Jump to content

GT500

Trusted Advisors
  • Posts

    6,304
  • Joined

  • Last visited

Posts posted by GT500

  1. https://www.virustotal.com/gui/url/372b6d122537ab02ae0f2fef530c9fc1e9df521389cf2ed4e7a43c2c93d1bb69

    It is promoted as the site to download a Windows PE building tool called "LiveSystem pro".

    https://theoven.org/viewtopic.php?t=39

     

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 7/22/2024
    Protection Event Time: 1:18 AM
    Log File: ceb7f02a-47e9-11ef-a87b-a85e45b389b1.json
    
    -Software Information-
    Version: 5.1.6.117
    Components Version: 1.0.1280
    Update Package Version: 1.0.87048
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.3930)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: Trojan
    Domain: www.kare-net.de
    IP Address: 217.160.0.81
    Port: 443
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

  2. www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 4/12/2024
    Protection Event Time: 2:18 PM
    Log File: 1effa6d0-f8f9-11ee-88f7-a85e45b389b1.json
    
    -Software Information-
    Version: 5.1.2.109
    Components Version: 1.0.1214
    Update Package Version: 1.0.83359
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.3930)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: Phishing
    Domain: form.questionscout.com
    IP Address: 54.211.93.189
    Port: 443
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

  3. I don't know if it's still the case, but once upon a time robvanderwoude.com was a great resource for batch file related info. I didn't bother restarting my browser to see if the domain still points to the same website, but here's the latest VT results for it:
    https://www.virustotal.com/gui/url-analysis/u-4feb55b2d7d2e100f6061ae49b79e2b488a34e1689c1c16c189facabcfe97dbd-1696518531

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 10/2/2023
    Protection Event Time: 1:43 PM
    Log File: 3a0ff6fa-614b-11ee-8c04-a85e45b389b1.json
    
    -Software Information-
    Version: 5.0.12.68
    Components Version: 1.0.1021
    Update Package Version: 1.0.75893
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.3208)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: RiskWare
    Domain: www.robvanderwoude.com
    IP Address: 46.30.215.252
    Port: 443
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 10/5/2023
    Protection Event Time: 11:08 AM
    Log File: 1b5e399a-6391-11ee-94a3-a85e45b389b1.json
    
    -Software Information-
    Version: 5.0.12.68
    Components Version: 1.0.1021
    Update Package Version: 1.0.75975
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.3208)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: RiskWare
    Domain: robvanderwoude.com
    IP Address: 46.30.215.252
    Port: 80
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

  4. This website appears to be blocked by Malwarebytes 5, however VirusTotal is showing it isn't detected:

    https://www.virustotal.com/gui/url/4046eccd51c20ea5e72fdb79ab877fea42de542d1617b1abbe83a5e7bcf242b4

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 5/3/2023
    Protection Event Time: 4:51 AM
    Log File: b58f29b0-e98f-11ed-9ebc-a85e45b389b1.json
    
    -Software Information-
    Version: 5.0.7.55
    Components Version: 1.0.939
    Update Package Version: 1.0.68944
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.2846)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: Trojan
    Domain: www.softnology.biz
    IP Address: 212.224.112.239
    Port: 80
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

  5. 22 minutes ago, EricRoberts said:

    GT500, the official website is not down. I have just checked it and it is accessible. Probably your web browser blocks it from accessing. Or try any free VPN web browser add-on.

    Malwarebytes blocks it, and I forgot that Chromium based browsers cache DNS lookup results, so I might have needed to close my browser and reopen it after disabling web protection and before trying to load their website again.

  6. The official website is down, but Malwarebytes (along with a number of other AV softwares) are detecting the only 17.1 download cached by archive.org as malware:

    https://www.virustotal.com/gui/file/364ff35e31756c17d12e6b0e230e255e3ed189450939646a30178538a2bc0254/detection

    URL downloaded from (file attached below):

    https://web.archive.org/web/20230323132424/http://www.softnology.biz/files/thphn171.zip

    thphn171.zip

  7. I'm seeing this detection once every minute, and it appears to always be the same IP. The detections have stopped after exiting Windscribe VPN client.

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 4/18/2023
    Protection Event Time: 9:01 PM
    Log File: ad74e1ae-de4d-11ed-92c0-a85e45b389b1.json
    
    -Software Information-
    Version: 5.0.7.55
    Components Version: 1.0.939
    Update Package Version: 1.0.68201
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19045.2846)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , System, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: Malware
    Domain: 
    IP Address: 95.143.177.69
    Port: 0
    (No malicious items detected)
    Type: Outbound
    File: System
    
    
    
    (end)

     

  8. 18 hours ago, gatortail said:

    Is it working for you now to activate the MB5 Beta via you My Account credentials?

    Yes, it is. Thank you.

