Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Malwarebytes Payload Exploit #570

Open
samuelgriffey0 opened this issue Feb 7, 2024 · 0 comments
Open

Malwarebytes Payload Exploit #570

samuelgriffey0 opened this issue Feb 7, 2024 · 0 comments

Comments

@samuelgriffey0
Copy link

Attempting to preview my .puml file generates the below error with my antivirus software.

Is this a security issue or is Malwarebytes misinterpreting something?

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 2/7/24
Protection Event Time: 11:33 AM
Log File: 646b1ee2-c5e7-11ee-bf10-204ef6783e5a.json

-Software Information-
Version: 4.6.8.311
Components Version: 1.0.2242
Update Package Version: 1.0.80568
License: Premium

-System Information-
OS: Windows 10 (Build 19045.3930)
CPU: x64
File System: NTFS
User: System

-Exploit Details-
File: 1
Exploit.PayloadFileBlock, C:\Users\samue\AppData\Local\Temp_graphviz\dot.exe, Quarantined, 0, 392684, 0.0.0, 2649599C3214D4C77D45420E681AC279, 73A87076829479E1C96058324C46DA46FA1AAB5CB9A8CA2405221D920AC1BBCC

Exploit: 0
(No malicious items detected)

(end)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant