Jump to content

Search the Community

Showing results for tags 'pup.optional.ask'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 2 results

  1. What is Search Extension by Ask?The Malwarebytes research team has determined that Search Extension by Ask is a search hijacker. These so-called "hijackers" manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice.How do I know if my computer is affected by Search Extension by Ask?You may see this entry in your list of installed Chrome extensions:and these warnings during install:You will see this icon in your Chrome menu-bar:and this changed setting:How did Search Extension by Ask get on my computer?Browser hijackers use different methods for distributing themselves. This particular one was downloaded from the webstore:after a redirect from their website:These redirect sites are presented to users who have just installed a newtab hijacker from the same family (Myway, Mindspark).How do I remove Search Extension by Ask?Our program Malwarebytes can detect and remove this potentially unwanted program. Please download Malwarebytes for Windows to your desktop. Double-click MBSetup.exe and follow the prompts to install the program. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen. Click on the Get started button. Click Scan to start a Threat Scan. When the scan is finished click Quarantine to remove the found threats. Reboot the system if prompted to complete the removal process. Is there anything else I need to do to get rid of Search Extension by Ask? No, Malwarebytes removes Search Extension by Ask completely. How would the full version of Malwarebytes help protect me?We hope our application and this guide have helped you eradicate this hijacker.As you can see below Malwarebytes Browser Guard, and the full version of Malwarebytes would have protected you against the Search Extension by Ask hijacker. It would have blocked the initial website, giving you a chance to stop the infection chain before it became too late. Technical details for expertsPossible signs in FRST logs: CHR DefaultSearchURL: Default -> hxxps://search.tb.ask.com/search/GGmain.jhtml?searchfor={searchTerms}&enableSearch=true&rdrct=no&redirect=CPC CHR DefaultSearchKeyword: Default -> askweb CHR DefaultSuggestURL: Default -> hxxps://ss.search.ask.com/ss?li=ff&sstype=prefix&limit=10&hl=en&q={searchTerms}&enableSearch=true&rdrct=no CHR Extension: (Ask Web Search) - C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed [2019-11-27] Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0 Adds the file manifest.json"="11/27/2019 9:12 AM, 2298 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_metadata Adds the file computed_hashes.json"="11/27/2019 9:12 AM, 3268 bytes, A Adds the file verified_contents.json"="1/1/1980 12:00 AM, 5645 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\config Adds the file config.json"="1/1/1980 12:00 AM, 2100 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons Adds the file icon128.png"="11/27/2019 9:12 AM, 5242 bytes, A Adds the file icon16.png"="1/1/1980 12:00 AM, 1559 bytes, A Adds the file icon19disabled.png"="1/1/1980 12:00 AM, 1617 bytes, A Adds the file icon19on.png"="11/27/2019 9:12 AM, 700 bytes, A Adds the file icon48.png"="11/27/2019 9:12 AM, 1913 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js Adds the file ajax.js"="1/1/1980 12:00 AM, 2218 bytes, A Adds the file background.js"="1/1/1980 12:00 AM, 19772 bytes, A Adds the file chrome.js"="1/1/1980 12:00 AM, 146 bytes, A Adds the file content_script.js"="1/1/1980 12:00 AM, 2186 bytes, A Adds the file dlp.js"="1/1/1980 12:00 AM, 5659 bytes, A Adds the file dlpHelper.js"="1/1/1980 12:00 AM, 1799 bytes, A Adds the file extensionDetect.js"="1/1/1980 12:00 AM, 4299 bytes, A Adds the file index.js"="1/1/1980 12:00 AM, 49 bytes, A Adds the file internationalSearchUtils.js"="1/1/1980 12:00 AM, 4635 bytes, A Adds the file logger.js"="1/1/1980 12:00 AM, 532 bytes, A Adds the file settingsOverridesUtils.js"="1/1/1980 12:00 AM, 3823 bytes, A Adds the file splashPageLocalStorageSetter.js"="1/1/1980 12:00 AM, 239 bytes, A Adds the file storageUtils.js"="1/1/1980 12:00 AM, 2026 bytes, A Adds the file templateParser.js"="1/1/1980 12:00 AM, 3038 bytes, A Adds the file ul.js"="1/1/1980 12:00 AM, 3386 bytes, A Adds the file urlUtils.js"="1/1/1980 12:00 AM, 8289 bytes, A Adds the file util.js"="1/1/1980 12:00 AM, 3808 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\libs Adds the file PartnerId.js"="1/1/1980 12:00 AM, 22130 bytes, A Adds the folder C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed Adds the file 000003.log"="11/27/2019 9:12 AM, 1585 bytes, A Adds the file CURRENT"="11/27/2019 9:12 AM, 16 bytes, A Adds the file LOCK"="11/27/2019 9:12 AM, 0 bytes, A Adds the file LOG"="11/27/2019 9:12 AM, 185 bytes, A Adds the file MANIFEST-000001"="11/27/2019 9:12 AM, 41 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings] "eocnnoackodjagdbaoddhjbkpjabimed"="REG_SZ", "82F192AC54DBC29CA2F90B51C9115DAB0E220BF6FB5546A928C383E1CE333D14" Malwarebytes log: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 11/27/19 Scan Time: 9:30 AM Log File: 38e9dbd8-10f0-11ea-a679-00ffdcc6fdfc.json -Software Information- Version: 4.0.4.49 Components Version: 1.0.718 Update Package Version: 1.0.15464 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 233812 Threats Detected: 68 Threats Quarantined: 68 Time Elapsed: 4 min, 43 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 1 PUP.Optional.ASK, HKCU\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|eocnnoackodjagdbaoddhjbkpjabimed, Quarantined, 2, 761985, , , , Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 21 PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\es_419, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\pt_br, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\pt_pt, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ar, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\de, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\en, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\es, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\fr, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\it, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ja, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ko, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\nl, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_metadata, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\config, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\libs, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\EXTENSIONS\eocnnoackodjagdbaoddhjbkpjabimed, Quarantined, 2, 761985, 1.0.15464, , ame, File: 46 PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\config\config.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons\icon128.png, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons\icon16.png, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons\icon19disabled.png, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons\icon19on.png, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\icons\icon48.png, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\ajax.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\background.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\chrome.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\content_script.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\dlp.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\dlpHelper.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\extensionDetect.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\index.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\internationalSearchUtils.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\logger.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\settingsOverridesUtils.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\splashPageLocalStorageSetter.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\storageUtils.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\templateParser.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\ul.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\urlUtils.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\js\util.