     

     

    18 hours ago, gatortail said:

    @GT500 I'm not sure what happened a year ago, but it was deactivated so we re-activated it.

    While I doubt there's any documentation of whatever happened since then, my support ticket to get my license reactivated a year ago was opened from the same e-mail address as my forum account.

  9. I just installed the Malwarebytes 5 beta, and it doesn't appear to be possible to activate a lifetime license that has a separate ID and Key. I tried registering the license at my.malwarebytes.com and while it did give the correct fields to allow entering both, the license wasn't added to my account after clicking the button to register it (the account uses the same e-mail as my forum account).

  10. When clicking on the "QuickGuide" shortcut in the dgVoodoo2 folder I had just unzipped, Malwarebytes blocked the connection. URL in the shortcut is as follows.

    http://dege.fw.hu/dgVoodoo2/QuickGuide/

    VT report: https://www.virustotal.com/gui/url/1ac86fcc8adfe09b476cb8caf078775466268354764a18b60ea71842ae2b49a3?nocache=1

    Malwarebytes log:

    Malwarebytes
    www.malwarebytes.com
    
    -Log Details-
    Protection Event Date: 8/23/22
    Protection Event Time: 12:21 AM
    Log File: 11d3d1b0-229b-11ed-9af7-a85e45b389b1.json
    
    -Software Information-
    Version: 4.5.12.204
    Components Version: 1.0.1725
    Update Package Version: 1.0.59027
    License: Premium
    
    -System Information-
    OS: Windows 10 (Build 19044.1889)
    CPU: x64
    File System: NTFS
    User: System
    
    -Blocked Website Details-
    Malicious Website: 1
    , C:\Program Files\Vivaldi\Application\vivaldi.exe, Blocked, -1, -1, 0.0.0, , 
    
    -Website Data-
    Category: Trojan
    Domain: dege.fw.hu
    IP Address: 157.90.171.43
    Port: 80
    Type: Outbound
    File: C:\Program Files\Vivaldi\Application\vivaldi.exe
    
    
    
    (end)

     

  11. There is currently a known BSoD issue caused by Malwarbytes' Web Protection when it's installed alongside Emsisoft Anti-Malware (EAM). @AdvancedSetup may know more.

    A workaround for anyone who has this issue is to do the following:

    1. Right-click on the little Emsisoft icon in the lower-right corner of the screen (to the left of the clock).
    2. Go to Protection status.
    3. Select Disable Web Protection.

    Note that after doing this you will need to restart the computer. On Windows 8.1 and Windows 10 you will need to restart by right-clicking on the Start button, going to Shut down or sign out, and selecting Restart from this menu to bypass Fast Startup.

  12. Here's a couple of FP's:

     

    PUP.Adware.Heuristic, C:/Program Files\ASUS Phoebus Audio Sound Card

    Sound card software from ASUS:
    https://www.asus.com/Sound-Cards/ROG_Xonar_Phoebus/

     

     

    PUP.Optional.BTmagnat, C:\Windows\Uninstaller

    Uninstaller for FakeFactory Cinematic Mod 2013 for Half Life 2 (URL in a code box since I'm pretty sure there's some optional stuff for it that's NSFW):
     

    http://www.cinematicmod.com/cinematic_mod_2013.php

    AdwCleaner_FP.png.1911e18bd75066726a3fbbb39b0358b6.png

  13. The critical error is "SPF MUST allow Google servers to send mail on behalf of domain." I don't want Google sending mail on my behalf, so this is actually a good thing and not a problem. ;)

    When there was a problem, Google's "Check MX" tool was showing an error that basically meant there were no nameservers for the domain. Hover managed to mess something up with the nameserver information so that it wasn't usable, even though it appeared correctly in WHOIS. This meant that the domain wasn't usable, and since they didn't seem to accept that there could be something wrong on their end I don't have a problem with having switched registrars.

  14. Hover did eventually reply to me, but of course they continually denied that there could be a problem with their service, instead blaming it on my DNS settings, Limestone's nameservers, the DNS tools I was using to check if the issue was resolved, etc.

    In the end, the best I could get them to say was they didn't understand why the problem was happening. They were, of course, unwilling to look into it further since I was transferring my domain. I guess I can't blame them for being reluctant to help a customer who is leaving, however you'd think that if there is a problem with their system that they'd want to look into it and see if they can find out why it is happening.

  15. As annoying as this whole thing has been, I have to admit that gandi.net's e-mail support has been pretty responsive. It looks like the issue transferring the domain was due to the WHOIS taking too long to update, and they sent the administrator confirmation e-mail to my gt500.org address (whoops). If I'd known that and known that their support would reply in a few hours before paying to transfer to Namecheap, I would have stuck with them. It's nice to have a service with responsive support for something as important as a domain name. Oh well...

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.