Jump to content

Search the Community

Showing results for tags 'malware.exploit.agent.generic'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Nebula
    • Malwarebytes Nebula Modules
    • Malwarebytes Endpoint Security
    • Other Malwarebytes Business Products
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 4 results

  1. I also got a warning from the same program and folder today. There were some earlier warnings about Malware.Exploit.Agent.Generic when trying to open a Word document. Any help would be greatly appreciated, I haven't done much this type of virus/malware removal and would like to find out what to do, especially as it is not my own computer but my mother's.
  2. Hi there Malwarebytes team . this is my first experience with an Exploit that is just happened on today and not sure what should do I do now ? https://blog.malwarebytes.com/detections/malware-exploit-agent-generic/ Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 10/11/19 Protection Event Time: 4:36 PM Log File: 0e6c789a-ec2c-11e9-b528-80ce62d7ac0e.json -Software Information- Version: 4.0.2.44 Components Version: 1.0.690 Update Package Version: 1.0.13959 License: Premium -System Information- OS: Windows 10 (Build 18362.418) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, 0, 392684, 0.0.0 -Exploit Data- Affected Application: Mozilla Firefox (and add-ons) Protection Layer: Application Behavior Protection Protection Technique: Unauthorized attempt to unload protection detected File Name: URL: (end) Malware.Exploit.Agent.Generic.txt
  3. Can you help to overcome following problem Malwarebytes Premium blocks Microsoft Office Word Malicious Memory Protection Exploit: 1 Malware.Exploit.Agent.Generic, , blocked, [0], [392684],0.0.0 Exploit code executing from Heap memory blocked In addition, I also run EMET 5.0, which reports the following when trying to open Word or Excel, which both get blocked by EMET 5.0: EMET detected SimExecFlow mitigation and will close the application Assuming that Malwarebytes and EMET 5.0 are fully compatible, I wonder what is causing the problem: Here is the report of Malwarebytes: -Exploit-Daten- Malwarebytes www.malwarebytes.com -Protokolldetails- Datum des Schutzereignisses: 23.03.18 Uhrzeit des Schutzereignisses: 08:46 Protokolldatei: 44d01e5a-2e6e-11e8-b14b-00241d745f82.json Administrator: Ja -Softwaredaten- Version: 3.4.4.2398 Komponentenversion: 1.0.322 Version des Aktualisierungspakets: 1.0.4458 Lizenz: Testversion -Systemdaten- Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: System -Einzelheiten zu Exploits- Datei: 0 (keine bösartigen Elemente erkannt) Exploit: 1 Malware.Exploit.Agent.Generic, , Blockiert, [0], [392684],0.0.0 -Exploit-Daten- Betroffene Anwendung: Microsoft Office Word Schutzebene: Malicious Memory Protection Schutzverfahren: Exploit code executing from Heap memory blocked Dateiname: URL: END Thanks for any help and advice on this most annoying and concering problem. A. Naseweiss
  4. I am a Senior technician for a la mode technologies, llc. and we are getting reports that one of the files in our software is getting marked as a virus on our customer's machines by Malwarebytes. This is causing issues for both our customers and for use and we would like to have this file scanned and remove from the virus detection to prevent further disruption to our customers work. Thank you, Jason Krise Senior Tech. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 10/13/17 Protection Event Time: 11:43 AM Log File: aee63d22-b035-11e7-8f15-d8cb8a4f7edc.json Administrator: Yes -Software Information- Version: 3.2.2.2029 Components Version: 1.0.212 Update Package Version: 1.0.3005 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, [0], [392684],0.0.0 -Exploit Data- Affected Application: Internet Explorer (and add-ons) Protection Layer: Application Behavior Protection Protection Technique: Exploit payload from UNC blocked File Name: \\ka08\total program share\WinTOTAL.exe URL: (end) Malwarebytes false positive.txt WinTOTAL.zip
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.