Mike406
-
Posts
15 -
Joined
-
Last visited
Content Type
Events
Profiles
Forums
Posts posted by Mike406
-
-
When viewing an image from image.prntscr.com, the image is blocked from loading. This also occurs when images hosted from this site are directly embedded on websites or forum posts. Here's a screenshot of the MBAM popup window regarding this:
-
I'd like to see Scan Detections and Real-Time Detections becoming Hyperlinks that will take you to a more detailed itemization of what each detection was along with other info about it like datetime, location, type of detection, etc.
-
Thanks, I've already turned off exploit protection on MS Office. It was more of a report to the MBAM team to look at in case they were not aware of this issue.
-
Any confirmation on this?
-
On version 3.0.6.1469 - The Exploit Protection feature causes hangs and crashes of my Microsoft Office 2016 programs either when starting the program or randomly during usage. Once I turn protection off for these programs the crashing stops. I noticed that a related known issue is listed here toward the bottom of the page (Websense exploit). Is this the same known issue or something new?
Thanks,
Mike -
mwac.sys BSOD (0xC9 DRIVER_VERIFIER_IOMANAGER_VIOLATION) under verifier.exe checks on my Windows 7 x64 laptop. BSODs quite early in the boot sequence, no memory.dmp file is able to be successfully written sadly. Doesn't seem to matter what flags I try. Was just using standard flags at first then tried w/o Special Pool and Force IRQL Checking, makes no difference for me.
-
Thank you for clarifying Ron, was wondering at first if it had something to do with being in Unused Accounts group.
-
Can't edit, but please note that I'm not trying to provide justification of NOT updating site compatibility; simply that the issue in question may not be of the highest priority right now depending on how the demographics break down.
-
While I think it is great that you care to help, the fact is that browser statistics can be very misleading and using another site's breakdown probably will not reflect the audience of this particular forum. A couple of others for comparison:
http://www.sitepoint.com/browser-trends-january-2014-yearly-review/
http://en.wikipedia.org/wiki/Usage_share_of_web_browsers#Summary_table
http://www.w3counter.com/globalstats.phpIt would have also been nice if Ars Technica would have provided how they were breaking their stats down as that's the highest amount of IE use I've seen yet.
The point is, don't immediately trust other's fancy graphs, tables and breakdowns like that. As a web developer myself, I never rely on other's statistics. I run my own analytics, I can assume the developers of this board are aptly equipped with even better statistics of their user breakdown.
-
The copy paste issue with IE 11 is similar to the problem that happened with vBulletin forums. You either have to change the document mode of IE 11 from Edge to 10, or you need to turn off the WYSIWYG formatting (toggle the BBCode button in the upper left of this editor) to be able to paste again.
-
My rootkit database ver. is the same. Maybe rootkit database is not updated as frequently?
-
Hi John. I do have self protect enabled and the recurrence setting for the scan task I set was 1 week.
-
Oops, I should probably mention my system information.
Windows 7 Professional x64. Using MBAM Premium.
-
Hello, I would just like to report on some bugs I've noticed with MBAM 2.0.1. I am aware of the upcoming bug-fix version but would like to see if any of these are known.
#1: After doing a System Restore, Malicious Website Protection module ceases to function. It cannot be successfully re-enabled or "fixed" by MBAM even after a reboot. It will always be reported as disabled. I've needed to reinstall MBAM after performing system restores to get it working again. This has happened for all system restores I have done so it is easily reproducible on my system.
#2: I have set an automatic schedule for a Scan once a week. After setting up the task, after an indeterminate period of time passes or after a couple of regular reboots, if I go back into the automatic scheduling settings MBAM will report in the frequency of the scan as "Repeats once every 0 weeks" instead of what it was actually set to. I haven't seen yet if this actually will prevent the schedule from operating correctly.
#3: If an Access Policy is set to block changes to settings but you close the GUI when in any of the settings areas, since re-opening MBAM will place you where you left off, you will be able to bypass the access policy restriction for whatever page it is on and apply changes. The same is true for the History tab as well. I would make the suggestion to always return you to the Dashboard when the GUI is re-opened.
TTREngine.exe detected as False Positive
in File Detections
Posted
File is part of the game Toontown Rewritten: https://toontownrewritten.com/play
Thanks!
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 5/18/23
Scan Time: 12:24 PM
Log File: 6ce20a10-f598-11ed-8bac-001fbc0f428d.json
-Software Information-
Version: 4.5.27.262
Components Version: 1.0.1991
Update Package Version: 1.0.69650
License: Premium
-System Information-
OS: Windows 10 (Build 19045.2846)
CPU: x64
File System: NTFS
User: ****
-Scan Summary-
Scan Type: Custom Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 1
Threats Detected: 1
Threats Quarantined: 0
Time Elapsed: 0 min, 15 sec
-Scan Options-
Memory: Disabled
Startup: Disabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 0
(No malicious items detected)
Registry Value: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 1
Malware.AI.3627846373, C:\****\DOWNLOADS\TTRENGINE.EXE.E797976DF7\TTRENGINE.EXE, No Action By User, 1000000, -667120923, 1.0.69650, AD712AA61B5F3D80D83C8AE5, dds, 02301765, 629B2C022D8F4EF2A3B8A03D414F85D1, 9F7E059F45C312871D4BCF707E039FC5AB97D8C0D014DC9E4A7352777C9A4F31
Physical Sector: 0
(No malicious items detected)
WMI: 0
(No malicious items detected)
(end)