![]() I still don't understand why a working app, stops working after an update, and the creator of that update can't or won't tell us what he's done, or how to fix it. So I need some one to tell me exactly what they did, to get this latest build working in DE !! Not interested in VM nonsense, I just installed W10 1909 on another pc, left it all default, vanilla settings, installed what RB needs to work, it ask to do the exceptions it needed, loaded a new job, and exactly the same non starting, non connecting behaviour. This is your software, and your update, so you need to help until this is resolved. See If you can connect to servers within virtual machine. ![]() Create virtual machine and then install fresh win10 1909. Like I said to start, I'm not trying to cause a panic here and I'm a huge fan of the program. Please let me know if this is a known issue and a false positive. I think what I've found is credible and I feel it would be best to get this information out there ASAP. I'd be interested to know what I'm breaking by not having it around. I'm not sure what the application is used for at this point. I've updated the update.ini and installed_tools.ini files in the Tools directory and the update.ini file in the Updates directory to set waitforprocess's AllowUpdate value to 0 for now. I love RipBot264 and want to continue using it. I will test my home machine once I get home, but if the SHA values match, there should be no different information. I want to scan the actual file through VirusTotal, but unfortunately, the application is blocked by Cisco Umbrella. It also looks like there might be a trojan that modifies windows firewall settings. It looks like the detected malware might be adware-related or part of an SEO inflation scheme. Anyone can check this themselves by copying the SHA256 values above, logging into VirusTotal, and clicking the Search function. When I run the Detection SHA (the part of the file detected as "malware"), it shows detections by CrowdStrike Falcon, Panda, Microsoft, Trapmine, and Webroot. When I run the Application SHA through Virustotal's search function, it shows clean. The SHA-256 for the application shows very little detection information. Oğile path: file:///RipBot264v1.24.0/tools/WaitForProcess/WaitForProcess.exe The file is hosted here: according to the update.ini file. I just want to calmly let everyone know that my corporate antivirus found an issue in the waitforprocess.exe file that is downloaded by the updater for RipBot264.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |