Jump to content

Recommended Posts

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes 3 Help forum.

 

If you are having technical issues with our Windows product, please do the following: 

Spoiler

If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply:

NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  1. Download Malwarebytes Support Tool
  2. Once the file is downloaded, open your Downloads folder/location of the downloaded file
  3. Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  4. Place a checkmark next to Accept License Agreement and click Next
  5. You will be presented with a page stating, "Get Started!"
  6. Click the Advanced tab on the left column
    0. UI.png
  7. Click the Gather Logs button
    17. Advanced.png
  8. A progress bar will appear and the program will proceed with getting logs from your computer
    19. System Repair Progress.png
  9. Upon completion, click a file named mbst-grab-results.zip will be saved to your Desktop. Click OK
  10. Please attach the file in your next reply. Before submitting your reply, be sure to enable "Notify me of replies" like so:
     notify me.jpeg  

Click "Reveal Hidden Contents" below for details on how to attach a file:
 

Spoiler

To save attachments, please click the link as shown below. You can click and drag the files to this bar or you can click the choose files, then browse to where your files are located, select them and click the Open button.

mb_attach.jpg.220985d559e943927cbe3c078b
 

One of our experts will be able to assist you shortly.

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/community/consumer/pages/contact-us to get help

If you need help looking up your license details, please head here: https://support.malwarebytes.com/docs/DOC-1264 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

 

Link to post
Share on other sites

Hello John.

Explorer.exe is an integral part of every Windows operating system.   Explorer is not the web browser, if that is what you think.

What is it that you are seeking to protect or do and why.  +  what is the version of Windows.

 

Link to post
Share on other sites

Just to add to the comments from Maurice above; the list of shielded applications for the Exploit Protection component in Malwarebytes are focused on the most frequently targeted applications by exploits for attack, especially those that are at the greatest risk due to being web-facing or where they are known to be exploited by Trojanized documents and media files including web browsers, media players, document viewing/editing applications and the like.  The OS shell itself (explorer.exe) and other critical/core OS components are actively shielded and hardened by Exploit Protection (as well as by technologies built into the operating system such as DEP and some hardware features if your CPU supports them) however those shields/protections work differently than the shielding provided through the DLL injection performed on the applications listed in the default list of shielded applications for Exploit Protection.

With that said, if you do use any browsers or other applications that regularly pull web based content (like sidebar/desktop gadgets for example) that aren't listed in the default list of shielded applications, you can add them to the list and use the appropriate profile for them; for example, for a media playback program use the Media Players profile and for a web browser use the Web Browsers profile or Chrome-based Browsers profile depending on whether the browser is based on Chromium, and likewise for a document/office type application use the MS Office or PDF Readers profile as appropriate depending on the type of application/documents etc. used by the application.

I hope this helps a bit to clarify things.

Link to post
Share on other sites
On 8/4/2019 at 10:10 PM, exile360 said:

Just to add to the comments from Maurice above; the list of shielded applications for the Exploit Protection component in Malwarebytes are focused on the most frequently targeted applications by exploits for attack, especially those that are at the greatest risk due to being web-facing or where they are known to be exploited by Trojanized documents and media files including web browsers, media players, document viewing/editing applications and the like.  The OS shell itself (explorer.exe) and other critical/core OS components are actively shielded and hardened by Exploit Protection (as well as by technologies built into the operating system such as DEP and some hardware features if your CPU supports them) however those shields/protections work differently than the shielding provided through the DLL injection performed on the applications listed in the default list of shielded applications for Exploit Protection.

With that said, if you do use any browsers or other applications that regularly pull web based content (like sidebar/desktop gadgets for example) that aren't listed in the default list of shielded applications, you can add them to the list and use the appropriate profile for them; for example, for a media playback program use the Media Players profile and for a web browser use the Web Browsers profile or Chrome-based Browsers profile depending on whether the browser is based on Chromium, and likewise for a document/office type application use the MS Office or PDF Readers profile as appropriate depending on the type of application/documents etc. used by the application.

I hope this helps a bit to clarify things.

Thanks, Exile360. Excellent explanation; much appreciated!! -J

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.