Jump to content

MasterBlaze

Members
  • Content Count

    7
  • Joined

  • Last visited

Community Reputation

0 Neutral

About MasterBlaze

  • Rank
    New Member
  1. Thank you so much! And yeah, I was able to update everything!
  2. ESET Online didn't find anything, but here's the scan log if you need it. and here is SecurityCheck's log My case is unrelated to Superhot, maybe I got that virus from downloading KMSPico and Radmin VPN (KMSPico for obvious reasons, and Radmin VPN trying to host a local game). After I removed the virus using Windows Defender it never showed again but wasn't sure I was clean so that's why I made this post. SecurityCheck.txt eset scan log.txt
  3. Hello, About those entries, yeah, I know those entries, it's just an application for a game. Thank you so much for the help. Here's fixlog.txt Fixlog.txt
  4. Hello, I recently got a virus, it was detected by Windows Defender and was called SettingsModifier:Win32/HostsFileHijack. I ran a full scan with Windows Defender and Malwarebytes but nothing found except for some PUM. I wonder if there's any infection, can somebody help me? Sorry for bad english, not my first language. Addition.txt FRST.txt Malwarebytes Log.txt
  5. I would recomendaciones use Malwarebytes Chameleon... It worked forma me.
  6. Hi, My problem is the next. I was recently infested with zpevdo.a, searching I found it's a rootkit... I was unable to start MalwareBytes... using Malwarbytes Chameleon I fixed it and was able to start Malwarebytes, before that I was having problems with Windows Defender, I'm unable to start his service. Using MSE I was able to "delete" zpevdo.a from my computer, but I don't know if my computer is clean, I scan my computer several times with Malwarebytes Premiun Trial and Malwarebytes AntiRootkit. It should be removed since Malwarebytes didn't detect any malware and rootkit (I
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.