Jump to content

Malwarebytes is Crashing MS Office 365


Deaniegirl

Recommended Posts

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 11/11/21
Protection Event Time: 10:01 AM
Log File: 566da06a-4319-11ec-8c72-3417ebd46398.json

-Software Information-
Version: 4.4.10.144
Components Version: 1.0.1499
Update Package Version: 1.0.47096
License: Premium

-System Information-
OS: Windows 10 (Build 19043.1348)
CPU: x64
File System: NTFS
User: System

-Exploit Details-
File: 0
(No malicious items detected)

Exploit: 1
Malware.Exploit.Agent - Exploit payload process blocked, C:\Program Files\Google\Drive File Stream\52.0.6.0\crashpad_handler.exe C:\Program Files\Google\Drive File Stream\52.0.6.0\crashpad_handler.exe --database=C:\Users\NEAS\AppData\Local\Google\DriveFS\Crashpad --url=https:\clients2.google.com\cr\report --annotation=application=WINWORD.EXE --annotation=prod=DriveFS --annotation=ver=52.0.6.0 --initial-client-data=0x1f14,0x1e44,0x1fb0,0x1f0c,0x1f8c,0x7ff86f81f820,0x7ff86f81f830,0x7ff86f81f840, Blocked, 0, 392684, 0.0.0, , 

-Exploit Data-
Affected Application: Microsoft Office Word
Protection Layer: Application Behavior Protection
Protection Technique: Exploit payload process blocked
File Name: C:\Program Files\Google\Drive File Stream\52.0.6.0\crashpad_handler.exe C:\Program Files\Google\Drive File Stream\52.0.6.0\crashpad_handler.exe --database=C:\Users\NEAS\AppData\Local\Google\DriveFS\Crashpad --url=https:\clients2.google.com\cr\report --annotation=application=WINWORD.EXE --annotation=prod=DriveFS --annotation=ver=52.0.6.0 --initial-client-data=0x1f14,0x1e44,0x1fb0,0x1f0c,0x1f8c,0x7ff86f81f820,0x7ff86f81f830,0x7ff86f81f840
URL: 

(end)

Link to post
Share on other sites

Ok. It's disabled.

I don't recall even touching any of the options in Malwarebytes. I figured the default settings were designed with higher knowledge than I have, so I kept them. Only recently did I disable the Exploits because I figured out the correlation with Word crashing.

So, disabling that one setting but leaving Exploits enabled will 'cure' the problem?

Is there anything else I ought to set correctly?

Thank you for your quick responses, Parthos, I appreciate community input since it tends to be more realistic to users and also much more prompt in response times!

(I was a tech writer for software companies--HP, Intel, Xerox, Autodesk, loads of startups, etc.--during the 80s-90s, prior to dot com bust. Had an excellent career!)

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.