Jump to content

Lfei3

Members
  • Posts

    16
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I apologize ahead of time if this isn't totally related. Using the latest Malwarebytes premium with anti exploit enabled. I have the same question as cutting_edge about what programs are "protected" but not listed in the anti exploit module. Malwarebytes premium doesn't have the notification system for its exploit module as anti exploit standalone so it is hard to tell. Is there a log I can look at to see what it is protecting?
  2. I am trying to add additional processes for the anti exploit module. Many exe spawn additional processes and I am wondering how I should add them manually or if I need to at all. For example Firefox is already added and I assume that add plugin container.exe that spawns from Firefox. EMET requires manually adding the secondary processes. Now I want to add Thunderbird to the anti exploit list which also has plugin container.exe. Do I need to manually add plugin container.exe along with the Thunderbird.exe to be properly protected? There are other programs that spawn secondary processes so I would like a conclusive answer.
  3. I am in a similar situation and posted my misgivings in my post history. The logic is MBAM is now full fledged anti virus suite in the vein of Norton or Kaspersky and MBAM should alert users when one its real time protection modules and keep doing for the safety of its users...shrugs.
  4. This is just based on my experience. I went back to MBAM ver 2x b/c this issue. There is an option to disable realtime components at windows start. There will a pop up notification the first time you turn it off like you said. However there will no more pop up notifications after. You can turn restart, turn off and then on. There is no longer a pop up notification tell you that a real time protection module is off. There will be red icon inside MBAM system icon, but that is all there is to indicate that a realtime protection module is off. It may seem to be a small issue, but it becomes an big issue b/c it is persistent and constant, b/c it needlessly forces users who selectively disable a realtime component to manually close the pop up notification every time they turn on their machines.
  5. I want to second this notion. MBAM 2.0XX allowed users to turn off real time protections and not be constantly reminded that the user purposely turned off some protection. Like many people I use MBAM as a supplement to my main AV, I find some real time protection modules more useful than others and would like not to be notified every time I turn on my computer that I purposely turned off something in MBAM. I am not disagreeing with exile360 and that should be default behavior, but it should have a option to turn off the notifications. I would also note, that most reputable AVs like Panda, AV, and Symantec allow selective turning off modules without bugging users too much, you might get a prompt asking for confirmation and that will be the end of it. If you turn off everything, then Windows will notify you that don't have any real time protection and that should be good enough.
  6. I installed the new Malwarebytes 3.0. I noticed I now get the "Real-Time Protection layers turned off" notification whenever I start/restart my computer. In prior Malwarebytes versions, there was an option under Advanced, where you could turn off a protection module at start which would suppress such notifications. I think the design philosophy was to notify users if users accidentally or some third party program turned off a realtime protection module leaving users exposed. However it is unnecessary and inconvenient having to click off the notification every time if the users purposely and knowingly turned off the protection module for whatever reason. I don't use Webfilter b/c I use my own solutions for that type of thing and the notifications becomes a nuisance day in and day out. I can see other configurations where this can become an issue. For example if someone prefers EMET and turns off the anti exploit module. Thanks for the new update, other then the issue above, I really like it so far.
  7. Working here again too. Just a quick question though. When you put out the stable version, do we have to manually download that and reinstall or will this specific test build automatically update itself? Just need to know, I will keep subscribed to this thread if I have to eventually download the stable version, if it automatically updates itself to a stable version then I can de subscribe to this thread. Thanks for the quick response.
  8. Didn't work for me Lando unfortunately. Here is what happens to me C:\Windows\system32>cd c:\program files (x86)\malwarebytes anti-exploit\ c:\Program Files (x86)\Malwarebytes Anti-Exploit>mbae-svc -install CmdDelService(881): Malwarebytes Anti-Exploit Service deleted. ........CmdInstallService(772): Malwarebytes Anti-Exploit Service failed to start.
  9. I have a similar/same? issue with the AU update and MBAE. The process shows up in the task manager, then it there an error saying that MBAE didn't start or something of that nature. I also did a clean install of AU.
  10. I think Malwarebytes needs a hands free autoupdate mechanism when new versions come out. Right now it, Malwarebytes just has a notification and then requires users to manually update the program when new versions comes. There is some problems with this approach 1) non technical users have a high likehood of ignoring the prompt 2) limited account users unable to update 3) needless fragmentation of malwarebytes I believe all the major AV companies and any security sensitive software including browsers, Adobe products like Reader and flash, and so have pretty robust automechanism in place drastically reduce the problems I stated. I really see no potential pitfall assuming Malwarebytes creates an option to turn off the autoupdate mechanism if they don't want it. On a personal level, I worry about my parents and relative computers with malwarebytes pro licenses on them. I know that a few will probably ignore the prompt, and then probably either call me or mess with the recommended malwarebytes settings to turn off the notification and be less secure.
  11. I am confirming this also on Windows 64 bit, in Japanese Unicode. Turning off the Heuristics engine solved the problem.
  12. Status: resolved Admin can you remove this post. Malwarebytes is now working perfectly with the latest definitions 4397.
  13. Thanks nokno, I did as you asked. Hopefully I will get a reply soon.
  14. Note: I originally posted this PC help section, and was redirected here with instructions to attach diagnostic logs with this post. Here is the original post detailing the problem. "Hi, I been trying to run a quick scan with malwarebytes, however no matter what I do it becomes stuck on "C:\Windows\system32\pndx5016.dll" This started to happen only recently. A week ago I was able to run the quick scan and complete it. So I am not sure whats going on. I am running Windows 7 64 bit, and the only other anti malware program I use that is running in realtime is Avira, which i turned off to troubleshoot, but it does not make a difference. Note: I also according to instructions I can't seem to find "pndx5016.dll" via windows explorer. Maybe that's why it stuck b/c it not there? " So the main problem is Malwarebyte inablity to finish its scan being stuck at "C:\Windows\system32\pndx5016.dll" . The computer itself does not show any sign of any infection. In the attachment are several diagnostic logs that I was instructed to attach to this post. Thanks for volunteering your time and ope to hear from you soon ark.txt Attach.txt DDS.txt hijackthis.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.