WildCard65
Honorary Members-
Posts
32 -
Joined
-
Last visited
Content Type
Events
Profiles
Forums
Everything posted by WildCard65
-
I only did it because Malwarebytes only yeeted the executable so I didn't really know what DLL was detected.
-
Forgot to supply the log, my bad I just gave you the entire game's code in the archive. LOG.txt
-
So the most recent Malwarebytes update starting falsely flagging the in-development game Traitors in Salem as malware. The detection is: MachineLearning/Anomolous.100% The game is built using Unity Game Engine on the Mono .NET runtime, it is currently going through a closed alpha testing.
-
So, recently Bitdefender has been detecting a file under "C:\ProgramData\MBAMService" as suspicious: "The file C:\ProgramData\Malwarebytes\MBAMService\dds_tmp\D77C.tmp is infected with Gen:Variant.Mikey.114802. Bitdefender blocked this item, your device is safe." I found a similar thread here that says to exclude this path, but I'm reluctant to do so incase malware actually breached MBAM (despite the protection module being early start enabled). I tried moving the file into quarantine so I could upload it here for you, but it was deleted.
-
Looks like it's working properly as well for me.
-
It seems the website is blocked for phishing, but I don't understand why. Is it possible an AD on it caused it? Note: This was only triggered for Browser Guard atm. https://bulbapedia.bulbagarden.net
-
Quick little update to show the certificate issue got resolved, the URL also now has a valid Let's Encrypt SSL Certificate.
-
Attached a picture showing scans of latest build is a clean file (I also notified builder of expired certificate)
-
This may of gotten blocked due to false positives generated by 7 different AV Engines (Reference). Anyway, newest VirusTotal scans show 0/72 detections + the person in charge of the URL digitally signs the executable. Source-code for the executable is on Github (Public Repository) so you can compile and compare builds if required.
-
Unfortunately, there is no report generated for the block, but I know it's the module causing it as disabling the module allows the connection to go through, otherwise I get a "408 Timeout" error, this issue only appeared after a Windows 10 update on June 8th (Properly installed on my laptop June 10th), I was told to report it here from this thread: https://forums.malwarebytes.com/topic/231520-malwarebytes-blocking-shellshock-live-steam-edition/
-
Hope I got the correct logs mbst-grab-results.zip
-
This domain is being blocked by MalwareBytes preventing me from playing ShellShock Live (Steam version), this only occurred because of the recent update (DB or Program itself) to the software, it's annoying as I have to disable the module to play the game. Port used as well: 27000