02-18-2019 04:05 AM
File Hash: 44e94be969d812a907cc14e68c43280709b9be555e5c966e820af1eb6f7f48c3
Link to Virustotal report for the file: https://www.virustotal.com/en/file/44e94be969d812a907cc14e68c43280709b9be555e5c966e820af1eb6f7f48c3/...
Virustotal verdict: 0/67
Description: Visma InSchool Primus client ver: W4.59.2
06-18-2020 01:52 PM - edited 06-18-2020 01:53 PM
This forum is for non-customers reporting WildFire verdict FP's on VirusTotal.
If you have an AV signature triggering as an FP in your firewall, please open a Support case.
04-05-2021 02:35 PM
Lately I have started seeing lots of Threat Logs for Threat ID 406494039 which is for Virus/Win32.WGeneric.bcqcxs as per https://threatvault.paloaltonetworks.com/ however the hashes provided in the signature/threat ID definition i have checked in Virus Total and other hash file repuation check , these are not reported any where so i have few question
1)If the hashes (below mentioned )corresponding to which this threat is checking are not malicious in any way then why the alert is triggering ?
2) Since Palo alto is blocking these connection based on Threat ID and sending reset-both to client and server then why firewall resets the connection continuously i have seen 700+ logs in less 11 hours so what this signifies some one was accessing the file continuously for 11 hours if not then why did firewall kept on sending reset-both for 11 hours ?
I would request you to please answer the above questions as soon as possible also i did not found a way to post a new question hence asking my questions here ..thanks
04-07-2021 08:13 AM
Please provide an answer to the above questions ASAP.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!