Jump to content

wreckage

Members
  • Posts

    11
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Thank-you, creasman00. You're a gentleman. I do realise that it's annoying for a board's users to post in an inappropriate forum, but I also believe that moderators should have a little more respect and tolerance. It doesn't take much effort to guide a user in a friendly and polite manner to the correct area, or even move the post and leave a note stating "This topic has been moved to....." yada yada. Mr. Lipman and Mr. Shadowwar must have a great time trying to 'out-power-trip' each other. ;-) Toodle-oo!
  2. Well woo-hoo David H. Lipman. No, "Hello...."? No, "thanks for resolving this, we'll take it on board... "? Your mother must be proud of your manners. If being alerted by MBytes of TEXT strings in a *.js file when there is NO malware present isn't a false positive, then I don't know what is. Have a great day! ;-)
  3. Hello, All. I'm a little disappointed that nobody here knew the resolution for this issue. It is as follows:. If Babylon Toolbar is ever accidentally installed and removed either manually or by MalwareBytes, it leaves behind in the nnnnnnnn.default Firefox profile, a file named 'user.js'. Even after all BabylonToolbar entries are removed from Firefox's prefs.js, somehow it is re-populated from user.js which in turn, does NOT EVER have the "BabylonToolbar" entries detected. These are only text entries, by the way, and not malicious in themselves. The Babylon Toolbar itself needs to be installed for the entries to do anything. Deleting the user.js file when FF is closed stops the prefs.js being repopulated, and thus no further detections are made by MBytes. I hope you can now assist others with this issue in the future, and perhaps build something into MBytes to check for this issue. Cheers.
  4. This morning the daily scan results were waiting for me. The same 15 culprits were there; extensions.BabylonToolbar_i.nnnnn, etc. I closed Firefox but by the time I had the Firefox process highlighted in Task Mangler and hit End Process Tree, it had finished its housework and closed. I checked with Process Explorer and FF was closed. Closed all applications then hit Quarantine All and closed MBytes. Rebooted. Ran Threat Scan and nothing found. Opened Firefox and ran Threat Scan - All 15 items are back in Prefs.js. I can only think that I have an old FF Extension folder (that should be deleted) here: \\COMPUTER-NAME\Users\username\AppData\Roaming\Mozilla\Firefox\Profiles\xxxxxxxx.default i'll carefully go through them all and see if I can find the culprit. I'll just delete known extension folders that I no longer use and see where it gets me. Cheers.
  5. Oops.. Looks like you don't allow editing of posts. My attempt at humour backfired. I meant of course to type 'Task Mangler' (for Task Manager). Cheers.
  6. Hello, Fatdcuk. Thank-you for your assistance with this. As stated previously "that closing Firefox, (killing the process), then selecting Quarantine..." has not worked, By the way, CTRL+Shift+Esc is a quicker trigger for Task Manlger. I shall try your suggestion of closing MBytes and rebooting then re-scanning. I'll report back in around 12-14 hours. Thanks again for the suggestion.
  7. I'm sorry to say that closing Firefox, (killing the process), then selecting Quarantine (for each item - one can never be sure that the 'Quarantine All' button does anything because of there being NO confirmation and not even a graphic change to make the button look pressed), out of the three available options (Add Exclusion or Ignore Once) being the other two (where's 'Delete for good'?) still did not work. This morning's scan has again revealed 15 instances of PUP.Optional.Babylon.A. Firefox obviously re-creates the 'Prefs.js' file out of something. From where does it re-create itself? - yes, I have completely deleted it while Firefox is closed - which is a pain in the proverbial as a lot of settings have to be re-configured. Can somebody at Malwarebytes assist me with figuring out what's going on here, please? By the way, I hope the GUI is improved as it looks somewhat amateurish compare tto the previous version.
  8. Of course! Thank-you, Fatdcuk - I should have realised that myself. Sometimes I need others to remind me how silly I can be. :-) Cheers.
  9. Hello there. Every time (daily) Malwarebytes runs it finds entries for Babylon toolbar inside the prefs.js file in my Firefox profile. For the first few times I clicked 'Quarantine all', but the next scan the detections are back. I then tried manually selecting 'quarantine' for each item (about 20) but when the next scan is run, guess what? They're baa-aaack!. I then deleted the prefs.js file from this path: AppData\Roaming\Mozilla\Firefox\Profiles\nnnnnnnnnn\ but, you guessed it. The detections were back in the next scan. I'm really getting tired of this and would love to hear an explanation. Here are some typical entries: PUP.Optional.Babylon.A, C:\Users\username\AppData\Roaming\Mozilla\Firefox\Profiles\r19v7a82.default\prefs.js, Good: (), Bad: (user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon"), Replaced,[da9b53d6403b39fd095d79d1ce36ca36] PUP.Optional.Babylon.A, C:\Users\username\AppData\Roaming\Mozilla\Firefox\Profiles\r19v7a82.default\prefs.js, Good: (), Bad: (user_pref("extensions.BabylonToolbar_i.smplGrp", "none"), Replaced,[1263ec3d92e9bf7767ffa9a1ee16d12f] PUP.Optional.Babylon.A, C:\Users\username\AppData\Roaming\Mozilla\Firefox\Profiles\r19v7a82.default\prefs.js, Good: (), Bad: (user_pref("extensions.BabylonToolbar_i.srcExt", "ss"), Replaced,[175efd2cf289ba7cb5b163e780841ee2] PUP.Optional.Babylon.A, C:\Users\username\AppData\Roaming\Mozilla\Firefox\Profiles\r19v7a82.default\prefs.js, Good: (), Bad: (user_pref("extensions.BabylonToolbar_i.tlbrId", "base"), Complete log attached.MB_Log.txt Thank-you.
  10. Hello there. I must say that from a customer-service point-of-view, your 'suit yourself' attitude is somewhat lacking. I would have expected something along the lines of the below; " I appreciate that the installation of the Pro edition has its faults under some circumstances, but may I direct you to this page of comprehensive advice and instructions that may help you with your problem. Malwarebytes is actively working on improving our installation routine to try to detect and allow for these sorts of issues, and failing that, we will include an advice window in future installation packages warning that you may encounter problems and displaying some help resources that may assist you. Malwarebytes takes the satisfaction of its customers seriously and we apologise for the problems you have with our product. If you still feel you would like a refund, then please open a ticket with our Help Desk and they will be more than happy to oblige..." I guess in the mean-time that it's "...up to me...", and that if I wish a refund then "... I will need to open a ticket on the Help Desk...". Thanks for trying, man. ;-) Cheers.
  11. Hello. I have the same (almost) as this thread which I found via Google: "Windows 7 won't start after installing Malwarebytes Pro" situated here: http://forums.malwarebytes.org/index.php?showtopic=122312 I have installed and uninstalled twice. After installation of Malwarebytes Pro (bought 11th February 2013) My computer re-starts, but as soon as an account icon is double-clicked, nothing more happens. Not even a password prompt. This happens with two accounts which have local administrator rights. Luckily, I can uninstall Malwarebytes using Safe Mode, then all is well again. My AV is Microsoft Security Essentials. I do not wish to go through all the trouble-shooting of the previous poster (who I believe, got nowhere anyway) and all I request is a refund. I will go back to my paid version of Super Antispyware which worked with no issues. I must admit that I am bitterly disappointed, as in my job as a computer techie, I use Malwarebytes regularly and often sing its praises. Please advise how I go about obtaining a refund. This is the ID I was issued: ID: 9TE83-D11UK Thank-you,
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.