<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242492#M125548</link>
    <description>&lt;P&gt;We are seeing the same behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is actually a false positive against a legitimate Microsoft update, then:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Why is Microsoft making our computers get DLL files over an unencrypted HTTP connection? (Geez, Microsoft)&lt;/LI&gt;
&lt;LI&gt;Why aren't they using their own MSFT netblocks instead of a 3rd party CDN / colocation company (Colocation America Corporation)&lt;/LI&gt;
&lt;LI&gt;Why is this behavior happening on computers with Windows updates turned OFF&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition, we noticed the following two additional "files":&lt;/P&gt;
&lt;P&gt;216.74.105.204&lt;FONT color="#0000FF"&gt;{{{{/}}}}&lt;/FONT&gt;filestreamingservice/files/9683459a-02fa-4bd6-9ae6-af8ddfbeef35?P1=1763926133&amp;amp;P2=404&amp;amp;P3=2&amp;amp;P4=GOZXCewqQuAo9xaOkFUJus8cWmvuRRYqUNIXAp7bl5iI7duymC/li00a7kgIX9MFwBnbDuFTOB9pL7I18kZ2Gg==&amp;amp;cacheHostOrigin=2.tlu.dl.delivery.mp.microsoft.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Nov 2025 20:19:13 GMT</pubDate>
    <dc:creator>SYoung14</dc:creator>
    <dc:date>2025-11-24T20:19:13Z</dc:date>
    <item>
      <title>Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242462#M125538</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;we have had a large amount of the following alerts via this filename. We think it could be related to a Microsoft update. Has anyone else seen this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 10:39:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242462#M125538</guid>
      <dc:creator>becksyboy</dc:creator>
      <dc:date>2025-11-24T10:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242470#M125539</link>
      <description>&lt;P&gt;Hi Becksyboy,&lt;/P&gt;
&lt;P&gt;I do not have answer but I am wondering myself about it. I can see several alerts in last 2 days concerning what you described - on several endpoints but no information is found. Only place on the Internet I see about this issue is this community thread. Despite action being BLOCKED_9 - I do not see any usefull information.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 13:01:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242470#M125539</guid>
      <dc:creator>S.Operator225554</dc:creator>
      <dc:date>2025-11-24T13:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242474#M125541</link>
      <description>&lt;P&gt;Having the same issue. Thousands of alert emails. All the same&amp;nbsp;Virus/Win32.WGeneric.esuykr(752144200) with&amp;nbsp;misc: 206.206.85.202/filestreamingservice/files/9683459a-02fa-4bd6-9ae6-af8ddfbeef35?P1=1764000338&amp;amp;P2=404&amp;amp;P3=2&amp;amp;P4=YDDgm/xWLBt72w75YAeGr9xQrqK8hDBIUmysmppuEA4LGHQH05HpVTdDCdlt1nw+5ewnbPKWuH1bhYnl4pa5Jw==&amp;amp;cacheHostOrigin=2.tlu.dl.delivery.mp.microsoft.com. It looks like just about every computer on the inside of this network have triggered the alert.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 15:59:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242474#M125541</guid>
      <dc:creator>MattVanEpps</dc:creator>
      <dc:date>2025-11-24T15:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242484#M125545</link>
      <description>&lt;P&gt;Any updates on this? I also had it trigger on a couple other files, such as&amp;nbsp;WindowsAdvancedSettings.exe but coming from the same ip of&amp;nbsp;216.74.105.201&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 18:15:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242484#M125545</guid>
      <dc:creator>josh.weeden</dc:creator>
      <dc:date>2025-11-24T18:15:50Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242485#M125546</link>
      <description>&lt;P&gt;I think these were false positives. Try installing the &lt;STRONG&gt;5381-5907&lt;/STRONG&gt; A/V updates from this morning. That put a stop to these detections for us.&lt;/P&gt;
&lt;P&gt;If you pull up the Threat IDs in the Threat Vault, you'll see where they removed the definitions in the&amp;nbsp;5381-5907 update. For example, look at&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/?query=752144200" target="_blank" rel="noopener"&gt;https://threatvault.paloaltonetworks.com/?query=752144200&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Current Release: No&lt;/P&gt;
&lt;P&gt;Last Release: 5380 (2025-11-23 UTC)&lt;/P&gt;
&lt;P&gt;First Release: 5379 (2025-11-22 UTC)&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 18:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242485#M125546</guid>
      <dc:creator>sounetworksupport</dc:creator>
      <dc:date>2025-11-24T18:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242492#M125548</link>
      <description>&lt;P&gt;We are seeing the same behavior.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is actually a false positive against a legitimate Microsoft update, then:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Why is Microsoft making our computers get DLL files over an unencrypted HTTP connection? (Geez, Microsoft)&lt;/LI&gt;
&lt;LI&gt;Why aren't they using their own MSFT netblocks instead of a 3rd party CDN / colocation company (Colocation America Corporation)&lt;/LI&gt;
&lt;LI&gt;Why is this behavior happening on computers with Windows updates turned OFF&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition, we noticed the following two additional "files":&lt;/P&gt;
&lt;P&gt;216.74.105.204&lt;FONT color="#0000FF"&gt;{{{{/}}}}&lt;/FONT&gt;filestreamingservice/files/9683459a-02fa-4bd6-9ae6-af8ddfbeef35?P1=1763926133&amp;amp;P2=404&amp;amp;P3=2&amp;amp;P4=GOZXCewqQuAo9xaOkFUJus8cWmvuRRYqUNIXAp7bl5iI7duymC/li00a7kgIX9MFwBnbDuFTOB9pL7I18kZ2Gg==&amp;amp;cacheHostOrigin=2.tlu.dl.delivery.mp.microsoft.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 20:19:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242492#M125548</guid>
      <dc:creator>SYoung14</dc:creator>
      <dc:date>2025-11-24T20:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242651#M125581</link>
      <description>&lt;P&gt;We are also experiencing the same issue. Has anyone been able to confirm whether this is a false positive, or if any action is required?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2025 10:46:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242651#M125581</guid>
      <dc:creator>V.Sambath</dc:creator>
      <dc:date>2025-11-26T10:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.esuykr(752144200) via filename=msvcp140_2_app.dll</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242681#M125584</link>
      <description>&lt;P&gt;It was a false positive. As you can see on Threat vault, the signature was already disabled.&lt;BR /&gt;&lt;A href="https://threatvault.paloaltonetworks.com?query=752144200" target="_self"&gt;https://threatvault.paloaltonetworks.com?query=752144200&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;==&amp;gt; Status: inactive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oNA9CAM" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oNA9CAM&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 00:54:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-esuykr-752144200-via-filename-msvcp140-2/m-p/1242681#M125584</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2025-11-27T00:54:01Z</dc:date>
    </item>
  </channel>
</rss>