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\libs\PartnerId.js, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ar\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\de\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\en\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\es\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\es_419\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\fr\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\it\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ja\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\ko\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\nl\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\pt_br\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_locales\pt_pt\messages.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_metadata\computed_hashes.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\_metadata\verified_contents.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Extensions\eocnnoackodjagdbaoddhjbkpjabimed\50.166.16.29426_0\manifest.json, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed\000003.log, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed\CURRENT, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed\LOCK, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed\LOG, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\Users\{username}\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\eocnnoackodjagdbaoddhjbkpjabimed\MANIFEST-000001, Quarantined, 2, 761985, , , , PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 2, 761985, , , , PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, 2, 761985, , , , Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat.We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.
  2. What is DriverHive?The Malwarebytes research team has determined that DriverHive is a "driver updater". These so-called "system optimizers" use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems.More information can be found on our Malwarebytes Labs blog.This installer for this particular one also is a bundler:How do I know if I am infected with DriverHive?This is how the main screen of the system optimizer looks:You will find these icons in your taskbar, your startmenu, and on your desktop:and see these warnings during install:and these screens during "operations":You may see this entry in your list of installed programs:How did DriverHive get on my computer?These so-called system optimizers use different methods of getting installed. This particular one was downloaded from their website:How do I remove DriverHive?Our program Malwarebytes can detect and remove this potentially unwanted application. Please download Malwarebytes to your desktop. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program. Then click Finish. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure. When the scan is complete, make sure that all Threats are selected, and click Remove Selected. Restart your computer when prompted to do so. Is there anything else I need to do to get rid of DriverHive? No, Malwarebytes removes DriverHive completely. How would the full version of Malwarebytes help protect me?We hope our application and this guide have helped you eradicate this system optimizer.As you can see below the full version of Malwarebytes would have protected you against the DriverHive installer. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late. Technical details for expertsYou may see these entries in FRST logs: (Bootstrap Development, LLC.) C:\Program Files (x86)\DriverHive\DriverHive.exe (Bootstrap Development, LLC.) C:\Program Files (x86)\DriverHive\DriverHiveTray.exe HKLM-x32\...\Run: [DriverHiveTray] => C:\Program Files (x86)\DriverHive\DriverHiveTray.exe [2444328 2016-01-17] (Bootstrap Development, LLC.) C:\Users\{username}\AppData\Roaming\BSD C:\ProgramData\BSD C:\Users\{username}\Desktop\DriverHive.lnk C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverHive C:\Program Files (x86)\DriverHive (Bootstrap Development, LLC.) C:\Windows\bsdsetupDH.dll DriverHive (HKLM-x32\...