> >
> > I run clamav on linux, but I also have windows 7 installed.
> > I mounted the windows partition and ran a clamav scan,
> > which found the following viruses:
> >
> > /mnt/windows/Windows/System32/cliconfg.exe: Win.Virus.Expiro-9965977-0
> > /mnt/windows/Windows/System32/spool/tools/PrintBrmEngine.exe:
> > Win.Virus.Expiro-9958014-0
> >
> > I submitted both these files at virustotal.com. PrintBrmEngine.exe
> > was not detected by anything besides clamav, and cliconfg.exe
> > was only detected by clamav and google. So I am assuming these are
> > probably
> > fasle positives. Just wondering if anyone has an opinion about these.
> >
> 
> I think the db maintainers would be very pleased with your help fixing
> false positives.
> 
> OT I think you need to airgap Windows7. If I remember correctly Microsoft
> distributed remote exploits just after it's EOL.
> 


----- Transcript of session follows -----
... while talking to smtp.usol.com.:
<<< 550 Your country is not allowed to connect to this server.
554 5.0.0 Service unavailable

:D it think you need to find different provider.
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat

Reply via email to