Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

windows defender remove D:\Support\Scoop\apps\flow-launcher\current\app-1.13.0\UserData\Plugins\Steam Search-8.1.0\run.exe #46

Closed
I-Want-ToBelieve opened this issue Mar 2, 2023 · 10 comments

Comments

@I-Want-ToBelieve
Copy link

Please open new issue in: https://github.com/Garulf/Steam-Search/issues/new

  1. upload log file: D:\Support\Scoop\apps\flow-launcher\current\app-1.13.0\UserData\Logs\1.13.0\2023-03-02.txt
  2. copy below exception message

Flow Launcher version: 1.13.0
OS Version: Microsoft Windows NT 10.0.22621.0
IntPtr Length: 8
x64: True

Python Path:
Node Path:
Date: 03/02/2023 21:40:24
Exception:
Steam Search Exception:
Websites: https://github.com/Garulf/Steam-Search
Author: Garulf
Version: 8.1.0
Flow.Launcher.Core.ExternalPlugins.FlowPluginException: An error occurred trying to start process 'D:\Support\Scoop\apps\flow-launcher\current\app-1.13.0\UserData\Plugins\Steam Search-8.1.0\run.exe' with working directory 'C:\windows\system32'. 系统找不到指定的文件。
---> System.ComponentModel.Win32Exception (2): An error occurred trying to start process 'D:\Support\Scoop\apps\flow-launcher\current\app-1.13.0\UserData\Plugins\Steam Search-8.1.0\run.exe' with working directory 'C:\windows\system32'. 系统找不到指定的文件。
at System.Diagnostics.Process.StartWithCreateProcess(ProcessStartInfo startInfo)
at System.Diagnostics.Process.Start(ProcessStartInfo startInfo)
at Flow.Launcher.Core.Plugin.JsonRPCPlugin.ExecuteAsync(ProcessStartInfo startInfo, CancellationToken token) in C:\projects\flow-launcher\Flow.Launcher.Core\Plugin\JsonRPCPlugin.cs:line 247
at Flow.Launcher.Core.Plugin.JsonRPCPlugin.QueryAsync(Query query, CancellationToken token) in C:\projects\flow-launcher\Flow.Launcher.Core\Plugin\JsonRPCPlugin.cs:line 314
at Flow.Launcher.Core.Plugin.PluginManager.<>c__DisplayClass22_0.<b__0>d.MoveNext() in C:\projects\flow-launcher\Flow.Launcher.Core\Plugin\PluginManager.cs:line 191
--- End of stack trace from previous location ---
at Flow.Launcher.Infrastructure.Stopwatch.DebugAsync(String message, Func`1 action) in C:\projects\flow-launcher\Flow.Launcher.Infrastructure\Stopwatch.cs:line 34
at Flow.Launcher.Core.Plugin.PluginManager.QueryForPluginAsync(PluginPair pair, Query query, CancellationToken token) in C:\projects\flow-launcher\Flow.Launcher.Core\Plugin\PluginManager.cs:line 190
--- End of inner exception stack trace ---
at Flow.Launcher.Core.Plugin.PluginManager.QueryForPluginAsync(PluginPair pair, Query query, CancellationToken token) in C:\projects\flow-launcher\Flow.Launcher.Core\Plugin\PluginManager.cs:line 210
at Flow.Launcher.ViewModel.MainViewModel.<>c__DisplayClass135_0.<g__QueryTask|2>d.MoveNext() in C:\projects\flow-launcher\Flow.Launcher\ViewModel\MainViewModel.cs:line 811
--- End of stack trace from previous location ---
at Flow.Launcher.ViewModel.MainViewModel.QueryResults() in C:\projects\flow-launcher\Flow.Launcher\ViewModel\MainViewModel.cs:line 785
at System.Threading.Tasks.Task.<>c.b__128_0(Object state)
at System.Windows.Threading.ExceptionWrapper.InternalRealCall(Delegate callback, Object args, Int32 numArgs)
at System.Windows.Threading.ExceptionWrapper.TryCatchWhen(Object source, Delegate callback, Object args, Int32 numArgs, Delegate catchHandler)

@I-Want-ToBelieve I-Want-ToBelieve changed the title windows defender windows defender remove D:\Support\Scoop\apps\flow-launcher\current\app-1.13.0\UserData\Plugins\Steam Search-8.1.0\run.exe Mar 2, 2023
@scharmach
Copy link

Same here, updated the plugin and Windows Defender detected run.exe as the treat Trojan:Win32/Wacatac.H!ml.

Report from VirusTotal for Steam Search-8.1.0.zip:

https://www.virustotal.com/gui/file/390b4e7716592ac4e433601dc6252878f2bbcb2b777d1704729da8a0a79bf64b?nocache=1

@Garulf
Copy link
Owner

Garulf commented Mar 3, 2023

Sorry I can only assume the executable being named: "run.exe" is some how triggering a false positive with windows defender.

I'll have test version with a name change to see if this helps.

EDIT: This is not the case. Its how the plugin is being compiled and is not signed with a certificate.

@Garulf
Copy link
Owner

Garulf commented Mar 3, 2023

Sadly it looks like a common issue: https://plainenglish.io/blog/pyinstaller-exe-false-positive-trojan-virus-resolved-b33842bd3184

@scharmach What version did you update from?

@scharmach
Copy link

@Garulf I don't really remember and since I couldn't find anything in the logs, I had a look at the creation date of the Steam Search folder here: %AppData%\FlowLauncher\Settings\Plugins. There it says that the folder was created on September 9, 2022.

Comparing this with the releases, I must still have been on version 5.0.0, which was released on September 8, 2022.

Since the plugin updates only appear at the bottom of the Plugin Store and you are not notified about them, I only noticed that updates were available at all when I updated Flow Launcher to 1.14.0. Therefore, my version was already quite old ...

@Garulf
Copy link
Owner

Garulf commented Mar 8, 2023

@scharmach Does the Minecraft Multi Launcher plugin also trigger Windows defender? If so I could adjust this plugin to use a similar method to avoid false positive detection.

@scharmach
Copy link

@Garulf I don't have the Minecraft Multi Launcher plugin installed and I'm not sure if I want to test this. Sure, this might only be a false positive, but I would prefer not to trigger Windows Defender eventually again on my system.

@Garulf
Copy link
Owner

Garulf commented Mar 9, 2023

@Garulf I don't have the Minecraft Multi Launcher plugin installed and I'm not sure if I want to test this. Sure, this might only be a false positive, but I would prefer not to trigger Windows Defender eventually again on my system.

I see, no problem. Sadly nothing is triggered on my end.

In the mean time I have sent the file to Microsoft to see if anything can be done on their end.

You’re more then welcome to send the file on your end as well (or not) via: https://www.microsoft.com/en-us/wdsi/filesubmission/

image

@Garulf
Copy link
Owner

Garulf commented Mar 10, 2023

Good news! I just got a report back from MS and they cleared the executable.

I'll share a screen shot when I'm back at my computer.

@Garulf
Copy link
Owner

Garulf commented Mar 10, 2023

image

If you are still having issues you can follow the analyst's recommendation:

...If the detection is still observed, follow the steps below to capture support log files from the system reporting detection.

From an elevated command prompt, change to directory "%programfiles%\windows defender" and execute mpcmdrun.exe with option GetFiles:
cd "%programfiles%\windows defender"
mpcmdrun.exe -GetFiles

All created log files will be compressed into MPSupportFiles.cab. Please send us the detected file and MPSupportFiles.cab using https://aka.ms/wdsi. We will continue the investigation once we receive the support log files.

Thank you for contacting Microsoft.

@Garulf Garulf closed this as completed Mar 10, 2023
@scharmach
Copy link

Just checking in one last time, even if this is already closed, @Garulf.

I felt confident to reinstall the plugin now, but ran the files through VirusTotal again beforehand. Interestingly enough it's not triggering Windows Defender anymore, not on VirusTotal and then not on my system either. Must have been wrongly detected for only a couple of days by Microsoft then.

Thanks for your support on this and also, for making these plugins in the first place!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants