Search the Community
Showing results for tags 'ruby'.
Malwarebytes 3 is flagging Ruby as ransomware, removing the executable, and as I'm just discovering there is nowhere to recover a file that has been deleted when detected as ransomware. Its pretty annoying because I would like to keep my ransomware protection enabled. Are there any plans to allow exceptions to be added for these ransomware detections since false positives are in the wild - The same way regular detections can be excluded? Or is https://rubyinstaller.org/downloads/ spreading ransomware? BTW its the top link that was tested. Ruby 2.4.2-2 (x64)
Greetings everyone, First off let me say I am proud to be a long term user of MBAM Pro and I highly endorse, to all my colleagues, the fantastic product that the team at Malwarebytes offers to protect my PC. Secondly, apologies if this is not the correct place to post this, as this is the first time I have had to post an issue. With that out of the way, time to get down to the issue at hand: I recently purchased an annual license for Private Internet Access (PIA), a VPN service to resolve my ISPs monkey business with YouTube, twitch, and the internet in general. So far everything is fine and I have noticed a MASSIVE boost in network consistency and bandwidth with a minor sacrifice in ping times. However, I also noticed MBAM Pro consistently attempts to IP-Block "Rubyw.exe" which is the runtime environment PIA uses for connectivity and management purposes. While it hasn't hindered VPN performance as far as I know (and tends to happen whenever I turn it off), it is quite annoying. Whitelisting the process does not resolve the issue either since they are all randomized and dynamically connect to random ports. Why overall question: is there a solution to this or am I stuck with the excessive IP-Blocks? Below I have enclosed my log, though it continually updates over time.