Feedback
Skip to content

Why donate?

Which type of operating system are you running?



Microsoft Windows - 0.013% Detection Rate *

Did you just find a download or a file on your computer that is digitally signed by Microsoft Windows? If that's the case, please read on.

You will typically see Microsoft Windows when running the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Microsoft Windows appears as the verified publisher in the UAC dialog

You can view the additional details from the Microsoft Windows digital signature with the following steps:

  1. Open up Windows Explorer and locate the Microsoft Windows file
  2. Right-click on the file and select Properties
  3. Click on the Digital Signatures tab
  4. Click on the View Certificate button

Here's a screenshot of a file that has been digitally signed by Microsoft Windows:

Screenshot of the Microsoft Windows certificate

As you can see in the screenshot above, the Windows OS reports that "This digital signature is OK". This means that the file has been published by Microsoft Windows and that no one has tampered with the file.

If you click the View Certificate button shown in the screenshot above, you can examine all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also see the address for Microsoft Windows, such as the street name, city and country.

Microsoft Windows Verification PCA and Microsoft Windows Production PCA 2011 has issued the Microsoft Windows certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screengrab above.

Microsoft Windows Files

The following are the Microsoft Windows files I've gathered, thanks to the FreeFixer users.

The FreeFixer tool treats files from Microsoft Windows as trusted, which means that the Microsoft Windows files will appear with a green background and that there's no removal checkbox for the file. However, as you can see in the scan results below, a few of the anti-virus scanners detects the Microsoft Windows file(s). My guess is that those detections are false positives and that the files are safe. It is unlikely that Microsoft Windows would ship a malware file.

Detection RatioFile Name
1/53amdmon32.exe
1/54akwweip.exe
1/48adp94xx.sys
1/49streamci.dll
1/46ehPrivJob.exe
1/50dxdiag.exe
1/49flpydisk.sys
1/48adpahci.sys
1/470
1/463ware.sys
1/50sdclt.exe
1/57wow64_microsoft-windows-ntdll_31bf3856ad364e35_6.1.7601.18839_none_c140de874739bffd_ntdll.dll_ae4ef39c
1/45DiagPackage.dll.mui
1/55WmiPrvSE.exe
1/57dxdiag.exe
1/57BitLockerWizard.exe
0/57GWXUX.exe
0/47comctl32.dll
0/57GWX.exe
0/51blbdrive.sys
0/473ware.sys
0/49comctl32.dll
0/48amdxat%USERNAME%.sys
0/48COMCTL32.dll
0/51parvdm.sys
0/48vmstorfl.sys

Scanner and Detection Names

Here's the detection names for the Microsoft Windows files. I've grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

As mentioned above, I think these detections are false positives since it is very unlikely that Microsoft Windows would ship a malware file.

ScannerDetection Names
AegisLabW32.Virut
AvastWin64:Dropper-gen [Drp]
BkavHW32.Nonim.owme, W32.HfsAutoA.C021, HW32.Nonim.psyk, W32.HfsAutoA.7bbe, HW64.packed.3B1A
ByteHeroTrojan.Malware.Obscu.Gen.002
EmsisoftJS:Exploit.BlackHole.OP (B)
JiangminWin32/Virut.bn
MicrosoftBackdoor:MSIL/Bladabindi.AA
RisingPE:PUF.Injector!1.9F0F
TheHackerTrojan/Injector.aoc

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I have gathered 119367 scan reports for the Microsoft Windows files. 16 of these scan reports came up with some sort of detection. If you like, you can review the full details of the scan results by examining the files listed above.

Analysis Details

The analysis is done on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply