Newb

Members
  • Content count

    12
  • Joined

  • Last visited

About Newb

  • Rank
    New Member
  1. Okay, this is what you have to say.. Open your MalwareByes, go to Protection and turn off or unclick malicious website blocking. Then update to the newest version and this issue should be fixed.
  2. Go into your log and post what it says. Mine is only my local host. 127.0.0.1 (Type: outgoing, Port: 64539, Process: mbam.exe) For malwarebytes, but the port are different, spammed 50times.
  3. It's not just you.. I think this is another update that is super sensitive. So it's blocking off everything that resembles a malicious content. (I'm guessing) Cause I had to turn off malicious website blocking, in order to get on here.
  4. I have no issue with running on real time updates. However, I am confused on one part. Starting database refresh Stopping IP protection IP Protection stopped successfully Database refreshed successfully Starting IP protection IP Protection started successfully Questions: 1) If real time is enabled. Does that mean, every 5minute, IP protection is stopped and IP Protection restarts? 2) Everytime MalwareBytes updates/installs, since IP Protection is stopped and restarted. Does it mean, my computer is vulnerable at that state? Let's say I am updating/installing and IP is stopped or restarting. If I accidentally click on a harmful website, will IP Protection still block the IP, while stopped?
  5. I will take into account of what you said. As you are more knowledgeable than me in this area. Maybe I should move onto a safer alternative. Such as surveys.
  6. Well the actual site is clean. They host outside links that people pay to place onto their site. It's possible some of the outside links are infected. I'm doing this, not for profit or for revenue. I'm clicking and re-investing all the money back into NeoBux. At the end of each year. I give all proceed to a friend in need or in financial trouble. It's not something I can stop.. Although, I did figure not all of the links were clean.
  7. I'm currently not on skype. I was on http://www.neobux.com/?rh=4D72576F6C666965 That is a site that pays you to click on advertisements. Could that be the issue?
  8. 2013/02/15 19:45:48 -0800 -PC IP-BLOCK 50.62.128.121 (Type: outgoing, Port: 58295, Process: avastsvc.exe) 2013/02/15 19:45:48 -0800 -PC IP-BLOCK 50.62.128.121 (Type: outgoing, Port: 58296, Process: avastsvc.exe)
  9. 2013/02/15 18:39:10 -0800 -PC MESSAGE Executing scheduled update: Daily 2013/02/15 18:39:11 -0800 -PC MESSAGE Database already up-to-date 2013/02/15 18:39:13 -0800 -PC MESSAGE Starting protection 2013/02/15 18:39:13 -0800 -PC MESSAGE Protection started successfully 2013/02/15 18:39:13 -0800 -PC MESSAGE Starting IP protection 2013/02/15 18:39:14 -0800 -PC MESSAGE IP Protection started successfully 2013/02/15 19:20:24 -0800 -PC IP-BLOCK 50.62.128.39 (Type: outgoing, Port: 52015, Process: avastsvc.exe) 2013/02/15 19:20:24 -0800 -PC IP-BLOCK 50.62.128.39 (Type: outgoing, Port: 52016, Process: avastsvc.exe) ------------------------------------------------------------------------------------------------------------------------------------------ Currently on my 14-day trial for MalwareBye Pro. I am planning to buy MalwareByte Pro. I wanted to see if Avast is compatible with MBP.(I've been told it is compatible. However I don't want to exclude either/or program at this time. In the serious rare event I get infected, Avast or MBP might be compromised.) I'm still learning about what is what. Having spent a chunk of my time on google. What does IP-BLOCK 50.62.128.39 (Type: outgoing, Port: 52016, Process: avastsvc.exe) mean exactly? Does it mean that ip was blocked (un-safe redirect)? or was Avast going to block it and MBP did it first.
  10. C:\Users\MBB\AppData\Local\Temp\is1598539481\zgInstaller.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (What is this? Google doesn't show much. Does any legitimate program need this? This seems to be a redirecter?)
  11. Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 1 HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fraps (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (Fraps - Safe) Files Detected: 6 C:\Fraps\uninstall.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (Fraps - Safe) C:\Program Files\CCleaner\uninst.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (CCleaner - Safe) C:\Users\MBB\AppData\Local\Temp\is1598539481\zgInstaller.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (What is this? Google doesn't show much. Does any legitimate program need this? This seems to be a redirecter?) C:\Users\MBB\Downloads\ccsetup321.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (CCleaner - Safe) C:\Users\MBB\Downloads\npp.6.1.Installer.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (Notepad++ - Safe) C:\Users\MBB\Downloads\setup.exe (Trojan.Backdoor.MRX) -> Quarantined and deleted successfully. (Fraps - Safe)