Jump to content

plb4333

Members
  • Content Count

    343
  • Joined

  • Last visited

About plb4333

  • Rank
    Cadet

Recent Profile Visitors

731 profile views
  1. In addition to what richbuff mentioned, if you have 'AutoKMS' => -uninstall
  2. After seeing the headers and paths, the Email meets the criteria for having fake credentials. This is like a form letter that no doubt gets mailed to a lot of people and most likely Gmail users.. It's not too hard to forge the email header to show your email address, as who its from. Your best bet, IMO, is to send your email with all headers, as a source file, just like you did above already. This should bring about an investigation by the postmaster for that domain.( abuse@cloud134.ihsystem.com ) If that doesn't work and bounces, just use (postmaster@cloud134.ihsystem.com) Here's a link to see what's going on with this fraudster. It shows its well known and the guy's format for the letters, AND using the recipent's email address. It's a link to Bitcoint Abuse Database and I got it by using the BTC address the guy gave you in his email for where to send the Bitcoin. You do not need to pay and just toss it. https://www.bitcoinabuse.com/reports/12yCNJHAwda8Kgxv9DswpS9k16XnstSqcJ 12yCNJHAwda8Kgxv9DswpS9k16XnstSqcJ was used in your Email. So doing a search for this bitcoin address shows the resulting abuse database. This works on any and all BTC addresses, and providing there is fraud involved for the BTC address...
  3. But did you try leaving all of them components as checked and then just click the box below them so that its Inactive as opposed to active for default? Wasn't sure if you only did the unchecking of components is all. Maybe just disable the 'Scan' option. This should cover everything I would think, and then it should allow saving. Object name for making exclusion would probably be: HEUR:Trojan.PowerShell.Generic After reviewing this Kaspersky setting window, it looks like I misunderstood how it works. To me, it looks like the default is as a exception and the person would want to leave all components as clicked. And the Active on the bottom of window, as is.. But it might be if the object name I listed could make a difference for working, not exactly sure. I had never used this setting before in Kaspersky so was unfamiliar with it. The double-checking helped tho and I believe just putting in the folder name with the object name as well, and nothing else done, would work ok.
  4. Here's a possibility. Go to Kasperksy Settings, then 'Additional', then 'Threats and Exclusions', about 1/2 way down there's 'Manage Exclusions', after clicking that, then Click 'Add'. In this window popup, input the folder with scripts, then go to bottom of window and set the protection components to be as 'Inactive'. This includes System Watcher, plus other components. Otherwise you could just click System Watcher so that the checkmark is gone making it inactive.
  5. Sorry about that. I read your post too fast and had left and returned, forgetting some of what you said.
  6. Have you thought about making an exception to the folder with the Scripts? Not sure if this would help, but it might be that running CMD.EXE is not the problem so much, but it's the scripts running that are causing the blocking of cmd.exe. Otherwise, IMO, Kaspersky would block cmd.exe all the time, but it doesn't...Worth a try
  7. Change JDownloader,exe, java.exe and javaw.exe in Kaspersky's Firewall as trusted if they're showing as Untrusted or Restricted. You might also have to make application exclusions to these as well.
  8. Thank you very much for this info! I have tried in the past to do this, but gave up after about an hour. Too much work. But then I didn't think about doing just the Taskbar Icons. This works superbly and appreciated it. All I did was disable Kaspersky's setting for 'Self-Protection' and then copy/pasted the Taskbar folder. I made sure to rename the original folder, just in case it was needed later. But, almost immediately I seen the results, after doing a Quit, and then restart Kaspersky program. Much better ICON in system tray! Thankyou again.
  9. Nevermind..I got the scoop on KC softwares and what's going on with it and Anti-Malware programs going back to Aug/Sept 2007 for SUMo.
  10. Hello Kyle. Can you tell me when version 5.89 will become available for SUMo? I know you're a programmer for this SUMo software, and perhaps the only one, and I figure out of all people, you would know about the releases and their dates. Thanks. On a sidenote, I'm surprised you haven't mentioned Kaspersky has seen reports of this software getting blocked as far back as 2013. In 2018 alone, there were reports given to Kaspersky in May, August, Oct., and not Dec. Rather curious why this is such an ongoing venture for blocking and reports. I realize its a direct competitor to Kaspersky's Software Updater, but still...Thanks again
  11. Also, make sure you have 'Advance Browser Integration' checked in IDM. As well as, some sites use a video protocol that's not yet supported in IDM, but not very many sites. A safe site for checking video's and IDM is YouTube. Sometimes there can be an extension/plugin incompatibility. You might try disabling Kaspersky plugin and see if it makes a difference. Personally, I use IDM and Kaspersky Internet Security and I don't have issues with Video DL bars.
  12. In addition to what i n d i o and Berny have stated, are you using the latest version of SUMo? Like 5.8.8.410 ? According to a site that checked this software (DEC 15th 2018), against virtually all Anti-Malware softwares scans, it comes up Clean. Kaspersky included. I thought maybe you were using an outdated version that had some issues prior.
  13. Hello! Are you using Kaspersky's Anti-Banner by chance? If so, it might be blocking that video bar used by IDM. Or I guess, remotely possible where you have 'Data Collection' from web getting blocked. Sounds more like Banner blocking tho.
×

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.