Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About chuckdee

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I just installed Visual Studio 2019 from the Microsoft site and received a false positive. Malwarebytes Version: Update Package Version: 1.0.40278 Component Package Version: 1.0.1273 Requested Files attached. platform-tools_r30.0.4-windows.zip malwarereport.txt
  2. A reverse engineering site with articles and exercises on reverse engineering software. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 11/11/20 Protection Event Time: 5:28 AM Log File: a1fafd42-2408-11eb-b4dc-74d435e5dae7.json -Software Information- Version: Components Version: 1.0.1070 Update Package Version: 1.0.32702 License: Premium -System Information- OS: Windows 10 (Build 18362.1082) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , C:\Program Files (x86)\B
  3. The Newest version (4.0.4) doesn't work with my VPN (Cisco) on windows 10. It doesn't recognize it as being up to date with the virus requirement policies. I've contacted support, and they've exhausted the current troubleshooting, and have gone back to QA to see what might be happening, as it should be recognized. In the meantime, I need to connect to my VPN. 3.x worked fine- so I wondered if there was anywhere to download a 3.x version in order to install until the time we can get this resolved.
  4. I can't see how to edit my response; I pasted the wrong page for his information page. That should be at https://www.donationcoder.com/forum/index.php?topic=5540
  5. Why? It's just an AHK exe to touch a file and change the modification date. You can see the thread that tells what it does here: https://www.donationcoder.com/forum/index.php?topic=4382.0 The source for the ahk is here: http://www.dcmembers.com/jgpaiva/wp-content/uploads/sites/9/CS/Touch/Touch.ahk It is not a Trojan, and your identification of it as such is a false positive. It's a compiled AHK for convenience only. Thoughts?
  6. IP address: Hostname/URL: hxxp://www.dcmembers.com Member site for DonationCoder.com. Hosts free software- many are AutoHotKey which you seem to get a lot of false positives for. Protection Log Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 7/30/19 Protection Event Time: 2:06 PM Log File: c14cbdec-b2f4-11e9-8448-74d435e5dae7.json -Software Information- Version: Components Version: 1.0.586 Update Package Version: 1.0.11760 License: Premium -System Information- OS: Windows 10 (Build 17134.285)
  7. I've been getting it for a while. But I just install OneDrive again. But after seeing it again, I figured I'd look around and found this post.
  8. Reinstalling onedrive works to get the application back, but I'm more concerned with the fact that at times it stops, and I don't even know that it stopped. I was working on something today and that was the only thing that pointed me to the fact that it was off- the fact that it wasn't synchronized to my work computer. I've added an exclusion and reinstalled onedrive but I'd rather if this problem was corrected in the software. I tried running the the support tool retrieve the logs but got an exception while running it. Thoughts?
  9. Thanks again for all of your help! UPDATE: No... that worked in that it restored access. I did what I should have done before in regards to adding to the exclusions, so it wouldn't be detected now.
  10. Thanks! That worked, and saved me a lot of work! One last thing... is there anywhere to see logs of what antiransomware does on a block? It doesn't show up in the protection logs.
  11. Excellent! Then I can restore antiransomware after I get access? One of my servers got hit with ransomware, so that's pretty much the only reason I keep it running (though that was an exploit in RDP rather than user error)
  12. It's not in MBAM quarantine. Are you saying that if I reboot it should be quarantined?
  13. And I'm just trying to regain access to it, and see logs of what was done in addition. I've excluded the folder from ransomware detection at this point, so the detection of it shouldn't be an issue. The issue is malwarebytes' actions and trying to reverse them without losing work. Pacman has been altered as far as permissions, so I can't do anything with it, even delete it. This is the problem that I'm trying to solve so I have options.
  14. msys2 is not the same as the windows subsystem for linux. It does some of the same things, but there have been other options that were in place before Microsoft implemented WSL, i.e. Cygwin and msys2. I think that pacman.exe is a rewrite of pacman, and therefore not a linux file.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.