You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
That one is often false positive unfortunately... https://board.flatassembler.net/topic.php?t=21786 has details, but I think the trojan is very polymorphic and thus the detection signature is very wide and thus prone to false positives 😐 https://board.flatassembler.net/topic.php?t=22773 "Two security experts point out to me that if code section is writeable, it is easily flagged by AV as malicious." ... so might be that
dumpbin (Windows):
dumpbin /headers my_app.exe
Check the characteristics of the .text section. It should be marked as CODE and Execute-Read.
The text was updated successfully, but these errors were encountered:
the nightly builds of vengi are detected as a trojan on windows 11
https://board.flatassembler.net/topic.php?t=21786
From a scummvm developer:
dumpbin (Windows):
dumpbin /headers my_app.exe
Check the characteristics of the
.text
section. It should be marked asCODE
and Execute-Read.The text was updated successfully, but these errors were encountered: