Jump to content

exploit protection blocked a cmd exploit

Recommended Posts

Yesterday, MBAM's exploit protection blocked what appeared to be an exploit from the command prompt. I know this is no longer a threat to my computer, but I was wondering what could've caused this to occur. There do not appear to be any other problems, but I just want to make sure of that. I have the exploit report, as well as the other necessary files produced via the advanced tab of Malwarebytes Support tool because I've used the tool previously. I did not use clean repair. To the person who helps, thank you for your time.

mbst-grab-results.zip Exploit report.txt

Link to post
Share on other sites

HI, MHN39..!   :)Although MBAM's has done an excellent job blocking the threat, let's do some more checks ..!


Farbar Recovery Scan Tool (FRST)

Download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. If you are not sure which version applies to your system, download both of them and try to run them. Only one of them will run on your system, and that will be the right version.

  • Right-click FRST.exe/FRST64.exe then click "Run as administrator"
  • When the tool opens, click Yes to the disclaimer.
  • Press the Scan button.
  • When finished, it will produce logs called FRST.txt and Addition.txt in the same directory the tool was run from.
  • Please copy and paste the logs in your next reply.


In your next reply, please include:

  • FRST.txt
  • Addition.txt
Edited by AdvancedSetup
corrected font issue
Link to post
Share on other sites

Good morning..!  No obvious signs of an active infection in the logs you've supplied.

Farbar Recovery Scan Tool - Fix

Please download the attached file fixlist.txt * to the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the FRST.txt log you have submitted.

Run FRST and click Fix only once and wait.

The Computer will restart when the fix is completed.

It will create a log (Fixlog.txt) please post it to your reply.

In your next reply, please include:

  • Fixlog.txt


Edited by icotonev
Link to post
Share on other sites

Thanks ..! :)  If all is well..:

The following will remove the tools we used as well as reset system restore points:


Download  KpRm by kernel-panik and save it to your desktop.

  • Right-click kprm_(version).exe and select Run as Administrator.
  • When the tool opens, ensure all boxes are checked, and select Run.
  • Once complete, click OK.
  • A log will open in Notepad titled kprm-(date).txt.
  • Please copy and paste its contents in your next reply.
Link to post
Share on other sites

  • 2 weeks later...

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you



Link to post
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.