New
#11
Thanks for the updates.
I mean no disrespect, but I think we might be veering a bit off-topic?
@Havoc originally reported the same PUP file detection on both MBAM and AdwCleaner scans.
As I mentioned, a VT scan of the file may or may not be entirely insightful, as some of the VT scanners do not target PUPs.
In order to determine if that PUP detection may or may not be a F/P for those 2 scanners, MBAM and AdwCleaner, one would need to follow the steps I already suggested to submit at least an MBAM scan log (or, preferably, the zipped file itself) in the F/P forum section at Malwarebytes forum.
(There is a similar process for AdwCleaner HERE.)
AFAIK, @Havoc reported a file detection, NOT an IP/website block, from MBAM for udemy.com.
There's no harm submitting that URL to VT or another site for analysis, of course.
But even if the site scans clean at VT, there still might be PUPs associated with the software available at that site. Checking the site, rather than the software itself, will yield different results.
If the vendor bundles their software with PUPs, then the site may well be clean, even if the software is not.
If, in fact, it is a legitimate PUP detection, and if it is being regenerated from your sync'd Chrome data, then getting rid of it will likely entail the steps I already mentioned. If it's coming from something on your system, then a bit of junkware/adware/malware cleanup may be needed.
In order to reduce the guesswork and to have a bit of real data with which to work, @Havoc, perhaps you might please ATTACH to your next reply here in this thread both the MBAM scan log and the AdwCleaner scan logs. (Let us know if you need help finding and exporting those logs.)
Just a suggestion,
MM
Last edited by MoxieMomma; 05 Jun 2016 at 14:04. Reason: typo