Jump to content

exile360

Experts
  • Content Count

    27,826
  • Joined

  • Last visited

Everything posted by exile360

  1. Greetings, As long as you installed the most recent monthly rollup for your OS then you already have this patch installed as it was included in the rollup for Windows 7. This is how most Windows 7 users received the patch through Windows Update. You can learn more in this Microsoft article.
  2. OK, it looks like a reboot is pending so go ahead and restart your system. Windows is waiting to finish installing some updates and it looks like some other software you recently installed is also waiting to replace some files on reboot. Once that's done go ahead and run another scan with Malwarebytes and have it remove anything it detects then follow the instructions in this topic. It's possible that this keeps coming back due to a known issue with Chrome where it restores an unwanted extension automatically when it syncs up with the cloud and those instructions should eliminate the issue if that is what is happening. Please let me know how it goes. Thanks
  3. Thanks for the update. Please let us know if this issue returns. In the meantime I'll be reporting this issue to the Product team for analysis. If the issue does return, please use the Malwarebytes Support Tool to collect logs and attach them here for analysis: Run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Thanks
  4. Greetings, If you are referring to entering your license key into Malwarebytes, you should be able to enter an old format license key by following the instructions in this support article making sure to check the checkbox referred to in step 4. in the support article. That should allow you to enter your old format key to activate your license. If that does not resolve the issue or if you're having trouble with something else please let us know. Thanks
  5. Greetings, Malwarebytes automatically updates its detection signatures each time a scan is run so whatever the files are, signatures that detect them must have been added recently. If you wish to check to determine if they are false positives read and follow the instructions in the 3 pinned topics in this area and then create a new topic in that area by clicking here and a member of the Research team will check the files and let you know if they are false positives or not.
  6. There are several options available. Here are a few examples of tools and tutorials you may find useful for this purpose: https://www.pendrivelinux.com/yumi-multiboot-usb-creator/ https://rufus.ie/ http://www.winsetupfromusb.com/downloads/ https://fossbytes.com/how-to-put-multiple-iso-files-in-one-bootable-usb-disk-create-multiboot-usb-disk/ https://www.makeuseof.com/tag/bootable-multiboot-usb/
  7. Greetings, The issue is likely being caused by a feature in Chrome where it restores your past extensions/plugins whenever it starts up, so it is bringing these PUPs back every time it is launched after Malwarebytes has removed them. To resolve this issue please follow the instructions in this topic. Please let us know how it goes and if there is anything else we might assist you with. Thanks
  8. That's great news, I'm glad to hear it, thank you for letting us know
  9. That is odd, please try restarting your system to see if that helps. It could be that one of the program's drivers or other components is preventing it from being removed and if so, restarting the computer and launching ADWCleaner again may resolve it.
  10. Greetings, You should find the information in this suppor article to be helpful, but please let us know if you still have any trouble and we will assist you further in removing Malwarebytes from your device. Please let us know how it goes and if there is anything else we might assist you with. Thanks
  11. If you haven't run a scan yet then there is nothing to remove. The Remove button exists to remove any logfiles from scans and items in quarantine that ADWCleaner has created on the system. If you have not scanned yet then none of those objects exist yet and therefore this is nothing that can be removed by the Remove function/button. If you have run a scan already and it is still grayed out then yes, it is a bug. I found this information in the ADWCleaner user guide:
  12. Greetings, It looks like this is being caused by a feature in your web browser called browser push notifications. It's been quite common recently for sites to abuse this feature to display persistent and annoying ads. The article I linked to there explains how it works and how to disable it if you've enabled notifications for any websites (it's likely one of those sites that is showing the pop-ups in your browser). If that fails to resolve the issue then please try a scan with ADWCleaner to see if it detects anything, and if it does have it remove it and restart the system if prompted to do so to complete the removal process. If the problem still persists then please read and follow the instructions in this topic and then create a new topic in the malware removal area including the requested logs and information by clicking here and one of our malware removal specialists will assist you in checking and cleaning the system of any threats as soon as one is available. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  13. Yep, not too bad at all, thanks for sharing I found the performance metrics particularly interesting. I knew Malwarebytes was especially light for web and file operations (which is indeed reflected in the AV-Test results) but I wasn't aware it had such a high impact on process launch times. I did know that it had some impact as it does use on-execution detection methods to check processes entering memory but I've always observed it to be quite snappy across all the systems I've used it on over the years, but I do tend to use higher-end hardware so that may be the reason I've not really noticed any issues. I'd always observed that most of the traditional AVs I've used/tested over the years had a much greater impact, but it has been a while since I've used one so perhaps they've improved things since then. By the way, in case anyone is curious about why Malwarebytes is now participating in these tests, you can read this Malwarebytes Labs blog article.
  14. I'm just guessing as well unfortunately (I wish companies would label/specify the functions of individual executables/files better than they do) but I'd suggest trying to exclude each of these one at a time until you are successful and hopefully one of them does the trick: C:\Windows\System32\BtwRSupportService.exe C:\Program Files (x86)\ControlCenter4\BrCcUxSys.exe C:\Program Files (x86)\ControlCenter4\BrCtrlCntr.exe C:\Program Files (x86)\Brother\BrUtilities\BrLogRx.exe C:\Program Files (x86)\Browny02\BrYNSvc.exe C:\Program Files (x86)\ControlCenter4\BrCcBoot.exe C:\Program Files (x86)\Browny02\Brother\BrStMonW.exe C:\Program Files (x86)\Brother\iPrint&Scan\USBAppControl.exe C:\Program Files (x86)\Brother\iPrint&Scan\WorkflowAppControl.exe The only other process I could see belonging to Brother was this one which appears to be their updater for their software so it isn't likely to do any good to exclude it: C:\Program Files (x86)\Brother\SoftwareUpdateNotification\SoftwareUpdateNotificationService.exe Hopefully excluding one of those resolves the issue. Please let us know how it goes. Thanks
  15. Excellent, I'm glad we were able to get it going again. I'm glad to be of service, and if there is anything else we might assist you with please don't hesitate to let us know. Thanks
  16. Yes, I believe they're actually ordered by default based on the actual encoded filenames of the raw .json logfiles in Malwarebytes data directory where they are stored which, while they do contain encoded date/time info, aren't named in such a way where they end up sorted in that order by default alphanumerically.
  17. OK, go ahead and restart the computer then try running the installer again. Please let us know if you have any problems. Thanks
  18. Greetings, I believe the default order for reports is based on event type (the first column) which shows the type of report/event being listed, for example website blocked, malware blocked, scan report etc. If you click on the Date and Time column header it should sort the list into chronological order. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  19. It appears to be the system recovery screen from HP, the system manufacturer. Some OEM's like HP will put these types of boot options onto their systems for the purpose of diagnostics, repairs (useful when Windows won't boot), as well as restoring the system back to factory settings (i.e. wiping the system completely and reinstalling Windows). If it came up on its own and you didn't initiate it deliberately I'd suggest just pressing the ENTER key as suggested to continue system startup and hopefully Windows will be able to boot properly.
  20. Yeah, that doesn't sound very efficient, that's for sure.
  21. You're welcome I suppose whether or not it gets fixed depends entirely on whether or not Microsoft actually considers it to be a bug or not, as they may very well be doing this deliberately for some purpose (like rendering or caching content as I mentioned). If that turns out to be the case then Malwarebytes is doing what it is supposed to in shielding every IE process that runs on the system against exploits (something particularly important should anyone attempt to launch an exploit attack through the rendering of javascript or any other active content that might use those hidden instances of IE that run whenever Outlook launches).
  22. You're very welcome They should be able to get everything sorted for you, and if there is anything else we might assist you with please let us know. Thanks
  23. Excellent, I'm glad to hear it Thank you for letting us know.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.