Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

22621.3007.63.2 and 22621.3007.63.3 flagged by Defender as Virus or potentially unwanted software #2873

Closed
TheAncient2 opened this issue Feb 20, 2024 · 116 comments

Comments

@TheAncient2
Copy link

Defender will not allow me to install the latest version of Explorer Patcher: It thinks it's a Virus
ExplorerPatcherVIRUS
(Running Win 11 - 22H1 (OS Build 22621.3155)
WinVer

@LPChip
Copy link

LPChip commented Feb 20, 2024

Same for me, Windows 10 Pro 22H2.

Its identified as HackTool:Win64/Patcher!MSR

So this really sounds like Microsoft does not like the tool that makes Windows 11 better and wants its users to suffer. I've restored the file and whitelisted the path from defender.

@griffinator76
Copy link

Same here with Windows 11 23H2

image

image

@lfloesser
Copy link

Same here

@NocturnalKing
Copy link

I have the same issue on my computer too

Screenshot 2024-02-20 124621

@applepines101
Copy link

applepines101 commented Feb 21, 2024

Same issue here.

Screenshot 2024-02-20 172045

@stretch07
Copy link

@valinet what is the source of this issue exactly

@RRTW
Copy link

RRTW commented Feb 21, 2024

Same issue in Windows 11 Home
EP_virus

@Amrsatrio
Copy link
Collaborator

Released 63.3. If this happens again I'll keep doing this.

@griffinator76
Copy link

Released 63.3. If this happens again I'll keep doing this.

Confirm that updating to 63.3 doesn't trigger any Windows Security alerts.

@TheAncient2
Copy link
Author

Tried to download version 63.3. Unfortunately, it still triggers the security warning.
ExplorerPatcher 63 3

@pushpeshkarki
Copy link

This is still happening on windows 11 Pro with the latest release.

image

@TheAncient2
Copy link
Author

TheAncient2 commented Feb 21, 2024 via email

@TheAncient2
Copy link
Author

TheAncient2 commented Feb 21, 2024 via email

@Amrsatrio Amrsatrio changed the title 2261.3007.63.2 flagged by Defender as Virus or potentially unwanted software 22621.3007.63.2 and 22621.3007.63.3 flagged by Defender as Virus or potentially unwanted software Feb 21, 2024
@Amrsatrio Amrsatrio reopened this Feb 21, 2024
@Amrsatrio
Copy link
Collaborator

Amrsatrio commented Feb 21, 2024

I suggest to report the false positives to Microsoft: https://www.microsoft.com/en-us/wdsi/filesubmission?persona=HomeUser

@applepines101
Copy link

Ran a virus test on the new update file and no issues were found.

MD5 checksum for update executable: 0F0D942625A01BA2BFA7F4FF6374F03B

@y2k04
Copy link

y2k04 commented Feb 21, 2024

It is not a false positive...
https://tria.ge/240221-h1b6kadb99/behavioral1
image
explorerpatcher.pdf

@Amrsatrio
Copy link
Collaborator

Amrsatrio commented Feb 21, 2024

@y2k04 I've said like 999 times, there are no stealer code present in EP. Everyone can check the code that gets into ep_setup.exe distributed through this GitHub. That is a false positive.

Someone else other than me should vouch for this though, honestly saying.

@y2k04
Copy link

y2k04 commented Feb 21, 2024

Then why does Triage report a 10/10?
For all we know, someone could've deleted some commit history implementing the code.

@y2k04
Copy link

y2k04 commented Feb 21, 2024

Still hella sus

@Amrsatrio
Copy link
Collaborator

Amrsatrio commented Feb 21, 2024

I am very sure because of that false Lumma stealer detection. The "Downloads MZ/PE" file is this one:
image

ep_setup.exe doesn't do any more of exe/dll downloads. Previously it was used to download specific versions of StartTileData.dll and such (those are distributed with Windows) but now not any more.

This one is for adding its uninstall entry in installed apps, nothing harmful:
image

This one is used for restarting explorer.exe as part of its installation/update process:
image

You do you. If you don't trust this then don't spread misinformation unless you can prove it that the code contains a stealer. This is an open source software, where the build process happens in GitHub's servers. Go check the source code and the build scripts yourself, or open IDA and find the stealer code and post it here if you believe that there's hidden code slipped in. If this software were closed source you could've said that. Swear to god I am in good faith developing this software, because I myself like the old taskbar a lot and don't want to miss it or see it being broken.

If you have proven that the code contains a stealer, tell me where the code is at and I will do my best to remove them. I totally do not want EP's name being contaminated just due to this.

@Trail-running
Copy link

Thanks for developing this software, I like the old taskbar a lot also. Following this issue and hopefully someone will step up and confirm that it is a false positive.

@druggedhippo
Copy link

I submitted here for review: https://www.microsoft.com/en-us/wdsi/filesubmission/ which is where all false positive reports should go.

@valinet
Copy link
Owner

valinet commented Feb 21, 2024

@Amrsatrio You're wasting your time imo. You can do so much to explain things rationally. Some still won't understand or even try to understand, by exploring the phenomenon themselves. They just limit themselves to believing some superfluous fact without researching what goes into that. Just ignore them, honestly, long term, it only generates unneeded stress for you and wastes your precious time dealing with the non-sense.

To everyone: once and for all, we do not have any intention of doing anything bad. Even if we had, why go though all the trouble of making an app like ExplorerPatcher when we could push some malware game in Google Play and that would have in a week the number of downloads this has gotten in years. It's not like it hasn't happened in the past. Whatever bugs there are in the program, you can be certain 100% they are unintentional and either documented and neutered when discovered, either documented and fixed. That's it.

To people believing and fueling these conspiracies and non-sensical posts, I challenge you to show me how you ensured the supply chain elsewhere in your life. Do you verify from transistor level to logical level everything that you use on a day by day basis? Do you ask the same you ask from EP to the others? Even then, EP has done more than the industry standard anyway: the code is fully open source, documented, so nothing stops you from checking out the tree, compiling a version yourself, disassembling that and then comparing the distributed executables with whatever you produced. I guarantee you functionally they are identical, nothing more, nothing less. Do this analysis, find something bad, and then come and open a topic like this. There are no blobs at the moment distributed with the program, you can recreate the binaries yourself from the source posted. You can also inspect the entirety of the source for "bad" things, as I said, I guarantee that, besides human mistakes aka bugs, you won't find anything malicious. The distributed binaries are not compiled on my PC or Amr's, but on GitHub's public infrastructure, on clean runners hosted in their cloud, all so that the build process has the least chance of getting compromised by an actor and that injecting unwanted payloads in the final executable. We do not touch those executables, they are compiled automatically every time new commits are pushed to the master branch.

From now on, threads on this matter won't be allowed. This is not a place to discuss "EP flagged by whatever AV engine". Things like "how can we improve EP's software supply chain security" or "what measures has the team taken to ensure distributed artifacts are the actual product of the source code posted" and so on of course are more than welcome and encouraged, things where we explain and build upon knowledge as well, but not where we waste time explaining for the millionth time how a modern AV engine works, what is a false positive, things explained a million times in the past.

Please refrain from replying if whatever you reply doesn't add value to the information that's already in this thread. Thank you.

@lakeykeith
Copy link

This is still happening on windows 11 Pro with the latest release.

image
Windows 10 Pro 22H2 ExplorerPatcher Threat Quarantined [Different threat]
image

@RRTW
Copy link

RRTW commented Feb 21, 2024

63.3 is OK for me, it doesn't trigger Windows11 Security alert.
(Windows 11 Home x64)

@Girofox
Copy link

Girofox commented Feb 21, 2024

Actually the issue is that this is common when a setup file is not older than 24 hours , the same was happening to WingetUI or SystemInformer (nightly builds). When there are very few users of a file this is very likely. So after one or two days Windows Defender cloud protection might stop flagging it as backdoor. For me 63.3 still triggers Windows Defender when trying to double click the .exe.

The error message is varying too:

image
image

@TheAncient2
Copy link
Author

@ateric I closed the issue a couple of days ago as currently things are working on my machines (#2873 (comment))
Machines are all running version 63.2, nobody is offering any updates that need to be installed and then blow up when you try to install them. For this reason, I currently don't need to waste anymore time on this. Hopefully , sooner or later, the AV companies will see the light and mark the latest updates of ExplorerPatcher as false positives. As for looking at my bank statements, I have no clue what you're talking about but I do hope you like red ink and are good with negative numbers.

@ateric
Copy link

ateric commented Feb 24, 2024

@TheAncient2

. . .
nobody is offering any updates that need to be installed and then blow up when you try to install them
. . .

Of course, I'm not forced to install any updates, but when a pop-up appears that says an update is available, my instinctive reaction is to respond.
Does this feel very unnatural to you ⁉️

Regarding money, I don't know you at all. Even if that were the case, I wouldn't turn down €100,000,000, whoever (Vladimir) offered me. To be honest, I would also have agreed to €50,000... And so would, of course, you... have you ⁉️

@TheAncient2
Copy link
Author

@ateric Let's try this again:

  • Originally, ExplorerPatcher DID offer an update.
    When I tried to install that update, alarm bells went off and Defender would not allow me to download or install it.
    At that time, I posted the issue here.
  • 2 days later, ExplorerPatcher no longer offered any updates.
    Thus, I felt, there was no need to respond to anything and I closed the issue.

Regarding money, I don't have the faintest idea what you are talking about...

@RikuTheKiller
Copy link

They're basically saying you conspired with Russia (Vladimir Putin) in exchange for money to infect computers with spy/malware. Yeah right, get your head out of the conspiracies @ateric this is a relatively small project used by nerds and it's open source with lots of transparency. This isn't the last target for something like that, but it's certainly not the first and it's owned by 2 people so you'd have to bribe both. Just shut up the likelihood is basically astronomical.

@TheAncient2
Copy link
Author

TheAncient2 commented Feb 25, 2024

@RikuTheKiller @ateric I am a USER of this software. I am NOT an author of this software. There is nothing that Putin would want to bribe ME for. The problem was caused by Microsoft Defender falsely detecting ExplorerPatcher as a virus. I was a victim of this problem and I reported, that this was happening to me. Putin does not have to bribe me to report that Microsoft screwed up (yet again). I have had enough run-ins with Microsoft to report their screw-ups for free - no payment required.

