Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by exile360

  1. You mean there were no available updates? If so, yes, that makes sense as the link I provided should be for the most recent version. Also, if you continue to have issues with it you may always contact Dell Support and they should be able to assist you with your system and the Dell SupportAssist software. If there is anything else we can do to help please let us know. Thanks
  2. Greetings and welcome, You may find the information on this page to be helpful in making your decision. It provides an overview of the various layers of protection in Malwarebytes 3 and how they function to defeat threats and attacks throughout the various phases of the attack chain to thwart the bad guys. With regards to iOBit, while there was an issue at one time with the confirmed theft of Malwarebytes database/intellectual property (along with those of several other vendors), however that was quite some time ago. As far as Malware Fighter is concerned, it shouldn't cause any issues like those you experienced with Driver Booster as it serves a different purpose (in fact, Malwarebytes frequently detects driver updating programs, along with registry cleaners and system optimizers as PUPs (Potentially Unwanted Programs) specifically because they often do more harm than good), but their anti-malware program should be relatively safe as it should not tamper with your registry or drivers in any potentially dangerous way. The only risk would likely be the same risk you'd face with any other anti-malware software should there be a problematic false positive that causes major issues, however those are typically rare and could happen to any vendor (even Malwarebytes as well as the likes of well known vendors like Microsoft, McAfee, Symantec/Norton, Kaspersky and pretty much all other vendors have experienced that kind of issue at least once over the years) so it's not something you'd need to worry about in all likelihood. Obviously I have my own bias towards Malwarebytes, but I am not going to tell you that Malware Fighter is a bad product because frankly I haven't had much experience at all with it, especially in recent years, so I really couldn't say how effective their product is compared to Malwarebytes. I can only tell you that I do know a LOT about Malwarebytes and I do have confidence in Malwarebytes 3, especially since I am a former Malwarebytes employee with first-hand information about much of the details and internal workings of its various components and have seen how advanced and effective of a product it is, especially since the integration of several signature-less behavior based protection components which go beyond detecting known threats via malware signatures and databases and use malware's defining traits and patterns of behavior and appearance against it to stop new and unknown threats and prevent them from leveraging their most frequently used vectors of attacks (such as exploits; one of the most common means of infection these days). I also know that there have been several recent enhancements to Malwarebytes primary detection engine and heuristics capabilities which have now integrated Machine Learning (what the AV/AM industry often refers to as "AI" or "Artificial Intelligence", though technically speaking it's not really AI by the true definition of the term so it's more of an industry buzzword than anything at this point) as well as cloud analysis to detect new and unknown threats and that it has become stronger and more effective over time since it first came online around a year or so ago. If it helps, you can try the free trial of Malwarebytes Premium by downloading and installing it, assuming you haven't run the trial on your system yet, so that you can take it for a test-drive to see how you like it and see how it performs. It is a fully functional 14-day trial which includes all of the Premium features so you'll get the full experience of the paid product with all of its layers of protection and additional functions. Regardless of what you decide, I wish you the best and hope that whatever you choose to protect your system does a good job and keeps your system safe and clean of all threats, and even if you decide to go with iOBit, you can always keep the free version of Malwarebytes around to use as a second opinion scanner (it even provides an automatic scheduled scan if you leave that option active so that it will check your system for threats automatically and remove any that it identifies). Malwarebytes is also currently testing a new browser extension which is in beta (links to details and download in my signature below) that you may install if you wish, and it will help keep you safe on the web as well free of charge, at least while it remains in beta (I do not know if they plan to keep it free once it is released or not, but they may). If there is anything else we might assist you with please don't hesitate to ask. Thanks
  3. Excellent, I'm glad you found the culprit. I'll make sure the team hears about it. Yes, you may contact Malwarebytes Support directly via the options found on this page and they will work with you privately to diagnose and hopefully fix the issue, or at least to gather data for the Developers so that they may hopefully fix the problem in an upcoming release. You may also link them to this thread when you do contact them as the information you have provided so far may also be helpful to them.
  4. Hopefully it will be corrected in the next release, assuming the Developers are able to track down the exact cause and correct it by then, however if you keep an eye on the pinned topics in this area of the forums where new releases are announced you should be able to check the reported changes/fixes in the announcement to know when this particular issue has been corrected.
  5. It's possible that when you ran/downloaded ADWCleaner it touched the file and/or directory the file was stored in triggering Defender to analyze it resulting in the detection. Whether or not the detection is an FP I cannot say, however if you submit the file to Microsoft research for analysis they should be able to tell you.
  6. Greetings, I suspect this may be due to the behavioral real-time monitoring of the Ransomware Protection component in Malwarebytes. To test, please try disabling it by right-clicking the Malwarebytes tray icon and clicking Ransomware Protection: On and then click Yes to the User Account Control prompt. Also, to determine what other factors may be involved, please do the following: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced Options on the main page (not Get Started) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply
  7. That's OK, it says it was because you already had the latest version installed which makes sense since you just downloaded it.
  8. OK, good, I'm glad you got it installed. So is it working OK now? Any other issues?
  9. You received that error when you attempted the uninstall of the existing version? If so, then go ahead and try running the installer for the one you downloaded and hopefully it will fix any broken or missing components.
  10. Do you have/use Microsoft OneDrive by any chance? The reason I ask is because I did a quick search about your issue and came across this topic where several users describe similar issues and claim it was being caused by MS OneDrive.
  11. It's most likely just Google's referral system. It handles things like telemetry tracking to determine users' interests etc. in an attempt to gather data to make their products better (and of course improve their advertising to increase their company's profits). It doesn't look like anything malicious to me and most search engines seem to work this way (especially Google, and especially lately as I've noticed even their image search does things like this, routing them through their own link first before connecting you to the site/image you seek).
  12. Greetings, I'd recommend trying to uninstall and then reinstall it. Open Programs and Features, uninstall it, then restart your system once it completes (even if not prompted to do so just to make sure everything is cleaned up/unloaded from memory), then download and install the latest version from here and try to run it. Hopefully that resolves the issue. Please let me know how it goes. Thanks
  13. Greetings, I'm sorry you're having trouble, but we'll help you to get your system cleaned and working properly again. To start, please follow the instructions in this topic to run a special build of Malwarebytes Anti-Rootkit. Hopefully that will be able to run and eliminate some of the threats. If it runs, have it remove anything it detects and then restart your system to complete the removal process if prompted to do so. Once that's done, go ahead and run ADWCleaner and likewise have it remove anything it detects and then restart to complete the removal process. Once that is completed, try downloading and running Malwarebytes again and hopefully it will be able to run this time. Have it remove anything it detects and then restart if prompted to complete the removal process. If none of the above tools worked or issues persist, please read and follow the instructions in this topic and then create a new thread in the malware removal area including the requested logs and information by clicking here and one of our malware removal specialists will assist you in checking and clearing your system of any threats as soon as one is available.
  14. Actually, no, they aren't hiding anything, otherwise they wouldn't publish a support article within their own knowledgebase that comes up whenever a user searches for assistance with billing, licensing and subscription support that points them right to Cleverbridge (as well as 2checkout, Malwarebytes other ecommerce partner) so that they may cancel their auto-renewal. Since Malwarebytes does not handle sales of licenses directly, nor do they handle the processing of auto-renewals or payments themselves, they make certain that you are directed to the correct organization for handling your subscription and cancelling if you wish (otherwise they wouldn't publish contact info for Cleverbridge and 2checkout as they did). It has to go through them because that is who is billing your account when the time for renewal comes up, so they need to make sure that they get you in touch with the correct vendor for doing so (which again, could be either Cleverbridge or 2checkout, and in the past, Avangate, one of their former ecommerce partners). Malwarebytes is in the business of making anti-malware software, not managing an ecommerce business which is why they use third parties who specialize in doing so and leave it to them, and they aren't in the business of trying to scam anyone either, which is why the provide public information on who to contact when you need to cancel your subscription. If you are not happy with Malwarebytes, they don't want you to continue paying for it. They do not want money that they have not earned, so if you are unhappy with Malwarebytes for any reason, you are welcome to cancel your subscription to discontinue it, however if you do have any constructive feedback on how Malwarebytes could be made better, they would be grateful because they are always seeking to provide better products and services, however that too is up to you and you may do as you wish.
  15. Thanks for letting us know. I believe that this is a known issue that is being worked on by the Developers. In the meantime until they get the issue corrected you may install the Malwarebytes browser extension beta which will shield your browser from malicious sites the same as the Web Protection component does, but also adds additional capabilities to behaviorally block several types of malicious sites without relying on them being in the Malwarebytes block database (the Web Protection component has no behavior based blocking capabilities, it only uses databases of known malicious sites and servers) and the extension also blocks other categories not targeted by the Web Protection component, including many ads as well as tracking servers to guard your privacy. The only downside is that it only protects your browser, while the Web Protection component performs blocking for the entire system (much like a web filter in a firewall would), however since most web threats are launched from malicious sites that get in through the web browser, it still ensures that the most critical component of the system is protected. Currently the extension works with Chrome and other Chromium based browsers (such as Chromium and SRWare Iron) as well as Mozilla Firefox. You will find links to the extensions below as well as in my signature: Chrome Firefox Once the issue with the Web Protection component is resolved, you may still keep the browser extension installed for use if you wish as it is fully compatible with the Web Protection component in Malwarebytes and complements it quite well.
  16. Greetings, Your quickest option would be to contact Malwarebytes Support directly via the options on this page and even if live chat is currently unavailable, you may still submit a support request so that they may assist you directly via email. You may also review the information found in this support article to be helpful as it provides details on how to seek licensing/subscription support, including cancelling auto-renewal. If there is anything else we might assist you with please don't hesitate to let us know. Thanks
  17. These same functions (via Windows Explorer) have existed at least since Windows XP. It relies on the structure in the registry described by David H. Lipman above (the user shell folders, also related to a similar function called environmental variables which have to do with standard locations for specific OS features and components and can be modified/redirected to other locations, including other disks or partitions). There are also hard links which are another method of redirecting the contents of a directory to another location. I don't know if Malwarebytes scans modified locations or not, however it may depend on a few factors such as whether or not the folders are moved to locations on a different partition or drive or just a different location on the same drive, but with that said, you should still be relatively safe because even if a specific location is not checked by the Threat scan, it still checks all processes in memory so if malware were running from such a location it would still be scanned and detected as a threat and removed accordingly upon completion of the scan once the remediation process is initiated by the user. Likewise, the real-time protection components in Malwarebytes Premium should have no trouble detecting threats attempting to execute from such locations and the only specific location that might be impacted significantly by moving it would be the Downloads folder which is among the default locations checked by the Threat scan (because by default this is where files from the web are saved which might include potential Trojans and other executable malware payloads), however you should still be able to use the shell context menu entry for scanning with Malwarebytes to check the Downloads folder's contents whenever new items are saved from the web prior to executing them to check them with Malwarebytes which would also be faster than performing an entire Threat scan. Besides, as I mentioned already, the real-time protection components shouldn't have any trouble identifying threats trying to run from the new location and should flag and quarantine them automatically, preventing them from infecting the system.
  18. I have a correction to make. I was mistaken in my statement that these notifications could not be controlled. They actually can, however they are located under a separate setting. Please refer to the settings highlighted/circled in RED in the following image: If you disable the first setting, program updates/upgrades will not be downloaded at all. If you disable the second, you will not receive notifications when those types of updates/upgrades are available so you may disable those notifications at will, or permanently if you see fit to do so. I apologize for the confusion, for some reason I had it in my head that these were unconfigurable as the notifications upon completion of a scan are (those still cannot be disabled as far as I know, even if nothing is detected).
  19. Greetings, In addition to the info requested by Firefox above, you might also test by disabling the Web Protection component alone in Malwarebytes 3 (leave its service enabled at startup, allow it to run, then right-click on the Malwarebytes tray icon and click Web Protection: On and then click Yes to the User Account Control prompt) then test to see if the websites work correctly and let us know how that goes, as that will help to isolate the exact cause of the issue if it turns out that disabling Web Protection resolves it.
  20. Just to add a bit to what the others have already provided; if you are using Chrome (or any other Chromium source based browser like SRWare Iron etc.) or Firefox, you can install the Malwarebytes browser extension beta so that you'll at least still have Malwarebytes web filtering for your internet browser (the most commonly targeted program by malicious sites/servers by far) as it uses the same databases as the Web Protection component in Malwarebytes 3 does, and even adds capabilities that Malwarebytes 3 doesn't have such as behavior based detection/blocking of certain types of malicious sites even if those specific sites/servers aren't yet in the Malwarebytes web databases, including tech support scam sites (lockscreen "you're infected" type pages that try to convince you that you need to call their number for support), phishing sites, clickbait links/ads, and even blocks some categories of sites not covered at all by Malwarebytes 3 such as many ads (not just malvertisements) as well as many tracking servers to protect your privacy (a category not currently covered by Malwarebytes 3). The only downside is that it only works to shield your browser, unlike the Web Protection component which will block all connections to/from your PC for all programs/your entire network connection, but it's still very useful and I highly recommend it whether you're able to keep Web Protection turned off or not (it's also designed to work in tandem with Web Protection in Malwarebytes 3 when both are installed and active). Links to the betas for each browser can be found in my signature at the bottom of this post, but I'm also including them below in case my signature changes at some point or isn't visible for any reason: Chrome Firefox
  21. Greetings, While it is true what Firefox says regarding using the Quit function in the tray (and in fact, this is the only way to cleanly terminate all of Malwarebytes background processes/services etc. as even disabling all protection components individually still leaves several of these running), it is also unfortunately true that there's no way that Malwarebytes can know why it is unable to connect to a server when it attempts to do so, which is why the message is displayed when offline. Were it being blocked by a firewall, a DNS hijacking Trojan, or just a disconnected cable, the result is the same so it simply reports its status as an alert so that you are made aware of the issue in case it is something that you are able to troubleshoot/correct should you need to use the software (i.e. for updating/scanning etc., as well as any of the features which rely on web access to function such as cloud features which it has in some of its components for both scanning and protection). I understand that this doesn't alleviate the problem, however I'm simply trying to explain why it happens and the logic behind having it do so. And again, as Firefox mentioned above, once you quit Malwarebytes via the tray's Quit Malwarebytes function, it takes all of Malwarebytes components out of memory (including all processes/services you can see in Task Manager, as well as drivers and DLLs which are also loaded into memory as well as some being loaded into other processes/threads that you can't see) so for offline gaming, if you want the best performance possible, this really is your best option. In fact, many AV/AM products these days don't even offer such an option to completely terminate all of their modules/components/processes from memory, so having this ability is very useful for users such as yourself who want the highest level of control to free up all resources possible for offline gaming (something I myself used to do quite frequently, and I'd kill my connection and security apps in the same way, including Malwarebytes).
  22. CORRECTION: while I still fully stand by my assessment and opinions stated below, I realized that you can actually control whether or not notifications for available program updates/upgrades are displayed, although it is under a separate setting from the other/standard notifications. Please refer to the image in my response here and I apologize for any confusion I might have caused with my error. Greetings, While I am inclined to agree with the vast majority of your sentiments, I do have to disagree on one point, however that is primarily because of my experience as a former Malwarebytes employee so I have first-hand internal knowledge of how things are done with regards to new program iterations and the emphasis on development of new detection and protection capabilities that the company has and how those changes come about and affect all versions of the software after their release. The thing is, the vast majority of changes that take place in the software with regards to engine modifications for the scanning components, enhancements to any of the protection components for the Premium version and database syntax changes that may take place (which are pretty much never backwards compatible with older versions because there's no way they could be without an updated interpreter to read/understand them, i.e. a new scan/protection detection engine) are requested directly by the Malwarebytes Research team as a way of targeting new threats and/or attack methods that the previous versions could not, or methods of making detection of known threats that it can deal with already more efficient to cover more known and unknown threats (i.e. heuristics and the like) and once a new version with such an enhancement is rolled out, the Research team generally transitions over to using the new syntax/capabilities very rapidly (which makes sense since they specifically requested those features to allow them to do a better job at killing more threats) so users of older versions of the software, even if only out of date by a single minor Component Update, often end up with a less capable product for protecting their system and detecting threats than the latest one released (even when the same versions of the databases are installed, again, because the older engine cannot read/understand any new syntax/methods so it is designed to ignore the parts it can't read to avoid false positives and errors). Obviously it is your choice, and again I totally get wanting the software just to be quiet and do its job so that you can go about the business of using your PC for your own purposes, be they for work, play, homework/school or anything else so the last thing you want is some chatty/nagging software constantly getting in your face with alerts about one thing or another. It's just my opinion, again based on my first-hand knowledge having worked on the product myself for many years in the past, that alerts about updates/upgrades really should not be ignored. In fact, I typically will myself check for new program updates manually on a regular basis (accomplished by launching Malwarebytes and visiting the Settings>Application tab and clicking on the Install Application Updates button as the methods of checking for database updates found in the Dashboard and tray's right-click context menu are not guaranteed to offer/download these updates/upgrades, but that particular button in that tab overrides that and forces it to check for/download any existing program updates). I usually do so at least once a month, often on Patch Tuesday when I perform other maintenance update related tasks such as installing any new Microsoft/Windows Updates and Adobe Flash (also usually updated by Adobe on Patch Tuesday to coincide with Microsoft's regular monthly patching schedule) and I take that as a reminder to go ahead and update any other critical apps such as my anti-malware software, Adobe Reader, my browsers and other security related or frequently targeted (by exploits and the like) web-facing apps that might need an update. Again, it is your system and I agree that you should be able to run it as you see fit, which includes, if you so desire, the ability to silence any specific notifications and types of notifications from your anti-malware software regardless of my or anyone else's personal preferences, habits or recommendations. The ability to have more granular control over notifications is something that has been requested more than once and it is in the backlogs for their list of things to do in the future, however it's obviously not the highest priority compared to certain other key items, and likely is awaiting the next major UI change at least as it would be a pretty extensive modification to allow that level of control and customization so I cannot say that it will necessarily be implemented very soon, but I do believe that it will be corrected at some point. I'm sorry that I cannot offer anything more concrete, however please know that your request is not being ignored; it's just a matter of priorities and compiling specific features into the product when they make sense (i.e. when they've embarked on the task of doing a new UI overhaul for the product, likely to coincide with a major version update like a hypothetical "4.0" or at the very least a "3.6" etc.). I hope this admittedly lengthy reply has been at least a little helpful, if not informative, and thanks for the feedback, it will be reported to the Product team (hopefully to impact, at least slightly, the prioritization of this feature for when the appropriate time/release does come to be worked on by the team).
  23. Greetings, You may find the information found here as well as here and in this article to be helpful, at least regarding this specific detection. While the Researchers have added details on many detections in the Malwarebytes database to the online threat database, they have not had the time or resources to add them all. For any other PUP detection it can be useful to familiarize yourself with the criteria Malwarebytes uses for determining when something is PUP which can be found here. You can also deduce common patterns with regards to various types of software that might be targeted as PUP by Malwarebytes by searching the term "PUP" in their online threat database found here. Often times the vendor names alone will be sufficient to clue you in as to the purpose of detection for other similar apps (for example, PUP.Optional.PCOptimizerPro, PUP.Optional.CosmosSystemCare, PUP.Optional.SuperCleanup, PUP.Optional.DriverPack, PUP.Optional.DriverToolkit, PUP.Optional.SlimCleanerPlus, PUP.Optional.PerfectRegistry, PUP.Optional.GlobalSystemMechanic, PUP.Optional.DriverSupport, PUP.Optional.DriverTuner, PUP.Optional.DriverUpdate; as you can likely deduce, driver updaters and registry cleaners/optimizers are frequently detected as PUP). As for the logic behind detecting these types of applications, a bit of info from outside Malwarebytes: https://decentsecurity.com/#/registry-cleaners/ https://support.microsoft.com/en-us/help/2563254/microsoft-support-policy-for-the-use-of-registry-cleaning-utilities https://www.howtogeek.com/171633/why-using-a-registry-cleaner-wont-speed-up-your-pc-or-fix-crashes/ https://www.howtogeek.com/162683/pc-cleaning-apps-are-a-scam-heres-why-and-how-to-speed-up-your-pc/ https://lifehacker.com/5482701/whats-the-registry-should-i-clean-it-and-whats-the-point https://lifehacker.com/5033518/debunking-common-windows-performance-tweaking-myths http://www.tomshardware.com/answers/id-1857635/good-free-automatic-driver-updater.html There are many such tools out there, yet if you investigate you'll find that the vast majority are made by companies who have a lot in common with one another and don't share space with prominent first tier software or security tool vendors (the likes of most of those listed on VirusTotal for example or mentioned frequently by the likes of Gartner in their quarterly reports about the status of the various areas of the security industry). When you look into many of them you will find that they are small marketing machines relying more on things like SEO and aggressive affiliate sales, aggressive and/or deceptive advertising practices (and often bundled installers with other more reputable/desirable apps) to generate downloads/sales and outside of their own sites and those of paid affiliates, you seldom find many (if any) actual users singing their praises (for example on tech forums and tech sites like WildersSecurity, BleepingComputer, TomsHardware, MajorGeeks, LifeHacker, Microsoft Technet etc.). In fact, usually the only sites where you might find anything positive said about such tools are sites where they are incentivized to generate downloads and/or sales of said tools/products (again, like affiliates and the like where they gain profit by convincing you to download/install/purchase said tool). On the other hand, you'll frequently find large numbers of individuals naming specific tools/utilities/apps that they hold in high regard or that they recommend across all these sites/forums even though they have nothing to gain in doing so. Likewise, you'll frequently find tools like driver updaters, registry cleaners and system performance optimizers decried as snake oil and the like by both tech folk and individuals and frequent recommendations against their use or at the very least proclamations that they are of little or no real value to improving the working status or performance of a PC. In fact, to date I know of no independent testing performed by anyone that showed that any of these kinds of tools have ever done anything to improve the performance of a system in any measurable way, be it system boot time, application loading time, internet download/upload speed or any other performance metric that can be objectively measured. Considering that these types of utilities have existed for decades and yet no such data exists, I believe that says something about the incredible claims made by most of these vendors producing these kinds of "tools". With regard to "fixing" PCs, again, I've never seen any evidence where someone had an actual issue that was fixed by running one of these utilities. I have seen actual specific repairs and tools designed to correct specific issues do so, but never any of these general "error fixing", "system optimizing", "registry curing" utilities being so aggressively advertised which make such claims. I'll give you an example. If you take a look at Tweaking.com's Windows Repair or even their Simple/Advanced System Tweaker utility, all of them contain tons of actual specific fixes/tweaks which are known to serve specific functions and purposes. They do not simply attempt to "scan" the entire registry and search for "errors" and then claim to fix them (when in fact, what those other apps are doing is simply looking for orphaned registry values which point to files no longer on disk, something that serves no real purpose for fixing any actual PC/OS issues). They have specific fixes for specific issues and specific tweaks with specific functions. I am not advocating their use, so don't misinterpret this as some kind of endorsement, but what I am saying is that they have created tools that have compiled specific known functions into a single application rather than putting together a simple scanner and claiming it to be a fix-all solution for every PC problem under the sun. If Microsoft themselves are not able to create such an application when it is their code that the operating system runs on, how can all of these other vendors have done so? I am skeptical to say the least. It is your system and what you choose to run on it or not is your business, so if you do not agree with my assessment that's fine, I won't argue. However, the reason these kinds of apps are detected as PUP by Malwarebytes I believe has been made clear. If you disagree, then simply perform a Threat scan with Malwarebytes, click the checkbox at the very top of the scan results screen to clear all of the checkboxes in the list and click Next, then when prompted on how to handle the remaining/unchecked items, click Ignore Always and they will be added to your Exclusions in Malwarebytes so that they are no longer detected.
  24. Oh, hehe, I was referring mainly to Spywareblaster and the FPs. I'm familiar with them because I've seen them before and have used Spywareblaster for so many years that I recognized the detections as soon as I saw them and knew what they were. I cited an example in the thread I linked to of an old app called PestPatrol that used to be one of my go-to tools long ago before Malwarebytes existed (it was made by eTrust/Computer Associates/CA). It used to detect those entries all the time for the same reason that ADWCleaner did, because it was looking for malicious sites being added to the trusted sites list for IE in the registry. I've seen other apps detect them as well over the years. It's just one of those things I've had a decent amount of experience dealing with, not unlike when a scanner detects my massive HOSTS file as a threat even though every entry is there to block malware, ads, scams, telemetry and trackers etc.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.