Jump to content

EcoGeek

Members
  • Posts

    3
  • Joined

  • Last visited

Reputation

0 Neutral
  1. When you updated your search engine, malwarebytes became a huge hog regarding CPU usuage. I'm really pissed. The previous version of malwarebytes 1.6x was fast in scanning, updating and usage. You guys have to come clean and admit that this latest update with all the various changes to the algorithms and additional modules created in 2.0.2.1012, has significantly impacted resources. I am running the Pro version. Similar to the demise of Spybot going from 1.67 to 2.1, it too became a memory hog with a change in their interface and computer users abandoned it in droves. I hope Malwarebytes does not fall in the same category. No, I do not have malware, spyware, trojans or viruses on any of my computers. It runs this way whether it is on a desktop or on any of my laptops using windows 7 ultimate. Normally running between 35 to 45 present of CPU usuage on 2 and 4 GB computers running Firefox 29 on 32bit and 64bit computers with EMET 4.1 installed. It is has become useless to me to run it so I am asking you if Malwarebyts is aware of this issue and whether they are going to come out with an update. Just google malwarebytes and cpu usage and you will see the issue. To me and other IT experts, Malwarebytes became the gold standard for malware detection software but for usability, It is not worth the impact on resources to keep using it.
  2. MEWQYPZEUQRX.EXE MEWQYPZEUQRX.EXE C:\USERS\HANNSP~1\APPDATA\LOCAL\TEMP\MEWQYPZEUQRX.EXE BLANK BLANK BLANK BLANK SVKMEQV.EXE SVKMEQV.EXE C:\USERS\HANNSP~1\APPDATA\LOCAL\TEMP BLANK BKANK BLANK BLANK TVSGIQTUGSI.EXE TVSGIQTUGSI.EXE C:\USERS\HANNSP~1\APPDATA\LOCAL\TEMP BLANK BLANK BLANK BLANK XHVIIOCAY.EXE XHVIIOCAY.EXE C:\USERS\HANNSP~1\APPDATA\LOCAL\TEMP BLANK BLANK BLANK BLANK YFAGR.EXE YFAGR.EXE C:\USERS\HANNSP~1\APPDATA\LOCAL\TEMP BLANK BLANK BLANK BLANK Or go here for the complete scenario on these malware Complete files
  3. I have the retail purchase version with real time protection. Malwarebytes missed 4 stealth trojans that attacked Microsoft add-ins to windows programs in which the programs, themselves did not require a dll. These scripts embedded themselves as executables in the windows registry, and as part of windows services in services.msc calling up their own dll. Why didn't your program pick up this malware? Are they running beneath your programs at the kernel level?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.