Jump to content

RL0000

Members
  • Posts

    5
  • Joined

  • Last visited

Reputation

0 Neutral
  1. At least I'm not alone. That much at least tells me that it likely isn't concerning. But I'd also love to see what staff has to say on the matter. Thank you Porthos! (my favorite Musketeer by the way!)
  2. So as you can see, last week (yesterday) it said I had malware detected. The desktop app does not show any detections by the way. However, when last two weeks is selected it says I have zero malware detections. No blocked items. Is this a FP?
  3. Sorry to add yet again to this, i was reading through, saw a few mistakes, and realized i couldn't edit. The block penetration testing setting was off. I did hit "reset to default" in that settings window before i noticed the windows security setting.
  4. Binisoft.org - not .com - my mistake
  5. One day after a fresh install of Windows. I get a windows notification about language switching hotkeys. I am not interested in this feature myself and was going to disable it, whatever it was, and it said to hit customize within the notification to do so. When I did, that was when malwarebytes detected it as an exploit and shut it down. I also noticed that in windows security "Potentially unwanted app blocking" disabled itself around the same time that malwarebytes made this detection. I noticed it after I was checking the exploit protection advanced settings (Block penetration testing attacks). Around this time i was also browsing for information about firewalls in firefox. Here are the domains I browsed through for this binisoft.com techradar.com quora.com askleo.com tenforums.com could one of these websites have made this attack? Or was it a false positive? I also have browserguard installed and have run a threat scan as well as an adwcleaner scan. malware exploit agent generic detection 9 19 22.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.