Hello,
Pretty sure these detections are false positives but figured I would be sure. Made a word document and went to print as usual but was blocked from printing. Around exactly this time I also recieved a notification from microsoft about peronalizing settings which I closed so not sure if that caused a detection as well. Note I was on an older version of bytes 4.5.4.168 but updated and recieved the same detection when trying to print from word. I tested using a test print and it went through so Im pretty certain its something in bytes not liking word or office. Saw people with similar issues before from reading through the forums. Everything was working fine until today. Wondering what settings may be causing this to occur if it is indeed a false positive. Long time lurker, first time poster, thanks in advance for taking a look!
First detection as follows
Malwarebytes
www.malwarebytes.com
-Log Details-
Protection Event Date: 4/14/22
Protection Event Time: 8:53 AM
Log File: e1859a8b-bbf1-11ec-b09f-e02be962260d.json
-Software Information-
Version: 4.5.4.168
Components Version: 1.0.1599
Update Package Version: 1.0.53647
License: Premium
-System Information-
OS: Windows 10 (Build 19044.1586)
CPU: x64
File System: NTFS
User: System
-Exploit Details-
File: 0
(No malicious items detected)
Exploit: 1
Malware.Exploit.Agent - Process Hollowing Protection, , Blocked, 0, 392684, 0.0.0, ,
-Exploit Data-
Affected Application: Microsoft Office Word
Protection Layer: Protection Against OS Security Bypass
Protection Technique: Process Hollowing Protection
File Name:
URL:
(end)
Second detection
Malwarebytes
www.malwarebytes.com
-Log Details-
Protection Event Date: 4/14/22
Protection Event Time: 8:54 AM
Log File: fecfa6f8-bbf1-11ec-8f73-e02be962260d.json
-Software Information-
Version: 4.5.4.168
Components Version: 1.0.1599
Update Package Version: 1.0.53647
License: Premium
-System Information-
OS: Windows 10 (Build 19044.1586)
CPU: x64
File System: NTFS
User: System
-Exploit Details-
File: 0
(No malicious items detected)
Exploit: 1
Malware.Exploit.Agent - Exploit payload process blocked, C:\Windows\splwow64.exe C:\Windows\splwow64.exe 8192, Blocked, 0, 392684, 0.0.0, ,
-Exploit Data-
Affected Application: Microsoft Office Word
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 8192
URL:
(end)