\DriverHive_is1) (Version: - Bootstrap Development, LLC.) Alterations made by the installer: File system details [View: All details] (Selection) --------------------------------------------------- Adds the folder C:\Program Files (x86)\DriverHive Adds the file DPInst32.exe"="1/17/2016 12:31 PM, 545280 bytes, A Adds the file DPInst64.exe"="1/17/2016 12:31 PM, 670720 bytes, A Adds the file DriverHive Help.chm"="1/17/2016 12:30 PM, 53312 bytes, A Adds the file DriverHive.exe"="1/17/2016 12:44 PM, 4710952 bytes, A Adds the file DriverHiveTray.exe"="1/17/2016 12:44 PM, 2444328 bytes, A Adds the file PBLogo.bmp"="1/17/2016 12:31 PM, 19542 bytes, A Adds the file unins000.dat"="1/28/2019 8:43 AM, 60470 bytes, A Adds the file unins000.exe"="1/28/2019 8:42 AM, 736090 bytes, A Adds the file UninstallTrial.bmp"="1/17/2016 12:31 PM, 52190 bytes, A Adds the file ZipDll.dll"="1/17/2016 12:33 PM, 134144 bytes, A Adds the folder C:\ProgramData\BSD\DriverHive Adds the file history2.dat"="1/28/2019 8:44 AM, 63 bytes, A Adds the file scandet2.dat"="1/28/2019 8:44 AM, 53027 bytes, A Adds the file scansummary2.dat"="1/28/2019 8:44 AM, 208 bytes, A Adds the folder C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverHive Adds the file DriverHive.lnk"="1/28/2019 8:43 AM, 981 bytes, A Adds the file Help for DriverHive.lnk"="1/28/2019 8:43 AM, 1006 bytes, A Adds the file Uninstall DriverHive.lnk"="1/28/2019 8:43 AM, 971 bytes, A Adds the folder C:\Users\{username}\AppData\Roaming\BSD\DriverHive\Logs Adds the file DriverHive.log"="1/28/2019 8:44 AM, 0 bytes, A Adds the file DriverHiveTray.log"="1/28/2019 8:44 AM, 0 bytes, A In the existing folder C:\Users\{username}\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch Adds the file DriverHive.lnk"="1/28/2019 8:43 AM, 987 bytes, A In the existing folder C:\Users\{username}\Desktop Adds the file DriverHive.lnk"="1/28/2019 8:43 AM, 963 bytes, A In the existing folder C:\Windows Adds the file bsdsetupDH.dll"="1/17/2016 12:42 PM, 1646592 bytes, A Alters the file win.ini 7/14/2009 7:09 AM, 403 bytes, A ==> 1/28/2019 8:44 AM, 486 bytes, A Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\BSD\DriverHive] "AffParam"="REG_SZ", "BSD" "CCParam"="REG_SZ", "" "CheckForUpdates"="REG_DWORD", 1 "DownloadDirectory"="REG_SZ", "C:\Users\{username}\AppData\Local\Temp\" "DriverCls"="REG_SZ", "{59756760-558E-47EB-818B-91C883633BC4}" "DriverIgnoreList"="REG_SZ", "" "DriverUploadList"="REG_SZ", "" "Language"="REG_SZ", "en" "LastDisplay"="REG_BINARY, .... "LastUpdateCheck"="REG_BINARY, .... "LatestVersionOnServerBuild"="REG_DWORD", 0 "LatestVersionOnServerMajor"="REG_DWORD", 0 "LatestVersionOnServerMinor"="REG_DWORD", 0 "LatestVersionOnServerRelease"="REG_DWORD", 0 "NA"="REG_SZ", "C" "NC"="REG_SZ", "A" "NR"="REG_SZ", "C" "NW"="REG_SZ", "A" "ProxyAddress"="REG_SZ", "" "ProxyEnabled"="REG_DWORD", 0 "ProxyPassword"="REG_SZ", "" "ProxyPort"="REG_DWORD", 0 "ProxyUsername"="REG_SZ", "" "Samples"="REG_DWORD", 1 "ScanFrequency"="REG_DWORD", 7 "ShowGUIOnScan"="REG_DWORD", 0 "TTParam"="REG_DWORD", 255 [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\BSD\DriverHive\StorageHistory] [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] "DriverHiveTray"="REG_SZ", "C:\Program Files (x86)\DriverHive\DriverHiveTray.exe" [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DriverHive_is1] "DisplayIcon"="REG_SZ", "C:\Program Files (x86)\DriverHive\DriverHive.exe" "DisplayName"="REG_SZ", "DriverHive" "HelpLink"="REG_SZ", "http://www.bootstrapdevelopment.com" "Inno Setup: App Path"="REG_SZ", "C:\Program Files (x86)\DriverHive" "Inno Setup: Deselected Tasks"="REG_SZ", "" "Inno Setup: Icon Group"="REG_SZ", "DriverHive" "Inno Setup: Selected Tasks"="REG_SZ", "desktopicon,quicklaunchicon" "Inno Setup: Setup Version"="REG_SZ", "5.3.5 (a)" "Inno Setup: User"="REG_SZ", "{username}" "InstallDate"="REG_SZ", "20190128" "InstallLocation"="REG_SZ", "C:\Program Files (x86)\DriverHive\" "NoModify"="REG_DWORD", 1 "NoRepair"="REG_DWORD", 1 "Publisher"="REG_SZ", "Bootstrap Development, LLC." "QuietUninstallString"="REG_SZ", ""C:\Program Files (x86)\DriverHive\unins000.exe" /SILENT" "UninstallString"="REG_SZ", ""C:\Program Files (x86)\DriverHive\unins000.exe"" "URLInfoAbout"="REG_SZ", "http://www.bootstrapdevelopment.com" "URLUpdateInfo"="REG_SZ", "http://www.bootstrapdevelopment.com" [HKEY_CURRENT_USER\Software\Ask.com.tmp\General] "apn_dbr"="REG_SZ", "ff_64.0" "cbid"="REG_SZ", "^XT" "client"="REG_SZ", "ic" "clientv"="REG_SZ", "9.9.9.9" "cr"="REG_SZ", "1" "cr-homepageurl"="REG_SZ", "http://www.search.ask.com/?l=dis&o=16522cr" "crif"="REG_SZ", "1" "cr-o"="REG_SZ", "10148cr" "crumb"="REG_SZ", "2019.01.28+02.42.09-dubprdapntlfe9-NL-QW1zdGVyZGFtLE5ldGhlcmxhbmRz" "crx-path"="REG_SZ", "http://apnmedia.ask.com/media/toolbar/supertoolbar/chrome/BSP/1.15.25.0/aaaapoehmlbjgmbfaelmebaigekhbioa_7.15.25.0.crx" "dbr"="REG_SZ", "2" "dot"="REG_SZ", "6" "dt"="REG_SZ", "156" "dtid"="REG_SZ", "^YYYYYY^YY^NL" "eichk"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^XT^YYYYYY^YY^NL&encb={incbid}&chk={ic_chk}&ts={random}&guid={guid}&dt={dt}&wft={wft}&inst={inst}&tb={tb}&hos={hos}&harch={harch}&hloc={hloc}&iv={iv}&fv={fv}&dbr={dbr}&vb={vb}&msi={msi}&dot={dot}" "einst"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=einst&p2=^XT^YYYYYY^YY^NL&stb={wr_tbr}&ssa={wr_sa}&shpr={wr_hpr}&res={ci_res}&erc={ci_erc}&itime={itime}&hos={hos}&harch={harch}&hloc={hloc}&iv={iv}&fv={fv}&dbr={dbr}&vb={vb}&msi={msi}&ts={random}&guid={guid}&wft={wft}&dot={dot}&inst={inst}&tb={tb}&dt={dt}&erd={erd}" "ewrap"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=ewrap&p2=^XT^YYYYYY^YY^NL&stb={wr_tbr}&ssa={wr_sa}&shpr={wr_hpr}&param={param}&ts={random}&guid={guid}&dt={dt}&inst={inst}&tb={tb}&hos={hos}&harch={harch}&hloc={hloc}&iv={iv}&fv={fv}&dbr={dbr}&vb={vb}&msi={msi}&wft={wft}&dot={dot}&erd={erd}" "fflu"="REG_SZ", "-2" "ff-max-version"="REG_SZ", "13.*" "fv"="REG_SZ", "64.0 (x86 en-GB)" "guid"="REG_SZ", "b0bd4e99-9ba8-46a3-94cb-5f350b47f718" "harch"="REG_SZ", "64" "hloc"="REG_SZ", "en-US" "homepageurl"="REG_SZ", "http://www.search.ask.com/?l=dis&o=16522" "hos"="REG_SZ", "6.1.1.sp1.x64" "iedis"="REG_SZ", "1" "ielu"="REG_SZ", "-2" "iev"="REG_SZ", "9.11.9600.19236" "inst"="REG_SZ", "200" "iv"="REG_SZ", "9.11.9600.19236" "l"="REG_SZ", "dis" "locale"="REG_SZ", "en_NL" "location"="REG_SZ", "Amsterdam,Netherlands" "make-offer"="REG_SZ", "1" "nthp"="REG_SZ", "0" "o"="REG_SZ", "10148" "oi"="REG_SZ", "nop" "qsrc"="REG_SZ", "2871" "repurl"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^XT^YYYYYY^YY^NL&encb={incbid}&chk={ic_chk}&ts={random}&guid=" "saguid"="REG_SZ", "5e4265a0-9d62-488b-9284-1162176cc6f8" "same-partner"="REG_SZ", "0" "slwo"="REG_SZ", "0" "tb"="REG_SZ", "BSP" "tb-installer-path"="REG_SZ", "http://apnmedia.ask.com/media/toolbar/supertoolbar/profile-ask/EverestWrapper.exe" "tb-version"="REG_SZ", "5.15.25.0" "to"="REG_SZ", "" "wft"="REG_SZ", "remote" [HKEY_CURRENT_USER\Software\Ask.com.tmp\Installer] "cr-homepageurl"="REG_SZ", "http://www.search.ask.com/?l=dis&o=16522cr" "crif"="REG_SZ", "1" "eichk"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^XT^YYYYYY^YY^NL&encb={incbid}&chk={ic_chk}&ts={random}&guid={guid}&dt={dt}&wft={wft}&inst={inst}&tb={tb}&hos={hos}&harch={harch}&hloc={hloc}&iv={iv}&fv={fv}&dbr={dbr}&vb={vb}&msi={msi}&dot={dot}" "ff-max-version"="REG_SZ", "13.*" "guid"="REG_SZ", "b0bd4e99-9ba8-46a3-94cb-5f350b47f718" "homepageurl"="REG_SZ", "http://www.search.ask.com/?l=dis&o=16522" "make-offer"="REG_SZ", "1" "nthp"="REG_SZ", "0" "oi"="REG_SZ", "nop" "repurl"="REG_SZ", "http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&p2=^XT^YYYYYY^YY^NL&encb={incbid}&chk={ic_chk}&ts={random}&guid=" [HKEY_CURRENT_USER\Software\Ask.com.tmp\Macro] "cbid"="REG_SZ", "^XT" "cr-o"="REG_SZ", "10148cr" "crumb"="REG_SZ", "2019.01.28+02.42.09-dubprdapntlfe9-NL-QW1zdGVyZGFtLE5ldGhlcmxhbmRz" "dtid"="REG_SZ", "^YYYYYY^YY^NL" "l"="REG_SZ", "dis" "locale"="REG_SZ", "en_NL" "location"="REG_SZ", "Amsterdam,Netherlands" "o"="REG_SZ", "10148" "qsrc"="REG_SZ", "2871" "slwo"="REG_SZ", "0" "to"="REG_SZ", "" [HKEY_CURRENT_USER\Software\BSD\DriverHive] "MainFormHeight"="REG_DWORD", 750 "MainFormLeft"="REG_DWORD", -1 "MainFormMonitor"="REG_DWORD", 0 "MainFormState"="REG_DWORD", 0 "MainFormTop"="REG_DWORD", -1 "MainFormWidth"="REG_DWORD", 915 "ShowWelcome"="REG_DWORD", 1 [HKEY_CURRENT_USER\Software\BSD\PCZ] Malwarebytes log: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 1/28/19 Scan Time: 8:50 AM Log File: 64bfdcb6-22d1-11e9-a7b0-00ffdcc6fdfc.json -Software Information- Version: 3.6.1.2711 Components Version: 1.0.482 Update Package Version: 1.0.8990 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 235667 Threats Detected: 34 Threats Quarantined: 34 Time Elapsed: 3 min, 17 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 2 PUP.Optional.DriverHive, C:\PROGRAM FILES (X86)\DRIVERHIVE\DRIVERHIVETRAY.EXE, Quarantined, [2912], [542206],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DriverHive.exe, Quarantined, [2912], [542200],1.0.8990 Module: 2 PUP.Optional.DriverHive, C:\PROGRAM FILES (X86)\DRIVERHIVE\DRIVERHIVETRAY.EXE, Quarantined, [2912], [542206],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DriverHive.exe, Quarantined, [2912], [542200],1.0.8990 Registry Key: 2 PUP.Optional.DriverHive, HKLM\SOFTWARE\WOW6432NODE\BSD\DriverHive, Quarantined, [2912], [542205],1.0.8990 PUP.Optional.DriverHive, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\DriverHive_is1, Quarantined, [2912], [542207],1.0.8990 Registry Value: 1 PUP.Optional.DriverHive, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|DRIVERHIVETRAY, Quarantined, [2912], [542206],1.0.8990 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 6 PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\TEMP\APNLOGS, Quarantined, [2], [184754],1.0.8990 PUP.Optional.ASK.Gen, C:\USERS\{username}\APPDATA\LOCAL\TEMP\APN-STUB, Quarantined, [3598], [181296],1.0.8990 PUP.Optional.DriverHive, C:\Users\{username}\AppData\Roaming\BSD\DriverHive\Logs, Quarantined, [2912], [542201],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\APPDATA\ROAMING\BSD\DRIVERHIVE, Quarantined, [2912], [542201],1.0.8990 PUP.Optional.DriverHive, C:\PROGRAM FILES (X86)\DRIVERHIVE, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\PROGRAMDATA\MICROSOFT\WINDOWS\START MENU\PROGRAMS\DRIVERHIVE, Quarantined, [2912], [542202],1.0.8990 File: 21 PUP.Optional.ASK, C:\USERS\{username}\APPDATA\LOCAL\TEMP\APNLOGS\ic.log, Quarantined, [2], [184754],1.0.8990 PUP.Optional.ASK.Gen, C:\Users\{username}\AppData\Local\Temp\APN-Stub\Stb69d0002f-688a-42c9-9ef4-d8530ff9ec01.log, Quarantined, [3598], [181296],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\APPDATA\ROAMING\BSD\DRIVERHIVE\LOGS\DriverHive.log, Quarantined, [2912], [542201],1.0.8990 PUP.Optional.DriverHive, C:\Users\{username}\AppData\Roaming\BSD\DriverHive\Logs\DriverHiveTray.log, Quarantined, [2912], [542201],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\DESKTOP\DRIVERHIVE.LNK, Quarantined, [2912], [542204],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\APPDATA\ROAMING\MICROSOFT\INTERNET EXPLORER\QUICK LAUNCH\DRIVERHIVE.LNK, Quarantined, [2912], [542203],1.0.8990 PUP.Optional.DriverHive, C:\PROGRAM FILES (X86)\DRIVERHIVE\DRIVERHIVETRAY.EXE, Quarantined, [2912], [542206],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DPInst32.exe, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DPInst64.exe, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DriverHive Help.chm, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\DriverHive.exe, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\PBLogo.bmp, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\unins000.dat, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\unins000.exe, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\UninstallTrial.bmp, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\Program Files (x86)\DriverHive\ZipDll.dll, Quarantined, [2912], [542200],1.0.8990 PUP.Optional.DriverHive, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverHive\DriverHive.lnk, Quarantined, [2912], [542202],1.0.8990 PUP.Optional.DriverHive, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverHive\Help for DriverHive.lnk, Quarantined, [2912], [542202],1.0.8990 PUP.Optional.DriverHive, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DriverHive\Uninstall DriverHive.lnk, Quarantined, [2912], [542202],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\DESKTOP\DRIVERHIVETRIALSETUP.EXE, Quarantined, [2912], [542209],1.0.8990 PUP.Optional.DriverHive, C:\USERS\{username}\DOWNLOADS\DRIVERHIVETRIALSETUP.EXE, Quarantined, [2912], [542209],1.0.8990 Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end) As mentioned before the full version of Malwarebytes could have protected your computer against this threat.We use different ways of protecting your computer(s): Dynamically Blocks Malware Sites & Servers Malware Execution Prevention Save yourself the hassle and get protected.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.