Jump to content

exile360

Experts
  • Posts

    31,301
  • Joined

  • Last visited

  • Days Won

    41

Everything posted by exile360

  1. Yeah, it's a bummer but it is understandable. As a network monitor it is a pretty cool tool though with a very nice UI. I guess after putting all that work in they want to get paid for it somehow so it makes sense that the protection/firewall feature would be paid only.
  2. They already do for their products that include their Forensic Timeliner application (refer to the info on this page and this page as well as this article).
  3. Actually, Malwarebytes does scan DOS executables (assuming you mean things like .COM files), .SCR files and several other non-EXE file types and containers (archives etc.). If you're referring to a 16-bit DOS executable, then no, it isn't a threat in modern operating systems, at least as long as the OS is 64 bit as x64 operating systems aren't compatible/will not run 16-bit executables as they are only backwards compatible to x86/32-bit executables. Scanning script files is beyond useless and the reason that Malwarebytes doesn't bother is because it's so easy to evade detection by altering them (since they're nothing more than glorified text files) that even I, not being a developer/hacker/coder could change a script file myself to make it evade detection by an AV. Detecting such threats behaviorally in the context of how they are used in actual attacks is far more effective and is where Malwarebytes focuses their efforts, via components like their advanced heuristics engine (Shuriken) and their Exploit Protection component. Refer to the information in this article to see what I'm referring to. It's an old article but still relevant, and is the reason that even the top AV vendors generally focus more on behavior based detection of script based threats today rather than relying on the obsolete signature based detection techniques of the past (which Malwarebytes has never ascribed to for this very reason).
  4. Yeah, I didn't include GlassWire because their actual firewall functionality isn't free (only basic network monitoring; you have to buy a license to get the actual firewall component).
  5. Greetings, I think that by default it will be for 1 year, however they may offer a promotional 2 year price shown on this page (currently $ 74.88 for 24 months which is a savings of 25% off the second year's subscription pricing) or something similar and I'm not sure what the standard renewal price is and what discounts they might offer for renewals, however they should send you an email which shows the current pricing for renewing along with the available durations/number of terms that you may renew the license for (i.e. 1 year, 2 years etc.). With that said, you may also contact Malwarebytes Support via the form found on the bottom of this page and they should be able to answer any questions you may have about the cost of renewal and the available terms/duration for renewing your subscription.
  6. Confirmed, here's what it shows on the purchase page if you opt to buy the 2 year subscription: That said, I will inform the Marketing and Product teams of this thread as it's possible that they may want to further clarify their wording to avoid any confusion.
  7. They do provide such options for the business products, just not the consumer version.
  8. You're very welcome Yes, I'm glad that Malwarebytes (unlike some other security applications) is really easy to exit completely without leaving anything behind in memory. It makes for a very gamer-friendly/power user-friendly security product.
  9. Yes, that's normal. Malwarebytes creates its drivers and loads them as needed when protection loads and removes them when they are not active so that you get the best performance when you terminate a protection component or exit Malwarebytes completely rather than leaving them loaded silently in memory as some products do.
  10. Yes it does ! Absolutely ! None that I'm aware of Nope, not that I know of (and if they were it would come configured that way out of the box in the latest Malwarebytes release) Nope Nope, none that I know of, though the default list of shielded apps should be sufficient for most use cases I'll concede to any members of the staff that wish to address this post, but having supported Malwarebytes 3 (including Exploit Protection) for every version of Windows 10 shipped so far, I'm pretty confident in my responses and Exploit Protection's full compatibility and compliance with Windows 10's protections including their integration/implementation of EMET in the more recent builds.
  11. Greetings, Please read and follow the instructions in this topic and create a new topic in the malware removal area including the requested logs and information by clicking here and one of our malware removal specialists will assist you in checking and cleaning the system. Good luck, and if there is anything else we can assist you with please let us know. Thanks
  12. Greetings, Please read and follow the instructions in this topic and then create a new topic in the malware removal area including the requested logs and information by clicking here and one of our malware removal specialists will assist you in checking and cleaning the system of any threats as soon as one is available, which will hopefully resolve the issue you're encountering with the random pop-ups and slower than normal system performance.
  13. Ah, if you have Malwarebytes Windows Firewall Control installed then yes, that's likely what it came from (assuming you don't have Malwarebytes Premium, in which case mwac.sys should be present).
  14. MWAC is Malwarebytes Web Access Controller which is what Malwarebytes uses for the Web Protection component in Malwarebytes (bad website blocking). It relies on the Windows Filtering Platform (WFP) APIs in modern versions of Microsoft Windows which is the same infrastructure/APIs used for the built in Windows Firewall in Windows Vista and newer Windows versions.
  15. Yes, the scan complete window remains until closed, however you can still initiate a new scan via the context menu in Explorer when the UI is in this state (you can test by running a Threat scan via the Scan Now button on the Dashboard tab, allowing it to complete, then leaving it in that state without clicking the 'X', then right-click on any file or folder and selecting 'Scan with Malwarebytes' and you'll see that the scan does indeed proceed even though you never closed out the previous scan result screen). You can also test it by performing multiple right-click context menu scans in a row without closing any of them out and watching what the UI does. You should see it proceed with each new scan without having to click the 'X' to close out the results from the previous scan. The issue with the option missing in Explorer is due to the right-click context menu's shell extension not being registered properly following installation/upgrade. The issue with the scan options being unavailable in the Scan tab is a separate issue and is indeed due to not closing out the scan results from the previous scan and is simply a UI/UX interactivity issue, not a bug (though I'd argue that it could be handled better and that the scan complete interface could just time out on its own after enough time has passed rather than leaving the UI in that state until MB3 is restarted or the user clicks the 'X' to dismiss it, but that's a usability issue not a bug).
