Virusalarm in TailBite and TBUpdater

TailBite specific forum

Moderators: gnozal, ABBKlaus, lexvictory

User avatar
ts-soft
Always Here
Always Here
Posts: 5756
Joined: Thu Jun 24, 2004 2:44 pm
Location: Berlin - Germany

Virusalarm in TailBite and TBUpdater

Post by ts-soft »

Can you change something? Is not that simple, the temporary file "TBUpdater.exe" in
the exemption list stuck. TailBite itself but also triggers alarm. Only TailBite
manager is clean :wink:

greetings
Thomas
PureBasic 5.73 | SpiderBasic 2.30 | Windows 10 Pro (x64) | Linux Mint 20.1 (x64)
Old bugs good, new bugs bad! Updates are evil: might fix old bugs and introduce no new ones.
Image
ABBKlaus
Addict
Addict
Posts: 1143
Joined: Sat Apr 10, 2004 1:20 pm
Location: Germany

Post by ABBKlaus »

What scanner are you using ?
User avatar
ts-soft
Always Here
Always Here
Posts: 5756
Joined: Thu Jun 24, 2004 2:44 pm
Location: Berlin - Germany

Post by ts-soft »

ABBKlaus wrote:What scanner are you using ?
Avira 8 Personal
PureBasic 5.73 | SpiderBasic 2.30 | Windows 10 Pro (x64) | Linux Mint 20.1 (x64)
Old bugs good, new bugs bad! Updates are evil: might fix old bugs and introduce no new ones.
Image
ABBKlaus
Addict
Addict
Posts: 1143
Joined: Sat Apr 10, 2004 1:20 pm
Location: Germany

Post by ABBKlaus »

Just compiled with PB4.20 final and the result is the same.
You should send them the file TBUpdater.exe !

Code: Select all

Datei TBUpdater.exe empfangen 2008.05.23 23:41:48 (CET)

Ergebnis: 5/32 (15.63%)

Antivirus Version letzte aktualisierung Ergebnis 
AhnLab-V3 2008.5.22.1 2008.05.23 - 
AntiVir 7.8.0.19 2008.05.23 TR/Crypt.XPACK.Gen 
Authentium 5.1.0.4 2008.05.23 - 
Avast 4.8.1195.0 2008.05.23 - 
AVG 7.5.0.516 2008.05.23 - 
BitDefender 7.2 2008.05.23 - 
CAT-QuickHeal 9.50 2008.05.23 (Suspicious) - DNAScan 
ClamAV 0.92.1 2008.05.23 - 
DrWeb 4.44.0.09170 2008.05.23 - 
eSafe 7.0.15.0 2008.05.22 - 
eTrust-Vet 31.4.5817 2008.05.23 - 
Ewido 4.0 2008.05.23 - 
F-Prot 4.4.4.56 2008.05.23 - 
F-Secure 6.70.13260.0 2008.05.23 - 
Fortinet 3.14.0.0 2008.05.23 - 
GData 2.0.7306.1023 2008.05.23 - 
Ikarus T3.1.1.26.0 2008.05.23 - 
Kaspersky 7.0.0.125 2008.05.23 - 
McAfee 5302 2008.05.23 - 
Microsoft 1.3520 2008.05.23 - 
NOD32v2 3128 2008.05.23 - 
Norman 5.80.02 2008.05.23 - 
Panda 9.0.0.4 2008.05.23 Suspicious file 
Prevx1 V2 2008.05.23 Malicious Software 
Rising 20.45.42.00 2008.05.23 - 
Sophos 4.29.0 2008.05.23 - 
Sunbelt 3.0.1123.1 2008.05.17 - 
Symantec 10 2008.05.23 - 
TheHacker 6.2.92.318 2008.05.23 - 
VBA32 3.12.6.6 2008.05.23 - 
VirusBuster 4.3.26:9 2008.05.23 - 
Webwasher-Gateway 6.6.2 2008.05.23 Trojan.Crypt.XPACK.Gen 
User avatar
ts-soft
Always Here
Always Here
Posts: 5756
Joined: Thu Jun 24, 2004 2:44 pm
Location: Berlin - Germany

Post by ts-soft »

Use TBUpdater the URLDownloadToFile_() API?
You can simple change this to the new ReceiveHTTPFile(), I think that may
fix this problem
PureBasic 5.73 | SpiderBasic 2.30 | Windows 10 Pro (x64) | Linux Mint 20.1 (x64)
Old bugs good, new bugs bad! Updates are evil: might fix old bugs and introduce no new ones.
Image
ABBKlaus
Addict
Addict
Posts: 1143
Joined: Sat Apr 10, 2004 1:20 pm
Location: Germany

Post by ABBKlaus »

If i would change the URLDownloadToFile_() to native PB-commands it won´t work behind a corporate firewall (proxy-server).

Btw the "UpdateTool.exe" from PB4.20 Beta6 has the same virus warning :

Code: Select all

Datei UpdateTool.exe empfangen 2008.05.20 20:35:17 (CET)
Status: Beendet 

Ergebnis: 11/32 (34.38%)

Antivirus Version letzte aktualisierung Ergebnis 
AhnLab-V3 2008.5.20.0 2008.05.20 - 
AntiVir 7.8.0.19 2008.05.20 TR/Crypt.XPACK.Gen 
Authentium 5.1.0.4 2008.05.19 - 
Avast 4.8.1195.0 2008.05.20 - 
AVG 7.5.0.516 2008.05.20 Generic10.ZBL 
BitDefender 7.2 2008.05.20 - 
CAT-QuickHeal 9.50 2008.05.19 - 
ClamAV 0.92.1 2008.05.20 - 
DrWeb 4.44.0.09170 2008.05.20 - 
eSafe 7.0.15.0 2008.05.20 Win32.Monder.gen 
eTrust-Vet 31.4.5806 2008.05.20 - 
Ewido 4.0 2008.05.20 - 
F-Prot 4.4.2.54 2008.05.16 - 
F-Secure 6.70.13260.0 2008.05.20 Trojan.Win32.Monder.gen 
Fortinet 3.14.0.0 2008.05.20 W32/Monder!tr 
GData 2.0.7306.1023 2008.05.20 Trojan.Win32.Monder.gen 
Ikarus T3.1.1.26.0 2008.05.20 Virus.Trojan.Win32.Monder 
Kaspersky 7.0.0.125 2008.05.20 Trojan.Win32.Monder.gen 
McAfee 5299 2008.05.20 - 
Microsoft 1.3520 2008.05.20 - 
NOD32v2 3114 2008.05.20 - 
Norman 5.80.02 2008.05.20 - 
Panda 9.0.0.4 2008.05.20 - 
Prevx1 V2 2008.05.20 - 
Rising 20.45.12.00 2008.05.20 - 
Sophos 4.29.0 2008.05.20 Mal/Generic-A 
Sunbelt 3.0.1123.1 2008.05.17 - 
Symantec 10 2008.05.20 - 
TheHacker 6.2.92.314 2008.05.20 - 
VBA32 3.12.6.6 2008.05.20 Trojan.Win32.Monder.gen 
VirusBuster 4.3.26:9 2008.05.20 - 
Webwasher-Gateway 6.6.2 2008.05.20 Trojan.Crypt.XPACK.Gen 
Last edited by ABBKlaus on Sun May 25, 2008 12:25 am, edited 2 times in total.
AND51
Addict
Addict
Posts: 1040
Joined: Sun Oct 15, 2006 8:56 pm
Location: Germany
Contact:

Post by AND51 »

ABBKlaus wrote:won´t work behind a corporate firewall
You mean PROXY? Routers and Firewalls are automatically passed by OpenNetworkConnection(), if permission allowed. Only HTTP-Proxies must be handled manually.
PB 4.30

Code: Select all

onErrorGoto(?Fred)
ABBKlaus
Addict
Addict
Posts: 1143
Joined: Sat Apr 10, 2004 1:20 pm
Location: Germany

Post by ABBKlaus »

AND51 wrote:You mean PROXY? Routers and Firewalls are automatically passed by OpenNetworkConnection(), if permission allowed. Only HTTP-Proxies must be handled manually.
Exactly.
Post Reply