Jump to content

exile360

Experts
  • Content Count

    24,657
  • Joined

  • Last visited

Everything posted by exile360

  1. Greetings, If you haven't done so already, please try temporarily disabling or exiting Kaspersky to see if you are then able to get Malwarebytes to install and run properly. I would suggest disabling Kaspersky, then reinstalling Malwarebytes as it probably won't be able to launch in its current state where many of its files and settings are not installed, likely as a result of the failed installation attempts. If that is successful, then it would be a good idea to create exclusions in Kaspersky for Malwarebytes. The items to exclude are listed in this support article. Please let us know how it goes and if the issue still persists. Thanks
  2. Greetings, Thank you for the suggestion. I will report it to the Product team for review and consideration. Please don't hesitate to let us know if you have any additional suggestions, feature requests or feedback in the future. Thanks
  3. Excellent, I'm glad you were finally able to get rid of that nasty adware. It looks like some kind of DNS hijack combined with a push notification pop-up attack pushing tech support scams judging by the info in your malware removal topic. Unfortunately such blended attacks are quite common these days, but I'm glad you were able to find the culprit and get it shut down. I will also be sure to bring your malware removal thread to the attention of the Product team so that they can hopefully work with the Researchers and Developers on isolating everything involved in this blended threat that Malwarebytes missed so that the product can detect and remove all components of this threat in the future to spare others from having to deal with this threat manually. Thanks for the update and please don't hesitate to let us know if there is anything else we might assist you with in the future
  4. Greetings, I just took a look at your logs and my first suggestion would be to try temporarily disabling Comodo then reinstalling Malwarebytes to see if that makes any difference. Comodo is a pretty aggressive HIPS/firewall so it's quite possible that it blocked one or more tasks that Malwarebytes needed to perform to install/activate properly (such as installing its drivers) so if you haven't tried that yet, it's definitely worth a shot. If that doesn't help, then I'd suggest running the support tool again and trying the repair function if you haven't already done so as that may be able to get it installed and running properly (your logs show many of Malwarebytes' files and registry entries missing, indicating an incomplete or failed installation which is likely why it can't launch properly). The last thing I'd suggest if neither of those options work would be to try a clean install. Instructions on how to do so are below: Run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Clean button, and allow it to restart your system and then reinstall Malwarebytes, either by allowing the tool to do so when it offers to on restart, or by downloading and installing the latest version from here Please let us know how it goes and if any of the above options works to get the program running for you. Thanks
  5. It could also be that your browser is sending the wrong user agent string causing sites to detect that you are using a different version of Firefox. In fact, that 'Track-Off' extension you mentioned, assuming it is actually the product/extension 'TrackOff' that I found when doing a search for that term, very likely does this very thing since one of the features it boasts is feeding inaccurate 'fingerprinting' information to trackers/the sites you visit, and one of the most prominent fingerprinting data points is the browser's user agent string which reports to the sites you visit, among other things, the web browser and version you are using. I suspect that product is the reason you're seeing those messages.
  6. I do not know if this is still true, but with the original beta, if you upgraded to 4.0.1 from the first beta it would actually fail to use the correct signatures. The only way to detect it was by scanning and having it detect false positives in the new heuristics engine which were known to have been fixed already. Because of this, I would strongly recommend doing a clean install of any new 4.x beta build until they explicitly state that upgrades are OK. You should have no trouble upgrading from the current 3.x release build to any 4.x beta, but going from one beta to another, at least for the moment, may have undesirable results (which may not be detectable unless you happen to have files on your system which were FPs known to be detected by the previous beta you upgraded from).
  7. Greetings, Unfortunately I don't believe that version is available any longer. The oldest version still available that I am aware of is version 3.5 which was the last version to support Windows XP and Windows Vista and can be downloaded here. Also please be aware that any older version of Malwarebytes, even if still receiving database/signature updates, will not be capable of detecting as many threats as the current version due to the fact that new detection capabilities are added in nearly every version of Malwarebytes that is released and these new signatures/syntax structures for the detection engine are not backwards compatible (old versions will simply ignore/not use threat signatures that they do not know how to read/which were created after they were released). The Malwarebytes Research team also has the tendency to replace older signatures with newer ones that use the newer, more powerful database syntax both for efficiency and to improve Malwarebytes' overall detection capabilities, so as time goes on older versions will likely detect fewer and fewer threats. Beyond that, you might check a site such as MajorGeeks or FileHippo, however I don't know if they would have the version you are seeking or not.
  8. Greetings, You should be able to use the Reports tab to review the results of previous scans and protection events which will give you the name and path of any objects that have been detected. From there it should be a simple matter to then either delete them by hand from your backups, or to write a script or batch file to check for and delete any of those detected items from your backup drive(s). With that said, the Malwarebytes scan engine and detection signatures are extremely dynamic, so maintaining and generating any sort of targeted threat scan to look only for previously detected objects on a new drive is not something that it can be used for and I have never seen any security product or scan engine that included this capability or any like it. You don't necessarily have to scan your entire backup drive though, and the suggestion I made above for writing a script or batch file should address any such objects and if you are familiar with batch scripting you can even including error checking, logging and validation so that it creates a scan log of sorts revealing which items from your script were present on the backup drive, which ones were successfully removed, and if there were any errors (such as a file being present that should have been deleted but wasn't for some reason such as permissions or being locked/in use etc.) those can be included in the output/log as well so that you may investigate and remove any remaining files manually, in Safe Mode, or offline if necessary. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  9. Greetings, You simply need to deactivate the previous installation in the system so that it is freed up for use on your new Windows installation. To do so, first begin by signing up at My.Malwarebytes.com if you haven't done so already. Use the same email address you used when you purchased your license. Instructions on doing so can be found in this support article. Once that is done, use the option to deactivate the old installation which should be listed there. Details on how to do so may be found in this support article and further details on using My.Malwarebytes.com to manage your licenses can be found in this support article. If that does not resolve the issue, then please contact Malwarebytes Support directly by filling out the form on the bottom of this page and they will assist you further. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  10. That's true, it's also had a major name change to Malwarebytes Browser Guard which should more clearly indicate that it is no longer a beta product, and of course there is the page on the main website here. That said, I will still pass your feedback on to the Product team in case they want to make any changes to more clearly indicate its release status.
  11. Yes, you can try visiting iptest.malwarebytes.com and it should be blocked. If you also have Malwarebytes Premium installed/active, then be sure to disable the Web Protection component first to ensure that the site is blocked by Malwarebytes Browser Guard and not Web Protection just to verify that the browser extension is working. Please let us know how it goes. Thanks
  12. Greetings, While you are waiting on a response, I would recommend also contacting Malwarebytes Support directly by filling out the form on the bottom of this page as they may be able to assist you more quickly.
  13. Greetings, I'm sorry that you're experiencing issues, but we should be able to get the problem corrected. Please replicate the problem and then do the following so that we may take a look at what is going on with your system: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Thanks
  14. No problem, hopefully they will be able to replicate the issue, however if there are other factors involved such as specific hardware, drivers, OS updates/patches, other software etc. that plays a role in the issue then they may not be able to replicate it, but hopefully that won't be the case. That said, uploading the memory dump from the BSOD shouldn't take too much effort as it gets created automatically by default whenever a BSOD occurs and could be very helpful to the Devs in discovering the cause if you would be willing to provide it. I understand if you are unable to do so, however if you can it would be most helpful. Either way thanks for reporting the issue.
  15. But clicking the icon in the Scanner UI element doesn't perform the same function as the Scan button in that part of the UI; the former simply expands the Scanner interface/tab, while the latter initiates a Quick Scan. In fact, I don't believe that the icon is actually what responds to clicks as you can click anywhere within the rectangular 'Scanner' UI element, including the blank white space, and the result is the same; it expands the Scanner tab/interface. The 3 UI elements on the main dashboard appear to work by highlighting the entire UI element with a blue border when you hover over them, and clicking them results in that element/page of the UI being expanded. The icons themselves don't appear to actually be active elements of the UI, I believe they are simply labels.
  16. Greetings, Since the latest builds of Opera are based on the same Chromium source code as Google Chrome you should be able to install the Chrome version of Malwarebytes Browser Guard without any issues. There is also an Opera extension that allows the installation of Chrome extensions if necessary, though I don't believe it should be needed. Have you tried installing Malwarebytes Browser Guard in Opera already, and did you experience any problems? Please let us know. Thanks
  17. Greetings, Thank you for reporting this issue. If you haven't done so already, please try excluding the items listed in this support article from Comodo's real-time protection as that may help to correct the issue. In the meantime, if you could please provide the memory dump file from the BSOD by zipping and attaching it here (it should be located under C:\Windows\MEMORY.DMP) and also please do the following so that they may better determine what might be the cause of the issue and so that they can better try to replicate it: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply Thanks
  18. What do you mean by 'hot' exactly? Can you provide some kind of examples and/or detailed description? Thanks
  19. Yes, that's definitely possible. We'll wait to hear from treed and see what he has to say.
  20. If there is an option for the scan component, then that probably needs to have full access as well. I don't know how it is on the Mac, but the old Windows version used to have 2 separate components; one that was used for real-time protection, and the other that was used for the scan engine for scans. If the Mac version is designed the same way, then there should be another component that should get full access for the scans to be able to access all files on disk.
  21. Did you allow Malwarebytes to have full disk access as described above? If not, then that could be the reason for the discrepancy.
  22. Greetings, I just wanted to check in and see if you were able to get the issues resolved that you were experiencing and offer assistance if not. If your system is still showing signs of infection then please read and follow the instructions in this topic then create a new topic in our malware removal area by clicking here and one of our malware removal specialists will guide you in checking and cleaning your system of any remaining threats. I hope this helps, and if there is anything else we might assist you with please let us know. Thanks
  23. Greetings, In addition to the information above from alvarnell which is quite accurate, I would also suggest checking your notification settings in your browser as it is quite possible that one or more sites is abusing the push notifications function available in Chrome. You can learn more about malicious push notifications in this Malwarebytes Labs blog article as well as this Malwarebytes Labs blog article. I hope this helps, and if the issues still persist please let us know and we will provide further assistance. Thanks
  24. Excellent, I'm glad you were able to resolve the issue. If you want to try the beta again, you should be able to install it over the top of your existing version without any issues, and if you have any further trouble or need assistance with anything just let us know. Thanks
  25. Greetings, Please try the following to see if it resolves the issue: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Clean button, and allow it to restart your system and then reinstall Malwarebytes, either by allowing the tool to do so when it offers to on restart, or by downloading and installing the latest release version from here or by reinstalling the beta version if that is what you are using currently and would prefer Please let us know how it goes. Thanks
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.