Jump to content


  • Posts

  • Joined

  • Last visited

Everything posted by TonyCummins

  1. Thanks for the heads up. I have gone and turned off the rootkit in the scan options. Appreciate it Tony
  2. Hi Blender, How do i acquire a log file of the detection. Using Nebula cloud console. The 2 tablets in question are in deputy vehicles so i dont have physical access to hardware right now tony
  3. Seeing multiple endpoints flag following files with detection name of Malware.AI.1204675391 C:\WINDOWS\SYSTEM32\PROUNSTL.EXE HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\PROSET Is this a known issue? We are using Cloud Malwarebytes Tony
  4. @Atribune Here is the file attached. Located in following location: C:\Program Files (x86)\fiScanner\PaperStream Capture\PSCPDFLib\AdobeXMP.dll Thanks AdobeXMP.zip
  5. Got hit with this this morning...i thought it was fixed? Users complain they cant "scan" this AM C:\Program Files (x86)\fiScanner\PaperStream Capture\PSCPDFLib\AdobeXMP.dll
  6. If you haven't already, create a support ticket and gather logs. You could also search the forums for "High CPU". We've had issues on and off but the answers seem to be a little different for many.
  7. I'd wait until someone more knowledgeable chimes in But to me it looks like the original sender wanted to know if / when the email was opened / read, kinda like the read receipt you can turn on in outlook. Instead they used a blank image to track that info, unfortunately for you the image is on a domain that malware bytes does not like. Maybe @Zynthesist can confirm for you as id hate to give you false information
  8. Hi Mark, I'm no expert but i think whats happening with that email is that there are "tracking" url's embedded in the email associated with that gnway domain. As soon as the email is opened it tries to pull the blank image to show it was opened. As soon as the mail is opened malwarebytes picks up the gnway parent domain and alerts you. <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=QHQ913p6-201809246115858102" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=ng9115S4-201809253135548505" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=267K13dg-201809254163115188" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=Y8y085zK-201811310161302596" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=6n646BVh-201811316135019799" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=75h10c11-201811318181622204" style="display:none"></div> <img alt="" src="http://onlykem.gnway.cc:6060/mailTrack?trackCode=09A96795-201811320173828967" style="display:none"></div>
  9. @AndrewPP...Thanks for posting the excel add-in !! I was not aware of that.
  10. Thanks for your continued help...hopefully this will clear it up.
  11. I got tired waiting on this to be pushed out (in the hopes it fixed the memory leak) i went and created a policy with no protection turned on. Moved the endpoints into that policy...ran a check for updates...it removed the old version...then i moved the endpoints back into the policy with protection enabled and it grabbed the version
  12. No I was not aware of that! I was instructed to use wildcards by tech support in a ticket i created back in May. You think they would have known..... So remove the wildcard exclusion and exclude by file path? C:\Program Files (x86)\Zuercher Suite\production\launcher\launch_leds.exe) Also, the deputy is off shift that was having the exclusions ignored....probably because they where excluded by wildcards? So still haven't been able to grab those log files.
  13. I will try get logs from the offending machine when he comes back on shift. The exclusion was not re activated...as u can see its been in place (manual one) since May 1st when support showed me how to correctly add it to the entire Zuercher folder.
  14. @djacobson @KDawg This got caught again on one of my end users and disabled the software. This software is a CAD / Dispatch in car software that my deputies use to run NCIC queries...to have my deputy out in the field and be without the in car software is unacceptable!! As you can see from screen shot, the manual exclusions are still in my exclusion list. In order to fix his issue i had to have him drive back to our facility, me drive in from home. Remove the policy from the endpoint to stop it flagging the repair / install., uninstall the corrupted software and re download and install. I left the endpoint without protection overnight as i didn't want a repeat of it getting flagged and quarantined again. This is unacceptable behavior of the endpoint protection when i have manual exclusion rules in place AND support assured me the cloud exclusions are in place and correct.
  15. again tonight i get a call from my end users the leds.exe picked up and the software disabled !! And thats with my manual exclusions still in place AND the so called cloud ones that support said were in place. !!
  16. All my users locally and remotely are non admin users. Over half my endpoints are in remote locations.. Doing a quick test on a machine i do have access to as a non admin, i opened task manage and killed the endpoint agent tray process and then tried deleting, it requires elevation to delete the "hubblecache" file. Also, there is no way that i know of to "turn off" malwarebytes temporally from the cloud or even have the end user shut down Malwarebytes from his end?
  17. After been told that the files where white-listed i DID remove the manual exclusions, immediately it got flagged and quarantined..i was remoted into the offending computer via team viewer so it had internet. I then re added the manual exclusions and restored from quarantine.
  18. yes, every machine has internet access and have no issues staying connected to the internet when it is powered up. (or my end users would be kicking up a storm). Obviously the local ones are NOT holding or i wouldn't be getting the the excluded files put in quarantine.
  19. the only machine i had online and able to access right now was the cad 2...i zipped up the logs from that one for the leds detections MBAMSERVICE.LOG.zip
  20. Here is the updated log for the pc catching the shell.exe.... MBAMSERVICE.LOG
  21. @djacobson I'm having machines starting to get the launch_leds.exe quarantined again ! (see screenshot) I've also been fighting with another false positive all morning ..see here where the 2 helpers have assured me its whitelisted.....as soon as i remove manual exclusions it gets caught
  22. @shadowwar as soon as i removed the manual exclusions it quarantine those files again !! This is ridiculous !
  23. ok...ill remove the manual exclusions again. Can you tell me what the deal is with this one? C:\Program Files (x86)\Zuercher Suite\production\launcher\launch_leds.exe ive whitelisted that months and months ago manually and it still gets popped...even after i was told they added it to the whitelist
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.