Jim Ablett wrote: ↑Sun Apr 07, 2024 12:14 pm
I've updated the download package for standalone CrayBlitzUCI executable with correction for version number
and including Alex's config file generator batch file (which will correctly set time per move when playing black or white).
Jim, firstly - thanks for this treat! However, I just downloaded the updated package the actual CrayBlitzUCI executable doesn't seem to be included in it...? Please have a look, thank you.
Peter
Hi Peter,
Just looked, it's there. The file is 'CrayBlitzUCI_49h.exe' . Looks like your antivirus may have eaten it
It will be triggered by some antivirus because it's an executable with other exectuables embedded in it.
Your antivirus probably thinks it contains a malicious payload (it doesn't).
Jim Ablett wrote: ↑Sun Apr 07, 2024 12:14 pm
I've updated the download package for standalone CrayBlitzUCI executable with correction for version number
and including Alex's config file generator batch file (which will correctly set time per move when playing black or white).
Jim, firstly - thanks for this treat! However, I just downloaded the updated package the actual CrayBlitzUCI executable doesn't seem to be included in it...? Please have a look, thank you.
Peter
Hi Peter,
Just looked, it's there. The file is 'CrayBlitzUCI_49h.exe' . Looks like your antivirus may have eaten it
It will be triggered by some antivirus because it's an executable with other exectuables embedded in it.
Your antivirus probably thinks it contains a malicious payload (it doesn't).
To get the UCI version to run I had to turn off Windows Defender. I thought once I had it running I could turn back on Windows Defender and it would be okay. Windows Defender killed the running exe immediately and wiped it from the drive. It might be fine and Windows Defender might be wrong but it does not matter. It is not usable. But thanks anyway for trying!
Mike Sherwin wrote: ↑Mon Apr 08, 2024 8:29 pm
To get the UCI version to run I had to turn off Windows Defender. I thought once I had it running I could turn back on Windows Defender and it would be okay. Windows Defender killed the running exe immediately and wiped it from the drive. It might be fine and Windows Defender might be wrong but it does not matter. It is not usable. But thanks anyway for trying!
There's usually a way to tell security software to leave particular files alone. Here's what I found on Windows Defender - link.
The simple reveals itself after the complex has been exhausted.
Mike Sherwin wrote: ↑Mon Apr 08, 2024 8:29 pm
To get the UCI version to run I had to turn off Windows Defender. I thought once I had it running I could turn back on Windows Defender and it would be okay. Windows Defender killed the running exe immediately and wiped it from the drive. It might be fine and Windows Defender might be wrong but it does not matter. It is not usable. But thanks anyway for trying!
WOW !
It is perfectly usable. Windows Defender has the "Exclusions" option!
Jim Ablett wrote: ↑Sun Apr 07, 2024 12:14 pm
I've updated the download package for standalone CrayBlitzUCI executable with correction for version number
and including Alex's config file generator batch file (which will correctly set time per move when playing black or white).
Jim, firstly - thanks for this treat! However, I just downloaded the updated package the actual CrayBlitzUCI executable doesn't seem to be included in it...? Please have a look, thank you.
Peter
Hi Peter,
Just looked, it's there. The file is 'CrayBlitzUCI_49h.exe' . Looks like your antivirus may have eaten it
It will be triggered by some antivirus because it's an executable with other exectuables embedded in it.
Your antivirus probably thinks it contains a malicious payload (it doesn't).
Jim.
You are absolutely right Jim. Sorry about the confusion. I wish Norton would have made it clear that this file had been removed. I was able to wrestle it back though so all good! Again, thank you!
I put the exe file on the exclusion list. It then ran okay. I turned windows defender back on. It did not kill the exe and the exe continued to run. However windows defender insist that there is a virus in the exe.
Backdoor:Win32/Bladabindi!ml
Alert level Severe
Status: Active
...
...
Details: This program provides remote access to the computer it is installed on.
Mike Sherwin wrote: ↑Tue Apr 09, 2024 1:11 am
I put the exe file on the exclusion list. It then ran okay. I turned windows defender back on. It did not kill the exe and the exe continued to run. However windows defender insist that there is a virus in the exe.
Backdoor:Win32/Bladabindi!ml
Alert level Severe
Status: Active
...
...
Details: This program provides remote access to the computer it is installed on.
I am pretty sure there is no virus. There is always virustotal.com if you still have any concerns.
"Good decisions come from experience, and experience comes from bad decisions."
__________________________________________________________________
Ted Summers
Mike Sherwin wrote: ↑Tue Apr 09, 2024 1:11 am
I put the exe file on the exclusion list. It then ran okay. I turned windows defender back on. It did not kill the exe and the exe continued to run. However windows defender insist that there is a virus in the exe.
Backdoor:Win32/Bladabindi!ml
Alert level Severe
Status: Active
...
...
Details: This program provides remote access to the computer it is installed on.
I am pretty sure there is no virus. There is always virustotal.com if you still have any concerns.
It just shows you how dumb signature based antivirus solutions are. They will flag anything with an Enigma Virtual Box fingerprint as malicious. They cannot look inside the executable and see what is actually in there, they just make a guess based on the fingerprint.
They will also flag an executable as malicious if you use an 'exe' packer/compressor such as upx. It's good practice to install a firewall such as 'simplewall -https://github.com/henrypp/simplewall ' on your system which will flag any unknown outgoing connections.
Mike Sherwin wrote: ↑Tue Apr 09, 2024 1:11 am
I put the exe file on the exclusion list. It then ran okay. I turned windows defender back on. It did not kill the exe and the exe continued to run. However windows defender insist that there is a virus in the exe.
Backdoor:Win32/Bladabindi!ml
Alert level Severe
Status: Active
...
...
Details: This program provides remote access to the computer it is installed on.
It remained pending in Microsoft Defender Protection History. The only solution is to reduce the number of days in which it will be deleted automatically (7-default, 2-my advice). Use a PowerShell command like below.