Jump to content


  • Content Count

  • Joined

  • Last visited

About schmeffn

  • Rank
  1. Thanks. I looked at some other KBs, but the ones that seemed the most interesting were all broken links. The error message said you had it under control and that you had been notified so I didn't say anything.
  2. Maybe I'm not being clear here. What's with the unnecessary, bizarre, and highly suspect domain names on your main download link? Are you starting a "Central Head Repository"? Selling "Preset Tours Signs"? One would think that your download link would lead to your download site.
  3. Nice to know, thanks! I may have been going on some old information it seems. Is there a command line option during the install, or a registry entry after the install to disable the (auto)update (checking)function?
  4. Why would they ever do that? Why would attackers, after breaking into a site and modifying a popular link to point to suspicious unidentified site continue on and do as they please (attacking those who use the link)? After breaking into a house or bank why does a burglar steal anything before leaving? After forging a check why does a forger try to cash the check rather than just shredding it? I didn't think I would have to explain the motives of cyber bad guys. Mostly their motives are to steal things of value. Compromising a computer by malware download or malware via exploit
  5. I see it is centralheadrepository.com now. Both of these sites are registered to Communigal Communication Ltd in Israel. Seeing as how this CD/DVD burning site is on a TLD from Sweden, and has nothing to do with "Central Head Repository" nor "Pre Set Tours Signs" (whatever those are). I assume something is seriously wrong. It also doesn't seem to be connected to the ad/junkware from installCore, since they already have their own (unrelated) domain. This seem to be for the sole purpose of (at the control of the attacker) replacing the normal installer download with any other
  6. One of your installers ( was incorrectly detected as malware, I have submitted it to my antivirus vendor to have the detection corrected to a PUA (Potentially Unwanted Application). While I was at it, I have also submitted the other installers to be detected / not detected properly (per their individual nature). I would suggest that everyone else do the same for their antivirus (I didn't have time to contact the other ~5 "decent" AVs), that way you can disable detection for just installCore ad/junkware (if you wanted to for some reason) rather than disabling detection of (m
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.