Jump to content

False positive--rogue installer?


Recommended Posts

Below are the results from a recent scan. At least one of the 2 infections was from Filezilla, an FTP client. I'm wondering if something in that program triggered the identification of this as malware, esp. because Avast antivirus (running in the background) and several recent scans from Symantec's online scanner didn't pick this up. I don't recall updating Filezilla in months if not longer than that (I uninstalled it for good measure, just to be sure), or else I'd look in the Program Files folder. Was this really malware?

Malwarebytes' Anti-Malware 1.30

Database version: 1321

Windows 5.1.2600 Service Pack 3

10/25/2008 6:48:52 PM

mbam-log-2008-10-25 (18-48-52).txt

Scan type: Full Scan (C:\|D:\|)

Objects scanned: 104396

Time elapsed: 1 hour(s), 57 minute(s), 40 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 1

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

HKEY_CLASSES_ROOT\CLSID\{db70412e-eec9-479c-bba9-be36bfdda41b} (Rogue.InstantAccess) -> Quarantined and deleted successfully.

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\Program Files\FileZilla FTP Client\fzshellext.dll (Rogue.InstantAccess) -> Quarantined and deleted successfully.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.