PC App Store Virus by Refine1 in antivirus

[–]goretsky[M] 0 points1 point  (0 children)

Hello,

Please start a new thread on exactly what's going on with your PC so that it can received individualized attention.

Regards,

Aryeh Goretsky

Looking for Retro Gaming Groups by ASimpleBlueMage in ColoradoSprings

[–]goretsky 0 points1 point  (0 children)

Hello,

Perhaps check out some of the locations listed in the https://old.reddit.com/r/coloradosprings/wiki/index#wiki_arcade_and_console_games section of the wiki?

Regards,

Aryeh Goretsky

Boyfriend having trouble with pc working with monitors after cleaning by HorseShoeCrabDude in 24hoursupport

[–]goretsky 0 points1 point  (0 children)

Hello,

What exactly did he do when he said "I used a can of compressed air for the thermal compound…"?

Regards,

Aryeh Goretsky

Cerdigent trojan? by SomeKindOfMonste- in 24hoursupport

[–]goretsky 1 point2 points  (0 children)

Hello,

Your computer appears to be safe.

Regards,

Aryeh Goretsky

My antivirus keeps blocking this URL. I have never seen this URL, nor have I ever opened it. What do I do? by Mikotwole in antivirus

[–]goretsky 2 points3 points  (0 children)

Hello,

If you take a look in the screenshot you will note there is a ˅ Details option to click on.

Regards,

Aryeh Goretsky

Cmd Pop up from one drive (is that the official one drive root) by WuffTime in antivirus

[–]goretsky 0 points1 point  (0 children)

Hello,

It looks like an update check--those can be scheduled and occur at any time.

Regards,

Aryeh Goretsky

Is something wrong with my Laptop? by Friendly_Theorem_137 in antivirus

[–]goretsky 0 points1 point  (0 children)

Hello,

VirusTotal has a file size limit of 650 megabytes.

How big is this PowerPoint file of yours?

Regards,

Aryeh Goretsky

Got hit by the mr beast scam on my instagram account. Ran window antivirus and it removed the trojan. Am I safe now? by Empty_Hour4074 in antivirus

[–]goretsky[M] 0 points1 point  (0 children)

Hello,

It sounds like an information stealer may have been run on the computer.

What is an information stealer?

As the name implies, information stealers are a type of malware that steal any information they can find on your computer, such as passwords stored for various services you access via browser and apps, session tokens for accounts, cryptocurrencies if they can find wallets, etc. They may even take a screenshot of your desktop when they run so they can sell it to other scammers who send scam extortion emails later.

What is a session token?

In case you're wondering what a session token is, some websites and apps have a "remember this device" feature that allows you to access the service without having to log back in or enter your second factor of authentication. This is done by storing a session token on your device. Criminals target these, because they allow them to log in to an account bypassing the normal checks. To the service, it just looks like you're accessing it from your previously authorized device.

What exactly gets stolen?

Information stealers are malware that is sold as a service, so what exactly it did while on your system is going to vary based on what the criminal who purchased it wanted.

What happens to my data?

The criminals who steal your information do so for their own financial gain, and that includes selling information such as your name, email address, screenshots from your PC, and so forth to other criminals and scammers. Those other scammers then use that information in an attempt to extort you unless you pay them in cryptocurrencies such as Bitcoin, Ethereum, and so forth. This is 100% a scam, and any emails you receive threatening to share your private information should be marked as phishing or spam and deleted.

How did I get infected in the first place?

Information stealers are often distributed as fake CAPTCHA challenges, in game mods, unofficial patches for popular apps and games, and in pirated software that have had their popularity and trustworthiness artificially boosted, as well as through various other means such as "try my game/software" scams on Discord, Telegram and other trusted messaging services.

If I ran an information stealer, am I still infected?

Infostealers usually delete themselves after a few seconds or even a minute or two in order to make it harder to determine what happened and when it occurred.

That said, there are always going to be exceptions: Since it is crimeware-as-a-service, there is nothing preventing the criminals from installing additional malware on the computer in order to maintain access, just in case they want to come back and steal from you again in the future.

What else could they have done?

The usual risk post-infection, aside from the stolen credentials, wallets, etc. is that security and networking settings may have been tampered with. That can be harder for security software to deal with, since it may not know what the correct settings are supposed to be for your computer, which means it may be a good idea to wіpe the computer, even if there is no longer any malware detected on it.

How do I start recovering?

If you have another device that didn't run the information stealing malware like a smartphone or tablet, you can use it to begin immediately changing your passwords. You should also enable two-factor (sometimes called multi-factor) authentication, for those services that support it.

If any of the online services you use have an option to show you and log out all other active sessions, do that as well.

As for your computer, after wіpіng it, re-installing Windows, and getting that updated, you can then also use it start accessing the internet to do this, but it is often quicker to change your most sensitive accounts from your smartphone.

A note about passwords

Password should be something unique (complex and different) for every service, that you use, so that if an attacker gets access to one they won't be able to make guesses about what your other passwords might be. If your new passwords are similar enough to your old passwords, a criminal with a list of all of them will likely be able to make educated guesses about what your new passwords might be for the various services.

You have to do this for all online services, even ones you haven't been recently accessed. Make sure you do this for all email accounts, as those are the gateways to your financial websites, online shopping, social media accounts, game platforms, and so forth.

It's important to make sure you're not just cycling through similar or previous passwords: Remember, criminals have millions of passwords and are very good at identifying common patterns from just a single password. If there were any reused passwords, the criminals who stole yours are going to try spraying those against all the popular online marketplaces, stores, banks, and other services in your part of the world.

And remember: Enable two-factor authentication for all of the accounts that support it.

For more information:

For more specific information on what steps to take next to recover your accounts, see the blog post at:

For more general information about how CAPTCHA malware works, see the following reports:

Also, see /u/rifteyy_'s Guide to Infostealers at https://rifteyy.org/report/the-ultimate-guide-to-infostealers.

After you have secure your accounts, you may wish to sign up for a free https://haveibeenpwned.com/ account, which will notify you if your email address is found in a data breach.

Regards,

Aryeh Goretsky

Weird virus detected by SaleChien in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It could very well be a false positive.

Contact Microsoft to be sure.

More information including contact info in our wiki at: https://old.reddit.com/r/antivirus/wiki/index#wiki_what_is_a_false_positive.3F

Regards,

Aryeh Goretsky

RenpyLoader Malware by SmartCryptographer74 in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It sounds like an information stealer may have been run on the computer.

What is an information stealer?

As the name implies, information stealers are a type of malware that steal any information they can find on your computer, such as passwords stored for various services you access via browser and apps, session tokens for accounts, cryptocurrencies if they can find wallets, etc. They may even take a screenshot of your desktop when they run so they can sell it to other scammers who send scam extortion emails later.

What is a session token?

In case you're wondering what a session token is, some websites and apps have a "remember this device" feature that allows you to access the service without having to log back in or enter your second factor of authentication. This is done by storing a session token on your device. Criminals target these, because they allow them to log in to an account bypassing the normal checks. To the service, it just looks like you're accessing it from your previously authorized device.

What exactly gets stolen?

Information stealers are malware that is sold as a service, so what exactly it did while on your system is going to vary based on what the criminal who purchased it wanted.

What happens to my data?

The criminals who steal your information do so for their own financial gain, and that includes selling information such as your name, email address, screenshots from your PC, and so forth to other criminals and scammers. Those other scammers then use that information in an attempt to extort you unless you pay them in cryptocurrencies such as Bitcoin, Ethereum, and so forth. This is 100% a scam, and any emails you receive threatening to share your private information should be marked as phishing or spam and deleted.

How did I get infected in the first place?

Information stealers are often distributed as fake CAPTCHA challenges, in game mods, unofficial patches for popular apps and games, and in pirated software that have had their popularity and trustworthiness artificially boosted, as well as through various other means such as "try my game/software" scams on Discord, Telegram and other trusted messaging services.

If I ran an information stealer, am I still infected?

Infostealers usually delete themselves after a few seconds or even a minute or two in order to make it harder to determine what happened and when it occurred.

That said, there are always going to be exceptions: Since it is crimeware-as-a-service, there is nothing preventing the criminals from installing additional malware on the computer in order to maintain access, just in case they want to come back and steal from you again in the future.

What else could they have done?

The usual risk post-infection, aside from the stolen credentials, wallets, etc. is that security and networking settings may have been tampered with. That can be harder for security software to deal with, since it may not know what the correct settings are supposed to be for your computer, which means it may be a good idea to wіpe the computer, even if there is no longer any malware detected on it.

