Jump to content

albesp77

Members
  • Posts

    4
  • Joined

  • Last visited

Reputation

0 Neutral
  1. i don't like my computer to be inspected from unknow peoples, anywhere here an extraction from log and a screenshot of configuration, seems that you check if whitelisted from your online database but don't work as internal exclusion list. 02/05/16 " 07:59:06.269" 34798097 AntiRansomwareControllerImpl 0d04 1914 mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback "ArwControllerImplHelper.cpp" 621 INFO "Received threat detection callback from ARW SDK, ObjectPath=C:\totalcmd\TOTALCMD64.EXE, MD5=00" 02/05/16 " 07:59:06.301" 34798144 MbCommonSigVerify 0d04 1914 VerifyFile "FileVerify.cpp" 479 INFO "Opening C:\totalcmd\TOTALCMD64.EXE for verification" 02/05/16 " 07:59:06.322" 34798160 MbCommonSigVerify 0d04 1914 ParseForIndirectData "FileVerify.cpp" 5597 ERROR "Certificate Indirect hash mismatch. 5597, ??" 02/05/16 " 07:59:06.322" 34798160 MbCommonSigVerify 0d04 1914 VerifyCertData "FileVerify.cpp" 3506 ERROR "Certificate indirect data error 3506, ??" 02/05/16 " 07:59:06.322" 34798160 MbCommonSigVerify 0d04 1914 VerifyFile "FileVerify.cpp" 526 INFO "C:\totalcmd\TOTALCMD64.EXE verification status - c000000d - IsMbam = 0" 02/05/16 " 07:59:06.413" 34798253 AntiRansomwareControllerImpl 0d04 1914 mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed "WhiteListManager.cpp" 211 DEBUG "MEPS WL request: { ""channel"" : """", ""detections"" : [ { ""filepath"" : ""C:\\totalcmd\\TOTALCMD64.EXE"", ""filesize"" : 8151936, ""md5"" : ""49F64C8C9B8D08CB517E01AD491C029F"", ""sha1"" : ""04D6298E1B78F1C5DC9E75384C3B6C3BC340AE17"", ""sha256"" : ""0C257845918798CA2D8C2AD9724A8CAAAC86D12EF872CC821BD6062357A9BE00"" } ], ""installation_token"" : ""GvDgs7Kx__DKjYaUMvx81454528565"", ""product_build"" : ""consumer"", ""product_code"" : ""MBRW-C"", ""product_version"" : ""0.9.9"" }" 02/05/16 " 07:59:07.186" 34799018 HttpConnection 0d04 1914 mb::common::net::HttpConnection::SendRequest "HttpConnection.cpp" 169 DEBUG "HTTP request success" 02/05/16 " 07:59:07.186" 34799018 AntiRansomwareControllerImpl 0d04 1914 mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed "WhiteListManager.cpp" 221 DEBUG "HTTP status code: 200, response body: {""results"":[]} " 02/05/16 " 07:59:07.186" 34799018 AntiRansomwareControllerImpl 0d04 1914 mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback "ArwControllerImplHelper.cpp" 661 DEBUG "The detected file is NOT whitelisted, sending an action request to the SDK to kill this process. ObjectPath=C:\totalcmd\TOTALCMD64.EXE." 02/05/16 " 07:59:08.909" 34800749 AntiRansomwareControllerImpl 0d04 1910 mb::arwcontrollerimpl::ArwCleanupScheduler::RemediateThreatObjects "ArwCleanupScheduler.cpp" 247 INFO "Received a results callback from ARW SDK - ObjectPath = C:\totalcmd\TOTALCMD64.EXE, ActionTaken=ARW_ACTION_KILL_THREAD, Result = ARW_RESULT_SUCCESS, RebootRequired = No" 02/05/16 " 07:59:08.909" 34800749 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 320 DEBUG "Before call to GetLicenseConfig" 02/05/16 " 07:59:08.909" 34800749 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 324 DEBUG "After call to GetLicenseConfig" 02/05/16 " 07:59:08.909" 34800749 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 328 DEBUG "After call to GetRansomwareSamplesURL" 02/05/16 " 07:59:08.955" 34800796 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 340 DEBUG "After call to AddClientFieldsToARWDetectionData, URL = https://mbarw.mb-cosmos.com/samples" 02/05/16 " 07:59:08.955" 34800796 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 350 DEBUG "Created HTTP connection" 02/05/16 " 07:59:08.970" 34800812 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 358 DEBUG "About to write to temp file: C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\arw_f42c7ed2-cbd5-11e5-9b0c-f46d0439d4a7.tmp" 02/05/16 " 07:59:08.970" 34800812 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 364 DEBUG "Wrote JSON data to temp file" 02/05/16 " 07:59:08.970" 34800812 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 376 DEBUG "Before call to UploadFile" 02/05/16 " 08:00:02.882" 34854710 AntiRansomwareControllerImpl 0d04 10c0 mb::arwcontrollerimpl::ArwControllerImpl::AddExclusion "ArwControllerImplHelper.cpp" 342 INFO "Successfully added exclusion of type=0, path=C:\totalcmd\TOTALCMD64.EXE." 02/05/16 " 08:00:36.752" 34888594 AntiRansomwareControllerImpl 0d04 1914 mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback "ArwControllerImplHelper.cpp" 621 INFO "Received threat detection callback from ARW SDK, ObjectPath=C:\Windows\explorer.exe, MD5=00" 02/05/16 " 08:00:36.778" 34888609 AntiRansomwareControllerImpl 0d04 1914 mb::arwcontrollerimpl::ArwControllerImpl::ArwShimDetectionCallback "ArwControllerImplHelper.cpp" 656 INFO "The detected file is whitelisted, ignoring this detection! ObjectPath=C:\Windows\explorer.exe." 02/05/16 " 08:00:38.916" 34890746 AntiRansomwareControllerImpl 0d04 1910 mb::arwcontrollerimpl::ArwCleanupScheduler::RemediateThreatObjects "ArwCleanupScheduler.cpp" 247 INFO "Received a results callback from ARW SDK - ObjectPath = C:\Windows\explorer.exe, ActionTaken=ARW_ACTION_ALLOW, Result = ARW_RESULT_SUCCESS, RebootRequired = No" 02/05/16 " 08:00:47.510" 34899342 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 380 DEBUG "After call to UploadFile, status: 200" 02/05/16 " 08:00:47.511" 34899342 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 385 DEBUG "Deleted JSON temp file" 02/05/16 " 08:00:47.511" 34899342 ArwController 0d04 0bbc CArwController::SendThreatFileToServerCallback "ArwController.cpp" 550 INFO "Successfully sent the detected file and info to server." 02/05/16 " 08:00:47.511" 34899342 TelemCtrlImpl 0d04 0bbc TelemetryControllerImpl::SendRansomwareStreamData "TelemetryControllerImplHelper.cpp" 1108 DEBUG "Sending JSON data to BAMBI ransomware stream: { ""client"" : { ""architecture"" : ""x64"", ""build"" : ""consumer"", ""caller"" : { ""name"" : ""ARWController"", ""trigger"" : ""Detection"" }, ""filesystem"" : ""ntfs"", ""os_version"" : ""Windows 7 Service Pack 1"", ""program"" : ""MBRW-C"", ""version"" : ""0.9.9.314"" }, ""header"" : { ""request_id"" : ""2ee8c17acbd611e5ab8cf46d0439d4a7"", ""time"" : ""2016-02-05T07:00:47Z"", ""uuid"" : ""083a9fdacb8611e5adc4f46d0439d4a7"" }, ""license"" : { ""license_state"" : ""licensed"" }, ""ransomware"" : { ""detections"" : [ { ""disposition"" : ""ARW_ACTION_KILL_THREAD"", ""md5hash"" : ""00"", ""pid"" : 5716, ""proc_path"" : ""C:\\totalcmd\\TOTALCMD64.EXE"" } ] } }" 02/05/16 " 08:00:48.125" 34899966 ArwController 0d04 0bbc CArwController::TelemetryDataCallback "ArwController.cpp" 642 INFO "Successfully sent the ransomware data to telemetry server." 02/05/16 " 08:00:48.134" 34899966 ArwController 0d04 0bbc CArwController::SubmitToCleanNotification "ArwController.cpp" 511 INFO "Successfully submitted detection results for cleaning." 02/05/16 " 08:00:48.134" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 320 DEBUG "Before call to GetLicenseConfig" 02/05/16 " 08:00:48.134" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 324 DEBUG "After call to GetLicenseConfig" 02/05/16 " 08:00:48.134" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 328 DEBUG "After call to GetRansomwareSamplesURL" 02/05/16 " 08:00:48.134" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 340 DEBUG "After call to AddClientFieldsToARWDetectionData, URL = https://mbarw.mb-cosmos.com/samples" 02/05/16 " 08:00:48.134" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 350 DEBUG "Created HTTP connection" 02/05/16 " 08:00:48.135" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 358 DEBUG "About to write to temp file: C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\arw_2f47f9e2-cbd6-11e5-afef-f46d0439d4a7.tmp" 02/05/16 " 08:00:48.135" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 364 DEBUG "Wrote JSON data to temp file" 02/05/16 " 08:00:48.135" 34899966 CloudCtrlImpl 0d04 0bbc CloudControllerImplHelper::SubmitRansomwareDetection "CloudControllerImplHelper.cpp" 376 DEBUG "Before call to UploadFile" 02/05/16 " 08:00:48.167" 34899997 CleanControllerImpl 0d04 18f4 Cleaner::Clean "Cleaner.cpp" 49 INFO "Start clean of client , detection resultsC:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ArwDetections\2f469a48-cbd6-11e5-afef-f46d0439d4a7.json" 02/05/16 " 08:00:48.188" 34900028 CleanController 0d04 18ec CCleanController::FireCleanStateChanged "CleanController.cpp" 587 DEBUG "Firing clean state changed, results ID = C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ArwDetections\2f469a48-cbd6-11e5-afef-f46d0439d4a7.json, cleanState = 1" 02/05/16 " 08:00:50.845" 34902680 MbCommonSigVerify 0d04 18f4 VerifyFile "FileVerify.cpp" 479 INFO "Opening C:\totalcmd\TOTALCMD64.EXE for verification" 02/05/16 " 08:00:50.864" 34902696 MbCommonSigVerify 0d04 18f4 ParseForIndirectData "FileVerify.cpp" 5597 ERROR "Certificate Indirect hash mismatch. 