Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 01/25/2019 in all areas

  1. 3 points
    Hello all, We are happy to announce a new release of Immunet: Version 7.0.0! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes Credo and AMSI. Credo is a ML engine that allows endpoint connector to extract feature print of a PE file and send to the cloud to see whether the file is malware or not. ScriptID engine allows AMP connector to analyze scripts prior to execution. It is based on the Windows Antimalware Scan Interface (AMSI). In 7.0.0 version of connector only PowerShell scripts are analyzed. You can get the new installer here. https://download.immunet.com/binaries/immunet/bin/ImmunetSetup.exe If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from http://www.immunet.com/index Changes in 7.0.0 Improvements and updates: New Credo engine New ScriptID engine for AMSI Query improvements in Immunet Protect driver Improvement in preforming Immunet registration Improvements in Connectivity test tool Curl version update ImmunetSCMS service now handle crash reporting Driver updates to support No Reboot upgrades New certificate for the ELAM driver Improvements on the Malicious Activity Protection (MAP) to reduce false positive Fixes: Stability Improvements in the Immunet Protect driver Stability Improvements in the SPP Stability Improvement on Immunet Protect shutdown Stability Improvements in the Exploit prevention
  2. 3 points
    Hello all, We are happy to announce a new release of Immunet: Version 6.3.0! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes Improved detection coverage Windows 10 RedStone 6 support Update ClamAV to version 0.101.2 Improved status in Windows Security Center Bug fix to exploit prevention engine Immunet installer now handles all legal windows characters that can be in a Windows file path for default install Fixes to mitigate high CPU/Memory issue some users are seeing on Windows 10 during Windows updates. As always, you can get the new installer at https://www.immunet.com. We strongly recommend existing Immunet user to upgrade to v6.3.0 and start taking advantage of new improvements. If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from https://www.immunet.com If you do encounter problems with the new version of Immunet Protect, please let us know via forums at http://support.immunet.com Thank you for your continued support! The Immunet Protect Team
  3. 2 points
    Hello all, We are happy to announce a new release of Immunet: Version 7.0.2! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes NoReboot upgrade beta. The Immunet Windows Connector often requires a reboot to complete the upgrade. This can be problematic for end users who have to time reboots, if they are in middle of critical updates or working on some important project, in order to upgrade the Connector, raising barriers to upgrading more regularly. This feature is to remove the requirement for reboots when upgrading the Windows Connector for good. Expected upgrade behaviour for Immunet users: * Upgrades from Connector versions < 7.0.0 to 7.0.0+ require a reboot to complete * Upgrades from Connector versions 7.0.0+ to any higher version do not require a reboot to complete Looking forward for your participation and help in cases of upgrade reboot failures issues, if encountered any. We would appreciate if you can reach out to us via support forum with Support logs as soon as you see upgrade failing or upgrade asking for reboot on upgrade. You can get the new installer here. https://download.immunet.com/binaries/immunet/bin/ImmunetSetup.exe If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from http://www.immunet.com/index Changes in 7.0.2 Improvements and updates: No Reboot upgrades No Reboot uninstalls New kernel logs for Connector upgrades and uninstalls Installer improvements to handle NoReboot upgrades and uninstall Fixes: Stability Improvements in the Immunet SelfProtect driver Fixed reference leak in asynchronous kernel exclusions Stability Improvements on Immunet Protect driver
  4. 2 points
    Hi all, The newest 6.3.0.10988 build of Immunet has a new running process called cscm. Microsoft made some improvements as to how antivirus solutions can better protect their software from unauthorized intrusion. It's a fact that some malware has the capacity to disable the installed AV, usually through unauthorized code-injection methods. This added security protocol will make it much harder for malware to disable Immunet. For anyone that wants to read this Windows Dev Center article (thanks Wookiee) regarding this added security protocol click on this link. https://docs.microsoft.com/en-us/windows/desktop/services/protecting-anti-malware-services- Regards, Ritchie...
  5. 2 points
    Yup, this is the right place for your questions. Sorry, Immunet doesn't offer spam or phishing protection, Interestingly , older versions of Immunet could scan local Outlook.pst email databases for malicious email attachments, but we shelved this feature for a couple reasons: 1) the average user moved to cloud email services (gmail, Hotmail, outlook.com / etc), most of which provide absolutely minimal span and phishing protection, making local emal scanning redundant 2) Microsoft changed their outlook.pst format and libraries a couple times resulting in Immunet failing to quarantine just the attachment from within the outlook.pst database file; and instead quarantined the entire email database.
  6. 2 points
    Ritchie, As soon and you mentioned AMP I fully remembered that I selected YES on both of those systems. I uninstalled Immunet and selected NO, rebooted and all is good now!! I agree that I will stay with AMP, but this is a GREAT free product for home users. Grant
  7. 2 points
    I've sent it to Clam so guess we'll see what they say. Thanks for your help!
  8. 2 points
    I would venture to guess that the ClamAV module is scanning files at the same time as they're being created by Visual Studio. Try creating a custom Immunet Exclusion rule for Visual Studio's entire Program Files folder in Settings. Then turn ClamAV back on, restart your computer and see if the same behavior persists. You can also directly contact the ClamAV developers to inform them of this issue if you wish. https://www.clamav.net/contact Best wishes, Ritchie...
  9. 2 points
    Try a restart of your PC and also press several times the update button!
  10. 2 points
    I am running Windows 7 Pro on an older desk top and during the last few days have been getting a Virus detected and quarantined message on virtually every application that I use. I have been using some of these sights for 10 plus years and never had this issue previously. It persists even when I switch from Firefox to Chrome. I just ran a full scan of the entire computer and get reports of no virus found and have verified that the latest update is installed (as of 2/2/19). When I go to manually initialize Immunet, I see a note that the computer has never been scanned and is not secure even when I have just run a full scan. A typical warning is that f_0001f3 has been detected as Clam.Txt.Trojan.Generic-6840302-0. Quarantine was successful. I even got a message that Firefox Installer was a Trojan. This is very annoying and I would like some suggestions to resolve this issue. Nelson
  11. 2 points
    confirmed, is defiantly a Clam false positive. Thanks to everyone who reported this. we're reprod it internally and are working on a fix. In the mean time, if you turn off the clam AV engine in Immunet's settings that'll prevent the constant FP notifications and still keep your computer protected with the immunet cloud engine. We'll notify the thread to turn clam back on as soon as the fp is fixed.
  12. 2 points
    Hello everyone, I see a lot of future in this software, its interface is destined to "the end", compared to other interfaces today ... But instead of just talking, I made a new design for Immunet AntiVirus .. .I only did the basic part, in case I get you back, I can go back to work on the interface and finish for a new look to the software. Here are the images: I look forward to the feedback from the developers, and also from the community. Att: Lucas Lks
  13. 1 point
    You nailed it, it's not working on my D drive. Files on my C drive Context Menu Scan just fine. Since I have a workaround I can't be arsed to reinstall, if that turns out to be the only solution.
  14. 1 point
    Happy New Year! And a pray for the fires all over the world, especially Australia, to stop! Finally, I did it again! To remove this error 503 you need to make a clean uninstall of Immunet first and then reinstall it! Uninstall, clear all data. After restarting, delete folders of immunet on program files and data. After, running regedit.exe, search for "immunet" delete these keys and subkeys... (I deleted some root keys also (where I see that it is only for immunet). Then reinstall! I didn't try it without registry cleaning (only reinstall after uninstalling) but you can try it first (just to not mess up with registry) Happy new 2020
  15. 1 point
    I'm seeing it again, this 503 error, and it hails back to GeekDaddy's August 27 post in that other thread where I posted up, too. In this class of software, one in which purports to provide protection against the dangers of the open internet, any error which persists, intermittently or not, for four months is unacceptable. Think about the error: a cloud based app fails to connect to it. 'Nuff said. While I can't accuse indifference and apathy on the part of the developers, it seems the problem won't be resolved. I suspect Immunet is way, way down on the corporation priority list. Having tried several Immunet versions for a period approaching a decade on test systems (over time, two Win7 and now Win10) and rejecting it for good reasons over and over, I had high hopes for this latest version. Again, it won't be migrating to my day-to-day systems. "Better luck next time" seems to be Immunet's strategy. Best regards.
  16. 1 point
    The Department of Homeland Security issued a rare public warning urging on-line shoppers to use a great deal of vigilance this holiday season! Black Friday's on-line sales was at a record high of about 4.1 billion dollars spent, I'm sure the bad guys have taken notice of this, and Cyber Monday is right around the corner too. Cyber crime always increases during the holiday season but there has been an "alarmingly noticeable increase" of reported incidents compared to last year. Here are some things you can do to protect yourself from becoming a victim of cyber crime. First of all it's not a bad idea to update your Antivirus software & run a malware scan of your Operating System drive before doing any holiday shopping. Then make sure your AV is kept up to date while doing your on-line shopping. If you have access to a Virtual Private Network (VPN) definitely use it whenever you do any on-line banking or shopping regardless of the time of year. When holiday shopping on-line make sure you don't end up on a bogus site that resembles the real thing. Fake websites are on the rise this year. Apple, Amazon, and Target are currently the most impersonated. Other big names in the same situation are Tiffany, Sony, Samsung, and Microsoft. Always look for the secure "HTTPS" URL header with the shopping site's Domain name. Almost all legitimate on-line retailers use these secure encryption protocols that protects your personal data that's being sent from your browser. Also look for Domain names for popular brands that have spelling errors or mistakes, even if using the HTTPS protocols or not (HTTP) these are not genuine. Consider using a major credit card for payment such as Visa or MasterCard, etc... instead of a bank debit card. If using a debit card your savings or checking account could be drained and, unless the criminals are actually caught, there's nothing much can be done about that. Most major credit card company's offer some form of reimbursement if it's discovered that you were a victim of scamming. Plus the big card company's have methods to detect & react to possible fraudulent use of your card number. Still check your card's account often for any unauthorized purchases and contact the card issuer right away if you suspect something is amiss. Another option would be to use PayPal or a similar secure web based payment service if the retailer accepts these types of payment methods. Email is also being used for phishing attempts, malware using attachments as an attack vector or to re-direct you to a malicious drive-by download site. Avoid opening any links or attachments that come from any unsolicited entity. Especially if it comes from a company or charity you never heard of or never done business with. Be very wary of so-called free giveaways, discounts or gift cards delivered to your in-box this holiday season. When in doubt, just delete them. Social media sites are also being targeted with possible malicious/phishing links offering such holiday themed giveaways, gift cards or discounts. So be wary of any links you click on while visiting social media sites as well. A little common sense can go a long way to keep you safe too. "If you see a bargain that seems too good to be true it probably is!" Best wishes, Ritchie...
  17. 1 point
    Hi, I just have some free time to play with UI concepts - so I came up with these artistic prototypes. What do You Guys think? Any thoughts? My goal was to keep current functionality -> development, not a revolution. Regards, Marcin Full View: https://imgur.com/a/im7fywl
  18. 1 point
    Hey ritchie58... What I meant by (error 0) is that what was reported in that little Immunet Updater windows instead of (error 503). Not that there were no more errors and I should have been more detailed than that. Sorry. However, today all I see is "Immunet is Up to Date." No (error anything ) ! Server side issue resolved it seems. I'll keep any eye on it. Later!
  19. 1 point
    Thank you, let me make one more example.
  20. 1 point
    Will be nice can protect the program with password so cannot be edited or deactivated by other PC users.
  21. 1 point
    To include the ability to lock the UI with a password is not a bad idea in my view! If the computer is used by multiple people (especially if kids are present) in the household that could prove to be beneficial. Actually Immunet's enterprise version called Amp for Endpoints uses an on-line console instead of a traditional UI. This ensures that no unauthorized personal can make any changes unless one knows the user name & password to the console.
  22. 1 point
    only from what I just read on https://blog.virustotal.com/2019/10/virustotal-bitdefender-theta.html tldr; Theta is bitDefenders automated malware analysis engine. all AVav companies, including Immunet, have a few. Some are better than others, but newer ones are always prone to FP's.
  23. 1 point
    Great FP Analysis BellGamin, I came to all the same points you did. I'm m submitting this to our internal virus analysis team for further review , only because it's a perfect trojan, and it's a smaller /lesser known/used app (that being said I do remember using a taskbar tweaker back in the windows XP days. Now I use classic start menu, though I do note taskbar tweaker has more features than classic start menu, and all it's features work - another point in favor of it being a FP That being said, there has been a growing trend of hacking source code access to older indy projects, injecting malware into them. And I want to make sure that isn't the case here as I vaguely remember using taskbar tweaker back in the windows XP days. Now I use Classic start menu, And it doe swht I ned but I also note taskbar tweaker has more features;
  24. 1 point
    Because of version 7's excellent improvements to Immunet, I am once again a user and fan of this AV. I have a few comments concerning Immunet's Clam component: 1) I *think* Clam is included with Immunet primarily to enable a user to do a scan without needing an internet connection... correct??? 2) Some folks (I am one of them) do not need Clam because they use some other on-demand AV scanner (such as HitmanPro, McAfee Stinger, Dr.Web CureIt, Emsisoft EEK, & Trend Micro Housecall). I *suppose* this is the reason why Immunet's GUI offers the option of disabling Clam... correct??? 3) However, although Clam can be disabled by using the GUI, Clam is nevertheless resident on one's computer, unnecessarily taking up disk space. It would be nice if the option to NOT use Clam were instead included as an option in Immunet's install routine, so that it would not be loaded onto one's computer at all. By the way, my favorite computer loves immunet because it is VERY easy on RAM & CPU, and it scans really really fast. A beautiful job of programming! Aloha from Hawaii, bellgamin
  25. 1 point
    Successfully reproduced with Chrome on Win7x64 & Win10x64 today - Thanks again Deathinition, you rock! Hopefully we'll have the FP fixed by Monday. On another note, that's for introducing me to listenonrepeat . Am learning to play a guitar and it' s going to be really handy.