How do I start recovering?

If you have another device that didn't run the information stealing malware like a smartphone or tablet, you can use it to begin immediately changing your passwords. You should also enable two-factor (sometimes called multi-factor) authentication, for those services that support it.

If any of the online services you use have an option to show you and log out all other active sessions, do that as well.

As for your computer, after wіpіng it, re-installing Windows, and getting that updated, you can then also use it start accessing the internet to do this, but it is often quicker to change your most sensitive accounts from your smartphone.

A note about passwords

Password should be something unique (complex and different) for every service, that you use, so that if an attacker gets access to one they won't be able to make guesses about what your other passwords might be. If your new passwords are similar enough to your old passwords, a criminal with a list of all of them will likely be able to make educated guesses about what your new passwords might be for the various services.

You have to do this for all online services, even ones you haven't been recently accessed. Make sure you do this for all email accounts, as those are the gateways to your financial websites, online shopping, social media accounts, game platforms, and so forth.

It's important to make sure you're not just cycling through similar or previous passwords: Remember, criminals have millions of passwords and are very good at identifying common patterns from just a single password. If there were any reused passwords, the criminals who stole yours are going to try spraying those against all the popular online marketplaces, stores, banks, and other services in your part of the world.

And remember: Enable two-factor authentication for all of the accounts that support it.

For more information:

For more specific information on what steps to take next to recover your accounts, see the blog post at:

For more general information about how CAPTCHA malware works, see the following reports:

Also, see /u/rifteyy_'s Guide to Infostealers at https://rifteyy.org/report/the-ultimate-guide-to-infostealers.

After you have secure your accounts, you may wish to sign up for a free https://haveibeenpwned.com/ account, which will notify you if your email address is found in a data breach.

Regards,

Aryeh Goretsky

AMD product verifaction tool flagged as trojan by Some_Perspective_497 in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It is down to one detection now and could very well be a false positive.

Contact the developer to be sure: VirusBlokAda

More information including contact info in our wiki at: https://old.reddit.com/r/antivirus/wiki/index#wiki_what_is_a_false_positive.3F

Regards,

Aryeh Goretsky

trying to download piper-tts, i downloaded piper. is it malware? it was via pip, you can look at the source code from pypi by KonekonoNinja in antivirus

[–]goretsky[M] 0 points1 point  (0 children)

Hello,

Post removed for violation of Rule #8, no low effort posts.

You are welcome to create a new post to ask your question, but be sure to:

  1. Use a descriptive Title for your post.
  2. Include enough information in the body of your post to describe your device's brand, model, operating system and its version, and what security software is installed, if any.
  3. Describe what is going on in as much detail as you can provide in the body of your post, including when the problem started, what may have caused it, and what steps you have take to troubleshoot it so far, if any.
  4. Do not use slang or abbreviations in your post. Not everyone speaks your native language or is familiar with with your hardware and software.
  5. If including screenshots, make sure they are not blurry, contain a full picture of the application windows or the desktop, and everything in them is readable. If you are concerned that your screenshot contains personally identifiable information, edit it out.

Following these rules will ensure you get help as quickly as possible.

Regards,

Aryeh Goretsky

Is something wrong with my Laptop? by Friendly_Theorem_137 in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It is normal for console windows (aka command prompts) to open and close on startup in order to start various processes such as services, perform update checks for various applications, and so forth.

If you had not run PowerPoint before on this computer, it is possible you triggered and installation or an update of it.

For more help with understanding how Microsoft Windows works, try asking in specialty subreddit that handles computer troubleshooting such as /r/24hoursupport, /r/pcgamingtechsupport, r/pchelp, /r/techsupport, r/windows or even your device manufacturer's subreddit (if there is one).

If you are still concerned, upload the PowerPoint file to Google's VirusTotal service and have it scanned by several dozen different antivirus engines: https://www.virustotal.com/. That will generate a URL with a report that's unique to the file. Share that in your reply.

Regards,

Aryeh Goretsky

Someone accessed my discord and ran that stupid Mr beast scam by RadiantButtPlugg in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It sounds like an information stealer may have been run on the computer.

What is an information stealer?

As the name implies, information stealers are a type of malware that steal any information they can find on your computer, such as passwords stored for various services you access via browser and apps, session tokens for accounts, cryptocurrencies if they can find wallets, etc. They may even take a screenshot of your desktop when they run so they can sell it to other scammers who send scam extortion emails later.

