Jump to content


  • Content Count

  • Joined

  • Last visited

About exile360

Recent Profile Visitors

116,943 profile views
  1. I like Zero (that's the robot's name), personally. I think he makes Malwarebytes stand out more, especially these days where nearly every app (including security apps) look virtually identical with flat, featureless UIs and solid color controls with no dimension, shading or gradients, and with tons of blank space making them look more like boring websites than applications (I know this is by design and is precisely the look they're all going for because 'modern' and 'cloud' and 'mobile' and 'scaling', but as a design language I personally think it just sucks and it's too often hard to tell the difference between information in such UIs and their controls, but maybe that's just me). In contrast, having Zero there breaks things up a bit and adds a little flavor and style to it without obstructing the flow or usability of the application/UI and I personally find it reassuring seeing him standing there like a silent sentry guarding my system against any would-be threats and attackers. His appearance on the Dashboard is very muted and low-key and I think it works fine and helps communicate the purpose of Malwarebytes to use advanced future-looking technology to provide powerful defense against online threats (the clouds obviously represent the web, the domed city represents our systems, and Zero standing, shield in hand, represents Malwarebytes standing guard with his thumb raised to reassure us that everything is good because he's got our backs).
  2. Something must have changed in the Web Protection component because for the first time ever, when Web Protection is active I cannot access the internet if DNSCrypt is enabled (I have my DNS server address set to as I always have for DNSCrypt). This just cropped up with the latest beta, 4.0.1; I had no issues with 4.0.0 or any previous version of Malwarebytes. To test, install SImple DNSCrypt and enable it for your network adapter(s) and verify for your IPv4 properties for your network connections that the Use the following DNS server address: option is set to NOTE: Do NOT try this without DNSCrypt installed/active or you won't have internet access, because normally is the loopback address, however because of the way that Simple DNSCrypt installs its service as a local DNS server, it uses this address to capture all DNS requests accordingly. You can find the latest build of Simple DNSCrypt here for QA testing and verification of this issue. I'm running Windows 7 x64 SP1 fully patched, though I doubt it matters as it appears to simply be an issue with the use of the loopback address as your DNS server address because if I either disable the address as my DNS server address or disable Web Protection in Malwarebytes, my internet starts working immediately. As soon as I have both enabled there is no internet access.
  3. Greetings, Unfortunately I don't believe there is unless you have a debit card from your bank with a Visa or Mastercard logo on it so that you can use it like a credit card. The other option would be to set up a PayPal account (it's free) and link your PayPal account to your bank account which would withdraw the funds from your bank account to pay for the product which would essentially be the same thing. There was an option to purchase through Amazon, however Amazon currently shows the product as unavailable for purchase. Another option would be to get a prepaid credit card which you put the amount of money on from your bank account that you wish to spend on your purchase(s). They can be found in many grocery stores, convenience stores and other retail locations. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  4. Greetings, I'm sorry you've experienced these issues, but Support should be able to assist you with this. Please contact them directly by filling out the form on the bottom of this page and they will contact you via email. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  5. After upgrading to the latest beta and restarting as prompted, Malwarebytes did not launch on system restart (no processes, no service(s) at all in memory). After launching Malwarebytes manually it appeared to function normally. It could just be a one-off, but I figured I should report it just in case. I'm running Windows 7 Pro x64 SP1, fully patched.
  6. That's odd. I had no trouble reaching the site and downloading the app here. Is it still not working for you?
  7. I was able to trigger the same block on the actual site in my browser by switching the language in the page from Spanish to English. I notice in your image that you have it set to English as well, so I bet that's why you are seeing the block. Please verify this behavior in your browser as well just to make sure that it is not an issue that is specific to the desktop web app.
  8. You could always try going the manual route using a tool such as Malwarebytes' own FileASSASSIN as long as you know where all of the files/folders/registry entries are that you wish to remove. You'll also find some other tools and methods in this article that may prove useful.
  9. Greetings, Are these detections coming from Malwarebytes 3 or JRT (Junkware Removal Tool)? I ask because this area of the forums is for JRT support, not Malwarebytes 3. Either way, I'd suggest starting by running a scan with ADWCleaner and having it remove anything it finds, then restarting the system if prompted to do so to complete the removal process. Once that is done, if anything was detected/removed by ADWCleaner, go ahead and perform another scan with Malwarebytes to see if any detections remain. If they do, and if they are associated with Google Chrome then I would suggest following the instructions found in this topic to see if that resolves the issue. After that, if the problem still persists then please follow the instructions in this topic and then create a new topic in the malware removal area by clicking here including the requested logs and information and one of our malware removal specialists will assist you in checking and clearing the system of any remaining threats as soon as one becomes available.
  10. Greetings, If you aren't comfortable posting logs publicly you may instead contact Malwarebytes Support directly by filling out the form on the bottom of this page and they will assist you privately via email. I don't recall seeing anyone else experiencing the issue you describe so my guess is that it is likely some problem unique to your system. My first thought just based on your description is that perhaps if you are using some kind of system reset/rollback solution, like perhaps as a form of malware/ransomware protection, that could account for the behavior you're seeing if that tool (assuming you are using such a tool at all of course) rolls back Malwarebytes' configuration files/data files and/or registry data. Other than that it could just be a problem with Malwarebytes itself not writing to its own configuration files properly or perhaps one or more of them being corrupt causing Malwarebytes to restore the clean/original backup copies that it keeps in place for emergencies should such corruption occur. To try and resolve that if that is a possibility, I'd suggest going ahead and doing a clean install of the software and then testing to see if the issue is resolved: Run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Clean button, and allow it to restart your system and then reinstall Malwarebytes, either by allowing the tool to do so when it offers to on restart, or by downloading and installing the latest version from here
  11. You're welcome, I'm glad to help. If there is anything else we might assist you with please let us know. Thanks
  12. If you could post a copy of the log we could probably explain it, however my guess is that the date on the log is likely reflecting the data of the signature/database used in detecting/blocking the site and the time is likely reflected in GMT to make it universal.
  13. Just to add, I don't believe that Malwarebytes does any kind of traffic injection. As I understand it (having worked on the team that actually developed the browser extension from the very beginning, as I was the Product Manager for this project at the time), the Malwarebytes browser extension works very similarly to a traditional ad blocker like Adblock Plus or uBlock Origin. Kaspersky's method of using a driver embedded in the network stack to inject code and modify packets sent to/from the system over the network connection is very different and operates at a different level of the network stack from the way that a redirecting browser extension like the one developed by Malwarebytes does. This does not mean that there isn't some method as of yet undiscovered to use an installed browser extension to track users across sites, however the method being used to exploit the flaw discovered in Kaspersky's security products would not work to track users of the Malwarebytes browser extension.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.