DoogleSmile Posted December 4, 2023 ID:1603175 Share Posted December 4, 2023 I've just started getting "Advanced Threat Protection" popups from Office when I click on links I know are safe. This is a new bug created by Office if you have an enterprise license and it hasn't been set up properly to allow links. However, if I click to skip verification to load the link, then Malwarebytes forces Excel to close and pops up the following (It does this with every link in the document): Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 04/12/2023 Protection Event Time: 15:57 Log File: d21300fc-92bd-11ee-84ff-00d8617830f9.json -Software Information- Version: 4.6.6.294 Components Version: 1.0.2201 Update Package Version: 1.0.77978 Licence: Premium -System Information- OS: Windows 10 (Build 19045.3693) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Exploit.PayloadProcessBlock, C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Program Files (x86)\Google\Chrome\Application\chrome.exe --single-argument https:\www.walescottageholidays.co.uk\snowdonia-the-llyn-peninsula\llanbedrog-cottages\thefor-the-forge, Blocked, 701, 392684, 0.0.0, , -Exploit Data- Affected Application: Microsoft Office Excel Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Program Files (x86)\Google\Chrome\Application\chrome.exe --single-argument https:\www.walescottageholidays.co.uk\snowdonia-the-llyn-peninsula\llanbedrog-cottages\thefor-the-forge URL: (end) I can copy and paste the line "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Program Files (x86)\Google\Chrome\Application\chrome.exe --single-argument https:\www.walescottageholidays.co.uk\snowdonia-the-llyn-peninsula\llanbedrog-cottages\thefor-the-forge" into a command prompt and it works fine to open the page up. Is there anything I can do to fix this issue? I'm able to simply copy the links and paste them into my browser window in the mean time. Link to post Share on other sites More sharing options...
Porthos Posted December 4, 2023 ID:1603178 Share Posted December 4, 2023 Do you have the following enabled in the advanced exploit settings section? Link to post Share on other sites More sharing options...
DoogleSmile Posted December 4, 2023 Author ID:1603180 Share Posted December 4, 2023 No, that is disabled in my settings. Link to post Share on other sites More sharing options...
Porthos Posted December 4, 2023 ID:1603184 Share Posted December 4, 2023 I am going to ask @Arthi to offer a fix for you. For now, work around it as you are doing. Link to post Share on other sites More sharing options...
Porthos Posted December 4, 2023 ID:1603185 Share Posted December 4, 2023 I personally do not use Chrome as my default browser and I can not reproduce it with Firefox as my default. Link to post Share on other sites More sharing options...
DoogleSmile Posted December 4, 2023 Author ID:1603189 Share Posted December 4, 2023 I just changed my default browser to firefox, and I get the same issue: Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 04/12/2023 Protection Event Time: 16:48 Log File: 034dc808-92c5-11ee-953b-00d8617830f9.json -Software Information- Version: 4.6.6.294 Components Version: 1.0.2201 Update Package Version: 1.0.77978 Licence: Premium -System Information- OS: Windows 10 (Build 19045.3693) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Exploit.PayloadProcessBlock, C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe -osint -url http:\www.google.co.uk\, Blocked, 701, 392684, 0.0.0, , -Exploit Data- Affected Application: Microsoft Office Excel Protection Layer: Application Behavior Protection Protection Technique: Exploit payload process blocked File Name: C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe -osint -url http:\www.google.co.uk\ URL: (end) Link to post Share on other sites More sharing options...
Solution Porthos Posted December 4, 2023 Solution ID:1603193 Share Posted December 4, 2023 Try resetting the advanced exploit protection to default and click apply. 1 Link to post Share on other sites More sharing options...
DoogleSmile Posted December 4, 2023 Author ID:1603202 Share Posted December 4, 2023 That fixed it, thank you! 1 Link to post Share on other sites More sharing options...
Staff Arthi Posted December 4, 2023 Staff ID:1603256 Share Posted December 4, 2023 Hi DoogleSmile, You most likely had the below non-default setting ON. Glad, it is resolved with restoring to defaults. Thanks for posting. 1 Link to post Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now