Jump to content

toborobot

Members
  • Posts

    5
  • Joined

  • Last visited

Reputation

0 Neutral
  1. After restarting the computer it no longer detects that file I attached as being malicious. I am not sure why that would be the case if the file hash and name are different. It must have been some type of cached value. I will have to restart each time I make a change it appears in order to isolate what is triggering AV.
  2. I have the paid version of Malwarebytes and the paid version detects this as malicious. As does the free version of Malwarebytes in Virus Total. If the paid version of Malwarebytes is detecting this, is it still going to auto-correct itself? TRIED TO ISOLATE WHAT THE DETECTION WAS In an attempt to try and discover what was causing the detection I commented out all button functionality in the application. I experimented with removing code signing as well. The app does not do anything other than load a window and Malwarebytes is still quarantining the file whenever I open it. I tried renaming the file and opening from different locations with the same results. TOOK EXTREME MEASURES TO ISOLATE WHAT THE DETECTION WAS To take it a step further I deleted all the commented out functionality and deleted all the code in the application in case word usage was a trigger. The version of the app that does nothing returns 4 different AV solutions in VirusTotal including Malwarebytes. THERE IS NO LEGITIMATE REASON FOR THE DETECTION? Malwarebytes returns https://blog.malwarebytes.com/detections/machinelearning-anomalous-100/ Will doing something like setting a cap or only allowing the application to encrypt one file at a time prevent it from being viewed as ransomware or whatever Malwarebytes is detecting? NoSigning-NoFunctionality-EncrypIT.7z
  3. Cool thanks for the quick response!
  4. MalwarebytesReportEncrypIT.txtUploaded this report in case it is still wanted even though it is not a website
  5. EncrypIT.7zThis is an application I have put together in order to allow domain users to easily encrypt and decrypt files using EFS. After adding an ability for the users to define where they would like to save a backup of their EFS certificate key file and a prompt to define a password used in protecting the private key, Malwarebytes began believing the executable is malicious. https://github.com/OsbornePro/EncrypIT https://sourceforge.net/projects/encrypit/ https://osbornepro.com/encrypit
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.