Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by exile360

  1. Greetings, It looks like the new build has altered its appearance based on your DPI settings. What is your screen resolution and DPI set to? If you aren't sure, you can run the following tool and it will provide us with a log that shows it: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced Options on the main page (not Get Started) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply
  2. No problem. You're still free to use the browser plugin if you wish. I can attest to its effectiveness, having seen it block tons of tech support scam sites etc. while browsing, and since it is a browser extension, it doesn't need to run any additional processes or services in the background.
  3. Greetings, It sounds like this is being caused by a known issue with the Web Protection component in Malwarebytes 3 which under certain conditions will block applications that it should not from being able to communicate with the internet. Currently the only workaround is to either disable Web Protection temporarily when updating affected applications or keeping Web Protection turned off. In order to supplement your protection should you need to disable Web Protection on a regular basis or to keep it disabled until this issue is fixed in an upcoming Malwarebytes release, you may install the new Malwarebytes browser plugin BETA which is available for Chrome and other Chromium based browsers as well as Mozilla Firefox. Info and download links for each may be found at the following links: Chrome Firefox The plugin will shield your browser from many web based threats, but rather than using large databases of known malicious sites and servers the way that Web Protection in Malwarebytes 3 does, the plugins instead rely more on signature-less behavioral detection of malicious content including tech support scam lockscreen sites, phishing sites, malicious and PUP plugin sites, many ad servers and trackers to help guard your privacy when surfing the web. Even with Web Protection in Malwarebytes 3 active, the plugins are still very useful because they work differently and can block different things, and they actually work in tandem with Web Protection to help speed up browsing performance by redirecting blocked pages by Web Protection more quickly, resulting in pages and content on the web loading more quickly when those blocks occur. Hopefully the issue with Web Protection will be fixed soon, but until it is these plugins should help provide some protection if using a compatible web browser.
  4. Excellent, I'm glad to hear that this issue is finally resolved. You may of course now delete the additional user account you created if you don't have any reason to keep it, assuming you haven't already (or you can keep it around as a secondary backup account if you wish just in case anything goes wrong with your current account in the future and you'd like to have an alternative to Safe Mode for attempting repairs which can at times come in quite handy, especially since most modern threats install on a local per-user account basis to avoid being blocked by User Account Control). If there is anything else we might assist you with in the future, please don't hesitate to let us know. Thanks
  5. Unfortunately no, however I have been told that they do intend to rework the entire notifications system to provide more granular control over it in the future, though such a large change would probably be reserved for a major release (something like a version 4.0, I'm thinking) meaning it's probably not going to happen any time soon. But hopefully they will decide to make this particular notification honor the enable/disable notifications setting, because then at least you could turn it off if you wanted along with the others. That said, I personally wouldn't want my security software running scans while I'm gaming anyway, since scans tend to be a pretty resource intensive process, so I'd probably suspend scanning during gaming sessions were it me (though I personally don't use scheduled scans anyway, and just rely on the more proactive real-time protection more than anything and just occasionally run a manual Threat scan to double-check, but that's just me; I don't even like Windows Updates to occur automatically as I'm a bit of a control freak when it comes to such things and tend to eschew any "automatic" or "scheduled" resource intensive and/or potentially system-altering "maintenance" tasks like scans and major software updates).
  6. Greetings, Yes, unfortunately the Developers are still working to fix this issue so it wasn't corrected in the recent component update, but hopefully they will find and fix the root of the problem soon. Once it is fixed, it will be noted among the changes/fixes in the release notes for the version it gets fixed in which are posted in a pinned topic at the top of this area of the forums, so keeping an eye out there for new releases and checking the changes posted would be a good idea to determine when it's been fixed. In the meantime the only workaround is still to disable Web Protection while using an application affected by this issue. With that said, there is a Malwarebytes browser plugin currently in beta available that can offer some protection, at least for your web browser, that you can add to your protection if you use Chrome or any Chromium based browser or Mozilla Firefox. You can find more info about it as well as links to get it in the following topics: Chrome Firefox
  7. Oh, and I didn't even mention Web Protection which uses massive, frequently updated block lists of known bad sites and servers to stop malware at its source to prevent it from ever reaching your system, so even if the bad guys do change their threats to evade detection, unless they purchase new IPs/domains to host them, they'll still be blocked. That makes things much harder for the bad guys because those things cost money and take time to set up. Malwarebytes is also currently testing a new browser plugin that takes things even further by not just using block lists, but actually blocking malicious web pages based on their content and behavior to thwart attacks like lockscreen tech support scam pop-ups and phishing scams and it also blocks many ads as well as trackers to help guard your privacy. It's currently available for both Chrome (and other Chromium based browsers like SRWare Iron) as well as Firefox and can be found at the following links: Chrome Firefox
  8. Yeah, too true. However, thankfully these days we have more advanced proactive technologies like the signature-less Exploit Protection component which includes not only protection from unknown exploits based on detecting generic exploit techniques and behaviors, but also certain system component hardening features that render many frequently targeted system components and software immune to exploits both known and unknown. Then there's the recently activated anomalous detection component that utilizes Machine Learning and cloud analysis technologies (what the AV industry frequently refers to as "AI" when in fact it's not really Artificial Intelligence by any stretch of the imagination) as well as the more traditional heuristics technologies built into the primary malware detection component of Malwarebytes. Those, along with the Anti-Ransomware component which I already mentioned that targets ransomware based on behavior rather than relying on signatures for known ransomware, combine to form a layered defense against both known and unknown threats that might try to infiltrate your system. They look at infections from every phase of the attack chain to try and stop it at every step in the process to keep your system clean. A good overview of how these technologies function can be found in the diagram and information on this page.
  9. Yeah, it used to get frequent updates when rootkits were more prominent, but these days most of the threats are PUPs and ransomware (as well as a lot of exploits that download/install ransomware) because, as they always do, the bad guys have moved on to new things now that the security industry has gotten a handle on their old tactics (thanks to tech like Anti-Rootkit and Malwarebytes 3). Basically it's a never ending cat-and-mouse game where the bad guys keep changing up their tactics to avoid detection while the good guys keep building tech that is better at detecting what the bad guys have built, and it keeps going on this way until we paint them into a corner and force them to come up with completely new techniques to avoid detection. Soon they'll change again now that the industry is getting a handle on ransomware (I cite the Ransomware Protection component in Malwarebytes 3 Premium as a prime example of this, which doesn't even use signatures/databases to stop ransomware in its tracks). If rootkits become active again, MBAR will likely receive more updates, just as it did for a while last year after a couple of years of laying dormant thanks to one group of bad guys who decided to use a new rootkit to download, install and protect/reinstall PUPs for profit (a threat known as SmartService, which incidentally was also the reason the special build of MBAR posted in this topic was created).
  10. Yes, but the truth is most users don't even know that exclusion functionality exists in MBAR and since it only scans the locations where rootkits are known to install, it's not likely to flag anything as a threat that it shouldn't, especially since, unlike Malwarebytes, it doesn't detect Potentially Unwanted Programs. It's a really specialized tool with a specific purpose designed to check known locations for rootkits and remove them as well as repair the fallout from such threats like broken Windows system services and other core OS components as a part of its cleanup routine. It's far more specialized than Malwarebytes 3, which could theoretically scan all files and folders on your system (via the Custom scan option) so it's a lot less likely to scan anything that it shouldn't. If you're trying to exclude a specific location because it contains a lot of data which makes the scan far longer that's understandable, but like I said, Malwarebytes 3 can do all that Malwarebytes Anti-Rootkit does anyway, and more, so you aren't really losing out on any critical functionality by skipping MBAR and just scanning with Malwarebytes 3.
  11. Unfortunately there probably won't be a solution unless the Developers update Malwarebytes Anti-Rootkit to be compatible with Malwarebytes 3. The format of exclusions in Malwarebytes 3 is different from Malwarebytes 2, and apparently Anti-Rootkit wasn't updated to be able to read the new format so until that happens, it isn't going to be able to use Malwarebytes 3's exclusions list.
  12. OK, sounds good. Just FYI, Malwarebytes Anti-Rootkit BETA is a platform for testing new rootkit detection and remediation capabilities prior to integrating them into the main Malwarebytes product/engine. There haven't been any major new rootkits in quite some time, so there haven't been any new features built into the beta that have yet to be integrated fully into Malwarebytes 3 so you aren't really gaining anything by running both tools. Also, Anti-Rootkit doesn't detect PUPs or PUMs, so for a comprehensive scan you'd still need to run Malwarebytes 3 anyway. On the other hand, there are still some items that ADWCleaner detects that Malwarebytes 3 does not, so it makes an excellent addition to a scanning regimen.
  13. They don't need to go to the beta forum for info. The info in the post pinned in this forum should be sufficient, and in reality most users don't even come to the forums anyway and would probably contact Support if they're really curious or just check the site, though unfortunately the site only includes info on major releases, not CUs. The fact is that most users won't even be aware of CU releases since they install silently and automatically just like database updates, so the only indication that one has been installed is the changing of the version info in the About sub-tab. It would be nice if the Changes.txt file would get an update whenever a new CU is published, but given the fact that these are basically just patch releases, it's somewhat understandable, but maybe a revised version with both the changes from 3.5.1 as well as any current/released CUs in their own sections in the text wouldn't be a bad idea. I'll suggest it to the team. From what I know of 1.0.391 so far, it's really a mixed bag. While it did correct some of the known issues with 3.5.1, it wasn't able to address all of them. The BSOD issues are still happening, as are the issues where some third party apps fail to update when Web Protection is active and there's also a startup issue some users are experiencing where protection doesn't load on boot and another where the tray fails to load on boot. I suspect we'll be seeing at least one more CU in the near future to address these problems, but at least some of the issues from the last release have been resolved.
  14. It should update and scan, but it really isn't a replacement for version 3. A lot of new detection and removal capabilities have been added since then which aren't backwards compatible with older versions of Malwarebytes. If your goal is just to check your system for rootkits with Malwarebytes Anti-Rootkit BETA once in a while, that's fine, but really it's main purpose is as an emergency cleanup tool for badly infected systems. Malwarebytes 3 has rootkit scanning built in and includes the capabilities of Malwarebytes Anti-Rootkit in its engine, so you'd be better off using that alone as a long term solution. Just launch Malwarebytes 3 and go to Settings>Protection and enable the Scan for rootkits option and it will check for rootkits whenever you scan.
  15. There weren't any changes between the beta and the release (hence the same version number rather than it being called 1.0.392+) so whatever was true of the beta is true of the final release version. This also means that anyone who installed the beta need not worry about having to install any new final build of the CU as they already have the final bits installed.
  16. They don't need to reside in the same folder, in fact, try keeping Malwarebytes installed in its default location (C:\Program Files\Malwarebytes\Anti-Malware) and just run Malwarebytes Anti-Rootkit from your desktop and allow it to extract to its default location on the desktop to run it from there and see how it goes. Don't move any files because that won't help. Anti-Rootkit is coded to read the Malwarebytes exclusion files from their default location, but if it isn't compatible with Malwarebytes 3, then you may need to remove that and install Malwarebytes Anti-Malware 2.x. The last released version of 2.x may be found here. You'll need to install it then add exclusions for whatever you don't want Malwarebytes Anti-Rootkit to scan, then it should work.
  17. Greetings, Please open Malwarebytes and navigate to Settings>Application and click on the Install Application Updates button. It should download and install the new component package, version 1.0.391 which includes several fixes and improvements and might resolve this issue so that your games are no longer blocked. Please let us know how it goes. Thanks
  18. Some info regarding the new CU have been posted here. It provides some details about what has been fixed in the release and an overview of some of the changes.
  19. OK, good. Yes, please let me know how it goes. Hopefully you'll have better luck with the new version.
  20. OK, good. Let me know if the notifications do show up again, but hopefully it's resolved now.
  21. Greetings, Actually, there is a way to exclude items from Malwarebytes Anti-Rootkit, but to do so you must have Malwarebytes 3 installed. If you create exclusions in Malwarebytes 3 on a system, Malwarebytes Anti-Rootkit should honor them; at least that's how it worked in the Malwarebytes version 2 days, so as long as they have brought this feature forward into the current builds, then this should still work. From the documentation included with Malwarebytes Anti-Rootkit BETA:
  22. If you return to C:\ProgramData\Malwarebytes\MBAMService and look for a folder called instlrupdate the installer might be in there as well, as indicated by this support article, however I've also seen cases where an orphaned registry entry caused the same thing, so if that folder isn't there or there's no installer inside it, then a registry entry is the most likely cause.
  23. Hehe, good one The installer file should be named something along the lines of mb<something>.exe. It would be pretty obvious if it were there. It's an InnoSetup installer package. The cause of this issue in your case might be a leftover registry entry indicating that the new version needs to be installed. Again, I'd need to logfiles to check though if you could provide them. If you aren't comfortable sharing them publicly then you may send them to me via private message here on the forums. Just hover your mouse over my name above my avatar picture and click Message when the small dialog is displayed.
  24. Greetings, I'm sorry that this is happening, but hopefully we have a fix for the issue. A new component update package was released for Malwarebytes earlier today. If you open Malwarebytes and navigate to Settings>Application and click on the Install Application Updates button found there it should download and install the new update package for you which will bring your installed Component package version: to 1.0.391 (you currently have 1.0.374 installed according to the image you posted, which was the previous version known to be affected by this problem on some systems). Hopefully that corrects the issue, but please let us know how it goes and if any new problems occur. Thanks
  25. OK, it looks like it either hasn't downloaded the installer yet and is just prompting you to do so, or it may be prompting you to install a component update (though that shouldn't be the case I don't think since those are supposed to install automatically and silently in the background without you needing to click anything). The next time the message pops up, please take a screenshot of it and post it here if you wouldn't mind. You can do so by clicking on the pop-up itself (just don't click any of the buttons/controls, just anywhere in the white space of it) and press Alt+Print Screen on your keyboard, then open an image editor like MS Paint and paste the contents of your clipboard there by pressing CTRL+V on your keyboard, then save the image somewhere you can find it and attach the image you saved to your next reply (and you can also insert it into your post if you wish by clicking the (+) on the uploaded image attachment placeholder once the upload completes at the bottom of the forum editor). Also, if you could post the ZIP file I requested above containing the diagnostic logs from the Support Tool, that would be most helpful as it should provide lots more info about what is going on with Malwarebytes and what it is trying to download/install. Thanks
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.