Jump to content

Efrain

Members
  • Posts

    20
  • Joined

  • Last visited

Everything posted by Efrain

  1. Windows 10. I don't believe it's flash. These are actual videos stored on a server. The officers log into a website, browse for the video then click on a thumbnail to see the video. They never see this app. Somewhere in the process a Java script runs and the player is installed for them (if not already installed) then the video starts to play within the browser (Edge or Chrome).
  2. I'm going to try the hash tomorrow. I'm not a fan of the application but that's what we're stuck with for now. I'm not a developer of this product. We purchased it from a company called L3 (Safe Fleet Mobile Vision). Thanks!
  3. I got the hash but haven't tried it yet. I will tomorrow. Again, thank you so much.
  4. I've thought of contacting the organization but my experience with them hasn't been great. I thought having an exclusion would be the easier route. Thanks! No, they can NOT.
  5. @AdvancedSetupThe officers log into a website, browse for the video then click on a thumbnail to see the video. They never see this app. Somewhere in the process a Java script runs and the player is installed for them (if not already installed) then the video starts to play within the browser (Edge or Chrome). The problem is that Malwarebytes thinks this is a malicious app and stops it from working so the video never plays. It's a horrible, stupid system that we are stuck with for now. As for the logs, we have an Endpoint agent running on the PCs. There's no app to click on to see and download logs. If you point me to the folder/files that you need I can upload. Thank you very much for you help!
  6. @Porthos The officers log into a website, browse for the video then click on a thumbnail to see the video. They never see this app. Somewhere in the process a Java script runs and the player is installed for them (if not already installed) then the video starts to play within the browser (Edge or Chrome). The problem is that Malwarebytes thinks this is a malicious app and stops it from working so the video never plays. It's a horrible, stupid system that we are stuck with for now.
  7. Where is this log located? Thanks.
  8. File uploaded in False Positive section. Thanks.
  9. This file keeps getting detected as a exploit. It's used by our police department to view video from their car and body cams. Please advise on what can be done about this. Thank you. FlashbackPlayer.zip
  10. Would that work even if the user name is always different? For example: C:\Users\AJOHNSON\AppData\Local\Temp\FlashbackPlayer.exe C:\Users\DSMITH\AppData\Local\Temp\FlashbackPlayer.exe Notice the folder after C:\Users is different. Thanks!
  11. So how to I determine what the HASH value is? Thanks.
  12. I keep getting the attached detection (see attached). Following is the full path: C:\Users\dalonso\AppData\Local\Temp\FlashbackPlayer.exe. The user name changes, depending on the user that's logged in. How do I add an exclusion for this? Thanks!
  13. I use Malwarebytes Nebula. How do I determine how many items have been quarantined during the past year? Thank you!
  14. Hi. I already opened a case with Malwarebytes but have not gotten a response. Again, thanks for all the help!
  15. Thanks for the replies thus far. We'll planning on re-installing Malwarebytes on our Exchange server tonight with the exclusions in the Microsoft article I mentioned above. However, it would be greatly appreciated if Malwarebytes provided better guidance on this. Particularly, I'd like to know: 1. Is Malwarebytes Endpoint Protection recommended and safe to run on a Windows server used for Exchange. 2. What does Malwarebytes recommend (if any) as far as exclusions, policy configurations, etc. for Exchange. Thank you!
  16. Thanks for the info! I also ran into this document but there are so many exclusions I wonder if it's even worth installing Malwarebytes. Anti-virus software in the operating system on Exchange servers | Microsoft Docs
  17. We are running Exchange 2013 on Windows Server 2012 R2. Malwarebytes Endpoint Protection was installed on the server about two months ago. Recently Microsoft pushed out KB5000871 (security update for Exchange). The update failed several times and eventually several services on the server were disabled. We had to remove Malwarebytes Endpoint Protection to get Exchange working again. Afterwards we were able to install KB5000871. Is Malwarebytes aware of any conflict between it's software and this patch (or any other patch)? What are Malwarebytes recommendations for installing Malwarebytes on an Exchange server? Thanks!
  18. I use the Management Console to connect and install Malwarebytes on workstations and servers within my organization. However, there is one server that I cannot connect to via the Console. I have search for it by IP address to push the client but it cannot be found. The only difference with this server is that it's located in a DMZ. We have opened up ports 443 and 18457 (I think TCP) but that doesn't helps. Is there anything else I should be doing? Thanks.
  19. On the Management Console I have configured a policy for the clients to download signature updates from the Management Server (see photo). I have pushed out the new policy to the clients and according to the Management Console the clients have the new policy. However, my clients do NOT update from the Management Console. Instead they update from the Internet. How can be this fixed? Thank you!
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.