Jump to content

BigRedConsulting

Members
  • Posts

    10
  • Joined

  • Last visited

Reputation

0 Neutral
  1. We are still seeing issues from our customers that use our tools, and not just the IIF Transaction Creator. Malwarebytes keeps blocking our excel add-ins, which causes Excel to hang - and other bad behavior. What can I do to keep this from happening? For example, I could supply a list of add-in file names.
  2. OK, well there's no special code in the add-in that works directly with memory addresses. It's VBA code working within Excel's framework. So, not sure what Malwarebytes is seeing. When can I expect an update on this? Our tools aren't doing anything wrong and your app is hampering both our business and our clients' businesses.
  3. What is "Malicious return address detection"? Sounds like something to do with email.
  4. Customer is up and running after disabling the what I think you call exploit. I wish I could fathom what some of these things mean. It's all Greek to me. But then I'm just a coder.
  5. The client writes: "I have tried it multiple times and found that no matter whether I stand on both feet, only the left, or only the right, nothing works. I am sending two text files because Malwarebytes creates two files every time I try to run Excel with the BRC add-in. I also did a screenshot to show that it has happened multiple times. "I had read Malwarebytes help files for problems such as mine and it is supposed to let you open a detected problem in the history and create an exception for it, but Malwarebytes will not allow me to open history items from the page where I am supposed to be able to accomplish that task." ------------------------------------------------ One of the log files appears to be you stopping the add-in from downloading a configuration text file from our site. Why would you do that? Downloading files is a rather standard thing computer do... The other identifies a "Exploit.HeapMemoryCodeExecution". I don't know what that means, but I'm thinking it's either a false positive or something is happening indirectly through the Excel app that the add-in has no control over. 9-19-23 at 1001 Exploit.txt 9-19-23 at 1001 Exploit He...eExecution.txt
  6. Customer previously reported that they tried to add it to the ignore list but it didn't stick: "I followed directions to re-enable it then restarted Excel and my malware protection software, Malwarebytes, prevented Excel from loading. I opened Malwarebytes and told it to allow the .xla file. I then ran Excel again and Malwarebytes again blocked Excel from starting." IMO this is somewhat rude behavior on the part of Malwarebytes, to actually cause Excel to choke when trying to load an add-in that you don't happen to like..., that the user has indicated they want to load... In any case, maybe the customer doesn't know how to add it to the ignore list properly. Do you have steps? Best, Steuart
  7. No, I don't have a log file. I will ask a customer for one. Do you have steps to create/share a log file?
  8. Malwarebytes recently started blocking the IIF Transaction Creator and other tools we offer that use the same code base. We're not sure what it object to, as our clients haven't been able to communicate that to us. IIF Transaction Creator.zip
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.