  16. Another nasty side channel vulnerability has been found in modern Intel Core CPUs. You may recall Spectre and Meltdown side channel vulnerabilities making headlines last year; well now a new vulnerability has joined their ranks which appears to be specific to Intel CPUs exclusively and it may not be as simple to mitigate as the previously reported vulnerabilities meaning Spoiler may not end up being addressed until a new microarchitecture is made available in the market that does not include the kinds of speculative execution techniques that make Intel's CPUs vulnerable to these attacks. You can read more about Spoiler in the following articles: The Register - SPOILER alert, literally: Intel CPUs afflicted with simple data-spewing spec-exec vulnerability OC3D.NET - SPOILER Alert - Intel CPUs Impacted by New Vulnerability TechRadar - ‘Spoiler’ flaw in Intel CPUs is similar to Spectre – yet dangerously different Based on my reading, it seams the only hope here (aside from new CPU architectures that don't include this 'feature') will be DRAM manufacturers and software developers who may be able to at least somewhat mitigate this vulnerability through their own security practices, but I would speculate (pun very much intended) that this will be another driving factor pushing many in the market for new systems to turn to AMD, who have shown themselves to have performance on par with Intel with their most recent Ryzen and Threadripper parts and their upcoming Ryzen 3000 series CPUs that promise even better performance and higher core counts than any of Intel's current offerings (though Intel's own 10NM chips, which have been delayed countless times, should hit the market late this year to provide some competition, hopefully including hardware level mitigations for these speculative execution attack vectors, but only time will tell; we know Intel's 10NM parts will be immune to Spectre and Meltdown, but given how recent the discovery of Spoiler is, the first wave of Intel 10NM chips may be afflicted by this new vulnerability given how late in the game it was reported, but we'll see). On the upside, this vulnerability apparently cannot be exploited without the attacker already successfully launching some malicious code on the system such as a malicious browser exploit or some malware process in memory according to the articles: Be sure to keep your anti-malware software up-to-date and your Exploit Protection active; I know I will
  17. Correct. This vulnerability allows .ACE archives to run as executables rather than opening like normal archives, thus providing a means of launching a malicious executable in memory. It's really not that bad of a vulnerability as it's not like something that allows arbitrary code in memory or process injection or anything like that; basically it's on the same level as run-of-the-mill Trojans that disguise themselves as PDFs and other non-PE file types via icons and/or double-extensions.
  18. No, you don't need to reinstall. As long as it can access the license server it should be able to initiate the trial.
  19. Greetings, Unfortunately no, there isn't. The settings for each installation are unique to that installation as they are encoded with a unique machine ID/installation ID so that they cannot be moved to another device or system, however you should be able to back them up and restore them on the same system. If there is anything else we might do to assist you please don't hesitate to let us know. Thanks
  20. Greetings, This is quite normal. The service which starts Malwarebytes other processes can be launched without administrative privileges. This is to enable it to run in hostile/infected environments and to improve compatibility with limited user accounts. Exiting requires UAC to safeguard it from being terminated by malware (since malware is unlikely to try to launch Malwarebytes, there's no need to guard against being launched, just to protect it from being terminated). I hope that clarifies things and if there's anything else we might assist you with please don't hesitate to ask. Thanks
  21. Greetings, It could actually be malware causing this issue as there is a threat currently infecting users that prevents any Malwarebytes software from running, and based on your description, it sounds like that's precisely what's happening. Please try running ADWCleaner to see if it is able to run, and if so, scan with it and have it remove anything it detects and restart your system if prompted to do so. Once that's done, try running Malwarebytes Anti-Rootkit to see if it is able to run, and likewise try to scan with it and have it remove anything it detects and restart if prompted to do so. If none of those would run or if the issue still persists then please follow the instructions in this topic and create a new topic in the malware removal area by clicking here and post the requested logs and info there and one of our malware removal specialists will assist you in checking and clearing the system of any threats which will hopefully resolve the issue with Malwarebytes.
  22. Greetings, Malwarebytes shouldn't be terminated via Task Manager as it could render the system unstable since it has drivers loaded into memory along with the service. Instead, the best method is to right-click on the Malwarebytes tray icon and choose Quit Malwarebytes and select Yes if prompted by User Account Control. That should remove all processes, services and drivers belonging to Malwarebytes from memory.
  23. Yes you can. It should work just fine with Windows Defender.
  24. Nope, it's very simple. It just displays a prompt whenever a new application wants to access the web allowing you to allow it or block it, giving you control over which apps can access the web and which ones cannot just as a good firewall should. No HIPS components or complicated functions, just the straightforward application level filtering that a good software firewall should provide.
  25. You can also try reinstalling the other programs you removed one at a time to determine which ones work with Malwarebytes and which ones do not. It may also help to set exclusions for Malwarebytes in the other apps. The list of items to exclude can be found in this support article. You can also exclude them from Malwarebytes by following the instructions under the Exclude a File or Folder section of this support article to exclude your AV's folder(s) under Program Files/Program Files (x86) and C:\ProgramData.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.