Jump to content

atube catcher PUP warning


Recommended Posts

I get a PUP warning when I try to install aTube Catcher. Other messages I've read are inconclusive on whether it's a false positive. Any new info? If I want to install anyway how do I get Malwarebytes from blocking installation?

Seems like a legit company with millions of installations. 

https://www.atube.me

 

Edited by AdvancedSetup
Removed live hyperlink
Link to post
Share on other sites

  • Staff

***This is an automated reply***

Hi,

Thanks for posting in the Malwarebytes 3 Help forum.

 

If you are having technical issues with our Windows product, please do the following: 

Spoiler

If you haven’t already done so, please run the Malwarebytes Support Tool and then attach the logs in your next reply:

NOTE: The tools and the information obtained is safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  1. Download Malwarebytes Support Tool
  2. Once the file is downloaded, open your Downloads folder/location of the downloaded file
  3. Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  4. Place a checkmark next to Accept License Agreement and click Next
  5. You will be presented with a page stating, "Get Started!"
  6. Click the Advanced tab on the left column
    0. UI.png
  7. Click the Gather Logs button
    17. Advanced.png
  8. A progress bar will appear and the program will proceed with getting logs from your computer
    19. System Repair Progress.png
  9. Upon completion, click a file named mbst-grab-results.zip will be saved to your Desktop. Click OK
  10. Please attach the file in your next reply. Before submitting your reply, be sure to enable "Notify me of replies" like so:
     notify me.jpeg  

Click "Reveal Hidden Contents" below for details on how to attach a file:
 

Spoiler

To save attachments, please click the link as shown below. You can click and drag the files to this bar or you can click the choose files, then browse to where your files are located, select them and click the Open button.

mb_attach.jpg.220985d559e943927cbe3c078b
 

One of our experts will be able to assist you shortly.

 

If you are having licensing issues, please do the following: 

Spoiler

For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/community/consumer/pages/contact-us to get help

If you need help looking up your license details, please head here: https://support.malwarebytes.com/docs/DOC-1264 

 

Thanks in advance for your patience.

-The Malwarebytes Forum Team

 

Link to post
Share on other sites

Hello @Seog and :welcome:

Looks can be deceiving.  The installer in question is flagged by 33 malware checking engines.

On the same page where a victim is to select the "Add & Start Download" button, you are knowingly agreeing to install a browser stealer which is likely the PUP you are being protected from.

Quote

"By clicking the button below you agree to install Search Manager Firefox add-on and have read the EULA & Privacy Policy"

The average computer security conscious user would immediately reject this.  Say "Thank You" to your Malwarebytes Premium!

Please once again evaluate your decision to override the Malwarebytes warning.

BTW - by not placing the infectious link in a BBS Code box <> , others could fall victim.  Forum management has been requested to neuter that hotlink.

Known safe malware report: https://www.virustotal.com/gui/file/17c89ca02d6ce1574e8f0d03dac34f4c04c34a30916cc536932dc93696633b41/details

HTH

Edited by 1PW
Link to post
Share on other sites

59 minutes ago, 1PW said:

Hello @Seog and :welcome:

Looks can be deceiving.

On the same page where a victim is to select the "Add & Start Download" button, you are knowingly agreeing to install a browser stealer which is likely the PUP you are being protected from.

The average computer security conscious user would immediately reject this.  Say "Thank You" to your protection software...

HTH

Screenshot for an example.

 

2019-08-28_19h19_23.png

Link to post
Share on other sites

Greetings,

If you still wish to install the software you have a couple of options.  First, you can change how PUPs are handled so that rather than blocking and quarantining PUPs that are detected in real-time, you can instead have Malwarebytes prompt you on what to do.  To change this, open Malwarebytes and navigate to Settings>Protection and under the Potential Threat Protection section use the drop-down menu for PUPs to Warn user instead of the default selection which has them treated like actual malware/threats.  This will cause Malwarebytes to display a prompt/notification dialog whenever a PUP is detected in real-time asking you what to do.  You'll have the option to allow the item once (useful for when you are running an installer), ignore always which will add the item to your persistent exclusions (useful for an application that is already installed), or to have the item quarantined (useful for any PUPs that you do not wish to allow onto your system).  This will apply to all items that are detected as PUPs by real-time protection, and for scans it will mean that anything detected as PUP will not have the checkbox next to it selected for removal by default, though it will still show up in the list of detections.  If you select the option for Malwarebytes to ignore all PUP detections then no PUPs will be detected at all by real-time protection or scans, so I would highly recommend selecting the 'Warn user' option if you do decide to change how Malwarebytes treats PUPs system wide.

Another option would be to temporarily disable the Malware Protection component in Malwarebytes when running an installer that Malwarebytes detects as PUP.  To do this, simply right-click on the Malwarebytes tray icon and click on Malware Protection: On and click Yes to the User Account Control prompt.  Once you are done installing the PUP application, I would suggest then performing a Threat scan with Malwarebytes by opening Malwarebytes and clicking on the Scan Now button found on the Dashboard tab, allowing the scan to complete, and as long as the only items detected are components of the PUP application that you installed, click the empty checkbox at the top of the list of detections then click Next, and when prompted on what to do with the remaining detected items select the option to always ignore them and they will be added to your exclusions so that none of those items will be detected in the future by scans or Malware Protection.  Now you may re-enable Malware Protection by again right-clicking on the Malwarebytes tray icon and clicking Malware Protection: Off and it will then re-enable it, or you may use the switch provided for Malware Protection on the Dashboard tab in the main UI.

I hope this helps, and if there is anything else we might assist you with please let us know.

Thanks

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.