Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OwlyShield detect taskhostw.exe or svchost.exe like Ransomware activity during Windows Update execution #57

Open
mostonet opened this issue Sep 6, 2023 · 1 comment
Assignees

Comments

@mostonet
Copy link

mostonet commented Sep 6, 2023

Type: BUG/False positive
Tested on: Windows 10, Server 2016, Windows 11
Workaround: Exclusion in exclusions.txt

Dear OwlyShield Team
I would like to inform you of the problem in question.
How is it possible to whitelist the two files: taskhostw.exe and svchost.exe inside the exclusions.txt file
With what syntax should the TXT file be compiled?
Can you post a concrete example while waiting for a resolution to the problem?
A thousand thanks.

@dlescos dlescos self-assigned this Sep 6, 2023
@dlescos
Copy link
Contributor

dlescos commented Sep 6, 2023

Hi,

Thank you for your feedback!

We have indeed observed false positives with extreme disk activities, especially those arising from Windows updates.

We are working on implementing additional features to our model, which is time-consuming. We aim to release these updates by the end of September or early October (and take this opportunity to refresh our lagging GitHub repository).

You got it right: in the meantime, please ensure that you populate the file C:\Program Files\Owlyshield Ransom Community\config\exclusions.txt with the following content:

taskhostw.exe
svchost.exe

Then, restart the Owlyshield service.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants