I have a number of legitimate tools on my system for home admin password recovery etc. … Nirsoft and Sysinternals are just a few respectable names. And every if I stupidly move them from one location to another Avast annoys the heck out of me by flagging up an infection as there is no sensible whitelisting feature. Is there any way to permanently flag the file as safe based on say a checksum or something like it? That way it won’t matter where the tools are located on my PC and Avast can ignore them.
The problem with such tools is avast doesn’t know if they are used for good or evil.
As for no sensible way of white listing, what have you tried ?
The use of the * wildcard should get round your movement to a different folder, e.g. c:*\suspect_file_name.exe, etc. so that is good for any folder on the c:\ drive for whatever the tool’s file name is.
That would need to be entered in the standard shield and program settings, exclusions to cover on-access and on-demand scans.
You could go through the process of confirming at virustotal that it is a false detection (but I suspect others may also flag the tool/s) and reporting it to avast so the signature can be updated assuming they accept it isn’t malicious, etc.
You could also check the offending/suspect file at: VirusTotal - Multi engine on-line virus scanner and report the findings here. You can’t do this with the file securely in the chest, you need to extract it to a temporary (not original) location first, see below.
Create a folder called Suspect in the C:\ drive, e.g. C:\Suspect. Now exclude that folder in the Standard Shield, Customize, Advanced, Add, type (or copy and paste) C:\Suspect* That will stop the standard shield scanning any file you put in that folder. You should now be able to export any file in the chest to this folder and upload it to VirusTotal without avast alerting.
They should correct the detection into the virus signature database. If you submit the files to virus (at) avast (dot com you’ll help improve detection and accuracy.
You can use the Exclusion lists but there isn’t a MD5/CRC check (or white list). It will take much more resources (to acquire and compare) then the scanning itself.
Thanks for your reply. Yes, I am aware of the current system of whitelisting, which requires a double entry process. I think a configurable whitelist for all would be much better than the current system.
Also, as far as I can see, you cannot flag a file as safe when it is detected as a threat by Avast… So when all the sirens and lights go off to warn you that you have a possibly dodgy file, you cannot click a button “Whitelist this file” or “Known Safe File” for example. This of course means that when you click on ‘do nothing’ the file is locked and you cannot move it anywhere until it is whitelisted under both on-access and on-demand scans. And I find that this is annoying.
BTW: I’m definitely not moaning about the Avast product overall, not at all. I think it is fantastic product with very useful features that many other AV softwares haven’t even thought of let alone give away generously in their free versions. No, I rate the product very highly, it’s just this particular feature that bugs me.
Also, let’s assume that I’m using the * wildcard and use it like in your example:
e.g. c:\*\suspect_file_name.exe, etc. so that is good for any folder on the c:\ drive for whatever the tool's file name is.
Does avast then recognise the file by it’s filename or some other means? Does avast tag that file at all? What I mean is, if a file of the same name was someone to appear in another folder on my box and that particular file WAS infected would avast ignore it because it whitelists the name and not the file?
Maybe in next version. There will be a beta phase probably starting next week.
I’m not sure you will be able to manage the exclusion list from there (could be dangerous for common users allowing what they shouldn’t) or it will be just a submission process dedicated to false positives.
File name and path (short 8.3 and full paths).
If you use the file name, wherever it’s located it will be excluded from scanning.
Somehow I thought that would be the case. So then, it might not be a very good idea to whitelist/exclude file based only on its filename only (using a wildcard IOW) rather than specifically filename and location. Okay, not a massive vulnerability, but it could nonetheless mean that a file of the same name could exist anywhere on the PC and get ignored even if it happened to be infected.