Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About mightaswell

  • Rank
    Advanced Member

Recent Profile Visitors

1,302 profile views
  1. Many thanks exile360. I followed the advice and functionality has been restored. I have updated to the latest component package version 1.0.976 I thought as much that it must have been a false positive.
  2. While saving an xlsx file Malwarebytes suddenly reported detecting ransomware and has removed access to excel entirely. It reports ransomware was detected and quarantined. I can no longer use excel. The file quarantined was Excel 2013.Ink What can I do to return functionality of Excel. How can I check if it is a false positive.
  3. BillH99999 It only pauses the update for the days selected. So after the selected days the updates download. I checked when I received updates with a 6 in the box, All updates were received but 6 days after the release. I thought manual checking for updates might over ride that but it didn't.
  4. I had exactly the same problem, Tried to manually update win 10 v 1903 and it said up to date. I knew that was not he case. I checked the advanced options in the update window. Scroll down to the bottom where it says "A quality update includes security improvements . It can be deferred for this many days" Change the drop down box to 0 and go back and recheck for updates manually . If it's like mine it will find the update immediately. I had overlooked that. Must have delayed the updates when feature update 1903 happened.
  5. @LAVA Component Update 3.6.1 v1.0.508 was released on December 7th. The Tensforums article you linked described issues back in November before the offending CU update had been released to the general public so would appear to be unrelated. However I agree with @abs7125 and @mkaz that it does appear likely to be more widespread than they could know. When a computer freezes and needs a hard reboot or is simply powered off normally how is that sort of data differentiated?
  6. Ever since Component Update 3.6.1 v1.0.508 was released on December 7th there has been a steady stream of users complaining of frozen systems , crashing or slow systems attributable to that specific CU update . Malwarebytes is aware of the issue which they are trying to fix. As the update propagates more systems are being affected. That said the folks at MB insist that only a minor percentage of machines are affected. I have taken the step of preventing the Component package updating to the 508 version and have none of the above problems on either the win 7 x64 or Win X x64. If you sti
  7. It isn't OS specific. This laptop is running Win 7 and has a similar error report. It is described as APPCRASH . The crash is not very obvious as occurs on shutdown so easy for many users to be unaware. Win 7 does have the action center flagging the error and offering "checking for solutions". I imagine that would be fruitless exercise anyway.
  8. No problem at all. You are wise to be careful and if in doubt check.
  9. The version you have is 3.4.5 and the latest version of Malwarebytes is 3.5.1 so it is probably a correct notification. There is indeed a new version to the one you have. So I would say it is legitimate. What makes you think it isn't?
  10. That bell is just a part of the dashboard and shows a red alert when there is a notification as below. Yours shows no notification so all is good. If a notification is shown click on the bell and you'll see details about the notification and then the alert clears automatically.
  11. Maybe the issue @lock is one of veracity and robust proof of purchase linked to an email account. Having a screen shot of keys installed and providing an email may not provide MAlwarebytes with the kind of linkage they require for the account.
  12. Hi @Benequest , There is nothing wrong with Malwarebytes but you'll need to change a setting in the scheduled scan option. In order for the regular scheduled scans to perform the rootkit scan you need to open Malwarebytes and then select "settings" and then click on the "scan schedule" tab. Then tick the box next to the scan you wish to add the rootkit scan for (there might only be one listed) then you'll notice the "edit" button will become active. Click on the "edit" button and a window will open with details of the scheduled scan. Click on "advanced" button and the options
  13. Select "close" on the scan window (if it shows the scan and quarantine is complete window), then select dashboard before reselecting the scan option which then should show the custom scan window. Choose Custom Scan and then configure.
  14. The latest stable Avast version 18.1.2326 has just been released. Amongst other things it spruiks "What's new: - We've added a new Anti-Exploit module for better protection against exploits, shellcode, and other malicious executable files" Before jumping in and updating Avast does anyone know if Malwarebytes anti exploit module and the "new" Avast anti-exploit module play nicely together? Or should one be disabled?
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.