Malware1
-
Posts
2,836 -
Joined
Content Type
Events
Profiles
Forums
Posts posted by Malware1
-
-
Look at my PM, bdubrow.
-
-
I haven't checked that file, but low detection at VT:
-
I haven't checked that file, but low detection at VT:
-
Yes, IObit was stealing Malwarebytes database definitions to use on their own product, IObit Malware Fighter. The original thread on Malwarebytes explaining this is located here:
I don't know how this resolved, but IObit products are now blacklisted for me and I strongly encourage everyone to uninstall them. Plus, most of their products are "junkware", programs you don't need like driver updaters and PC Boosters. They won't do anything good to your system, just bloat it down at one point, maybe break it.
It was actually IObit Security 360, IObit Malware Fighter never used stolen signatures (but who knows?)
-
d45709c441f48916aa12acd7da0aaeba512a12bb
-
c1e03138891eb2cb3d49ec3bd6e033862827192d
-
-
emmers.ugu.pl 178.33.49.137
-
2rep.free.fr 212.27.63.162
-
fourfaces.republika.pl 77.55.12.181 kf.nazwa.pl 85.128.128.99 nazwa.pl 85.128.128.36
helpdesk.nazwa.pl 85.128.134.76
panel.nazwa.pl 85.128.134.62
-
213.180.150.17:56671
meteo_tarnowiec.republika.pl
-
790bdc310b18efb366f24490afa2e06369cb9b79
-
from a "malware" pack from another site.
-
this looks just like a photo app but detected as trojan.agent, can you recheck it?
-
-
Please remove this post, siketa already reported it here.
-
10c5506337845ed9bf25c73d2506f9c15ab8e608
-
fbc3a5e1c91a263168dcef38cc43a00294f041e1
-
Thanks.
-
e81d5651dfc573ac27113a491bd84874a881e8f8
0b15d24a45762708cd85910be3a31ae3a4c4ecc2 -
909dc6764355625cb9a98ae45f986439cf3142a6
-
bc4146eef418e5c5476919aae606143b522b629e
-
Can you post the file here?
Malwarebytes Anti-Malware 2.2.0 Beta 1 Bug + ! Question
in Malwarebytes Anti-Malware 2.2.0 Beta
Posted
The shortcut changes the location most likely because the installer overwrites it.