I have Avast Pro and it keeps getting a false positive when I try to run my program even though I’ve added it to the exclusion list. I’ve started just leaving the active protection turned off :\
My question is, is there any way to remove a virus definition with the database so that it won’t be detected any more?
What is the file name and location ?
Have you tested it at other on-line scans, etc. ?
You could also check the offending/suspect file at: VirusTotal - Multi engine on-line virus scanner I feel virustotal is the better option as it uses the windows version of avast (more packers supported) and there are currently 30 different scanners.
Or Jotti - Multi engine on-line virus scanner if any other scanners here detect them it is less likely to be a false positive. Whichever scanner you use, you can’t do this with the file in the chest, you will need to move it out.
You probably haven’t added it to the exclusions in the resident scanner Standard Shield, you have to add it to both areas. Standard Shield, Customize, Advanced, Add and
Program Settings, Exclusions
they were detected as Win32.Iroffer-011[Trj] and Win32.Iroffer-049[Trj]
I think I figured it out the exclusion. I only had one of the added to the exclusion list, but it’s working now.
Still I know they are working proper as when I downloaded them and I don’t seem to have any type of extraneous outgoing connections.
So why are they listed as trojans?
I think AVG detected it too, but since I bought and have been using avast I thought I’d ask here.
There are more kinds of malware behavior besides extraneous outgoing connections…
Some trojans use rootkit to became hidden to antivirus.
Why the error (if it is an error)? Well, false positive are due to incorrect signature files, treating the clean files as being infected.
hmm I see, so the only way to bypass it is to add it to the exclusions list?
I downloaded iroffer from http://iroffer.org/ just now and got this result
http://iroffer.org/ is just the main page of the website for the program…
the actual download link is on the download page h**p://iroffer.org/archive/v1.3/iroffer_win32bin_1.3.b11.zip
I downloaded that, unzipped the iroffer.exe and submitted just the exe
I would be concerned with any of the malware names listing it as a backdoor which may be able to bypass your firewall. With so many hits I wouldn’t care about its origin I would be looking for another application that doesn’t rate this kind of attention by AV scanners.