All Questions
43
questions
0
votes
1
answer
51
views
When AV software puts files and various malicious "objects" in "quarantine", what exactly do they actually do?
I had malware on a computer, which Malwarebytes managed to remove. Or did it? It rather "put it in quarantine". And it's remained like that. I see no way to actually delete it.
This appears ...
2
votes
0
answers
305
views
Mysterious hidden files in C:\Windows -- are they malicious?
A few months ago, I noticed two strange hidden files in C:\Windows. They had seemingly random alphanumeric names, no file extensions, and seemingly random binary content. I didn't think much of it at ...
4
votes
1
answer
258
views
How do tech support scams work in windows? Is it malware, phishing, or how else would threats gain access to computers?
I'm currently working for Geek Squad at Best Buy in the front of the operation checking in client computers and I am frequently encountering bogus tech support scams which involves copious amounts of ...
0
votes
0
answers
28
views
I clicked on “show pictures” in a malware e-mail [duplicate]
I carelessly pressed “show picture “in a spam e-mail that was in my unwanted folder
When i clicked the link just disappeared and no picture was shown.how worried should I be?
I did a disk clean-up ...
0
votes
1
answer
4k
views
rundll32.exe making outbound TCP connection
I've been attempting to harden my network, and have taken some extra security precautions for the sake of learning, as well as.. to be secure. I've recently formatted and re-installed Windows 10, and ...
0
votes
1
answer
621
views
Explorer.exe making outbound TCP connection to Akamai
I've just noticed that my c:\windows\explorer.exe executable has attempted to make an outbound connection from localhost:49844 -> 104.111.87.125:443.
It seems that this IP is registered to Akamai, ...
0
votes
1
answer
55
views
win 10 - What are the things to look out for after you uninstalled a suspected malware?
I'm relatively under informed when it comes to windows operating system's core, other than it is notoriously insecure and features a wacky access control system unlike Linux.
I've accidentally ...
0
votes
1
answer
1k
views
Windows defender not removing Program:Win32/Cayunamer.A!ml from system [duplicate]
My Windows firewall gives me security alert that my device is affected by Program:Win32/Cayunamer.A!ml. But when I try to remove it by selecting action as Remove, no change occurs. It loads for a time ...
1
vote
1
answer
339
views
Prevent Infection of USB drive
I have a bootable USB drive full of computer repair tools. I would use it to repair a computer that might very well be infected by a virus or other malware. I would like to know how I can prevent ...
2
votes
1
answer
3k
views
Bypass UAC by using Remote Desktop to connect to localhost?
I can use Remote Desktop (RDP) to connect to computer B from computer A without typing my password, and vice versa, because I use the same account on these two computers. Further, in a remote desktop ...
5
votes
1
answer
27k
views
"Trojan:Script/Cloxer.A!cl", any info on this virus? what does this virus do? [duplicate]
Windows Defender identified and removed a threat on my Win10Pro PC called "Trojan:Script/Cloxer.A!cl". But there is no information on the web on this trojan, searching for this yields little/nothing. ...
0
votes
0
answers
43
views
Removing the Malware From Hell [duplicate]
My home server (aging HP Proliant MicroServer, Windows 7 x64) has acquired some Malware from Hell. Turned up in one of those dodgy installers that wraps a legitimate installer in another package, and ...
1
vote
2
answers
1k
views
Malicious software removal tool reports hundreds of infections and finally finds nothing
I have downloaded the Malicious software removal tool from the Microsoft website, and got the November 2017 edition, which obviously is the latest one available. During Quick analyse, the tool reports ...
0
votes
3
answers
116
views
Can ransomware encrypt data on protected devices by coming through unprotected devices?
We have about 8-10 Windows devices in our business. Some of them do not hold important data. Others store company accounting files, labels, inventory databases, etc. We would like to install a good ...
-2
votes
1
answer
330
views
Can a normal antivirus protect you from WannaCry or other ransomware?
My understanding is that the WannaCry ransomware spreads itself using two mechanisms:
Opening an infected email attachment
Exploiting a remote code execution vulnerability in another computer
...