- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
01-03-2019 06:19 PM
Hello
These 2 files belong to official package 3.1.7.7 for SuperR's Kitchen - Donate (not free) version - checked & approved by XDA.
SHA-256File nameFile sizeLast analysis
32d2cbedf45e7dc8fde686bbefd6a9c2f1b0ca7a8fce271e935188726bac7da8 |
ramdisk.exe |
1.31 MB |
2019-01-04 02:00:09 UTC |
SHA-256File nameFile sizeLast analysis
04c40d3d7e736a7bed42dc5067b3e796b3fd035fcc1527b38041aaf700dede50 |
superr.exe |
2.39 MB |
2019-01-04 02:00:15 UTC |
They triggered several AV engines because they use Pyinstaller module even thought there is no malicious code/activity.
I'm helping its developer for the reassessment requests = many major AV vendor have already reclassified & whitelisted it.
I can't provide You obviously the full package, but I'm leaving a temporary link to download just those 2 specific files .
- https://www.sendspace.com/file/x49xuz
ZIP Password = infected
Thanks in advance
01-07-2019 07:10 PM
Hi
Sorry for my delay in responding.
We reviewed both of your samples and now the verdict for both have been "Clean".
Please check the above VT links for the latest information for our analysis result.
Best
-Koji
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!