Archive: 2.35 nsExec Trojan.Win32.Agent.fqk Kaspersky false positive


2.35 nsExec Trojan.Win32.Agent.fqk Kaspersky false positive
Just to keep you informed - I've sent a report to Kaspersky labs, and they confirmed 'false positive' situation, promised to fix this soon. Can be reproduced on simple script

Name "nsExec Test"
OutFile "nsExec Test.exe"
ShowInstDetails show
Section "MakeNSIS commands help"
; ExecDos::exec '"c:\qstar\bin\helper.exe" inssvc stop' "" "$EXEDIR\helper.log"
nsexec::exec '"c:\qstar\bin\helper.exe" inssvc stop'
Pop $0
DetailPrint " c:\qstar\bin\helper.exe Return value: $0"
SectionEnd
ExecDos not caused any problems (today :) ).
Antivirus alert was on tmp file during nsExec.dll extraction to the temporary dir.

Will this automatic stuff ever stop? We should add all NSIS files into the default Windows installation or something...


False positive fixed in today's update form Kaspersky.
If I correctly understood KichiK' note about 'c:\qstar\...' Now in script

#InstallDir "$PROGRAMFILES64\${SHORT_NAME}"
InstallDir "C:\${SHORT_NAME}"
both root and $PROGRAMFILES tested, and I am realy don't like all these Pithon's, MinGW and other installing to disk root, but executive director says this is better and so it is. :)

I wasn't referring to your script. I was complaining about the automatic process anti-virus companies use that cause all of these false positives. Then I went on to "suggest" a solution of including all NSIS files in the default installation of Windows because surely they check for false positives on those.


Several of our testers are getting a hit on Trojan.Win32.Agent.jkv. Is there a way to identify/capture the tmp file to send in to Kaspersky? We need to get past this if it is a false positive.

From AV Log
C:\DOCUME~1\lmeadows\LOCALS~1\Temp\nsb32.tmp\ns33.tmp;is a Trojan
Trojan.Win32.Agent.jzv;4/15/2008 9:34:31 AM

This seems to be repeated for 10 temporary files during the install. An AV scan of the machines HD, once the install completes, does not seem to find any trace of this virus.


A co-worker has identified that nsExec.dll is the problem. A quote from my co-worker:
We've secretly replaced our fine ground nsExec coffee with Folger's ExecWaits. Let's see if Kaspersky notices...

Nio, Kaspersky isn't complaining at all. No ugly red windows popping up.


In case anyone is interested, we resolved this problem by extracting the nsExec.dll from NSIS 2.36 and using that instead of the one from NSIS 2.29. There was a fix, so apparently it is no longer identified as a false positive in version 2.36 by Kaspersky.


This worked for awhile. A new virus report has come in from the latest build today. Here is the information reported: I received anti-virus alert that trojan program "Trojan.win32.Agent.muq" was detected.
file ns88.tmp


Same happens here. Our users are reporting problem with Avast antivirus. Currently we are using NSIS 2.37, it is OK when we use nsexec.dll from NSIS 2.29. In fact, the problem is not with nsexec.dll but with its temporary copy (e.g. ns6A.tmp) which is different only in 4 bytes. Does anyone know why NSIS creates modified temporary copy of nsexec.dll?


IIRC the nsexec copy is a exe and not a dll