Jump to content


Honorary Members
  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About DarthVitrial

  • Rank
    Advanced Member

Recent Profile Visitors

1,926 profile views
  1. File and log attached. Happened because I forgot to disable expert system algorithms. Disabling now, but this is a false positive. fp.txt ISSetup.7z
  2. Ever since the 4.0 UI change I've had no idea how to find logs. Where are they?
  3. Flashpoint is an emulator for old flash games. The four detected files attached. Download source: https://bluemaxima.org/flashpoint/downloads unins000.7z NPCult3DP.7z NPP3D.7z flash.7z
  4. Thanks. It wasn't detected by scan, it was real-time detection with expert algorithms enabled, btw
  5. File attached. Run the installer (setup.exe) and Malwarebytes will block ISSetup.dll as a threat. ssd_utility_ssd-tool-box_B21_0514.1.zip Caused by expert system algorithms.
  6. player.7zDetected exe attached. Malwarebytes calls it "malware.heuristic.1003"
  7. Downloaded from here: http://biomediaproject.com/bmp/files/LEGO/gms/online/Galidor/GalidorQuest/DSWMEDIA/index.html Needed to play archived, old games from the early 2000s. File attached. Shockwave10-12XtrasInstall.7z
  8. It won't let me un-quarantine without rebooting first, but I just downloaded the same file again. The reason it's falsely detected is because what CAO does is pack large amount of files in BSA compressed packages, which probably looks similar to ransomware to a heuristic. This already happened once before and was fixed then, but I guess it's back. file and log.7z
  9. It wasn't from a scan, it was the "real time protection" quarantining the file as I was using it.
  10. Downloaded from here: https://www.nexusmods.com/skyrimspecialedition/mods/23316?tab=files The "pack BSA" function triggers Malwarebytes' detection, but the app is not malicious.
  11. (the changelog entry I'm referring to is "Fixed: rundll32 AE block in Word". I can't edit my post for some reason.) I will still argue that A: Microsoft Office is not a pentesting tool and blocking it is a false positive even in the context of only working on penetration tests, and B: The UI as it stands now simply saying "block pentesting attacks" with no warning that it is explicitly not intended for use will confuse average users that will look at the settings and just go "attacks are bad and should be blocked".
  12. I assumed the fact that the changelog for it mentioned a word exploit fix and the fact that the post by Exile360 above referred to "the issue should be fixed for good in the new beta" meant "the pentesting setting will no longer have the false positive that makes it think Microsoft Word is a pentesting tool", rather than "Malwarebytes now properly turns off pentesting blocking by default". I misunderstood.
  13. No, with CU 1.0.1096 still doesn't fix it. Enabling "block pentesting attacks" STILL prevents word documents from being opened.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.