@pyrates999
Copy link

I suggest this issue be locked.

@y2k04
Copy link

y2k04 commented Feb 25, 2024

I suggest this issue be locked.

Agreed. This is getting out of hand.

@TheAncient2
Copy link
Author

@pyrates999 @y2k04
Agreed!
Although it would be nice to be able to find out "somewhere" if and when AV companies - especially Defender - are no longer blocking EP and it is ok to download the latest version.

@Amrsatrio
Copy link
Collaborator

Amrsatrio commented Feb 25, 2024

2 days later, ExplorerPatcher no longer offered any updates.
Thus, I felt, there was no need to respond to anything and I closed the issue.

That is because I pulled back 63.2 and 63.3 from being the latest release. I made it back to 62.2 which is the last known good. The real question is: what happens if I make 63.4 a release? Will MS flag it again? Should I do it to find out? Thing is it does not query all running processes anymore. If that gets flagged again then it means the setup codebase will need a reset to 62.2. Ugh.

I do not want to lock this thread as well because doing so might look like we're denying the fact that we have a virus without chances for the users to further speak or confirm about it, though.

@pyrates999
Copy link

I would build it myself and submit it to windows defender and scan it before you do a release.

@Amrsatrio
Copy link
Collaborator

Won't do anything I presume. It began with two detections, maybe with only Defender detecting as Wacatac or Wacapew but then it goes away naturally as it gets spread. It's very common for exes that are not widely spread yet. Speaking about submitting to MSR, that thing takes a long while to respond. It's been four days without a response at least for me so don't think it would make a difference.

Source: I've done that four days ago, and once again just now: https://www.virustotal.com/gui/file-analysis/ZDY3ODBkM2I4ZDI5YzFhZTU1ZmNjNjIzNmNhODMzZWE6MTcwODgzNDA1OQ==

@pyrates999
Copy link

I appreciate the work you do :)

@Amrsatrio
Copy link
Collaborator

I still believe that this is related to behavioral heuristics that are invoked manually by humans. 63.1, 63.2, and 63.3 all of them queries all running processes. Combined with the other things ep_setup does, I believe that would cause MS into hating this thing. 63.4 doesn't do that anymore as I said.

@TheAncient2
Copy link
Author

@Amrsatrio
I just tried downloading 63.3 and 63.4 again and, as before, Defender still blocks them from being downloaded. Of course, if you can't download them, you can't install them.
Since you pulled 63.3 and 63.4, EP no longer issues any pop-ups that tempt users into downloading a newer version which then gets blocked. No pop-ups ==> No download or install errors ==> No users complaining
... and version 63.2 still works just fine.

@pyrates999
Copy link

@Amrsatrio I just tried downloading 63.3 and 63.4 again and, as before, Defender still blocks them from being downloaded. Of course, if you can't download them, you can't install them. Since you pulled 63.3 and 63.4, EP no longer issues any pop-ups that tempt users into downloading a newer version which then gets blocked. No pop-ups ==> No download or install errors ==> No users complaining ... and version 63.2 still works just fine.

Can you show the screen shot of defender blocking them? What does defender identify them as?

@TheAncient2
Copy link
Author

@pyrates999
I added exceptions for "everything" I could think of on every machine and I'm afraid I don't have the time to undo all this work just so I can take a screenshot. In the meantime, I am attaching some screenshots of error messages I am STILL receiving in Chrome.
(I do not know which component issues those messages. Could be native Chrome, could be some add-in, could even be Defender)
ChromeDownloadBlock1
ChromeDownloadBlock2
ChromeDownloadBlock3

@pyrates999
Copy link

Those are chrome warnings, they are not coming from windows defender. I get them too. It happens when a file hasn't been downloaded much and is less then 24 hours old.

@druggedhippo
Copy link

Microsoft Analyst response to my submission:

"We have reviewed the files and added malware detections for them to the next definition update. The latest definition information is available here: https://docs.microsoft.com/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus

Thank you for contacting Microsoft."

As of this comment, 63.4 is not detected by Windows Defender, but 63.3 is flagged as "HackTool:Win64/Patcher!MTB"

Definition: 1.405.631.0

@Amrsatrio
Copy link
Collaborator

Yep I got the same. Probably we need to dispute about this now, or try releasing a new update based on 62.2.

@dedors
Copy link

dedors commented Feb 29, 2024

63.4 not detected on my Win11

@elmondohummus
Copy link

Did my part and submitted v.63.3's file as a false-positive detection for malware. Don't know if Microsoft will move on it, but at least it's one more report.

@kilgorezer
Copy link

It's happening on an older version without the latest updates too.

@catnip-king
Copy link

Also got this for the latest update. Freaked me out a bit because other updates have gone smoothly. Sent a false positive report to Windows Defender for what its worth.

@Amrsatrio
Copy link
Collaborator

@catnip-king By submitting it to Microsoft you are basically converting the detection to HackTool:Win64/Patcher.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests