Jump to content

TonyCummins

Members
  • Content Count

    102
  • Joined

  • Last visited

About TonyCummins

  • Rank
    Advanced Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I'd wait until someone more knowledgeable chimes in But to me it looks like the original sender wanted to know if / when the email was opened / read, kinda like the read receipt you can turn on in outlook. Instead they used a blank image to track that info, unfortunately for you the image is on a domain that malware bytes does not like. Maybe @Zynthesist can confirm for you as id hate to give you false information
  2. Hi Mark, I'm no expert but i think whats happening with that email is that there are "tracking" url's embedded in the email associated with that gnway domain. As soon as the email is opened it tries to pull the blank image to show it was opened. As soon as the mail is opened malwarebytes picks up the gnway parent domain and alerts you. <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=QHQ913p6-201809246115858102" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=ng9115S4-201809253135548505" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=267K13dg-201809254163115188" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=Y8y085zK-201811310161302596" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=6n646BVh-201811316135019799" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=75h10c11-201811318181622204" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=09A96795-201811320173828967" style="display:none"></div>
  3. @AndrewPP...Thanks for posting the excel add-in !! I was not aware of that.
  4. Thanks for your continued help...hopefully this will clear it up.
  5. I got tired waiting on this to be pushed out (in the hopes it fixed the memory leak) i went and created a policy with no protection turned on. Moved the endpoints into that policy...ran a check for updates...it removed the old version...then i moved the endpoints back into the policy with protection enabled and it grabbed the 3.6.1.2716 version
  6. No I was not aware of that! I was instructed to use wildcards by tech support in a ticket i created back in May. You think they would have known..... So remove the wildcard exclusion and exclude by file path? C:\Program Files (x86)\Zuercher Suite\production\launcher\launch_leds.exe) Also, the deputy is off shift that was having the exclusions ignored....probably because they where excluded by wildcards? So still haven't been able to grab those log files.
  7. I will try get logs from the offending machine when he comes back on shift. The exclusion was not re activated...as u can see its been in place (manual one) since May 1st when support showed me how to correctly add it to the entire Zuercher folder.
  8. @djacobson @KDawg This got caught again on one of my end users and disabled the software. This software is a CAD / Dispatch in car software that my deputies use to run NCIC queries...to have my deputy out in the field and be without the in car software is unacceptable!! As you can see from screen shot, the manual exclusions are still in my exclusion list. In order to fix his issue i had to have him drive back to our facility, me drive in from home. Remove the policy from the endpoint to stop it flagging the repair / install., uninstall the corrupted software and re download and install. I left the endpoint without protection overnight as i didn't want a repeat of it getting flagged and quarantined again. This is unacceptable behavior of the endpoint protection when i have manual exclusion rules in place AND support assured me the cloud exclusions are in place and correct.
  9. again tonight i get a call from my end users the leds.exe picked up and the software disabled !! And thats with my manual exclusions still in place AND the so called cloud ones that support said were in place. !!
  10. All my users locally and remotely are non admin users. Over half my endpoints are in remote locations.. Doing a quick test on a machine i do have access to as a non admin, i opened task manage and killed the endpoint agent tray process and then tried deleting, it requires elevation to delete the "hubblecache" file. Also, there is no way that i know of to "turn off" malwarebytes temporally from the cloud or even have the end user shut down Malwarebytes from his end?
  11. After been told that the files where white-listed i DID remove the manual exclusions, immediately it got flagged and quarantined..i was remoted into the offending computer via team viewer so it had internet. I then re added the manual exclusions and restored from quarantine.
  12. yes, every machine has internet access and have no issues staying connected to the internet when it is powered up. (or my end users would be kicking up a storm). Obviously the local ones are NOT holding or i wouldn't be getting the the excluded files put in quarantine.
  13. the only machine i had online and able to access right now was the cad 2...i zipped up the logs from that one for the leds detections MBAMSERVICE.LOG.zip
  14. Here is the updated log for the pc catching the shell.exe.... MBAMSERVICE.LOG
  15. @djacobson I'm having machines starting to get the launch_leds.exe quarantined again ! (see screenshot) I've also been fighting with another false positive all morning ..see here where the 2 helpers have assured me its whitelisted.....as soon as i remove manual exclusions it gets caught
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.