<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Networks generic.ml: JRS_SLE.EXE in VirusTotal</title>
    <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252805#M917</link>
    <description>&lt;P&gt;The hash is correct, but some explanation is in order. Yesterday, I noticed that the file listed on VirusTotal was a little out of date, so I uploaded the current version (which will soon be updated again) and the detection results changed. Now, 6 out of 64 engines detect it as malware, and Palo Alto Networks is not listed as detecting it or showing it as clean.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps you have some idea why it's not appearing in either group now.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2019 04:10:19 GMT</pubDate>
    <dc:creator>jrs-soft</dc:creator>
    <dc:date>2019-03-08T04:10:19Z</dc:date>
    <item>
      <title>Palo Alto Networks generic.ml: JRS_SLE.EXE</title>
      <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252572#M912</link>
      <description>&lt;P&gt;I'm reporting a false positive for the file: JRS_SLE.EXE. On Virustotal.com Palo Alto Networks flags the file as "generic:ml" when, in fact, the program is harmless. It's actually part of our anti-piracy protection. I wrote and compiled the program. Furthermore, the file is signed by Jurik Research Software, Inc. with a digital certificate. If Palo Alto Networks need a copy of the file or further information, let me know.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 20:50:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252572#M912</guid>
      <dc:creator>jrs-soft</dc:creator>
      <dc:date>2019-03-06T20:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks generic.ml: JRS_SLE.EXE</title>
      <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252574#M913</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please provide the following information so that we may assist you further:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;File Hash: &amp;lt;hash&amp;gt;&lt;/P&gt;&lt;P&gt;Link to Virustotal report for the file: &amp;lt;link&amp;gt;&lt;/P&gt;&lt;P&gt;Current VirustTotal Verdict: &amp;lt;verdict&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 21:52:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252574#M913</guid>
      <dc:creator>tdavault</dc:creator>
      <dc:date>2019-03-06T21:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks generic.ml: JRS_SLE.EXE</title>
      <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252579#M914</link>
      <description>&lt;P&gt;Thanks for the repy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SHA-256 19d4d041a07c50fdf3a828f2676869d99ac14fb13f43ca8d3c66fc9a6daabe91&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/#/file/19d4d041a07c50fdf3a828f2676869d99ac14fb13f43ca8d3c66fc9a6daabe91/detection" target="_blank"&gt;https://www.virustotal.com/#/file/19d4d041a07c50fdf3a828f2676869d99ac14fb13f43ca8d3c66fc9a6daabe91/detection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure what you mean by verdict, but 8 of 69 malware engines falsely detect the file as being malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 22:11:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252579#M914</guid>
      <dc:creator>jrs-soft</dc:creator>
      <dc:date>2019-03-06T22:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks generic.ml: JRS_SLE.EXE</title>
      <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252769#M916</link>
      <description>&lt;P&gt;I don't see any generic:ml for that sample for Palo Alto Networks. We have made no changes.&lt;/P&gt;&lt;P&gt;Do you have the right sha256?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 21:36:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252769#M916</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2019-03-07T21:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks generic.ml: JRS_SLE.EXE</title>
      <link>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252805#M917</link>
      <description>&lt;P&gt;The hash is correct, but some explanation is in order. Yesterday, I noticed that the file listed on VirusTotal was a little out of date, so I uploaded the current version (which will soon be updated again) and the detection results changed. Now, 6 out of 64 engines detect it as malware, and Palo Alto Networks is not listed as detecting it or showing it as clean.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps you have some idea why it's not appearing in either group now.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 04:10:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/virustotal/palo-alto-networks-generic-ml-jrs-sle-exe/m-p/252805#M917</guid>
      <dc:creator>jrs-soft</dc:creator>
      <dc:date>2019-03-08T04:10:19Z</dc:date>
    </item>
  </channel>
</rss>

