When I scan it, I get the above alert. How would I know if it’s a false positive? Should I unzip it and re-scan the unzipped contents, or is that ill-advised?
Suspicious files can be uploaded and tested at virustotal.com
Should I unzip it and re-scan the unzipped contents, or is that ill-advised?
It is best to scan unzipped at virustotal.
If you are scared of doing that, you may use metadefender.com it will unpack and show file inside, click details for result
The file compressed is only detected on the scan
When unpacking there is no detection, there is no executable application.File has been submitted to FTP
Let’s wait for someone else will look at this.
It is an error in configuring the Ruby implementation - An unhandled win32 exception occurred in UE4Editor.exe and we have VectorVM.dll D:\Team6\EngineT6\Engine\Binaries\Win64\UE4Editor-VectorVM.dll in Cryptbase detected. Something to do with svhost.exe trying to access the aplication.
Somehow I have a hunch it could be a false positive. But scan, better safe than sorry.
I’ve downloaded the open_icon_library-standard-0.11.zip file from the website and then scanned it with an on-demand scan and it came out clean. So either the file changed or I got served a different one from a different mirror (hash of the downloaded file is 3FA5229C3C84711B3B67026B20E180FB7BFAEC396445C7E473E7D2A245F83078).
Just to be sure I’ve manually checked the file I downloaded and it looks OK.
I see, I’ve scanned the .tar file and it does trigger. And as mentioned earlier, there are no executable files so this is definitely a false positive. I’ve already updated the detection, it should stop triggering after next VPS update.