-
Notifications
You must be signed in to change notification settings - Fork 24
Open
Description
π VirusTotal flags android-mic_2.1.8_x64-setup.exe
as malicious (6 detections)
Hi there π β thank you for this amazing project! I noticed some antivirus detections on the latest Windows installer and wanted to report them respectfully in case it helps others assess the file's safety.
π§ͺ VirusTotal Summary
- File name:
android-mic_2.1.8_x64-setup.exe
- Scan URL: VirusTotal Link
- Detections: 6 / 72 vendors flagged the file
- Sample detections:
Backdoor.Convagent
β VBA32Win64.Trojan.Agent.C6QPJK
β GDataWin32.Outbreak
β Ikarus- Others reported as grayware or suspicious confidence-based flags
Most major engines (Microsoft, Bitdefender, Kaspersky) marked it as clean β this may be a false positive, but I wanted to confirm with you.
π§© File Metadata
Field | Value |
---|---|
SHA-256 | ff12e9b2fc33f2af598add59405fe83e7696284da64013ddf99f701a6d88d419 |
MD5 | 4a0d6e2c5c57f4c1ceeec852cc315398 |
File Size | 8.26 MB |
Build Time | 2023-07-02 02:09:43 UTC |
File Type | Win32 EXE (Nullsoft Installer) |
Digital Signature | β Not signed |
π§ Behavior Analysis (Yomi, CAPE, etc.)
- Detected anti-analysis activity (
detect-debug-environment
,checks-user-input
) - Drops multiple
.dll
files (UserInfo.dll
,nsis_tauri_utils.dll
) to%TEMP%
folder β common in NSIS but may raise AV heuristics - Creates registry entries under
HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\AndroidMic
- DNS lookups to Microsoft/Office domains (e.g.,
mira-tmc.tm-4.office.com
) β likely system background activity - Flags associated with MITRE ATT&CK techniques for
Execution
,Defense Evasion
,Persistence
andCredential Access
(though may be broad categorization)
π Relations Summary
Contacted Domains
Domain | Detections | Notes |
---|---|---|
mira-tmc.tm-4.office.com |
0/94 | Microsoft Teams |
svc.ha-teams.office.com |
0/94 | Microsoft |
www.microsoft.com |
0/94 | Standard telemetry |
Bundled/Dropped Files
File | Type | Detections |
---|---|---|
android-mic.exe |
Main binary | 2/72 |
uninstall.exe |
Uninstaller | 4/72 |
nsis_tauri_utils.dll |
NSIS plugin | 2/72 |
UserInfo.dll , StartMenu.dll |
Installer UI | 1β2/72 |
π Request for Clarification
Would it be possible to:
- Confirm whether these detections are false positives?
- Provide a signed version of the installer (if feasible)?
- Offer SHA256 hashes alongside future releases to aid verification?
Thanks again for your great work β this tool has so much potential, and I'd love to help others trust it even more. Let me know if I can contribute further!
See attached image for reference.

Metadata
Metadata
Assignees
Labels
No labels