Jump to content

WildCard65

Honorary Members
  • Posts

    32
  • Joined

  • Last visited

Everything posted by WildCard65

  1. I only did it because Malwarebytes only yeeted the executable so I didn't really know what DLL was detected.
  2. Forgot to supply the log, my bad I just gave you the entire game's code in the archive. LOG.txt
  3. So the most recent Malwarebytes update starting falsely flagging the in-development game Traitors in Salem as malware. The detection is: MachineLearning/Anomolous.100% The game is built using Unity Game Engine on the Mono .NET runtime, it is currently going through a closed alpha testing.
  4. So, recently Bitdefender has been detecting a file under "C:\ProgramData\MBAMService" as suspicious: "The file C:\ProgramData\Malwarebytes\MBAMService\dds_tmp\D77C.tmp is infected with Gen:Variant.Mikey.114802. Bitdefender blocked this item, your device is safe." I found a similar thread here that says to exclude this path, but I'm reluctant to do so incase malware actually breached MBAM (despite the protection module being early start enabled). I tried moving the file into quarantine so I could upload it here for you, but it was deleted.
  5. Looks like it's working properly as well for me.
  6. It seems the website is blocked for phishing, but I don't understand why. Is it possible an AD on it caused it? Note: This was only triggered for Browser Guard atm. https://bulbapedia.bulbagarden.net
  7. Quick little update to show the certificate issue got resolved, the URL also now has a valid Let's Encrypt SSL Certificate.
  8. Attached a picture showing scans of latest build is a clean file (I also notified builder of expired certificate)
  9. This may of gotten blocked due to false positives generated by 7 different AV Engines (Reference). Anyway, newest VirusTotal scans show 0/72 detections + the person in charge of the URL digitally signs the executable. Source-code for the executable is on Github (Public Repository) so you can compile and compare builds if required.
  10. @dcollins Just did that and no dice (Other vendor: Bitdefender Total Security 2018)
  11. @dcollins After installing the beta, I'm reporting that the issue is still around (at least for me).
  12. @dcollins Just to let you know, PlayerIO is the framework used by ShellShock Live.
  13. Unfortunately, there is no report generated for the block, but I know it's the module causing it as disabling the module allows the connection to go through, otherwise I get a "408 Timeout" error, this issue only appeared after a Windows 10 update on June 8th (Properly installed on my laptop June 10th), I was told to report it here from this thread: https://forums.malwarebytes.com/topic/231520-malwarebytes-blocking-shellshock-live-steam-edition/
  14. That Adapter is for Wireshark only as it allows me to capture packets sent to 127.0.0.1 and localhost
  15. Hope I got the correct logs mbst-grab-results.zip
  16. I'ved created the thread for the false positive but the exclusion isn't working (I've done it for application connecting to the internet).
  17. This domain is being blocked by MalwareBytes preventing me from playing ShellShock Live (Steam version), this only occurred because of the recent update (DB or Program itself) to the software, it's annoying as I have to disable the module to play the game. Port used as well: 27000
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.