It's hyperworking.MD works as intended
True; even if I turn off tamper protection, turned off real time protection turns itself back on after a while or after reboot.turning the protection off doesn't mean it's always off.
Only novice users do so.I had a user who actually quitted, permanently, installing pirated MS Office products (which likely contained serious malware) because MD got in the way at every step without them being able to disable it.
I did have MD detecting a "severe trojan" in one of these strings from a VirusTotal reportDefender flagged its own YARA rules is a notorious false-positive trap. YARA rules literally contain the exact strings, hex patterns, and byte sequences of the malware they are designed to catch.
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
For more information please see the following:
https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Boxter.HHP!MTB&threatid=2147962999&enterprise=0
Name: Trojan:PowerShell/Boxter.HHP!MTB
ID: x
Severity: Severe
Category: Trojan
Path: file:_C:\Users\x\AppData\Roaming\Mozilla\Firefox\Profiles\x\storage\default\https+++www.virustotal.com\cache\morgue\129\{x}.final
Detection Origin: Local machine
Detection Type: Concrete
Detection Source: User
User: x\x
Process Name: Unknown
Security intelligence Version: AV: 1.445.225.0, AS: 1.445.225.0, NIS: 1.445.225.0
Engine Version: AM: 1.1.26010.1, NIS: 1.1.26010.1
You're being too kind to the this tester, whoever he/she/they is/are. "Clown" is more accurate.The author’s operational security practices strongly suggest an amateur rather than a seasoned researcher. The most glaring red flag is the maintenance of a multi-terabyte malware zoo on a daily-driver host OS where the native antivirus can unexpectedly re-enable itself. Standard industry practice dictates that active analysis be strictly confined to an isolated, air-gapped virtual environment, not a primary machine used for casual web browsing such as YouTube.