Howdy Matt from Taxware,
Hope your present heuristical detection issues may disappear as FP. Take the following info into consideration, please.
Especially for the website analysis part, for which I present relevant knowledge paired to experience.
It would be helpful and save you a lot of trouble if the file(s) come digitally signed as they are not now,
this is especially so with encrypted and compressed data and
this is not helpful: detects
Detects VirtualBox using ACPI tricks
process: {u'process_name': u'winfiduc.exe', u'process_id': 1592}
signs: [{u'type': u'api', u'value': {u'category': u'registry', u'status': True, u'return': u'0x00000000', u'timestamp': u'2016-04-13 01:06:02,246', u'thread_id': u'452', u'repeated': 0, u'api': u'RegOpenKeyExA', u'arguments': [{u'name': u'Handle', u'value': u'0x00000084'}, {u'name': u'Registry', u'value': u'0x80000002'}, {u'name': u'SubKey', u'value': u'HARDWARE\\ACPI\\DSDT\\VBOX__'}], u'id': 12295}}]
Detects the presence of Wine emulator
process: None
signs: [{u'type': u'registry', u'value': u'HKEY_CURRENT_USER\\Software\\Wine'}]
: http://www.isthisfilesafe.com/sha1/96B3153463BCCDB7F436C0EE504BDC6671044F2F_details.aspx
Just see the threat results and what they kick up here: https://www.google.nl/search?q=309A5C9D4D102964EAC1C1EA2338774A&oq=309A5C9D4D102964EAC1C1EA2338774A&aqs=chrome..69i57&sourceid=chrome&ie=UTF-8
There is quite some detection for it: https://www.virustotal.com/en/file/8978906210d352b4b9b4a4d94c565dc5da2d4d3e94f161a2f5baa5929b03b777/analysis/
Also the checking for the most updated version came flagged by some AV: Only 1 of the AV scans reported anything malicious in it, 360 Security, which has apparently had many false positives before. However, this <MACHINE_DNS_SERVER>:53 thing appears in many malicious scans on VirusTotal.
Again my main point here is that dignitally signing would prevent many a FP to appear.
Where the website is concerned you have avulnerable jQuery library detected:
-http://www.taxwaresystems.com
Detected libraries:
jquery - 1.11.0 : (active1) -http://www.taxwaresystems.com/wpscripts/jquery.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
(active) - the library was also found to be active by running code
1 vulnerable library detected
Errors and warnings here:
405 - HTTP verb used to access this page is not allowed.
The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
Configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.
Clickjacking Warning: Result
It doesn’t look like an X-Frame-Options header was returned from the server which means that this website could be at risk of a clickjacking attack. Add a header to explicitly describe the acceptable framing practices (if any) for this site.
In wpscripts/jquery.event.move.js there is a code error: error: undefined variable jQuery
error: undefined variable jQuery.event
error: line:1: SyntaxError: missing ; before statement:
error: line:1: var jQuery.event = 1;
error: line:1: …^
Always remember thatjQuery is a sink, your SRI A-Status saved you there! → https://sritest.io/#report/45f0cb81-3fb4-4d57-8a0b-4c25c3807b30 8) but set up your event-driven responses on page elements correctly!
polonus (volunteer website security analyst and website error-hunter)