Search the Community
Showing results for tags 'malware.exploit.agent.generic'.
I also got a warning from the same program and folder today. There were some earlier warnings about Malware.Exploit.Agent.Generic when trying to open a Word document. Any help would be greatly appreciated, I haven't done much this type of virus/malware removal and would like to find out what to do, especially as it is not my own computer but my mother's.
Hi there Malwarebytes team . this is my first experience with an Exploit that is just happened on today and not sure what should do I do now ? https://blog.malwarebytes.com/detections/malware-exploit-agent-generic/ Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 10/11/19 Protection Event Time: 4:36 PM Log File: 0e6c789a-ec2c-11e9-b528-80ce62d7ac0e.json -Software Information- Version: 220.127.116.11 Components Version: 1.0.690 Update Package Version: 1.0.13959 License: Premium -System Information- OS: Windows 10 (Build 18362.418) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, 0, 392684, 0.0.0 -Exploit Data- Affected Application: Mozilla Firefox (and add-ons) Protection Layer: Application Behavior Protection Protection Technique: Unauthorized attempt to unload protection detected File Name: URL: (end) Malware.Exploit.Agent.Generic.txt
Can you help to overcome following problem Malwarebytes Premium blocks Microsoft Office Word Malicious Memory Protection Exploit: 1 Malware.Exploit.Agent.Generic, , blocked, , ,0.0.0 Exploit code executing from Heap memory blocked In addition, I also run EMET 5.0, which reports the following when trying to open Word or Excel, which both get blocked by EMET 5.0: EMET detected SimExecFlow mitigation and will close the application Assuming that Malwarebytes and EMET 5.0 are fully compatible, I wonder what is causing the problem: Here is the report of Malwarebytes: -Exploit-Daten- Malwarebytes www.malwarebytes.com -Protokolldetails- Datum des Schutzereignisses: 23.03.18 Uhrzeit des Schutzereignisses: 08:46 Protokolldatei: 44d01e5a-2e6e-11e8-b14b-00241d745f82.json Administrator: Ja -Softwaredaten- Version: 18.104.22.1688 Komponentenversion: 1.0.322 Version des Aktualisierungspakets: 1.0.4458 Lizenz: Testversion -Systemdaten- Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: System -Einzelheiten zu Exploits- Datei: 0 (keine bösartigen Elemente erkannt) Exploit: 1 Malware.Exploit.Agent.Generic, , Blockiert, , ,0.0.0 -Exploit-Daten- Betroffene Anwendung: Microsoft Office Word Schutzebene: Malicious Memory Protection Schutzverfahren: Exploit code executing from Heap memory blocked Dateiname: URL: END Thanks for any help and advice on this most annoying and concering problem. A. Naseweiss
I am a Senior technician for a la mode technologies, llc. and we are getting reports that one of the files in our software is getting marked as a virus on our customer's machines by Malwarebytes. This is causing issues for both our customers and for use and we would like to have this file scanned and remove from the virus detection to prevent further disruption to our customers work. Thank you, Jason Krise Senior Tech. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 10/13/17 Protection Event Time: 11:43 AM Log File: aee63d22-b035-11e7-8f15-d8cb8a4f7edc.json Administrator: Yes -Software Information- Version: 22.214.171.1249 Components Version: 1.0.212 Update Package Version: 1.0.3005 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, , ,0.0.0 -Exploit Data- Affected Application: Internet Explorer (and add-ons) Protection Layer: Application Behavior Protection Protection Technique: Exploit payload from UNC blocked File Name: \\ka08\total program share\WinTOTAL.exe URL: (end) Malwarebytes false positive.txt WinTOTAL.zip