查看: 29720|回复: 236
收起左侧

[病毒样本] mm.exe 第365次更新 3月14日第2次更新

[复制链接]
sam.to
发表于 2009-2-17 12:29:23 | 显示全部楼层 |阅读模式
因字数限制而开新帖!

第1至28次更新:
http://bbs.kafan.cn/thread-322929-1-1.html
第29至54次更新:
http://bbs.kafan.cn/thread-331871-1-1.html
第55至80次更新:
http://bbs.kafan.cn/thread-342389-1-1.html
第81至116次更新:
http://bbs.kafan.cn/thread-352114-1-1.html
第117至160次更新:
http://bbs.kafan.cn/thread-366834-1-1.html
第161至210次更新:
http://bbs.kafan.cn/thread-382752-1-1.html
第210至258次更新:
http://bbs.kafan.cn/thread-401335-1-1.html
第258至297次更新:
http://bbs.kafan.cn/thread-416415-1-1.html
====================
3月14第3次:
a1450a548424c0e8af1035e97bf14cfb  mm.exe
2fffb6b51a0a77bce9af3ab1221faf3d  x.gif
fa7a83b152775d150129fd5c0966b7ec  1.exe
to kl


0e7e81f0cc3a2f9866b743fcf88eff82  bbs.dll
d77f8695dfae3ff20e17d77a44155f50  xl.pif
6d9168305379a4d7cc0a2d4fcebb65e3  TIMPIatform.exe
to kl

Its detection will be included in the next update.
====================
3月14第1和第2次:
3bb3290c71af9fd235775abe5057b080  x.gif1
c8969462b4647d947676d8d532914c01  1.exe1
be68a6ba5b7b5d3108ea7bf923eebac5  mm.exe1
to kl


16c3c78c9d3a69a9accaa60a4e07242a  TIMPIatform.exe1
a9d7cae7968372b8b503e568153f5e03  xs.pif
to kl


a022d9c8f8df9823a576b4a1d005a781  9.exe
125e817f06362f5739c9aa2b8f66ff8b  x.gif
2dc362803a46cc11f9051c00ec481f80  mm.exe
to kl


9c0c1d7bf8f5437724fa8a412f8384ab  bbs.dll
to kl

##.exe_ - Worm.Win32.AutoRun.acdp,
(1).exe_ - Worm.Win32.AutoRun.acdq,
1.exe1 - Trojan-Dropper.Win32.Agent.ajhd,
9.exe2 - Trojan-GameThief.Win32.OnLineGames.usty,
bbs.dll2 - Worm.Win32.AutoRun.acdn,
mm.exe2 - Worm.Win32.AutoRun.acdo,
TIMPIatform.exe1 - Trojan-Dropper.Win32.Small.cwt,
xs.pif1 - Trojan-Dropper.Win32.Agent.ajhc
====================
3月13第3次:
1482e456e72760908967f2e97e57892e   1.exe
d8443b523e5db53bf911221aa1a380f4   x.gif
93975a2fe475f344160cb3429d27e19d   mm.exe
33422996241d8d72531d4a3f23c94fc4   9.exe
to kl


c1064bdce941dd54f879198549af1e91   bps.dll
a985794c92b884655aa99aff73759063   henaji.pif
d914a2605c63e3d920bedad17886a71a   TIMPIatform.exe0
to kl

1.exe- - Trojan-Dropper.Win32.Agent.ajin,
9.exe- - Trojan.Win32.Agent.burh,
bps.dll - Trojan.Win32.Agent2.ffw,
henaji.pif_ - Trojan.Win32.Agent2.fho,
mm.exe-, x.gif- - Worm.Win32.AutoRun.fgh
====================
3月13第1和第2次:
f2b705fa13a38f59e67e8d94736dd063   mm.exe(已能查出來,沒有上报)
e9bc01f15c4028a9bb7fdc2ee0eb76f1   9.exe
ca96dd7ac160cee6c5cdc0d487945365   1.exe (已能查出來,沒有上报)
4722ab915125e855c31759b246a31501   x.gif
to kl


1685ef16baa9ab51d1f1231b6348b284   nps.dll2
45f0d43185164233b06b90f968bf1506   TIMPIatform.exe_
6666aef37408bc3300a5affe144d8499   henaji.pif
to kl


