• Listen to a special audio message from Bill Roper to the Hive Workshop community (Bill is a former Vice President of Blizzard Entertainment, Producer, Designer, Musician, Voice Actor) 🔗Click here to hear his message!
  • Read Evilhog's interview with Gregory Alper, the original composer of the music for WarCraft: Orcs & Humans 🔗Click here to read the full interview.

[IMPORTANT] Bitdefender detecting Sharpcraft as Ransomware, infected file and PUP

Status
Not open for further replies.
Level 5
Joined
Apr 13, 2017
Messages
157
So, yesterday I've updated and renewed my license in Bitdefender 2016 to Bitdefender 2017.

As I run the Sharpcraft, Bitdefender showed me 6 critical notifications notifying me that is a Ransomware.
Because it wanted to change in Debug.txt, which is not a work of a real Ransomware

Could you make this application more friendly to the Computer System because it is detected as a Ransomware, infected file and PUP.
 
Level 21
Joined
Aug 3, 2004
Messages
710
So, yesterday I've updated and renewed my license in Bitdefender 2016 to Bitdefender 2017.

As I run the Sharpcraft, Bitdefender showed me 6 critical notifications notifying me that is a Ransomware.
Because it wanted to change in Debug.txt, which is not a work of a real Ransomware

Could you make this application more friendly to the Computer System because it is detected as a Ransomware, infected file and PUP.
I'm afraid that's not possible. The way SharpCraft works is just like a lot of viruses, so programs detect it as a virus.
 
Level 5
Joined
Apr 13, 2017
Messages
157
I'm afraid that's not possible. The way SharpCraft works is just like a lot of viruses, so programs detect it as a virus.

Well, I believe because you are the creator and the process of Sharpcraft is just like other viruses by writing down information into a certain file, like debug.txt, and plus I got this information from Bitdefender's Website:

BITDEFENDER:

" Whenever any suspicious pattern of activity emerges on an endpoint, samples are sent to Bitdefender cloud. The sample is automatically analyzed in the cloud and if it’s found to be ransomware, a signature is generated and pushed in less than 30 minutes.

After the signatures gets pushed, propagation takes approximately 3 hours to get on all endpoints via product update.


To minimize the propagation windows, a similarity hash will be calculated for locally executed files and compared to the cloud. If there’s a match with a sample that’s already been tagged as ransomware, but has not yet been delivered to endpoints via update, it will automatically be blocked from executing. This will offer the best minimum reaction time. "


So that means that Sharpcraft.exe's signatures were sent to the cloud storage of Bitdefender already, or is it?
 
Status
Not open for further replies.
Top