  26. 1 point
    Hi Ritchie, I will look into providing a list of important fixes that are included in the release. To answer some of your other questions: The Credo engine is a new engine that is integrated within the product. The ScriptID engine will monitor PowerShell activity and doesn't require a new process to function. Cheers, Andrew
  27. 1 point
    @Rob.Turner I can confirm that I can either see text or get a download prompt for every one of those links supplied. @ritchie58 Don't worry, I of course still allow Windows updates on my internet-connected machine. I have Pro so am fortunately able to defer any non-security updates for up to a year, which I recommend everyone should do before their PC gets bricked. It gives Microsoft a good chance at fixing the worst of their problems before their "improvements" reach your machine - unless the next broken update they release without testing just happens to be a security one... As a side note, When your Windows 7 reaches end-of-life, one option would be to just have a dual-boot scenario: Switch to GNU/Linux for anything that requires the internet, and keep your unsupported Win7 installation as-is, unpatched, for any obscure software you might still need to run occasionally, but can't get on GNU/Linux. You'd just need to keep the Windows 7 installation offline, for instance by disabling your network interfaces in the device-manager, or unplugging your network cables. I'm aware there's a learning-curve, it's a matter of personal taste, and It's not possible for everyone, but I'm about 90% of the way there. I used to dual-boot and value both OSs for their respective qualities, but I'm rapidly getting to the point where I just need to get the work done and Windows now gets in the way of that for me.
  28. 1 point
    Two days ago my Windows 10 got a serious update (took about 3 hours). Since that time I've been getting that 503 error. Coincidence?
  29. 1 point
    If you look at the list most of the exclusions have to do with Windows Update. If Immunet was scanning these files while Windows was updating if could take much longer to download & install the updates. These exclusions are also there to keep Immunet from using up excessive system resources. Once any new code is installed these files will be scanned when you run your next full scan. Keep in mind that Immunet also has heuristic capabilities that can recognize suspicious activity. Except for Defender all the third-party AV exclusions can be manually deleted.
  30. 1 point
    There is another option of using the Verbose Tray Notifications setting. Ordinarily this feature is best left off but perhaps you may find it useful. Click on the Notification Settings tab in Settings and turn "on" Verbose Tray Notifications, don't forget to click Apply too.. You will start getting alerts for every file Immunet encounters this way. Be forewarned, there will be many of them.
  31. 1 point
    Immunet doesn't have any know issues running in virtualized environments and has been thoroughly tested in vmware workstation, vmware server and virtual box. and once even in Microsoft's cloud. Complaints we've gotten about running in visualized environments usually stem from unrealistic expectations of performance on non-dedicated hardware (i.e. cloud hardware thats randomly shared with strangers (e.g. the free trial and budget tier's of google, amazon and Microsoft clouds). There is just too high a chance someone like me is sharing hardware time and already pushing the machine to it' s limits (see paragraph below:) To set some hardware expectations, I test Immunet on a local desktop running dual xenon e506 2.13Ghz CPU's +12 gb ram (ouch), and 2 independent scsi 1TB drives ( one dedicated to my os & apps, the other dedicated to vmware images) and it easily simultaneously powers my win10 working desktop (chrome, waterfox, and IE browsers, email, visual studio, and an Android Virtual device) plus 3 copies of immunet running on vmware workstation images for win7x32, win7x64, & xpx32. It can also power an additional win 10x64, but at this point the images start to chug ( I think disk bandwidth is the bottleneck). I can easily run this same level of compute (dektop + 4 images) + an additional win10_x64 image on a single more modern Intel i-core 7 + 64gb of ram and 2 sata disks (one flash drive for the OS & apps an a 1tb 7200 rpm disk for the images). Getting back to your original problem, yochenhsieh you nailed it figuring out clamAV, I've seen similar stats with my benchmarking too. The clam av engine loads it's full virus definitions signature set into memory: which takes from 100 to 600mb. add to that the clam scanning engine and virus definitions updater and clam alone can in a worst case scenario use in the the 700mb of memory range. Currently we have extra experimental blue keep preventative signatures out for a worm we're expecting that are inflating the usual virus definitions set size. You can try updating the clam av definitions set via the update button in the gui and running a full scan overnight. That might get you a smaller more concise set of definitions that'll take less memory and get you over the initial performance hump of building the local cache up.
  32. 1 point
  33. 1 point
    Glad I could help! Immunet is a great product in my view too considering it's been developed to be used as a companion AV to a good number of major player's products. That gives users an added layer of protection if they so desire! I have it running compatible & stable (ClamAV module disabled) as a companion AV alongside Panda Dome Pro at this time as an example. If Immunet is to be used as a stand-alone AV then it is recommended that the ClamAV module & updates for it be enabled. If Immunet is used as a companion AV to a paid AV product it is also recommended that you turn off the ClamAV module.
  34. 1 point
    Sorry for the delay in responding & thanks for the added info. What it sounds like to me is that your copy of Immunet has some corrupted .db files if it's not remembering the previous settings configuration. I would suggest you try and do a clean uninstall. First uninstall Immunet, when asked by the uninstaller if you plan to reinstall Immunet again choose the "NO" option, this will delete all .db history files. Then reinstall Immunet but you will have to reconfigure the Settings and add any custom Exclusions you were using again. Let us know if this corrects the issue. I was given a free one year license for AMP a while back just to check it out myself so I am familiar with the software. It can be configured for home/personal use too. Having to use an on-line console to effect changes instead of a traditional UI did take a bit of getting use to I remember. This is a security feature since no unauthorized personal can make any changes to the software without the proper log in credentials to the console. Although not free like Immunet, AMP for Endpoints really is the better choice if you're using a multiple endpoint server environment for the simple fact that you can customize this software to your specific needs. Also with AMP you have the option of using the TETRA detection engine (which was part of the no longer available Immunet Plus). Originally based on Bitdefender's detection engine this now highly customized engine can sniff out usually hard to detect malware like root-kits, keyloggers, encrypted Trojan downloaders, etc... One more nice thing with AMP (compared to Immunet) is that you can configure it to automatically scan all in-coming email data packets for malware. A still prevalent attack vector. Compared to AMP, Immunet doesn't have no way near the customization options. I would suggest you stick with using AMP for Endpoints at least with your server! Something else I should mention is that Immunet is not licensed to be used in any "for profit" business, service, product or organization. If it's discovered Immunet is being used in this manner no further support will be offered. This info is included in the End User License Agreement (EULA) when you first install Immunet. Best wishes, Ritchie...
  35. 1 point
    Cool, thanks for taking the time to report this to the ClamAV team! Much appreciated Macbeth!
  36. 1 point
  37. 1 point
    Instead of downloading an online installer, try the same with the offline installer. You can download it here. Also, ClamAV detects a lot of false positives, so no need to worry.
  38. 1 point
    Sorry to hear Revo wasn't much help to you Chame. Usually that software is great at dealing with uninstalling stubborn programs or finding left over files from a botched uninstall. Since no other user, thus far, has reported the same issue I believe this to be an isolated, anomalous occurrence. I think it really wasn't a good idea at all to just start manually deleting stuff, especially in the registry. Do you use any type of system imaging or did you, by any chance, create a bootable Win 10 emergency recovery CD or USB device that will write over any corrupted Windows Operating System files or re-install any missing ones? If not, I'm at a loss as to what to try next. Maybe it might be that you'll have to re-format your OS unfortunately.
