Jump to content

Trojan.Agent infecting FlashIK.dll file


Recommended Posts

Aaah I'm new to the forum here but...

My Malwarebytes(free ver) detected a virus called Trojan.Agent (No win32, no gen, just Trojan.Agent), while I've read a lot of forums about this virus, they're mainly about rogue antiviruses/softwares, to which I have never downloaded any nor have I recieved constant pop-ups from these rogue antivirus(I barely know it's on my computer), and virus commonly attacks regristry and files that have win32 in them.

However I am unsure about the virus I've obtained, it's not linked to any regristry nor win32 file.

It's still in the quaratine but I've yet to take action for fear that I'll mess up my computer, and the virus will pop up again.

This is the log I got from Malwarebytes(I had to remove a letter from the log's name because it won't save for some reason),

Malwarebytes Anti-Malware 1.62.0.1300

www.malwarebytes.org

Database version: v2012.08.14.02

Windows 7 Service Pack 1 x64 NTFS

Internet Explorer 9.0.8112.16421

Dell :: RAVEN-LAPPY [administrator]

14/8/2012 5:16:51 PM

mbam-log-2012-08-14 (19-32-06

Scan type: Full scan (C:\|D:\|E:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 413874

Time elapsed: 1 hour(s), 24 minute(s), 31 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 1

C:\Program Files (x86)\Adobe\Adobe Flash CS5\FlashIK.dll (Trojan.Agent) -> No action taken.

(end)

Link to post
Share on other sites

No viruses were detected.

Here's the log.

Malwarebytes Anti-Malware 1.62.0.1300

www.malwarebytes.org

Database version: v2012.08.14.02

Windows 7 Service Pack 1 x64 NTFS

Internet Explorer 9.0.8112.16421

Dell :: RAVEN-LAPPY [administrator]

14/8/2012 8:47:55 PM

mbam-log-2012-08-14 (20-47-55).txt

Scan type: Full scan (C:\|D:\|E:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 414126

Time elapsed: 1 hour(s), 21 minute(s), 53 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

Link to post
Share on other sites

OK, you're good....MrC

Hello MrCharlie,

I also am new to the forum, and experienced the same thing this morning with the CS5.5 version of this file (if indeed they aren't identical). Problem is, I can't follow the steps given here because I quarantined it and can't seem to restore the file. Apparently MB has problems with writing privileges for certain directories. I did a second full scan after quarantining the dll and restarting the computer, which reported no malicious items found.

Should I relax and consider this a false positive, or should I try to get the file back so it can be examined? I'm not worried too much about it being unretrievable; I've not yet used Flash CS5.5, and if I need to I can reinstall it.

Malwarebytes Anti-Malware 1.62.0.1300

www.malwarebytes.org

Database version: v2012.08.14.06

Windows 7 x86 NTFS

Internet Explorer 9.0.8112.16421

***************************

8/14/2012 11:34:49 AM

mbam-log-2012-08-14 (11-34-49).txt

Scan type: Full scan (C:\|D:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P

Scan options disabled:

Objects scanned: 476896

Time elapsed: 1 hour(s), 51 minute(s), 4 second(s) [aborted]

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 1

C:\Program Files\Adobe\Adobe Flash CS5.5\FlashIK.dll (Trojan.Agent) -> Quarantined and deleted successfully.

(end)

Link to post
Share on other sites

It looks like a false positive, why can't you restore the file??

If we can can get a sample of the file, it could be submitted and checked.

@BloodCaramel, can you zip up and attach FlashIK.dll for us?

MrC

Not sure. I click either "restore" or "restore all" and all that happens is the "Exit" button gets highlighted. The entry in the Quarantine list remains, doesn't change in any way, and the file doesn't reappear in the directory. No notifications appear or anything.

I searched for this behavior and apparently MB has a known issue where it doesn't have permission to write to certain folders, and so people are unable to restore their files from quarantine. Would be nice if there were a "restore to" option or something.

Link to post
Share on other sites

I just downloaded that file and MB popped up and quarantined it, uploaded it to VT and it's clean??

https://www.virustot...86f9e/analysis/

MrC

That's a rather comprehensive list of antimalware software. In fact, the only one I've heard of that isn't on there is MB. Why is that?

But if they say it's good, then I guess I can relax.

Thanks MrC, I appreciate it.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.