Jump to content

JustJackAtlanta

Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by JustJackAtlanta

  1. Perfect. Thank you. It is working fine now. If only all problems could be solved so easily. The Malwarebytes was uninstalled and reinstalled through the standard download previously. A security issue had occurred where the license had been hijacked to another e-mail. Malwarebytes support cancelled the subscription and created a new subscription. The software that I was using was downloaded from the subscription e-mail link, but what was not done was the "Clean" removal of the previous version. I usually suspect registry keys in this type of situation. The support tool "clean" option does a good job of removing possible problems. Thank you for your expeditious help!
  2. Should any of the system repairs be done as well? Or will that create more issues?
  3. User Sally reported this problem on 11/5/21 under the title of "I can run Word because RTP detection" (I am assuming she meant "can't"). I am having the same issue. The thread was closed without resolution. The log is shown below. It is also attached. My eye is drawn to the 8192 after the splwow64.exe. Is that the port number? Does that even make sense? Also attached is the mb support tool output. I'm in the same boat and not sure what to do. Thank you. Jack PS, a snivey about the support tool. It says that the file mbst-grab-results.zip is on my desktop. It is not. It is in the folder C:\Users\Public\Desktop. Please modify the tool so that it provides the complete path or at least change the verbiage. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 12/8/2021 Protection Event Time: 4:32 PM Log File: 43e9a42e-586e-11ec-8d6f-28d24431946b.json -Software Information- Version: 4.4.10.144 Components Version: 1.0.1499 Update Package Version: 1.0.48326 License: Premium -System Information- OS: Windows 11 (Build 22000.348) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent - Exploit payload process blocked, C:\Windows\splwow64.exe C:\Windows\splwow64.exe 8192, Blocked, 0, 392684, 0.0.0, , -Exploit Data- Affected Application: Microsoft Office Word Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 8192 URL: (end) exploit.txt mbst-grab-results.zip
  4. I wrote the previous on my iPhone while all the installs were taking place. Apple gave the appearance that it attached the zip file, but alas it did not. So here is the zip file that was gathered. mbst-grab-results.zip
  5. Is this still in beta? I just BSO’D on that driver. As far as I know I’m up to date. (Yeah, I could tell you what release... BSOD crawls dumping 12Gb I guess...) Okay, I was on 4.1.2, and when it rebooted it let me know of 4.3.0. What makes it a 0x139 MWAC BSOD? This looks different than above, bugcheck D1, (00000000’00000008, 00000000’00000002, 00000000’00000000. fffff802’821759a1), from ntoskrnl.exe+407d69. Obviously to mwac that was at mwac.sys+159a1. I was not using a VPN at the time, pulse or otherwise. So to be on the safe side I downloaded the MWB support tool, but given it already was in the process of a 4.3.0 update, the support tool just decided to do a Repair on it’s on. After it finished, I did a gather. So if this appears to be what was fixed, bravo, and I’ll let you know if it happens again. If you want whatever it gathered, it’s been gathered, zipped, & saved. If there is yet another beta fix for yet another BSOD, I can go that route also. Let me know.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.