Giorgos Posted January 4, 2022 Report Share Posted January 4, 2022 Despite the...somewhat weird name, it's clearly a trusted program (open source). SF.NET page, here. (Link for Github, also at that page).  Bye!!!  Link to comment Share on other sites More sharing options...
ritchie58 Posted January 4, 2022 Report Share Posted January 4, 2022 Yes, I've heard of Process Hacker before. Was there any quarantine response? Just click on the word 'Quarantine' located below the History tab to investigate. What was Immunet's detection name for this very possible False Positive? Regards, Ritchie... Link to comment Share on other sites More sharing options...
Giorgos Posted January 4, 2022 Author Report Share Posted January 4, 2022 It deleted at the initial flash scan. Couldn't restore it from quarantine, so I disabled the antivirus, redownloaded, added to exceptions and reenabled the antivirus. Â Link to comment Share on other sites More sharing options...
ritchie58 Posted January 5, 2022 Report Share Posted January 5, 2022 Hi Giorgos, I did some research on the web for Process Hacker & couldn't find anything malicious being reported. You did the right thing by creating a custom Exclusion rule with Immunet for Process Hacker as I'm also convinced that this is a False Positive. If you didn't already I would recommend that the Exclusion cover the 'entire Program Files folder' for Process Hacker. That should go a long way at not getting any more FP's for this app. If a detection does occur again let me know what the detection name is. Actually a screen shot of the data would be even better & we could look into this issue further if need be. Cheers, Ritchie... Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now