Jump to content

Malicious Activity Detected: Persistence via Registry - Windows


oconnb17
 Share

Recommended Posts

Immunet detected a persistence behavioral issue on a Windows machine notification below.

"Behavioral Protection detected malicious activity [UserInitMprLogonScript Registry Key Used for Persistence] No remaining actions were taken."

It is not consistently displayed, might be OneDrive or another App that wrote to registry and unclear how to inspect and/or remediate.   Any direction would be helpful.

Link to comment
Share on other sites

Other users have reported the same detection as well recently. This is a False Positive.

I would suggest you submit a False Positive report to the Immunet Support team & since it's a ClamAV detection also report it to the folks at ClamAV too. Here's the links for both to do so.

https://www.immunet.com/false_positive

https://www.clamav.net/reports/fp

  • Thanks 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

×
×
  • Create New...