Jump to content

Problems with php and apache installs on Win11Pro local hosting (Laragon)


Recommended Posts

We do webdev locally on Laragon (Apache/2.4.57 (Win64) OpenSSL/3.0.8 PHP/8.2.8
PHP version: 8.2.8 info, Document Root: W:/laragon/www) on Win11Pro (build 10.0.22621) and have ongoing issues with MalwareBytes (Premium 4.5.32).  As soon as we launch a dev site (Wordpress 6.2.2) on that server we get malware reports from MB.  See attachments.

For some reason, MalwareBytes flags the URL vtf.createit.pl, whenever we open any development sites running under laragon, as well as the httpd.exe file in the apache folder. It points the httpd.exe file in path:  w;|laragon\bin\apache\httpd-2.4.54-win64-vs16\bin\httpd.exe.  MalwareBytes states it's a "Malware.Ransom.Agent.Generic.  See: https://www.malwarebytes.com/blog/detections/malware-ransom-agent-generic." Also, the MS Windows Defender SmartScreen stops any opening of the httpd.exe file.  Obviously, there is a problem.

 

Thinking the files from php.net and apachelounge may have been hacked, I have changed the versions of php including: php-7.4.33-nts-Win32-vc15-x64, php-8.1.10-Win32-vs16-x64, and php-8.2.8-Win32-vs16-x64; as well as:  Apache httpd-2.4.54-win64-VS16 and httpd-2.4-57-win64-VS17.  Same problem with all of those versions. (I wanted to attache the httpd.exe file, but this message format won't allow exe files to attach.)  I have left messages on

https://windows.php.net

as well as

https://www.apachelounge.com/.

  No responses.  Apparently I'm not important enough....

So, ... I'm hoping you can add the weight of your organization in approaching them as well as if anyone here can provide a solution, it would be appreciated.  If any other info is needed, please let me know.

Thanks in advance.

Website blocked.jpg

Detection History.jpg

MalwareBytes Alert2.jpg

MS Defender SmartScreen1.jpg

Edited by AdvancedSetup
Disabled hyperlink
Link to post
Share on other sites

Hello @RickyO and :welcome::

While you are waiting for the next qualified/approved malware removal expert helper to weigh in on your topic, and even though you may have run the following Malwarebytes utility, or its subsets, please carefully follow these instructions:

  1. Download the Malwarebytes Support Tool.
  2. In your Downloads folder, open the mb-support-x.x.x.xxx.exe file.
  3. In the User Account Control (UAC) pop-up window, click Yes to continue the installation.
  4. Run the MBST Support Tool.
  5. In the left navigation pane of the Malwarebytes Support Tool, click Advanced.
  6. In the Advanced Options, click only Gather Logs. A status diagram displays the tool is Getting logs from your computer.  WARNING: Do Not click the Repair System under Advanced unless requested to by a Malwarebytes support agent or authorized helper.
  7. A zip file named mbst-grab-results.zip will be saved to the Public desktop, please attach that file in your next reply to this topic. Please do NOT copy and paste.

For the short time between when you post the diagnostic logs, and when your helper weighs in, please take no further self-directed remedial actions that will invalidate the diagnostic logs you will have posted.

Thank you.

Link to post
Share on other sites

  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.