See: http://virusscan.jotti.org/en/scanresult/54d2aad00b5564f6f354c6a81549efbed6288828
and https://www.virustotal.com/en/file/11f02210f1c3b39ac96160f079b77623dbed0cd48aeb13b362b9d40c2b3c9305/analysis/
Anyone?
See: http://virusscan.jotti.org/en/scanresult/54d2aad00b5564f6f354c6a81549efbed6288828
and https://www.virustotal.com/en/file/11f02210f1c3b39ac96160f079b77623dbed0cd48aeb13b362b9d40c2b3c9305/analysis/
Anyone?
Hi,
Is this from your PC? Do you know filepath?
Location = C:\Users\pol\AppData\Local\Google\Chrome\User Data\Default\History Provider Cache
According to me it is the Google Chrome Omnibox Cache - Only avast on demand scan detects JS:ScriptPE-inf
or is this a reader junk file?
pol
Do not burden yourself with that detection. Try to clear browser cache ( CCleaner may help ) and that should calm down avast.
This is none other than yet another FP’s …
Hi magna86,
Thanks for the reassuring validation, you are the qualified malware removal expert.
I thought this was a FP anyways as I only perform third party scanning
and never go directly to sites with js malcode.
I always have script blocking active both in firefiox and google chrome,
also keep all my software updated via the avast updater service.
But whenever I have performed some cold reconnaisance scans
I always do a complete scan of my Users folder for the browser I used
before I close that browser down.
One always takes utmost care.
I think the avast! shields detection is awful.
It was the best that could happen to avast, just also in version 2014.
thanks again and kindest regards,
Damian