Jump to content

tnaseem

Members
  • Posts

    3
  • Joined

  • Last visited

Reputation

0 Neutral
  1. I'd like to report what I think is another False Positive on a Visual Studio PowerShell tool package. The scan log and offending file attached as a zip. I've read about the false positives on Machine Learning type files, and have deleted the HubbleCache file as described here , thinking what was reported there was the same thing, but the scan results still return with this file being detected. Any chance you could look at this too? Cheers!log.txt PAYLOAD.zip
  2. Getting the same here too: Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 9/1/18 Protection Event Time: 3:58 PM Log File: 3266b6dc-ad9b-11e8-84f9-00ffe3818609.json -Software Information- Version: 3.5.1.2522 Components Version: 1.0.421 Update Package Version: 1.0.6591 License: Premium -System Information- OS: Windows 10 (Build 17134.228) CPU: x64 File System: NTFS User: System -Exploit Details- File: 0 (No malicious items detected) Exploit: 1 Malware.Exploit.Agent.Generic, , Blocked, [0], [392684],0.0.0 -Exploit Data- Affected Application: VLC Player Protection Layer: Application Behavior Protection Protection Technique: Exploit payload file blocked File Name: C:\Users\Tarique\AppData\Local\Temp\vlc-3.0.4-win64.exe URL: (end)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.