Jump to content

Recommended Posts

Hello @samherman and :welcome:

Thank you for reporting the system's service connect issue.  The Malwarebytes' developers/staffers/helpers must have good data for a quality fault analysis.  Use the following Malwarebytes data gathering support tool, on the system in question, restarted in the Windows NORMAL boot mode and logged in as an Administrator:

  1. Download the trusted, Malwarebytes authored arwlogs.exe utility/tool and save only to a system Administrator's desktop of the system in question.
  2. arwlogs.exe is an information gathering tool that neither installs nor does it make system/registry hive changes.
  3. Single right-click the j1Bynr2.png&key=c55e643d4ec26aa771880d2d  arwlogs.exe icon and select RunAsAdmin.jpg  Run as administrator from the Windows context menu.
  4. If a Windows User Account Control (UAC) alert/prompt for arwlogs.exe appears, select the "Yes" button to continue.
  5. If a Windows SmartScreen warning alert/prompt for arwlogs.exe appears, select "More info" then select the "Run anyway" button to continue.
  6. A Command window will appear and its contents may be mostly ignored.
  7. When "Press any key to continue . . . " appears at the bottom of the Command window, type an Enter key to close the window.
  8. A zipped archive (yyyy-mm-dd-{COMPUTERNAME}.zip) should have been generated to the system Administrator's desktop.
  9. Delete arwlogs.exe from the Administrator desktop.
  10. Attach the above-zipped archive to your next reply in this topic.

Although more data may be required, after the requested data is posted, the Malwarebytes' team can commence their analysis.  Thank you always for your assistance.

Link to post
Share on other sites

Hello @samherman:

It appears as if MBARW BETA8 was installed/reinstalled a few days ago.  The data produced by the Farbar Recovery Scan Tool (FRST64) logs may be of further troubleshooting assistance.

  1. Please download FRST64.exe to an Administrator's desktop only.
  2. Single right-click the FRST.gif icon and select RunAsAdmin.jpg Run as administrator to start the tool in the passive reporting mode.
  3. If a Windows User Account Control (UAC) alert/prompt window for FRST64.exe appears, select the "Yes" button to continue.
  4. If a Windows SmartScreen warning alert/prompt window for FRST64.exe appears, select "More info" then select the "Run anyway" button to continue.
  5. When the FRST's (x64) GUI opens, left-click "Yes" button in the Disclaimer of warranty window.
  6. Please do not uncheck any Whitelist boxes.  Ensure that only the Optional Scan's Addition.txt box is checked.
  7. Select the "Scan" button and wait until the tool has run to completion.  (About 3-5 minutes or less.)
  8. The FRST64 tool should have written two log files to the Administrator's desktop (FRST.txt and Addition.txt) and will also open them with the system's default text editor.
  9. Close the two FRST text report windows and the FRST (x64) GUI window.
  10. Only attach the two (2) separate text (.txt) files to your next reply to this topic.

Thank you for your help.

Link to post
Share on other sites

Hello @samherman:

Please uninstall Malwarebytes Anti-Ransomware (MBARW) as well as Malwarebytes Anti-Exploit (MBAE) from the system in question.  With the release of Malwarebytes 3 (MB3), MBARW was rolled into MB3 as its ARW module.  Also, MBAE was rolled into MB3 as its AE module.  The separate and additional installations of MBARW and MBAE are not compatible with MB3's normal operation.

Thank you.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.