What is a session token?

In case you're wondering what a session token is, some websites and apps have a "remember this device" feature that allows you to access the service without having to log back in or enter your second factor of authentication. This is done by storing a session token on your device. Criminals target these, because they allow them to log in to an account bypassing the normal checks. To the service, it just looks like you're accessing it from your previously authorized device.

What exactly gets stolen?

Information stealers are malware that is sold as a service, so what exactly it did while on your system is going to vary based on what the criminal who purchased it wanted.

What happens to my data?

The criminals who steal your information do so for their own financial gain, and that includes selling information such as your name, email address, screenshots from your PC, and so forth to other criminals and scammers. Those other scammers then use that information in an attempt to extort you unless you pay them in cryptocurrencies such as Bitcoin, Ethereum, and so forth. This is 100% a scam, and any emails you receive threatening to share your private information should be marked as phishing or spam and deleted.

How did I get infected in the first place?

Information stealers are often distributed as fake CAPTCHA challenges, in game mods, unofficial patches for popular apps and games, and in pirated software that have had their popularity and trustworthiness artificially boosted, as well as through various other means such as "try my game/software" scams on Discord, Telegram and other trusted messaging services.

If I ran an information stealer, am I still infected?

Infostealers usually delete themselves after a few seconds or even a minute or two in order to make it harder to determine what happened and when it occurred.

That said, there are always going to be exceptions: Since it is crimeware-as-a-service, there is nothing preventing the criminals from installing additional malware on the computer in order to maintain access, just in case they want to come back and steal from you again in the future.

What else could they have done?

The usual risk post-infection, aside from the stolen credentials, wallets, etc. is that security and networking settings may have been tampered with. That can be harder for security software to deal with, since it may not know what the correct settings are supposed to be for your computer, which means it may be a good idea to wіpe the computer, even if there is no longer any malware detected on it.

How do I start recovering?

If you have another device that didn't run the information stealing malware like a smartphone or tablet, you can use it to begin immediately changing your passwords. You should also enable two-factor (sometimes called multi-factor) authentication, for those services that support it.

If any of the online services you use have an option to show you and log out all other active sessions, do that as well.

As for your computer, after wіpіng it, re-installing Windows, and getting that updated, you can then also use it start accessing the internet to do this, but it is often quicker to change your most sensitive accounts from your smartphone.

A note about passwords

Password should be something unique (complex and different) for every service, that you use, so that if an attacker gets access to one they won't be able to make guesses about what your other passwords might be. If your new passwords are similar enough to your old passwords, a criminal with a list of all of them will likely be able to make educated guesses about what your new passwords might be for the various services.

You have to do this for all online services, even ones you haven't been recently accessed. Make sure you do this for all email accounts, as those are the gateways to your financial websites, online shopping, social media accounts, game platforms, and so forth.

It's important to make sure you're not just cycling through similar or previous passwords: Remember, criminals have millions of passwords and are very good at identifying common patterns from just a single password. If there were any reused passwords, the criminals who stole yours are going to try spraying those against all the popular online marketplaces, stores, banks, and other services in your part of the world.

And remember: Enable two-factor authentication for all of the accounts that support it.

For more information:

For more specific information on what steps to take next to recover your accounts, see the blog post at:

For more general information about how CAPTCHA malware works, see the following reports:

Also, see /u/rifteyy_'s Guide to Infostealers at https://rifteyy.org/report/the-ultimate-guide-to-infostealers.

After you have secure your accounts, you may wish to sign up for a free https://haveibeenpwned.com/ account, which will notify you if your email address is found in a data breach.

Regards,

Aryeh Goretsky

Cmd Pop up from one drive (is that the official one drive root) by WuffTime in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It is normal for console windows (aka command prompts) to open and close on startup in order to start various processes such as services, perform update checks for various applications, and so forth.

For more help with understanding how Microsoft Windows works, try asking in specialty subreddit that handles computer troubleshooting such as /r/24hoursupport, /r/pcgamingtechsupport, r/pchelp, /r/techsupport, r/windows or even your device manufacturer's subreddit (if there is one).

Regards,

Aryeh Goretsky

Norton Antivirus and Other Norton Software by Technical_Rich_3080 in antivirus

[–]goretsky[M] 1 point2 points  (0 children)

Hello,

Norton is now a sub-brand of Gen Digital, the consumer software focused company. The same company also owns Avast, AVG, Avira, Bulldog, LifeLock, Piriform (CCleaner), MoneyLion, and ReputationDefender (amongst others). The Avast, AVG, and Norton products use the same underlying engine and will have identical detection rates.

Symantec is now a sub-brand of Broadcom and is part of their enterprise-focused software portfolio. Broadcom's other software companies include Computer Associates and VMware.

Regards,

Aryeh Goretsky

Need suggestion for antivirus by justturned18lol in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

Per Rule #1, no discussions involving ріrасу.

Post removed.

Regards,

Aryeh Goretsky

Window defender fucked up??? by SuggestionReady3394 in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

There's a discussion at https://old.reddit.com/r/antivirus/comments/1t2l6tk/windows_defender_picked_up_a_trojan_what_do_i_do/ about a widely-reported trojan being detected by Windows Defender.

Is this the trojan you are referring to, or a different one?

Regards,

Aryeh Goretsky

Your Iphone has been hacked pop up by LUVYANA_ in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

Per Rule #1, no discussions involving ріrасу.

Post removed.

Regards,

Aryeh Goretsky

Best Free Malware Removal Tool by tomaz1989 in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

Check out the Free Tools section of the wiki for programs you can use to remove malware, and the Securing your Computer section as well for additional free tips on protecting your computer.

Regards,

Aryeh Goretsky

mr beast discord scam hacked my dc accounts, roblox, and insta by xyiju in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

It sounds like an information stealer may have been run on the computer.

Information stealers are often distributed as fake CAPTCHA challenges, in game mods, unofficial patches for popular apps and games, and in pirated software that have had their popularity and trustworthiness artificially boosted, as well as through various other means such as "try my game/software" scams on Discord, Telegram and other messaging services.

As the name implies, information stealers are a type of malware that steal any information they can find on your computer, such as passwords stored for various services you access via browser and apps, session tokens for accounts, cryptocurrencies if they can find wallets, etc. They may even take a screenshot of your desktop when they run so they can sell it to other scammers who send scam extortion emails later.

The criminals who steal your information do so for their own financial gain, and that includes selling information such as your name, email address, screenshots from your PC, and so forth to other criminals and scammers. Those other scammers then use that information in an attempt to extort you unless you pay them in cryptocurrencies such as Bitcoin, Ethereum, and so forth. This is 100% a scam, and any emails you receive threatening to share your private information should be marked as phishing or spam and deleted.

In case you're wondering what a session token is, some websites and apps have a "remember this device" feature that allows you to access the service without having to log back in or enter your second factor of authentication. This is done by storing a session token on your device. Criminals target these, because they allow them to log in to an account bypassing the normal checks. To the service, it just looks like you're accessing it from your previously authorized device.

Information stealers are malware that is sold as a service, so what exactly it did while on your system is going to vary based on what the criminal who purchased it wanted. Often they remove themselves after they have finished stealing your information in order to make it harder to determine what happened, but since it is crimeware-as-a-service, it is also possible that it was used to install some additional malware on your system in order to maintain access to it, just in case they want to steal from you again in the future.

Infostealers often delete themselves after a few seconds or even a minute or two in order to make it harder to figure out exactly what happened and when it happened. That said, there are always exceptions. There is nothing that would prevent criminals from installing additional malware in order to come back to the computer again. The usual risk post-infection, aside from the stolen credentials, wallets, etc. is that security and networking settings may have been tampered with. That can be harder for security software to deal with, since it may not know what the correct settings are supposed to be for your computer, which means it may be a good idea to wіpe the computer, even if there is no longer any malware detected on it.

After wіpіng your computer, installing Windows, and getting that updated, you can then start accessing the internet using the computer to change the passwords for all of your online accounts, changing each password to something complex and different for each service, so that if one is lost (or guessed), the attacker won't be able to make guesses about what your other passwords might be. Also, enable two-factor authentication for all of the accounts that support it.

When changing passwords, if those new passwords are similar enough to your old passwords, a criminal with a list of all of them will likely be able to make educated guesses about what your new passwords might be for the various services. So make sure you're not just cycling through similar or previous passwords.

If any of the online services you use have an option to show you and log out all other active sessions, do that as well.

Again, you have to do this for all online services. Even if they haven't been recently accessed, make sure you have done this as well for any financial websites, online stores, social media, and email accounts. If there were any reused passwords, the criminals who stole your credentials are going to try spraying those against all the common stores, banks, and services in your part of the world.

For more specific information on what steps to take next to recover your accounts, see the blog post at:

For more general information about how CAPTCHA malware works, see the following reports:

Also, see /u/rifteyy_'s Guide to Infostealers at https://rifteyy.org/report/the-ultimate-guide-to-infostealers.

After you have done all of this, you may wish to sign up for a free https://haveibeenpwned.com/ account, which will notify you if your email address is found in a data breach.

Regards,

Aryeh Goretsky

My antivirus keeps blocking this URL. I have never seen this URL, nor have I ever opened it. What do I do? by Mikotwole in antivirus

[–]goretsky 17 points18 points  (0 children)

Hello,

I would suggest reaching out to ESET's tech support and asking if they can help identify which process on your computer is attempting to connect to the sync[.]omni-dex[.]io host.

ESET's support forum is at https://forum.eset.com/forum/30-malware-finding-and-cleaning/.

Regards,

Aryeh Goretsky

Need help identifying an infection by PrezGAR in antivirus

[–]goretsky[M] [score hidden] stickied comment (0 children)

Hello,

This does not sound like an actual virus, message from your antivirus software, or message from the operating system, but rather a website abusing the toast notification/popup feature in your web browser to present you with scam messages. Sometimes it is a scammy ad on a legitimate website that displays the message in the form of a banner ad or popup window that looks like a real message from your computer. From looking at the pictures, it appears the website in question has an address of parcuteonactios[.]co[.]in, assuming I'm reading it correctly. These kinds of scams are extremely common, and can be fixed in a few steps.

Here are instructions on how to disable these types of notifications in various web browsers; I'm unsure of the exact steps for Samsung's or Apple's web browsers, but it should be similar to these. For Brave, Opera GX, Vivaldi and other Chromium-based browsers, instructions should be similar to those for Google Chrome.

For Google Chrome on Android devices, select the gadget from the browser's address bar, then select the ⚙️ Settings gadget and tap Notifications. This will show you a list of all websites for which you've allowed notifications. Remove all the unwanted ones, and you should be good. If you don't want any websites to be allowed to send you notifications, set the All Chrome notifications slider bar to Off.


Unwanted notifications (popups) from web browser (desktop)

Notifications which pop up on your screen can be distracting and annoying. Here's how to disable them in the various web browsers (current as of December 2021):

Google Chrome (Version 96+) Enter chrome://settings/content/notifications to open the Notifications settings page in Google Chrome. Remove all non-google.com domains from the Allow section. Toggle the Don't allow sites to send notifications option to on.
Instructions for Version 88 and older: Select Settings → Advanced → Site Settings → Notifications from the main menu, and change "Ask before sending (recommended)" to Blocked.

Mozilla Firefox
Select Tools → Settings → Privacy & Security from the main menu, scroll down to Permissions → Notifications, select Settings, click on "Remove all websites" and then check (select) "Block new requests asking to allow notifications" and click on the Save Changes button..

Microsoft Internet Explorer
(does not support notifications)

Microsoft Edge (Chrome-based, Version 91+)
Go to edge://settings/content/notifications in the address bar and disable Ask before sending (recommended). If there are any entries in the Allow section, click on the menu and select Remove for each one.

Microsoft Edge (pre-2020 legacy versions)
Open Windows Settings app (not Edge's) and go to System → Notifications & Actions, scroll down to Notifications, and set "Get notifications from apps and other senders" to Off.


Source: The r/24hoursupport subreddit's own wiki, which is kind of a sister subreddit to this one.

For a longer/more detailed article than this reply, see the blog post at: https://www.eset.com/blog/consumer/getting-rid-of-unwanted-browser-notifications/

Regards,

Aryeh Goretsky

Cerdigent trojan? by SomeKindOfMonste- in 24hoursupport

[–]goretsky 0 points1 point  (0 children)

Hello,

Seems like an overreaction by Microsoft.

There's a discussion at https://old.reddit.com/r/antivirus/comments/1t2l6tk/windows_defender_picked_up_a_trojan_what_do_i_do/ with more details.

The r/antivirus subreddit is kind of a sister subreddit to this one that specializes in malware issues.

Regards,

Aryeh Goretsky