Webroot SecureAnywhere Discussion & Update Thread

Discussion in 'other anti-virus software' started by Triple Helix, Jun 6, 2014.

  1. phyniks

    phyniks Registered Member

    I want to submit malwares to Webroot.
    I know the online submission form but, Is there any email to send malwares to the staff ?
     
  2. fax

    fax Registered Member

  3. phyniks

    phyniks Registered Member

    Yes....that's me :D

    Well...On malwaretips there is a "malware hub" session and the new malicious files will be sent to multiple vendors to see which ones react faster....most of the AVs have the "email way" and this can promote the procedure.
     
  4. fax

    fax Registered Member

    I am afraid the way WSA works clash with the approach you try to achieve (i.e.signature based identification). But this was discussed plenty of times before in here... so I would not like to repeat it again.. lol.
     
  5. phyniks

    phyniks Registered Member

    Yes...I know....But,we will upload to its malware team anyway....(No matter their way to approach malwares is,the users will upload files to any known AV to see their reaction)

    Thanks for the info
     
  6. Triple Helix

    Triple Helix Specialist

  7. phyniks

    phyniks Registered Member

  8. Triple Helix

    Triple Helix Specialist

    You can supply MD5's from a scan log and post them in a ticket if you like as well?

    Thanks,

    Daniel :)
     
  9. Dragon1952

    Dragon1952 Registered Member

  10. Dragon1952

    Dragon1952 Registered Member

  11. Triple Helix

    Triple Helix Specialist

    Where do you get your downloads for flash? Removed Adobe Flash Links it's a Wilders Rule not to post them here. most times they have PUA's/PUP's added but never seen that one? As I always say be sure to uncheck any unwanted add-ons during install if offered https://community.webroot.com/t5/Security-Industry-News/Security-updates-available-for-Flash-Player-14-0-0-176-August-12/td-p/139411

    It's great that WSA remove that PUA and here is Webroot's Position on PUA's: https://community.webroot.com/t5/Tips-and-Tricks/Webroot-s-position-on-PUA/m-p/40404#M448

    Thanks,

    Daniel :)
     
    Last edited: Aug 13, 2014
  12. Dragon1952

    Dragon1952 Registered Member

    WSA Quarantine says that the file is...player-chrome.exe in C:\users\bruce\downloads.....http://www.freefixer.com/library/file/Player-Chrome.exe-120011/ I just deleted player-chrome.exe from quarantine and soon after it was back again and locked up my screen until i started WSA and ran a scan and told the popup to install to free up my screen and WSA quarantined it again.
     
    Last edited: Aug 13, 2014
  13. Triple Helix

    Triple Helix Specialist

    Can you post the line from your WSA scan log? Example: Wed 13-08-2014 13:38:46.0702 Infection detected: c:\users\daniel\downloads\ivoice_17063.scr [MD5: 52142FB6948416D824EB69BB792877CB] [3/00080001] [Trojan.Dropper.Gen]

    Thanks,

    Daniel ;)
     
  14. Dragon1952

    Dragon1952 Registered Member

    I saved the scan i did that detected the infection but WSA was not running at the time, I only use WSA as a on demand scanner now because of new tab and other issues i had with WSA and Chrome. Do you still want me to post the scan.
     
  15. Triple Helix

    Triple Helix Specialist

    Just the line of the detection not the whole log!

    Thanks,

    Daniel
     
  16. Dragon1952

    Dragon1952 Registered Member

    I looked and i don't think i can find that line of detection. My guess is that the infection was not because of the 2 downloads of flashplayer. I installed flashplayer yesterday. Today after i woke up and booted up my computer and went to facebook and a few other sites it started showing up when i opened up new tabs in my Chrome Browser.
     
  17. Triple Helix

    Triple Helix Specialist

    That's fine it was detected that's the main thing!

    Thanks,

    Daniel ;)
     
  18. Dragon1952

    Dragon1952 Registered Member

    I went to my history in chrome and this was when the infection happened i think..
    *VT result removed as per TOS*
     
    Last edited by a moderator: Aug 13, 2014
  19. Triple Helix

    Triple Helix Specialist

  20. Dragon1952

    Dragon1952 Registered Member

    I keep getting sent here when i open a new tab in chrome which locks up my screen and wants me to download something like player-chrome.exe...installlive.com/go/lightspark?adprovider=marmar
     
  21. Tarnak

    Tarnak Registered Member

    Oh dear, it looks like Daniel[TH] has to do the hard yards with all the explanations. Seems to me that Joe [PrevxHelp], has flown the coop. ;)
     
  22. Triple Helix

    Triple Helix Specialist

    Well I would do a full scan with WSA and Submit a Support Ticket so they can make sure your system is clean! And please let us know how it goes as it could help other users.

    Thanks,

    Daniel :)
     
  23. Drifter104

    Drifter104 Registered Member

    I have a question regarding the journalling feature which I've not been able to get an answer to.

    If I have a server with Webroot installed and a workstation with it also installed and I get infected with ransomware on the workstation, will either of the clients be able to recover the encrypted files using journalling for mapped network drives? I've been told the client on the workstation won't be able to revert these changes and I really can't see that the client on the server is going to do it because the infected process isn't on there for it to monitor.
     
  24. Triple Helix

    Triple Helix Specialist

  25. Dragon1952

    Dragon1952 Registered Member

    I might have found something to help this problem. In chrome history i found the url and the javascript that starts the whole thing so i blocked the url in my chrome settings under content and manage exceptions to run javascript.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice