This popped up this morning and while MB shows it was quarantined, there is nothing inmy quarantine?
Is this a legit exploit or false positive?
Thanks
=============================================================
Malwarebytes
www.malwarebytes.com
-Log Details-
Protection Event Date: 11/27/22
Protection Event Time: 6:56 AM
Log File: 90d17b3e-6e4a-11ed-befc-000000000000.json
-Software Information-
Version: 4.5.17.221
Components Version: 1.0.1806
Update Package Version: 1.0.62790
License: Premium
-System Information-
OS: Windows 11 (Build 22621.819)
CPU: x64
File System: NTFS
User: System
-Exploit Details-
File: 1
Malware.Exploit.Agent.Generic, C:\WINDOWS\sysnative\cmd.exe, Quarantined, 0, 392684, 0.0.0, ,
Exploit: 0
(No malicious items detected)
(end)
=============================================================
Malwarebytes
www.malwarebytes.com
-Log Details-
Protection Event Date: 11/26/22
Protection Event Time: 5:07 AM
Log File: 0ef375fa-6d72-11ed-b5f6-000000000000.json
-Software Information-
Version: 4.5.17.221
Components Version: 1.0.1806
Update Package Version: 1.0.62782
License: Premium
-System Information-
OS: Windows 11 (Build 22621.819)
CPU: x64
File System: NTFS
User: System
-Exploit Details-
File: 0
(No malicious items detected)
Exploit: 1
Exploit.PayloadProcessBlock, C:\WINDOWS\sysnative\cmd.exe C:\WINDOWS\sysnative\cmd.exe \c C:\WINDOWS\System32\REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography \v MachineGuid, Blocked, 0, 392684, 0.0.0, ,
-Exploit Data-
Affected Application: cmd
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\WINDOWS\sysnative\cmd.exe C:\WINDOWS\sysnative\cmd.exe \c C:\WINDOWS\System32\REG QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography \v MachineGuid
URL:
(end)