virustotal results
File nvata.sys.bad received on 2010.01.16 16:18:25 (UTC)
Current status: finished
Result: 22/41 (53.66%)
Compact
Print results
Antivirus Version Last Update Result
a-squared 4.5.0.50 2010.01.16 Rootkit.Win32.TDSS!IK
AhnLab-V3 5.0.0.2 2010.01.16 -
AntiVir 7.9.1.142 2010.01.16 TR/Patched.Gen
Antiy-AVL 2.0.3.7 2010.01.12 -
Authentium 5.2.0.5 2010.01.16 -
Avast 4.8.1351.0 2010.01.16 Win32:Alureon-EU
AVG 9.0.0.730 2010.01.16 -
BitDefender 7.2 2010.01.16 -
CAT-QuickHeal 10.00 2010.01.16 -
ClamAV 0.94.1 2010.01.16 -
Comodo 3604 2010.01.16 -
DrWeb 5.0.1.12222 2010.01.16 BackDoor.Tdss.1866
eSafe 7.0.17.0 2010.01.14 -
eTrust-Vet 35.2.7240 2010.01.15 -
F-Prot 4.5.1.85 2010.01.15 -
F-Secure 9.0.15370.0 2010.01.16 Rootkit:W32/TDSS.gen!D
Fortinet 4.0.14.0 2010.01.16 -
GData 19 2010.01.16 Win32:Alureon-EU
Ikarus T3.1.1.80.0 2010.01.16 Rootkit.Win32.TDSS
Jiangmin 13.0.900 2010.01.16 Rootkit.TDSS.cza
K7AntiVirus 7.10.949 2010.01.16 -
Kaspersky 7.0.0.125 2010.01.16 Rootkit.Win32.TDSS.y
McAfee 5862 2010.01.15 Patched-SYSFile.a
McAfee+Artemis 5862 2010.01.15 Patched-SYSFile.a
McAfee-GW-Edition 6.8.5 2010.01.16 Heuristic.LooksLike.Trojan.Patched.H
Microsoft 1.5302 2010.01.16 Virus:Win32/Alureon.F
NOD32 4777 2010.01.16 Win32/Olmarik.SJ
Norman 6.04.03 2010.01.16 W32/tdss.drv.gen6
nProtect 2009.1.8.0 2010.01.16 Trojan/W32.Rootkit.105472.E
Panda 10.0.2.2 2010.01.16 -
PCTools 7.0.3.5 2010.01.16 -
Prevx 3.0 2010.01.16 Medium Risk Malware
Rising 22.30.05.03 2010.01.16 -
Sophos 4.49.0 2010.01.16 Mal/TDSS-G
Sunbelt 3.2.1858.2 2010.01.16 Rootkit.Win32.TDSS.y (v)
Symantec 20091.2.0.41 2010.01.16 -
TheHacker 6.5.0.4.153 2010.01.16 -
TrendMicro 9.120.0.1004 2010.01.16 Cryp_TIDIES-12
VBA32 3.12.12.1 2010.01.15 Rootkit.Win32.TDSL
ViRobot 2010.1.16.2140 2010.01.16 -
VirusBuster 5.0.21.0 2010.01.16 Rootkit.Alureon.Gen!Pac.7
Additional information
File size: 105472 bytes
MD5...: 7322b3dcdfa56be7ed8cddf4166dad81
SHA1..: a3bccc8f5c2137a669f99306d1777709c6e7aa42
SHA256: 929580f8265607a82808d7c1d20739dbf58394c818ddbff2289b0c0d00965a91
ssdeep: 3072:SqlyIVXX9/IwkLw9EegML593uvaRmGrz5XCRRL4TgrK0mDn:1lyIVXX9/zQ
tML593uvaRmOzERN4cO
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x17ea4
timedatestamp.....: 0x4536c767 (Thu Oct 19 00:31:35 2006)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x300 0x166a4 0x16700 6.53 7609cea76aff4e1323b77552a74e8f55
.rdata 0x16a00 0x2d0 0x300 4.73 ad702daf36d333c9881c6b0529bc4c8c
.data 0x16d00 0xe4 0x100 1.39 03777d4a5d848a87e39eed778ab5ab31
PAGE 0x16e00 0x1b5 0x200 5.15 c42a76ad3d96bae2ea83574fe9f0ac73
INIT 0x17000 0xe6c 0xe80 5.51 962f171801bd386e2b615cc852aca21f
.rsrc 0x17e80 0x11a0 0x1200 6.99 afc1d03abf1f54deedcad84872016e6a
.reloc 0x19080 0xb5c 0xb80 6.11 9259932cc8e6201250797f742cb5d3fa
( 3 imports )
> ntoskrnl.exe: IoAcquireRemoveLockEx, PoCallDriver, PoStartNextPowerIrp, ObfReferenceObject, RtlCopyUnicodeString, READ_REGISTER_USHORT, READ_REGISTER_UCHAR, WRITE_REGISTER_UCHAR, WRITE_REGISTER_USHORT, WRITE_REGISTER_ULONG, READ_REGISTER_ULONG, KeInsertQueueDpc, KeSynchronizeExecution, MmUnmapIoSpace, MmMapIoSpace, IoFreeMdl, IoGetDeviceProperty, ZwClose, ZwQueryValueKey, ZwOpenKey, RtlInitUnicodeString, strncmp, IoBuildDeviceIoControlRequest, KeDelayExecutionThread, ZwSetValueKey, ZwCreateKey, IoOpenDeviceRegistryKey, ExAllocatePoolWithTagPriority, IoWMIRegistrationControl, IoDisconnectInterrupt, PoSetPowerState, IoReleaseRemoveLockAndWaitEx, KeBugCheckEx, KeSetEvent, sprintf, IoConnectInterrupt, IoGetDmaAdapter, KeInitializeDpc, IoIsWdmVersionAvailable, IoQueueWorkItem, IoAllocateWorkItem, ExInterlockedPopEntrySList, RtlFreeAnsiString, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, RtlInitAnsiString, IoReleaseRemoveLockEx, IoAllocateIrp, MmUnlockPages, IoFreeWorkItem, IoReleaseCancelSpinLock, MmProbeAndLockPages, IoAllocateMdl, MmMapLockedPagesSpecifyCache, IoInvalidateDeviceRelations, ExInitializeNPagedLookasideList, IoInitializeTimer, RtlFindMostSignificantBit, RtlFindLeastSignificantBit, ExDeleteNPagedLookasideList, IoStopTimer, IoInvalidateDeviceState, wcscpy, PoRegisterDeviceForIdleDetection, IoStartTimer, MmBuildMdlForNonPagedPool, Mm64BitPhysicalAddress, IoAcquireCancelSpinLock, KefAcquireSpinLockAtDpcLevel, KefReleaseSpinLockFromDpcLevel, KeInitializeDeviceQueue, ExfInterlockedInsertTailList, ExfInterlockedRemoveHeadList, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, RtlClearAllBits, RtlInitializeBitMap, RtlFindClearBitsAndSet, RtlClearBits, PsTerminateSystemThread, KeClearEvent, ObReferenceObjectByHandle, PsCreateSystemThread, KeSetTimer, KeQuerySystemTime, KeCancelTimer, KeInitializeTimer, _except_handler3, PoRequestPowerIrp, IofCompleteRequest, ExAllocatePoolWithTag, RtlAppendUnicodeToString, RtlIntegerToUnicodeString, RtlAppendUnicodeStringToString, IoCreateDevice, IoAttachDeviceToDeviceStack, IoDeleteDevice, IoInitializeRemoveLockEx, IoGetConfigurationInformation, IoCreateSymbolicLink, KeInitializeEvent, IoGetAttachedDeviceReference, IoBuildSynchronousFsdRequest, IofCallDriver, KeWaitForSingleObject, ObfDereferenceObject, IoDeleteSymbolicLink, IoDetachDevice, KeInitializeSpinLock, ExFreePoolWithTag, IoFreeIrp, ExInterlockedPushEntrySList
> HAL.dll: KeStallExecutionProcessor, ExAcquireFastMutex, KeQueryPerformanceCounter, KeGetCurrentIrql, KeFlushWriteBuffer, KeRaiseIrqlToDpcLevel, KfAcquireSpinLock, KfReleaseSpinLock, KfRaiseIrql, KfLowerIrql, ExReleaseFastMutex, READ_PORT_ULONG, WRITE_PORT_ULONG, WRITE_PORT_BUFFER_USHORT, WRITE_PORT_BUFFER_UCHAR, READ_PORT_BUFFER_USHORT, READ_PORT_BUFFER_UCHAR, WRITE_PORT_UCHAR, READ_PORT_UCHAR, READ_PORT_USHORT
> WMILIB.SYS: WmiSystemControl, WmiCompleteRequest
( 0 exports )
RDS...: NSRL Reference Data Set
-
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=461CCA490079A2019C05011464174000F85265CF' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=461CCA490079A2019C05011464174000F85265CF</a>
trid..: Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
File nvata.sys.bad received on 2010.01.16 16:18:25 (UTC)
Current status: finished
Result: 22/41 (53.66%)
Compact
Print results
Antivirus Version Last Update Result
a-squared 4.5.0.50 2010.01.16 Rootkit.Win32.TDSS!IK
AhnLab-V3 5.0.0.2 2010.01.16 -
AntiVir 7.9.1.142 2010.01.16 TR/Patched.Gen
Antiy-AVL 2.0.3.7 2010.01.12 -
Authentium 5.2.0.5 2010.01.16 -
Avast 4.8.1351.0 2010.01.16 Win32:Alureon-EU
AVG 9.0.0.730 2010.01.16 -
BitDefender 7.2 2010.01.16 -
CAT-QuickHeal 10.00 2010.01.16 -
ClamAV 0.94.1 2010.01.16 -
Comodo 3604 2010.01.16 -
DrWeb 5.0.1.12222 2010.01.16 BackDoor.Tdss.1866
eSafe 7.0.17.0 2010.01.14 -
eTrust-Vet 35.2.7240 2010.01.15 -
F-Prot 4.5.1.85 2010.01.15 -
F-Secure 9.0.15370.0 2010.01.16 Rootkit:W32/TDSS.gen!D
Fortinet 4.0.14.0 2010.01.16 -
GData 19 2010.01.16 Win32:Alureon-EU
Ikarus T3.1.1.80.0 2010.01.16 Rootkit.Win32.TDSS
Jiangmin 13.0.900 2010.01.16 Rootkit.TDSS.cza
K7AntiVirus 7.10.949 2010.01.16 -
Kaspersky 7.0.0.125 2010.01.16 Rootkit.Win32.TDSS.y
McAfee 5862 2010.01.15 Patched-SYSFile.a
McAfee+Artemis 5862 2010.01.15 Patched-SYSFile.a
McAfee-GW-Edition 6.8.5 2010.01.16 Heuristic.LooksLike.Trojan.Patched.H
Microsoft 1.5302 2010.01.16 Virus:Win32/Alureon.F
NOD32 4777 2010.01.16 Win32/Olmarik.SJ
Norman 6.04.03 2010.01.16 W32/tdss.drv.gen6
nProtect 2009.1.8.0 2010.01.16 Trojan/W32.Rootkit.105472.E
Panda 10.0.2.2 2010.01.16 -
PCTools 7.0.3.5 2010.01.16 -
Prevx 3.0 2010.01.16 Medium Risk Malware
Rising 22.30.05.03 2010.01.16 -
Sophos 4.49.0 2010.01.16 Mal/TDSS-G
Sunbelt 3.2.1858.2 2010.01.16 Rootkit.Win32.TDSS.y (v)
Symantec 20091.2.0.41 2010.01.16 -
TheHacker 6.5.0.4.153 2010.01.16 -
TrendMicro 9.120.0.1004 2010.01.16 Cryp_TIDIES-12
VBA32 3.12.12.1 2010.01.15 Rootkit.Win32.TDSL
ViRobot 2010.1.16.2140 2010.01.16 -
VirusBuster 5.0.21.0 2010.01.16 Rootkit.Alureon.Gen!Pac.7
Additional information
File size: 105472 bytes
MD5...: 7322b3dcdfa56be7ed8cddf4166dad81
SHA1..: a3bccc8f5c2137a669f99306d1777709c6e7aa42
SHA256: 929580f8265607a82808d7c1d20739dbf58394c818ddbff2289b0c0d00965a91
ssdeep: 3072:SqlyIVXX9/IwkLw9EegML593uvaRmGrz5XCRRL4TgrK0mDn:1lyIVXX9/zQ
tML593uvaRmOzERN4cO
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x17ea4
timedatestamp.....: 0x4536c767 (Thu Oct 19 00:31:35 2006)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x300 0x166a4 0x16700 6.53 7609cea76aff4e1323b77552a74e8f55
.rdata 0x16a00 0x2d0 0x300 4.73 ad702daf36d333c9881c6b0529bc4c8c
.data 0x16d00 0xe4 0x100 1.39 03777d4a5d848a87e39eed778ab5ab31
PAGE 0x16e00 0x1b5 0x200 5.15 c42a76ad3d96bae2ea83574fe9f0ac73
INIT 0x17000 0xe6c 0xe80 5.51 962f171801bd386e2b615cc852aca21f
.rsrc 0x17e80 0x11a0 0x1200 6.99 afc1d03abf1f54deedcad84872016e6a
.reloc 0x19080 0xb5c 0xb80 6.11 9259932cc8e6201250797f742cb5d3fa
( 3 imports )
> ntoskrnl.exe: IoAcquireRemoveLockEx, PoCallDriver, PoStartNextPowerIrp, ObfReferenceObject, RtlCopyUnicodeString, READ_REGISTER_USHORT, READ_REGISTER_UCHAR, WRITE_REGISTER_UCHAR, WRITE_REGISTER_USHORT, WRITE_REGISTER_ULONG, READ_REGISTER_ULONG, KeInsertQueueDpc, KeSynchronizeExecution, MmUnmapIoSpace, MmMapIoSpace, IoFreeMdl, IoGetDeviceProperty, ZwClose, ZwQueryValueKey, ZwOpenKey, RtlInitUnicodeString, strncmp, IoBuildDeviceIoControlRequest, KeDelayExecutionThread, ZwSetValueKey, ZwCreateKey, IoOpenDeviceRegistryKey, ExAllocatePoolWithTagPriority, IoWMIRegistrationControl, IoDisconnectInterrupt, PoSetPowerState, IoReleaseRemoveLockAndWaitEx, KeBugCheckEx, KeSetEvent, sprintf, IoConnectInterrupt, IoGetDmaAdapter, KeInitializeDpc, IoIsWdmVersionAvailable, IoQueueWorkItem, IoAllocateWorkItem, ExInterlockedPopEntrySList, RtlFreeAnsiString, RtlFreeUnicodeString, RtlAnsiStringToUnicodeString, RtlInitAnsiString, IoReleaseRemoveLockEx, IoAllocateIrp, MmUnlockPages, IoFreeWorkItem, IoReleaseCancelSpinLock, MmProbeAndLockPages, IoAllocateMdl, MmMapLockedPagesSpecifyCache, IoInvalidateDeviceRelations, ExInitializeNPagedLookasideList, IoInitializeTimer, RtlFindMostSignificantBit, RtlFindLeastSignificantBit, ExDeleteNPagedLookasideList, IoStopTimer, IoInvalidateDeviceState, wcscpy, PoRegisterDeviceForIdleDetection, IoStartTimer, MmBuildMdlForNonPagedPool, Mm64BitPhysicalAddress, IoAcquireCancelSpinLock, KefAcquireSpinLockAtDpcLevel, KefReleaseSpinLockFromDpcLevel, KeInitializeDeviceQueue, ExfInterlockedInsertTailList, ExfInterlockedRemoveHeadList, IoWriteErrorLogEntry, IoAllocateErrorLogEntry, RtlClearAllBits, RtlInitializeBitMap, RtlFindClearBitsAndSet, RtlClearBits, PsTerminateSystemThread, KeClearEvent, ObReferenceObjectByHandle, PsCreateSystemThread, KeSetTimer, KeQuerySystemTime, KeCancelTimer, KeInitializeTimer, _except_handler3, PoRequestPowerIrp, IofCompleteRequest, ExAllocatePoolWithTag, RtlAppendUnicodeToString, RtlIntegerToUnicodeString, RtlAppendUnicodeStringToString, IoCreateDevice, IoAttachDeviceToDeviceStack, IoDeleteDevice, IoInitializeRemoveLockEx, IoGetConfigurationInformation, IoCreateSymbolicLink, KeInitializeEvent, IoGetAttachedDeviceReference, IoBuildSynchronousFsdRequest, IofCallDriver, KeWaitForSingleObject, ObfDereferenceObject, IoDeleteSymbolicLink, IoDetachDevice, KeInitializeSpinLock, ExFreePoolWithTag, IoFreeIrp, ExInterlockedPushEntrySList
> HAL.dll: KeStallExecutionProcessor, ExAcquireFastMutex, KeQueryPerformanceCounter, KeGetCurrentIrql, KeFlushWriteBuffer, KeRaiseIrqlToDpcLevel, KfAcquireSpinLock, KfReleaseSpinLock, KfRaiseIrql, KfLowerIrql, ExReleaseFastMutex, READ_PORT_ULONG, WRITE_PORT_ULONG, WRITE_PORT_BUFFER_USHORT, WRITE_PORT_BUFFER_UCHAR, READ_PORT_BUFFER_USHORT, READ_PORT_BUFFER_UCHAR, WRITE_PORT_UCHAR, READ_PORT_UCHAR, READ_PORT_USHORT
> WMILIB.SYS: WmiSystemControl, WmiCompleteRequest
( 0 exports )
RDS...: NSRL Reference Data Set
-
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
pdfid.: -
<a href='http://info.prevx.com/aboutprogramtext.asp?PX5=461CCA490079A2019C05011464174000F85265CF' target='_blank'>http://info.prevx.com/aboutprogramtext.asp?PX5=461CCA490079A2019C05011464174000F85265CF</a>
trid..: Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)