  39. 1 point
    First of all for those that do not know what a VPN is here is a brief explanation of what it does. A VPN, or Virtual Private Network, allows you to create a secure connection using encryption protocols to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from hackers on public Wi-Fi, and much more. These days VPNs are "really" popular, but not for the reasons they were originally created. They originally were just a way to connect business networks together using encryption protocols over the internet or allow you to securely access a business network from home. VPNs essentially forward all your network traffic to an encrypted network, which is where the benefits, like accessing local network resources remotely and bypassing Internet censorship, come from. Why would I need a VPN service? Thanks to the Trump administration Congress passed legislation in Dec. of 2017 that allows your Internet Service Provider (ISP) to share or sell your browser history to third-party entities. Also, a VPN makes on-line shopping, banking or any site where sensitive data is required to be submitted much more secure since all internet activity is encrypted within the VPN service. I know that including a VPN service would be a costly endeavor since new code would have to be written and infrastructure changes would have to be enacted. For this reason I propose that a new Plus (paid) version be created to include an encrypted, entirely secure VPN service. Just an idea. Cheers, Ritchie...
  40. 1 point
    It's a hell wonderful idea! I promise I will share this great news when new Immunet will be in use with all my friends and tell them what to do to be secure and safe. You are really cool, guys! Are you going to create several VPN servers or only one?
  41. 1 point
    Initially, my Immunet had the auto quarantine option activated and it quarantined a lot of my executables from program files folder including IDMan.exe and some others like the vipsocks executable. I have no complaints against that - ClamAV's security features might be too good. What bugged me though is the quarantine's UI design. Some of the executables, detected from the "Appdata/Roaming" folders were leftovers from installations and I wanted to batch delete them. Alas, I couldn't do it. Also, there wasn't any option to add an exclusion as well for a particular file in quarantine itself while restoring a false positive. Same goes for deletion - I couldn't use my keyboard to multi - delete files. And its a pain to select 10 files by clicking on each of them and deleting them one by one. Workaround - Its true that the Immunet folder C:\Program Files\Immunet\Quarantine contains the quarantined files, but at least the GUI should prompt to open that folder so that one can batch delete at least if not batch restore.
  42. 1 point
    Thank you for the Information @ritchie58.
  43. 1 point
    I think what Kirav is talking about is the Metro theme configuration you can use with Win 8 & 8.1. To make the UI look similar to this I would conjecture. I have to agree with Kirav, it really has been a while since the UI got updated to "something" newer/different looking. Folks keep pointing that fact out!
  44. 1 point
    Thank you Richie a VPN in Immunet is a great suggestion, and thanks Cyrille for the +1 and being willing to pay for it. I've escalated the suggestion and can only wait and see what comes of it.
  45. 1 point
    Hello I think it's a good idea I'm willing to pay for a VPN have a nice day cyrille
  46. 1 point
    Hello Parai & welcome to the Immunet forum, any support issue dealing with possible bugs is taken "very seriously" & are usually dealt with in a timely manner is what I recollect from my experience of using Immunet over the years. Feel free to start a new topic in the Support (Issues & Defects) section of the forum if you encounter what you may think is a new bug. In fact, we encourage that input from users just to make the product that much better. Immunet uses a bootstrapper installer that requires an internet connection during the install process so you will get the newest 6.2.4 version, which I would "definitely" recommend you use. You can download the newest installer by clicking on this link here. https://download.immunet.com/binaries/immunet/bin/ImmunetSetup.exe Please note: Immunet no longer supports Windows XP or Vista so I hope you're not using one of these older Operating Systems. Cheers, Ritchie...
  47. 1 point
    First of all that is an "out-dated build" of Immunet (seen it, this vid is old). The current version is 6.2.4.10819. This video has absolutely no current validity since it doesn't relate to the newest build. Secondly, there have also been some recent infrastructure changes that will help in defeating the spread of such malware more aggressively within the Immunet cloud community.
  48. 1 point
    You can try to upload the two files on Virustotal and check the results from different AVs https://www.virustotal.com/#/home/upload
  49. 1 point
    The problem with most rootkits is that they generally use some sort of advanced encryption method which usually makes 'em hard to detect let alone access & read. So it wouldn't surprise me if HexaPro was unable to submit any SHA256 or MD5 checksum(s) hash tag(s). Besides Immunet it never hurts to have an additional on-demand rootkit scanner at your disposal! Speaking of such... Malwarebytes has a new beta "CMD based on-demand rootkit scanner" available that looks rather promising. They're also looking for beta testers with (preferably) virtual test rigs for anyone that's into that sort of thing. As with any beta software please read the legal Disclaimer documentation carefully before use. Not 100% sure if it's compatible with Server 2008 R2 however. https://www.malwarebytes.com/antirootkit/
  50. 1 point
    Six months later and we're still on the Windows 7 era GUI
×
×
  • Create New...