Steam Deck

Steam Deck

Dark2K3 Oct 21, 2024 @ 8:18pm
wbemprox.dll fals/positiv
Hi,

The file in the steamdeck directory /home/deck/.local/share/Steam/steamapps/common/Proton (Beta)/files/lib/wine/i386-windows/wbemprox.dll

Is noticeable with some virus scanners (virustotal.com)

Can someone check this with this file at virustotal?

Thanks.
< >
Showing 1-9 of 9 comments
ReBoot Oct 21, 2024 @ 9:23pm 
What EXACTLY is the name of the "threat"? Something with "gen"? Maybe "heur"? You gotta provide a bit more detail.
Dark2K3 Oct 21, 2024 @ 10:28pm 
Threat categories trojan dropper

Antiy-AVL. Trojan/Win32 Agent
AVG Win32:MalwareX-gen (Trj]
Bkav Pro W32 AlDetectMalware
Google Detected
Ikarus Trojan.Dropper
Avast Win32:MalwareX-gen (Trj]
Avira (no cloud) TR/Dropper.Gen
Elastic Malicious (high Confidence)
Gridinsoft Trojan.Win32.Agent.oalsl
WithSecure trojan. TR /Dropper. Gen

can please some recheck this with the file wbemprox.dll ?

/home/deck/.local/share/Steam/steamapps/common/Proton (Beta)/files/lib/wine/i386-windows/wbemprox.dll
Last edited by Dark2K3; Oct 21, 2024 @ 10:31pm
ReBoot Oct 21, 2024 @ 10:45pm 
This all reads generic as ♥♥♥♥. False-positives.
I got the same warning using ClamAV of Proton Experimental on my linux machine under the signature:
Win.Dropper.Malwarex-10037124-0

Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]
Last edited by Made of Magic And Wires; Nov 13, 2024 @ 3:58am
Plutopotamus Nov 15, 2024 @ 5:25pm 
Originally posted by Made of Magic And Wires:
I got the same warning using ClamAV of Proton Experimental on my linux machine under the signature:
Win.Dropper.Malwarex-10037124-0

Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]

Just wanted to mention I had the same results as you in Linux. How do we confirm this is a false positive, though? Is this something to do with Valve's new work towards creating a better anti-cheat solution? Anti-cheats can sometimes trigger false positives, right?
Last edited by Plutopotamus; Nov 15, 2024 @ 5:25pm
KEK Nov 15, 2024 @ 8:15pm 
Originally posted by Made of Magic And Wires:
I got the same warning using ClamAV of Proton Experimental on my linux machine under the signature:
Win.Dropper.Malwarex-10037124-0

Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]

Same results as well, but instead of "Win.Dropper.Malwarex-10037124-0" I got
"Win.Dropper.Malwarex-10037125-0"

23/73 scanners got it, false positives, nothing to worry about.
ReBoot Nov 15, 2024 @ 8:52pm 
Originally posted by Plutopotamus:
Originally posted by Made of Magic And Wires:
I got the same warning using ClamAV of Proton Experimental on my linux machine under the signature:
Win.Dropper.Malwarex-10037124-0

Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]

Just wanted to mention I had the same results as you in Linux. How do we confirm this is a false positive, though? Is this something to do with Valve's new work towards creating a better anti-cheat solution? Anti-cheats can sometimes trigger false positives, right?
You use
1. Your understanding of the matter and
2. Basic logic

There's no hard criterion for false-positives (if there was, there wouldn't be any false-positives).

Speaking of logic, this got nothing to do with Valve's anti cheat measures. No causal connection. There's a connection through a basic principle of "attempting to detect something bad".
Originally posted by Plutopotamus:
Originally posted by Made of Magic And Wires:
I got the same warning using ClamAV of Proton Experimental on my linux machine under the signature:
Win.Dropper.Malwarex-10037124-0

Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]

Just wanted to mention I had the same results as you in Linux. How do we confirm this is a false positive, though? Is this something to do with Valve's new work towards creating a better anti-cheat solution? Anti-cheats can sometimes trigger false positives, right?

For clamav specifically, you can try to find out why certain files were flagged[docs.clamav.net] by looking into the signature and what conditions trigger it.

For this signature you would run `sigtool --find-sigs 'Win.Dropper.Malwarex-10037125-0' | sigtool --decode-sigs` which for me spits out the following information:

VIRUS NAME: Win.Dropper.Malwarex-10037125-0 TDB: Engine:51-255,Target:1 LOGICAL EXPRESSION: (0|1)&(2&3&4) * SUBSIG ID 0 +-> OFFSET: ANY +-> SIGMOD: NONE +-> DECODED SUBSIGNATURE: CreateProcessW ret %d, GetLastError() %lu * SUBSIG ID 1 +-> OFFSET: ANY +-> SIGMOD: NONE +-> DECODED SUBSIGNATURE: ProcessStartupInformation is not implemented, vt_type %u, type %lu, val %p * SUBSIG ID 2 +-> OFFSET: ANY +-> SIGMOD: NONE +-> DECODED SUBSIGNATURE: .text$get_processor_manufacturer.constprop.0 * SUBSIG ID 3 +-> OFFSET: ANY +-> SIGMOD: NONE +-> DECODED SUBSIGNATURE: .text$wbem_services_ExecQueryAsync * SUBSIG ID 4 +-> OFFSET: ANY +-> SIGMOD: NONE +-> DECODED SUBSIGNATURE: _wbem_services_ExecQueryAsync@24

Now this isn't particularly helpful since I'm not very familiar with the syntax, but at a glance it does at least tell me this signature matches logical patterns rather than looking for specific file signatures of known viruses.

So it casts a wider net, in the hope of flagging possibly malicious programming practices that could be possibly dangerous which, in my mind, is more likely to produce false positives.

Some programming practices might be malicious in one context and perfectly valid in another, or just a straight up bug. Hard to know without really digging into this and analyzing the actual code and learning clamav's signature syntax[docs.clamav.net] but TL;DR false positive is definitely possible, more than if clamav was just comparing files against a specific known malware hash.
Last edited by Made of Magic And Wires; Nov 24, 2024 @ 7:54am
Mahjik Nov 24, 2024 @ 10:30am 
These A/V solutions aren't always right and it also depends on "intent" or "usage". For example, most of them will flag the Torrent protocol as bad since its was used in the past by bad actors. However, there are a lot of open source tools that use Torrent as a protocol. The usage of the protocol isn't bad, but some of those used to get flagged. I say used to as when Torrent started getting included in some browsers, A/Vs stopped reporting Torrent as bad but that's just an example of how a "thing" can get flagged even though its actual usage is not "bad".

I would put too much effort into this. If you are wondering "how do you know for sure", security teams would put the file(s) into a safe container, run it and see what it does. If it does nothing bad, they know it's a false positive.
< >
Showing 1-9 of 9 comments
Per page: 1530 50

Date Posted: Oct 21, 2024 @ 8:18pm
Posts: 9