Paragon PE Maker

Discussion in 'Paragon Drive Backup Product Line' started by SIW2, Jun 14, 2014.

  1. SIW2

    SIW2 Registered Member

    Joined:
    Sep 6, 2009
    Posts:
    1,572
    I have finally done a new one.

    Extract the .zip to somewhere with a short path, e.g. c:\parpev18

    https://www.dropbox.com/s/bd188ucb9ml0v33/PARPE-v18.zip


    Then rt click and run as admin on Run-me-as-admin.cmd.

    Works on 7 and newer, 32 and 64 bit.

    Also works on Vista ( think it works on xp - untested).

    vista-parpev18.jpg

    parpev18-2.png


    note: Vista and Xp users need 2 things;

    1) MStools ( only about 12 mb which it will download for you )

    2) Bootable wim file. You can supply your own - copy boot.wim or winre.wim from Vista or newer installation media into the parpev18 folder, right next to run-me-as-admin.cmd. Then rt click and run as admin on the cmd file.

    OR if you don't supply the bootable wim, it will download it for you from MS.
     
  2. wptski

    wptski Registered Member

    Joined:
    Nov 27, 2010
    Posts:
    564
    Location:
    USA
    I believe that has happened before with your software but my current and new antivirus software detects your latest download as infected with Pua.Downloadmr.Gen.
     
  3. SIW2

    SIW2 Registered Member

    Joined:
    Sep 6, 2009
    Posts:
    1,572
    Which file is it reporting?

    What a/v are you using?
     
  4. Atari800xl

    Atari800xl Registered Member

    Joined:
    Feb 21, 2014
    Posts:
    36
    SIW2, I've been a bit busy lately, only now have I noticed your new Aomei and Paragon PE makers (or are there even more?).
    I'm looking forward to testing them, your scripts/ batches are very "educational" and interesting, I always learn a lot from them.
    So thanks again, and I hope you'll continue your work!!
     
  5. wptski

    wptski Registered Member

    Joined:
    Nov 27, 2010
    Posts:
    564
    Location:
    USA
    in
    I'm using Webroot and discovered a bit more. Webroot which I've had for couple of months is much different than most other AVs and doesn't or suggest using a full scan which can take hours. I did one anyway and that's when it caught your zip file. A quick or deep scan doesn't catch it but only a full scan or a scan of the file itself will. It could very well be a false positive.

    I also recovered the previous version of your zip file that I deleted and it detected it as well.

    I just unzipped it and Webroot hits on "booticex64.exe" and blocked the file from being written to the folder. I can scan the folder then without that file being there and get no hits.

    ***EDIT***
    I turned in a support ticket with Webroot, within five minutes they replied that it was a false positive and they have updated their security list.
     
    Last edited: Jun 26, 2014
  6. SIW2

    SIW2 Registered Member

    Joined:
    Sep 6, 2009
    Posts:
    1,572
    Thanks for clearing that up. :)
     
Loading...