I did a little more digging and found out what is really happening. It has nothing to do with the StartAccess5_2013.exe program. In the startup of our Access database, we run some VBA code that includes the VBA ""Shell" command to run StartAccess5_2013.exe to perform a particular function. It turns out it is the use of the Shell command that is triggering the exploit. If I go into Settings, Security, Exploit Protection, Advanced Settings, Application Behavior Protection, then uncheck Office VBA7 abuse protection under MS Office, it fixes the problem. It doesn't matter if I shell out to Notepad.exe, it gets blocked unless I uncheck this setting. Or I can go through adding the exploit to the allow list so it doesn't get blocked anymore.
So this means any Office VBA developer that has an application they distribute to users/customers is going to be flooded with calls just because they use the Shell command. It doesn't matter what they are running, just the fact that they use the Shell command from VBA in an Office app. Ours is from MS Access and we have thousands of customers that have our program installed. This seems to be a recent change by Malwarebytes that triggered this mess. I have always been a fan of Malwarebytes, but this seems extreme. From your point of view it might seem like an easy fix, but this is going to damage our reputation as a software vendor and cause a lot of pain for our customers and our company in terms of support. I hope someone can take a closer look at this and not punish software developers for using the Shell command or customers for using Malwarebytes.