day.
I am hoping that killing those jobs will do the trick...
Thanks again!!!!!
- 1
-
Hello.. The Fix List says "Unavailable"
Can you paste the contents into the comments?
-
Thanks!
-
Hello,
I have been battling a virus for weeks. MWB finds and fixes the problem but it just keeps coming back.
I am working with someone from bleeping computers so I don't want to bring to many chefs to the table but I would like to know if you have any helpful advice.
I use MWB Nebula...
Below is the a report on what keeps coming back. It's always the same 92 infections...
Any assistance would be deeply appreciated...
Thank you!
Hello Mark Lonabaugh,
Based on your preferences, you are being notified that a new event has occurred for the following account:
Data Capture Solutions
- Endpoint Name: Nav.Datacapture.prv
- Domain/Workgroup: Datacapture.prv
- IP: 192.168.0.17
- Scan Date and Time: 08/05/2021 - 03:56:51 PM
- Scan Type: ThreatScan
- Detections Cleaned: 92
- Severity: warning
- Group: Default Group
- Policy: Default Policy
Displaying 92 of 92 detections below - additional details can be viewed via the Scan Report.
Name
Type
Category
Status
Path
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SHSTAT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RAVMOND.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCTRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\QQPCRTP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KWATCH.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVSRVXP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMONXP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSWEBSHIELD.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSAFETRAY.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISSVC.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSTART.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CMDAGENT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CFP.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360tray.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360sd.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360Safe.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rps.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe
RiskWare.IFEOHijack
Reg, Value
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\360rp.exe|DEBUGGER
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\kvxp.kxp
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP.kxp
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\kvxp.kxp
RiskWare.IFEOHijack
Reg, Key
Malware
Quarantined
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KVMonXP.kxp
-
Hello. The issue has been solved.
Thank you very much... Have a great weekend!
-
Thank you!
-
Hello,
I have an endpoint that shows 1 Suspicious activities found warring, but when I go into the Suspicious activities window I see "No Suspicious activities found"
I have deleted the endpoint, uninstalled and reinstalled MB but the warring returns and still receive "No Suspicious activities found" .
Is there a wat to clear the warning?
Thanks!
-
Awesome. Thank you for fast response...
Have a great day!
-
Hello,
Management console looks very useful. I will see about upgrading.
Thank you very much for such a quick and helpful response! -
Hello,
I am long time user of MB Corporate edition. I am now seeing this "Malwarebytes Anti-Malware for Business" and I am wondering, is this something I want to switch to? Can I upgrade my account?
Any guidance would be deeply appreciated. Thank you... -
Hello,
I am a long time corporate user and I was just wondering if you have any Corporate Version Beta's?
Thank you...
False Possitives
in Malwarebytes Nebula
Posted
I have been using MB for many many years, and the only issue I have had is excluding false possitives.
Why is is it so hard to excludes false possitives?
Is it me? Am I missing something? Is there an easy way to do this and I just can't find it?
Please help, its so frustrating