5597, ??" 02/05/16 " 08:00:50.864" 34902696 MbCommonSigVerify 0d04 18f4 VerifyCertData "FileVerify.cpp" 3506 ERROR "Certificate indirect data error 3506, ??" 02/05/16 " 08:00:50.864" 34902696 MbCommonSigVerify 0d04 18f4 VerifyFile "FileVerify.cpp" 526 INFO "C:\totalcmd\TOTALCMD64.EXE verification status - c000000d - IsMbam = 0" 02/05/16 " 08:00:50.957" 34902790 CleanControllerImpl 0d04 18f4 mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed "WhiteListManager.cpp" 211 DEBUG "MEPS WL request: { ""channel"" : """", ""detections"" : [ { ""filepath"" : ""C:\\totalcmd\\TOTALCMD64.EXE"", ""filesize"" : 8151936, ""md5"" : ""49F64C8C9B8D08CB517E01AD491C029F"", ""sha1"" : ""04D6298E1B78F1C5DC9E75384C3B6C3BC340AE17"", ""sha256"" : ""0C257845918798CA2D8C2AD9724A8CAAAC86D12EF872CC821BD6062357A9BE00"" } ], ""installation_token"" : ""GvDgs7Kx__DKjYaUMvx81454528565"", ""product_build"" : ""consumer"", ""product_code"" : ""MBRW-C"", ""product_version"" : ""0.9.9"" }" 02/05/16 " 08:00:51.689" 34903523 HttpConnection 0d04 18f4 mb::common::net::HttpConnection::SendRequest "HttpConnection.cpp" 169 DEBUG "HTTP request success" 02/05/16 " 08:00:51.689" 34903523 CleanControllerImpl 0d04 18f4 mb::common::whitelisting::WhiteListManager::IsFileOnlineWhiteListed "WhiteListManager.cpp" 221 DEBUG "HTTP status code: 200, response body: {""results"":[]} " 02/05/16 " 08:00:56.397" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::AddAsLinkedTrace "LinkingEngine.cpp" 608 DEBUG "Added new linked trace C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.398" 34908234 CleanControllerImpl 0d04 18f4 LinkingEngine::GetLinkedTraces "LinkingEngine.cpp" 556 DEBUG "Getting linked traces for C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.409" 34908250 CleanControllerImpl 0d04 18f4 DOREngine::PreCleanIsRebootRequired "DOREngine.cpp" 87 INFO "Must reboot, special file C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.410" 34908250 CleanControllerImpl 0d04 18f4 QuarantineEngine::QuarantineFile "QuarantineEngine.cpp" 275 INFO "Quarantining C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.430" 34908265 CleanControllerImpl 0d04 18f4 RemovalEngine::RemoveFile "RemovalEngine.cpp" 1351 INFO "Cleaning file C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.655" 34908484 CleanControllerImpl 0d04 18f4 RemovalEngine::DeleteFileAPI "RemovalEngine.cpp" 1453 INFO "Deleting file C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.996" 34908827 CleanControllerImpl 0d04 18f4 RemovalEngine::DeleteFileAPI "RemovalEngine.cpp" 1531 ERROR "Verification of deleting file C:\totalcmd\TOTALCMD64.EXE failed!" 02/05/16 " 08:00:56.996" 34908827 CleanControllerImpl 0d04 18f4 RemovalEngine::RemoveFile "RemovalEngine.cpp" 1438 INFO "Scheduling DOR cleaning for file C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.996" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::QuarantineFile "QuarantineEngine.cpp" 323 INFO "Succeeded quarantining file C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.997" 34908827 CleanController 0d04 18ec CCleanController::FireQuarantineItemAdded "CleanController.cpp" 627 DEBUG "Firing quarantine item added, id=30e55c40-cbd6-11e5-b4b0-f46d0439d4a7, path=C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.997" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.997" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.997" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.997" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.998" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE" 02/05/16 " 08:00:56.998" 34908827 CleanControllerImpl 0d04 18f4 QuarantineEngine::Quarantine "QuarantineEngine.cpp" 238 DEBUG "Ignoring (no quarantine/removal) of process/modules C:\totalcmd\TOTALCMD64.EXE"
  2. excuse me, this is not a problem of false positive, this is a software bug that absolutely do not consider files showed in exclusion list!
  3. Hi to all, seems that also with latest build exclusion list does not work correctly, some software, like total commander, that make huge disk activity are closed immediately and goes in delete on next reboot but they are present in exclusion list!
  4. to me continue as old build to not respect exclusion list, continue block software that are in exclusion list, is totally unusable!
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.