Jump to content

snowye

Members
  • Posts

    6
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Oh k yea interesting. I sort of know what you mean cus i messed around with remote access trojans ages ago in a virtual machine and you can put them in pictures n music files ect. It would always get detected through my antivirus and on virustotal.com. Iv also looked a little into how to take advantage of software exploits and by passing firewalls ect, but requires a lot more in depth research. It is good to know these things to protect your self against hacks.
  2. I noticed after i uploaded it, that is was different, i think its just a different version. I'm not totally sure how it would help even if you could reproduce it. I can't get a hold of the file though sorry, tried my best. It's interesting even if it was a false positive though, since a lot of people dont trust windows 10 because of its privacy issues, so i did want to try help n maybe malwarebytes team could have looked deeper into the file.
  3. So i got the file out of my image i made with acronis true image in july last year, I am not sure if it will be the same version or not? i am not sure if the file would have been updated since. Hopefully it helps. Cheers. File.zip
  4. There is no previous version sorry. I had also go to \\localhost\c$\ to even get the option for previous versions in windows file explorer.. There was no option to begin with to check for previous version, you might have to replicate the download for windows 10 update to grab the file for inspection, as i cannot restore the file.
  5. I was going to try get a copy of the file to attach, But it seems malwarebytes deleted the file rather than quarantine it. I cannot see it in quarantine and it is no longer in the folder. You can't copy edit or delete files in the folder.
  6. Hi i ran a full scan tonight and found Trojan.MalPack.Generic in windows 10 upgrade hidden folder. Could it possibly be microsoft is packing trojans in windows 10 now? Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 14/01/2016 Scan Time: 9:41 PM Logfile: Administrator: Yes Version: 2.2.0.1024 Malware Database: v2016.01.14.03 Rootkit Database: v2016.01.09.01 License: Premium Malware Protection: Enabled Malicious Website Protection: Enabled Self-protection: Disabled OS: Windows 8.1 CPU: x64 File System: NTFS User: Scan Type: Custom Scan Result: Completed Objects Scanned: 599128 Time Elapsed: 1 hr, 51 min, 16 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 0 (No malicious items detected) Registry Values: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Folders: 0 (No malicious items detected) Files: 1 Trojan.MalPack.Generic, C:\$Windows.~BT\Sources\SafeOS\SafeOS.Mount\Windows\System32\config\SOFTWARE{c7a35740-26e2-11e5-80da-e41d2d741090}.TMContainer00000000000000000001.regtrans-ms, Quarantined, [cdbe54e5c4d5b1853079114dfe0352ae], Physical Sectors: 0 (No malicious items detected) (end)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.