<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Agcinvokerutility.exe - Adobe Utility in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/agcinvokerutility-exe-adobe-utility/m-p/576865#M2627</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently our Palo Alto flagged&amp;nbsp;Agcinvokerutility.exe (Virus/Win32.Wgeneric.Eedlvy(624280308)) as malicious. A quick search on the virus signature on Virus total confirmed it to be highly malicious.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However,&amp;nbsp;Agcinvokerutility.exe is also a known Adobe Utility which verifies if a valid version of adobe software is being used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone else experienced this in their environment lately? Is it a false positive signature which PA is working on fixing it?&lt;/P&gt;</description>
    <pubDate>Fri, 09 Feb 2024 18:46:59 GMT</pubDate>
    <dc:creator>Sahil_Arora</dc:creator>
    <dc:date>2024-02-09T18:46:59Z</dc:date>
    <item>
      <title>Agcinvokerutility.exe - Adobe Utility</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/agcinvokerutility-exe-adobe-utility/m-p/576865#M2627</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently our Palo Alto flagged&amp;nbsp;Agcinvokerutility.exe (Virus/Win32.Wgeneric.Eedlvy(624280308)) as malicious. A quick search on the virus signature on Virus total confirmed it to be highly malicious.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However,&amp;nbsp;Agcinvokerutility.exe is also a known Adobe Utility which verifies if a valid version of adobe software is being used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone else experienced this in their environment lately? Is it a false positive signature which PA is working on fixing it?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 18:46:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/agcinvokerutility-exe-adobe-utility/m-p/576865#M2627</guid>
      <dc:creator>Sahil_Arora</dc:creator>
      <dc:date>2024-02-09T18:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Agcinvokerutility.exe - Adobe Utility</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/agcinvokerutility-exe-adobe-utility/m-p/576874#M2628</link>
      <description>&lt;P&gt;If you believe it to be a false positive you could create an exception for it and submit a TAC case for them to remove it. However, given the VirusTotal information on that I would be extremely hesitant to exception that and would actually just recommend that you dont exception it. Just because its ran as part of a known vendor does not necessarily mean its safe.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.virustotal.com/gui/file/b807502f1a0804543488c5b85a386452d6f9848bf611db01728f3d8c23a212c9" target="_blank" rel="noopener"&gt;VirusTotal - File - b807502f1a0804543488c5b85a386452d6f9848bf611db01728f3d8c23a212c9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/create-threat-exceptions#id566b52a9-d584-47f1-9c1d-f33814fe3c48" target="_blank" rel="noopener"&gt;Create Threat Exceptions (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 19:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/agcinvokerutility-exe-adobe-utility/m-p/576874#M2628</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-02-09T19:55:47Z</dc:date>
    </item>
  </channel>
</rss>

