Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Antiy-AVL. Trojan/Win32 Agent
AVG Win32:MalwareX-gen (Trj]
Bkav Pro W32 AlDetectMalware
Google Detected
Ikarus Trojan.Dropper
Avast Win32:MalwareX-gen (Trj]
Avira (no cloud) TR/Dropper.Gen
Elastic Malicious (high Confidence)
Gridinsoft Trojan.Win32.Agent.oalsl
WithSecure trojan. TR /Dropper. Gen
can please some recheck this with the file wbemprox.dll ?
/home/deck/.local/share/Steam/steamapps/common/Proton (Beta)/files/lib/wine/i386-windows/wbemprox.dll
Only 11/73 scanners recognize it though so probably false positive?
VirusTotal Result[www.virustotal.com]
Just wanted to mention I had the same results as you in Linux. How do we confirm this is a false positive, though? Is this something to do with Valve's new work towards creating a better anti-cheat solution? Anti-cheats can sometimes trigger false positives, right?
Same results as well, but instead of "Win.Dropper.Malwarex-10037124-0" I got
"Win.Dropper.Malwarex-10037125-0"
23/73 scanners got it, false positives, nothing to worry about.
1. Your understanding of the matter and
2. Basic logic
There's no hard criterion for false-positives (if there was, there wouldn't be any false-positives).
Speaking of logic, this got nothing to do with Valve's anti cheat measures. No causal connection. There's a connection through a basic principle of "attempting to detect something bad".
For clamav specifically, you can try to find out why certain files were flagged[docs.clamav.net] by looking into the signature and what conditions trigger it.
For this signature you would run `sigtool --find-sigs 'Win.Dropper.Malwarex-10037125-0' | sigtool --decode-sigs` which for me spits out the following information:
Now this isn't particularly helpful since I'm not very familiar with the syntax, but at a glance it does at least tell me this signature matches logical patterns rather than looking for specific file signatures of known viruses.
So it casts a wider net, in the hope of flagging possibly malicious programming practices that could be possibly dangerous which, in my mind, is more likely to produce false positives.
Some programming practices might be malicious in one context and perfectly valid in another, or just a straight up bug. Hard to know without really digging into this and analyzing the actual code and learning clamav's signature syntax[docs.clamav.net] but TL;DR false positive is definitely possible, more than if clamav was just comparing files against a specific known malware hash.
I would put too much effort into this. If you are wondering "how do you know for sure", security teams would put the file(s) into a safe container, run it and see what it does. If it does nothing bad, they know it's a false positive.