When I compiled the codes below to produce the exe code, it gives positive trojan results for
backdoor.Win32.infexor trojan by Emisoft and Ikarus. Even Kapaski gives the same result while compiling under certain conditions (not always... by deleting certain lines)
See http://www.foohokok.com/test/totalvirus.gif
However when I deleted the following line, it gives negative result for trojan.
" result3=WebGadget(10, 0, 31, 0, 0, "c:\visless\test.htm",#PB_EventType_DownloadEnd) "
I sent to http://www.virustotal.com for checking.
This is bad as any exe compiled with purebasic with Webget syntax will now give positive trojan.
Does this happen to anyone of you?
What should I do?
Tell the anti-virus company as false positives? Or should Purebasic themselves do it?
Warmest regards and thanks
Alan
Code: Select all
If OpenWindow(0, 10, 20, 500, 500, "AGE Paperless Homework ",#PB_Window_Maximize | #PB_Window_MaximizeGadget |#PB_Window_MinimizeGadget | #PB_Window_SizeGadget)
CreateStatusBar(0, WindowID(0))
StatusBarText(0, 0, "Welcome to the world of AGE - to close the digital divides! :)", 0)
If connection=1
website$="www.paperlesshomework.com"
Else
website$=""
EndIf
ButtonGadget(1, 0, 0, 50, 25, "Go Back")
ButtonGadget(2, 50, 0, 50, 25, "Go Next")
ButtonGadget(3, 100, 0, 50, 25, "Stop")
StringGadget(4, 155, 5, 0, 20, website$)
ButtonGadget(5, 0, 0, 25, 25, "Go")
Frame3DGadget(6, 0, 30, 0, 2, "", 2) ; Nice little separator
AddKeyboardShortcut(0, #PB_Shortcut_Return, 0)
ResizeWebWindow()
[b]result3=WebGadget(10, 0, 31, 0, 0, "c:\visless\test.htm",#PB_EventType_DownloadEnd) [/b] Repeat
Event = WaitWindowEvent()
Select Event
Case #PB_Event_Gadget
Select EventGadget()
Case 1
SetGadgetState(10, #PB_Web_Back)
Case 2
SetGadgetState(10, #PB_Web_Forward)
Case 3
SetGadgetState(10, #PB_Web_Stop)
Case 5
SetGadgetText(10, GetGadgetText(4))
EndSelect
Case #PB_Event_Menu ; We only have one shortcut
SetGadgetText(10, GetGadgetText(4))
Case #PB_Event_SizeWindow
ResizeWebWindow()
EndSelect
Until Event = #PB_Event_CloseWindow
EndIf


