Jump to content

Search the Community

Showing results for tags 'java'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes 3 Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 6 results

  1. I'm running Windows Server 2008 with the latest MALWARE BYTES version. I cannot find the way to stop this exploit... Malware.Exploit.Agent.Generic, Java malicious inbound socket detected This continually stops the Ubiquity Controller from functioning correctly. How can I correct this so i cna use MalwareBytes? Right now I have to turn it off for the Controller to work and the latest post that i saw were from 2014. HELP!!
  2. After purchasing Malwarebytes, I noticed my java development environment (playframework) recompile time on code change double from 10s to 20s, despite the dev directory being completely excluded. My morning ritual is now to startup my computer and quit Malwarebytes. This link seems to suggest it is the self-protection module that causes the slowdown. I assume it is the java process that is causing the issue but I don't want to exclude java because I assume java could be unsafe and should be monitored as long as it is not called from my dev directory. (Note that there is another issue here that appears to be a similar issue that support may want to handle at the same time.) How do I have malwarebytes on safely without impact to java compile time under a completely whitelisted directory?
  3. Hi M Community - I put an old desktop I had not used for some time thru a complete scrub. Clean, cept 2 issues which I cannot explain: 1xJava Exploit (2010-0840): Unexpected. Unit had been Java updated regularly. Updated to Version 5.20 (vulnerability patched) back in April 2010. Can java exploits download onto a computer with updated/patched system? Is a java exploit on a patched system harmless? Hitmanpro found inactive remnants of Zeroaccess (registry keys). I once removed a Ukash infection using system restore + AV/MBAM but that was the only active infection I previously found on this computer - nothing else ever found. Why were remnants found of an infection that was never found/removed? HMP responded saying these remnants may have been part of the Ukash but still doesnt explain the remnants... or could the remnants have survived the restore? All input/suggestions welcome...
  4. Malwarebytes flags an exploit event if I try to run/debug a file from the Netbeans IDE that involves spawning the tomcat process. I've flagged all the executables and directories involved under exceptions, and disabled the java protection, yet it still causes an issue. Interestingly, if I kill MB, start the process, then restart MB it's all fine until the next time I restart the IDE - go figure. Any clues on what I can do to prevent this? Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 8/1/17 Protection Event Time: 11:36 AM Log File: Administrator: Yes -Software Information- Version: 3.1.2.1733 Components Version: 1.0.160 Update Package Version: 1.0.2482 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, [0], [392684],0.0.0 -Exploit Data- Affected Application: cmd Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: C:\Windows\system32\cmd.exe cmd \C exit \B 0 URL: (end)
  5. My windows 10 computer was suddenly extremely slow and kept freezing after a few minutes after starting up. I noticed that the disc in the taskmanager was at 100% all the time and that thousands of "Java Web Launcher" were running in the background, multiplying untill they hit 8000 and my pc froze. I ran the java uninstaller tool (java was scaring me) in save mode, since my computer was inoperable but the uninstaller failed. Also, I have already reverted back to the only restoration point I had from two days ago, but this didnt resolve the issue. If anyone can help me I would be so grateful.
  6. MWAB is not honoring whitelisted websites, and continues to block (business critical) java apps from running on those sites. If web protection is completely disabled, sites work fine. Version: 3.0.6.1469 Component Package: 1.0.96 Update Package: 1.0.1666 Windows 10 Enterprise
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.