Jump to content


  • Content Count

  • Joined

  • Last visited

About u2berggeist

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Upgrading to MB3.4 seems to have fixed the issue. I no longer have the exploit warnings anymore and cmder is working fine now. Thanks for your help!
  2. There is no file named `user-aliases.cmd` like in the `init.bat`. Looking at the script, it looks like if there isn't one there, then it will copy `user-aliases.cmd.example`. I've attached that below. As far as what the script does, you're guess is as good as mine. I just use cmder, I don't mod it very much at all. Their documentation might be helpful. Side note: it's really annoying that the forum has file type limits. I've had to save both the `init.bat` and the `user-aliases.cmd.example` as a text file to upload. user-aliases.cmd.example.txt
  3. I don't run any special commands. I'm simply launching the executable. It doesn't start up in admin mode. The only slightly weird thing is I have the cmder folder placed in the C drive (so C:\cmder).
  4. The settings are the same. I've attached the check results zip. mb-check-results.zip
  5. I've no encountered an actual error inside cmder after trying to launch. See below: Also, other random notes: This "Exploit Block" doesn't happen on my Windows 10 machine when running cmder. The "Exploit Block" also occurs when using the integrated terminal in VS Code, but I believe that's simply tied to the fact that it's literally running the exact same code in a cmd window.
  6. Every time I run cmder, Malwarebytes gives me an exception error. I have no idea why it does, and it only just recently started happening (ie Previously I had run cmder and no exploit blocked notification was received). I can't directly tell whether it's impeding cmder's performance, but it's sure damn annoying. I can't make an exception for it because it doesn't show up in "Exclude a Previously Detected Exploit" page. How do I stop this? Here's the output of the report: Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 2/28/18 Protection Event Time: 9:54 AM Log File: 57c7570a-1c97-11e8-ae99-ecf4bb518a2b.json Administrator: Yes -Software Information- Version: Components Version: 1.0.262 Update Package Version: 1.0.4144 License: Premium -System Information- OS: Windows 8.1 CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, [0], [392684],0.0.0 -Exploit Data- Affected Application: cmd Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe \c ver URL: (end)
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.