Jump to content

Flintheart

Members
  • Posts

    12
  • Joined

  • Last visited

Everything posted by Flintheart

  1. Thank you for the offer. I don't feel comfortable with sending the whole thing without knowing the content. Is there any spesific part that could be of help which I could read through before sending?
  2. OS: Windows 10 If I try to start Anti-Exploit from the exe-file in the program folder nothing happens, I don't get any error messages either. I tried to install on another computer I have and everything worked without problems. This rules out any problems with Windows defender and Cryptoprevent. I have created logs with Malwarebytes support tool, but I'm a bit concerned about privacy so I won't upload it all at this moment. Is there anything I can look for specific in the logs or can you provide me with any possible solution?
  3. I would rather not post the log, hope that is ok. Generic.Malware/Suspicious, C:\USERS\X\DOWNLOADS\BURNAWARE_FREE_12.4.EXE burnaware_free_12.4.rar
  4. Hi Get the following error message when running the installer after choosing language. Runtime error (at 394:120) Invalid floating point operation I tried to run the Malwarebytes support tool but it also gives an error message. Error message from Windows 'wrong signature'. The Windows install is brand new. I have downloaded the legacy version, https://downloads.malwarebytes.com/file/mb3_legacy
  5. Interesting read: https://blog.avast.com/update-to-the-ccleaner-5.33.6162-security-incident Some media reports suggest that the affected systems needed to be restored to a pre-August 15th state or reinstalled/rebuilt. We do not believe this is necessary. About 30% of CCleaner users also run Avast security software, which enables us to analyze behavioral, traffic and file/registry data from those machines. Based on the analysis of this data, we believe that the second stage payload never activated, i.e. the only malicious code present on customer machines was the one embedded in the ccleaner.exe binary. Therefore, we consider restoring the affected machines to the pre-August 15 state unnecessary. By similar logic, security companies are not usually advising customers to reformat their machines after a remote code execution vulnerability is identified on their computer.
  6. I visited my friend today, I helped him scan the machine with Sophos Virus Removal Tool in safe mode, it didn't find anything. I saw this program recommended in another thread, we also did a complete scan with McAfee, again nothing. I found the infected installer in my backup, so I had the infected version installed at some point but the 64-bit saved me. PHEW.
  7. Personal home computer, alone on a isolated network connected to the internet. Only other connected device would be an Android phone.
  8. Great, thank you. My friend who has been infected, do you recommend a full format? The reset option in Windows 10 is really nice since programs and files are kept, would this be sufficient?
  9. Thank you for the answer. I came to think about one thing, I checked for the registry key after I uninstalled CCleaner. Is it safe to assume that the uninstall would leave the Agomo key alone?
  10. I'm on a 64-bit OS, I regularly update CCleaner so I must have had the infected version installed at some point. I also went from Win 7 x64 to Win 10 x64 a few weeks ago (15. or 16. of August after some digging, I kept all my programs in the upgrade process). I have now uninstalled CCleaner, I don't have the Agomo entry in my registry and I have scanned with Malwarebytes, portable ClamAV, SUPERAntiSpyware without any infections found. Is it safe to assume that I've never been infected? My understanding is that this only affected 32-bit OS but I want to be 100% sure. A friend of mine has Windows 10 32-bit and he had the infected version installed. Malwarebytes indentified "Floxif". Today I'm reading that the attack was more severe and people are recommended to format, is this the only way? Will the "reset this PC" option in Windows 10 be sufficient? Thank you for advice!
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.