Hi noob404,
I have analysed your files. Your files are clean, given that your website is fine (I didn't analyse the website).
Regarding the Batch files: Yes, I'd assume that's due to the Batch2Exe wrapper. I don't see anything else that's odd.
Regarding the .NET file. It has some odd characteristics that might contribute to the detections.
Firstly, the debugger timestamp (year 2061) and the COFF Header time stamp (year 2094) are in the future. You can see that if you
download PEStudio and put your file into it. I don't know how this happened but it's weird.
Secondly, the default project name WindowsFormsApp1 may cause automated analysis systems and AI based detection systems to assume that your file is suspicious. There are lots of small downloaders and crappy malware using those default names whereas legitimate software usually has proper names. The default name together with references to a website and a call to cmd.exe make it very similar to a malware downloader.
Third, the icon and version info modification is probably not without issues. With my version (5.1.7) of Resource Hacker, I cannot see the icon, although it shows on Windows. So I guess the way the icon is modified is not quite standard and causes some anomalies. Changing icons afterwards instead of doing that in Visual Studio is unusual for legitimate software, so it might be used as clue that the file is suspicious.
This is just out of my experience. In the end I don't know what exactly those AVs deem as suspicious or malicious.
Do you have any questions?