I have a professional automotive diagnostic program, used by those of us in the automotive technican field, that triggers Malwarebytes as an Exploit. The program is a paid software application from General Motors, so it's not something I'm concerned about at all security wise. If Exploit Detection is disabled it of course runs fine, but I'm looking for how to create an exclusion for this rather than completely disable exploit protection. Of course GM recommends not installing Malwarebyres in the first place, so that path is a non-starter. Can anyone suggest how to get past this without fully disabling exploit protection or uninstalling Malwarebyes completely?
The exported Malwarebytes exploit log contents is:
-Software Information-
Version: 4.4.10.144
Components Version: 1.0.1499
Update Package Version: 1.0.46890
License: Premium
-System Information-
OS: Windows 10 (Build 19042.1288)
CPU: x64
File System: NTFS
User: System
-Exploit Details-
File: 0
(No malicious items detected)
Exploit: 1
Malware.Exploit.Agent.Generic, C:\WINDOWS\System32\WScript.exe C:\WINDOWS\System32\WScript.exe C:\Users\user\AppData\Local\Temp\getadmin.vbs, Blocked, 0, 392684, 0.0.0, ,
-Exploit Data-
Affected Application: cmd
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\WINDOWS\System32\WScript.exe C:\WINDOWS\System32\WScript.exe C:\Users\user\AppData\Local\Temp\getadmin.vbs
URL:
I've looked in Advanced Settings under Security, but the VBScript entries in some tabs there appear browser specific and this program is a Java applet. I tried them anyway, and no effect. Restored to defaults.