Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fork from Peter Han triggering W32/Exploit.gen warning #91

Open
Gunner76th opened this issue May 11, 2018 · 0 comments
Open

Fork from Peter Han triggering W32/Exploit.gen warning #91

Gunner76th opened this issue May 11, 2018 · 0 comments

Comments

@Gunner76th
Copy link

Gunner76th commented May 11, 2018

https://images-ext-2.discordapp.net/external/toHwDBQq99kLblOB8ypTLPTpHpZr1O-PP5bJf8GQ7zA/https/snag.gy/QcbhOr.jpg

A member of my corporation was installing the fork that @peterhaneve has to make EveMon compatible with the new ESI system, and his Panda Virus Scanner alerted him to a possible W32/Exploit.gen

Virus gedetecteerd W32/Exploit.gen Locatie: C:\Users\Bonnema\Downloads\EVEMon-install-4.0.0.exe 11-5-2018 19:10 Geneutraliseerd

Here is a link to the fork in question: https://github.com/peterhaneve/evemon/

NevarrTivianne pushed a commit to NevarrTivianne/evemon that referenced this issue Apr 3, 2021
- Restore unintentionally deleted update events for character monitor header, fixes evemondevteam#98.
- Global apply name simplifications (convert Int64 to long and String to string)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant