Jump to content

Ippster32

Members
  • Posts

    6
  • Joined

  • Last visited

Everything posted by Ippster32

  1. Thanks for the responses. Porthos, I tried that and it still exhibited same problem. Arthi, that didn't quite work but it was very helpful because it led me to the right path (and thanks). I had to disable "office scripting abuse protection" to allow it to work. At least this is a much better workaround than disabling the entire Malware bytes. Is there any way to be more granular with this, or is that as good as it gets at this time? Thanks again.
  2. Hello, I have an Excel sheet that runs an important business process which uses a Microsoft VBA macro to access Outlook. As soon as this line runs: Dim OutApp As Outlook.Application Malwarebytes identifies it as an exploit and terminates Excel. Below is the log. I tried using the "allow list" and "exclude from all detections"(on both the file and folder). But Malware bytes keeps identifying it as an exploit and terminating it. The only way to stop it is to turn off the exploit detection (which, of course, isn't a good idea). How do I get by this to be able to run the Excel sheet? Thanks. ------------------- Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 8/3/22 Protection Event Time: 5:11 PM Log File: c7a5875c-1370-11ed-bef8-60a5e21bee2c.json -Software Information- Version: 4.5.12.204 Components Version: 1.0.1725 Update Package Version: 1.0.58137 License: Premium -System Information- OS: Windows 11 (Build 22000.795) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, C:\Users\ianip\OneDrive\Documents\Outlook.Application, Blocked, 0, 392684, 0.0.0, , -Exploit Data- Affected Application: Microsoft Office Excel Protection Layer: Application Behavior Protection Protection Technique: Exploit Office VBE7 object abuse blocked File Name: C:\Users\ianip\OneDrive\Documents\Outlook.Application URL: (end)
  3. Hi I also received a warning about the attached file for Malware.Heuristic.1001 but believe it is a false positive. Below is the log and I have also attached file. Thanks. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 7/12/21 Protection Event Time: 9:37 AM Log File: 4f4b7806-e316-11eb-9511-d03c1fa1a148.json -Software Information- Version: 4.4.2.123 Components Version: 1.0.1358 Update Package Version: 1.0.42993 License: Premium -System Information- OS: Windows 10 (Build 19042.1083) CPU: x64 File System: NTFS User: System -Blocked Malware Details- File: 1 Malware.Heuristic.1001, C:\Program Files (x86)\Typing Instructor for Kids Gold\Typing Instructor for Kids Gold.exe, Quarantined, 1000001, 0, 1.0.42993, 0000000000000000000003E9, dds, 01329504, 11AC4330E6F88CE0B6B4BE5CFC68FEB9, C2CA4DF1F0FC414916AC1DDA159E7D61BBA0B2AF794B2547CE2B8297147B56BD (end) Typing Instructor for Kids Gold.zip
  4. Thanks for letting me know. The above has been deleted. Much of the content is uploaded by users and is scanned by antivirus but sometimes somethings slip through.
  5. Hello, I was attempting to access my own website when I got this error. Below is the log. The website is: hxxp://www.planetsourcecode.com/ Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 11/18/19 Protection Event Time: 9:08 AM Log File: dd5eea72-0a0c-11ea-853e-b831b531529e.json -Software Information- Version: 4.0.4.49 Components Version: 1.0.718 Update Package Version: 1.0.15096 License: Premium -System Information- OS: Windows 10 (Build 17763.864) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, Blocked, -1, -1, 0.0.0 -Website Data- Category: Trojan Domain: planetsourcecode.com IP Address: 52.168.84.28 Port: 65068 Type: Outbound File: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (end)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.