Jump to content

Bastionpoint Technology

Members
  • Posts

    9
  • Joined

  • Last visited

Posts posted by Bastionpoint Technology

  1. The fix that Rbuck117 posted appears to be the official fix. Support reported back to us that the issue was resolved, but no details on what that resolution/fix was. On the new installs of Anti-Exploit that we have done, the Memory patch hijack protection setting for Microsoft Office is unchecked by default. So we have disabled that setting in our MBAM Console. Our issue with applying the policy to our endpoints via the MBAM Console appears to have been us making too many policy changes in a short period of time.

  2. We had Anti-Exploit block it today. Version 1.09.2.1384.

    5/16/2017 12:35:10 Exploit payload process blocked BLOCKC:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe \C copy \Y C:\ProgramData\HP\HP ENVY 5540 series\HPUDC\TH6AL2T0G70671_USB\UDC_device.json C:\ProgramData\HP\HP ENVY 5540 series\HPUDC\TH6AL2T0G70671_USB\UDC_device_2.json

  3. Ditto here. I've scanned my PC with multiple scanners and it is clean. Appears to be a bug in the latest update.

    Database version: v2014.01.15.07

    2014/01/15 11:35:07 -0500 TEMP-PC temp MESSAGE Executing scheduled update:  Hourly | Silent
    2014/01/15 11:35:11 -0500 TEMP-PC temp MESSAGE Scheduled update executed successfully:  database updated from version v2014.01.15.06 to version v2014.01.15.07
    2014/01/15 11:35:11 -0500 TEMP-PC temp MESSAGE Starting database refresh
    2014/01/15 11:35:11 -0500 TEMP-PC temp MESSAGE Stopping IP protection
    2014/01/15 11:35:11 -0500 TEMP-PC temp MESSAGE IP Protection stopped successfully
    2014/01/15 11:35:14 -0500 TEMP-PC temp MESSAGE Database refreshed successfully
    2014/01/15 11:35:14 -0500 TEMP-PC temp MESSAGE Starting IP protection
    2014/01/15 11:35:16 -0500 TEMP-PC temp MESSAGE IP Protection started successfully
    2014/01/15 11:36:02 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:02 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:10 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:10 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:10 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:10 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)
    2014/01/15 11:36:42 -0500 TEMP-PC temp IP-BLOCK 192.168.1.255 (Type: outgoing, Port: 137)

  4. Malwarebytes 1.7 corporate, Windows 7 and Windows 2008 R2 virtual machines on Microsoft Hyper-V platform

    We are seeing latency caused by the website blocking module, which is to be expected to a degree, but it seems to be pronounced on virtualized machines running under Microsoft Hyper-V 2.0 and 3.0.

    On a physical machine, we have seen pings go from 1 ms to 3 ms, but on a virtualized machine we are seeing an increase from 1 ms to 10 ms for a workstation used by a single user.

  5. MBAM quarantined pfussmon.exe which is the Fujitsu "ScanSnap Manager" TSR that monitors the scanner for a button press and launches the scanning software. Running a scan in developer mode also found two instances of chksti.dll, which had not been quarantined (yet?). After looking at the file details, chksti.dll appears to be legit, and also part of the ScanSnap software.

    offending-files.zip

    mbam-log-2011-11-28 (18-12-12).zip

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.