Xylitol wrote:http://www.virustotal.com/file-scan/rep ... 1309176617
page 8 and 9 of comments are interesting
I came across this funny hash of zero byte length file not so long time ago, seems number of experts increased for a few days.
Reputation:
6 credits
Comment date:
2011-06-05 15:13:36 (UTC)
it´s malware p2p exploit quicktime
Reputation:
3 credits
Comment date:
2011-06-16 18:12:55 (UTC)
Rogue AV detected by FireEye
Reputation:
1 credits
Comment date:
2011-01-18 12:44:17 (UTC)
TDSS sample
Reputation:
2395 credits
Comment date:
2011-05-26 09:41:00 (UTC)
This is the re-production to proof that this sample is a malware: <LONG NONSENSE POST SKIP>
*Facepalm*
Reputation:
3160 credits
Comment date:
2011-06-01 06:06:47 (UTC)
on my system this is the "MountPointManagerRemoteDatabase" (no extension) "System File" located at
[System Partition Root]\System Volume Information\ <LONG NONSENSE POST SKIP> I just managed to temporarily regain Admin rights on this system and wanted to see if this file (which appeared after reinfection symptoms started popping up) was detected by *any* of the scanners. Alas, none of the scanners are able to get around its evil genius... yet :(
"Alas, none of the scanners are able to get around its evil genius... yet :( " <- that was epic LOL, of course nobody don't wants to be FakeAV.