4e02e8614b348903358bd2fb4acdda66   1.exe8
901533d7c4d84cbcafbf72f2b01e5ee8   mm.exe8
c57244166c5fd9f6c477c46c0a05a66d   x.gif8
e9bc01f15c4028a9bb7fdc2ee0eb76f1   9.exe8
to kl


85d62a52f2a889db1a988b4e8982e819   henaji.pif
1f8996b542b77b14e48a2a90068b01fd   kps.dll9
b4e7e674f5dd7ec15a1dc212366ff50b   TIMPIatform.exe8
to kl

New malicious software was found in these files. Detection will be included in the next update. Thank you for your help.
====================
3月12第3次:
969f2c3661e832f51ee6dfd5d7e6414e   x.gif3
d98c41da872bc4ad9f30653c041c564f   mm.ex2e
ca96dd7ac160cee6c5cdc0d487945365   1.ex1e
to kl


1c7c7ef0a2d5d7e069a5fdc8dbbb347f   henaji.pif
45f0d43185164233b06b90f968bf1506   TIMPIatform.exe2
to kl

##.exe_, henaji.pif_, mm.ex2e - Worm.Win32.AutoRun.fga,
1.ex1e - Trojan-Downloader.Win32.Agent.bkuf
TIMPIatform.exe_ - Trojan.Win32.Agent.bukg
====================
3月12第2次:
6bc5a30969bd118a7f6b3d2cbec1c387   9.exe
bb6aac7f788896f10417ac5481dceb45   mm.exe
3c822f624741b5a1fae7aef16323fb06   x.gif
to kl


3bec24bdff111ea06a0fb4a16f81e569  henanlaji.pif
to kl

##.exe_ - Worm.Win32.AutoRun.ffs,
9.exe0 - Trojan-GameThief.Win32.OnLineGames.uspm,
henanlaji.pif2 - Trojan.Win32.Agent2.fbp,
mm.exe0 - Worm.Win32.AutoRun.ffr
====================
3月12:
0279739ca0aa2536172461b7462f2d50   1.exe1
e4369115a82778ce6a7d32e13b2b6638   x.gif2
72fc099460a9cbdc9eb095347f3e73c7   mm.exe2
e8937e92653ff2ffc6816e424d16ae59   9.exe2
to kl


b7cd16916b773e6732e49cc661b40a83   TIMPIatform.exe
to kl

Its detection will be included in the next update.
====================
3月11第2次:
72396b1defa2eb51a30955d469fd629c   9.exe
b870a65398e4fb21d042799a7e4929af   1.exe
e4369115a82778ce6a7d32e13b2b6638   x.gif
72fc099460a9cbdc9eb095347f3e73c7   mm.exe
to kl


d3cf81bbc41744ce326781971e355038   TIMPIatform.exe2
3a32e11359e801718be8444d11756543   henanlaji.pif
to kl

====================
3月11:
4673a19ddd07ddecf7efd6f79113c4e7   x.gif
7f68b37e3cc95feb09b02c93992917d3   mm.exe
b27a755af76fd20f4045fb882f031105   9.exe
0c7b893defe7dbb4730fed8f5684525d   1.exe
to kl


6a21ed95b1b733c6a77a6d514eacf9fb   TIMPIatform.exe
ddcf19f911c75cc742df2b9a3390b421   bs.pif
012abf6850338799919be22c22004dbc   bsn.dl
to kl

2e - Trojan-Dropper.Win32.Agent.ajaz(这可能是1.exe)
9.exe2 - Trojan.Win32.Agent.buew
mm.exe2,x.gif2.--_ .exe - Trojan-Downloader.Win32.Zlob.acqc
bs.pif - Trojan.Win32.Agent2.fac
bsn.dll2 - Trojan-Dropper.Win32.Agent.ajba
TIMPIatform.exe2 - Trojan-Downloader.Win32.Agent.bkok
====================
3月10第3次:
1174a945ba48e126480ceed0a196a51d  1.exe
5236f6eb48127c01a38caa85d45a06cf  x.gif
c7beb9cf407a0f63a9bfb3c743e08d79  mm.exe
to kl


ca67601a5fc3e4063a3f0432af6c378b  hl.dll2
72f1264e9e8af64b3555eabcc72a7d9f  TIMPIatform.exe2
1848b5a47717526ec47811742656b24c  wd.pif
to kl

##.exe_, mm.exe2 - Trojan-Downloader.Win32.Zlob.acqb,
1.ex1e - Trojan-Dropper.Win32.Agent.aizq,
hl.dll2 - Trojan.Win32.Inject.pvm,
TIMPIatform.exe2 - Trojan.Win32.Agent.buby,
wd.pi2f - Trojan.Win32.Agent2.eyu
====================
3月10第2次:
b87cca79658a2270e99b9017962de941   1.exe
8d9cc60c412d39ef3f3bd4e64fc257bc   x.gif
06c4033e8be3954fa90c351fb97e8732   mm.exe
c88f9975986f8bb7e0f3190f3b9261e5   9.exe


b87cca79658a2270e99b9017962de941   wuauclt.exe
235a5bc4bd97b13bee7216157de367eb   hl.dll

Detection will be included in the next update. Thank you for your help.
====================
3月10:
3d7523b7c0ece66df2df0f94290a9a28  mm.ex3e
10d15037bd61067a29a5c76eba71c64b  x.gi3f
c88f9975986f8bb7e0f3190f3b9261e5  9.ex3e
02c38886fd1f8319f83d03237d184a67  1.exe3
to kl



09aa90d989be26ecd6dc23bb7c53f268  TIMPIatform.exe3
73444538dc14ecfee529f372c51299e4  wd.pif
02c38886fd1f8319f83d03237d184a67  wuauclt.exe2
to kl


Detection will be included in the next update. Thank you for your help.
====================
3月9日第2,3次:
8bbce2bed9b4f06efc8e299ef74451d1   9.exe
773067b303786b63897ae859a4648faf   mm.exe
f110edadb300617157a435d3026298f6   x.gif
67658be2642a9084775aa24001c76d2a   1.exe
to kl


93cadd5562be19b79661c7de27721719   wd.pif
d768f520c83f7d489d4fc7dc3fb4c240   TIMPIatform.exe
to kl



2b7f164500ebf3abf2425b8ec9e1a50d  1.ex3e
15f775e9eeadc824c2ed91f7c3f6f30c  x.gif3
1c33592f79360991263f80b697e6e0c6  mm.ex3e
to kl


fdc98dd621d95dab33cc393c807ee6df   hnj.dll


1.ex3e, TIMPIatform.exe3, wuauclt.exe2 - Trojan-Dropper.Win32.Small.cwf,
hnj.dll2 - Trojan.Win32.Agent2.exb,
mm.ex3e, x.gif3 - Worm.Win32.AutoRun.fey
9.exe3 - Trojan-GameThief.Win32.OnLineGames.uskp,
mm.exe2 - Worm.Win32.AutoRun.ffd,
TIMPIatform.exe_ - Trojan-Dropper.Win32.Small.cwf,
wd.pif_ - Trojan-Dropper.Win32.Agent.aixx,
wuauclt.exe_ - Trojan-Dropper.Win32.Agent.aixy,
x(1).gif3 - Worm.Win32.AutoRun.ffc
====================
3月9日:
ffc0541a2dc1327a1a34a922100ddbf2   x.gif2
ce0bac3dcdf90099a5b58884cd43f5ed   mm.exe2
3205eb17b3d1393b6c39163b699656ef   9.exe2
to kl


43460d1bccc573163c8d67967794d9fb   wd.pif
to kl

##.exe_, mm.exe_ - Worm.Win32.AutoRun.fey,
9.exe_ - Trojan-GameThief.Win32.OnLineGames.bkye,
wd.pif_ - Trojan.Win32.Agent2.exc
====================
3月8日第3次:
0b6124505b6d03306a2c8a2d43852c8b   1.exe
ab1afad08a8c15ac2353f11e377e55fc   x.gif
a04d3b6664995fd0ddda4997215921b6   mm.exe
9802aafc38f434905934b5b10586c977   9.exe
to kl


0b6124505b6d03306a2c8a2d43852c8b   wuauclt.exe0
41924c46e70859da16d107da380a5ab9   TIMPIatform.exe2
e85f133a016354515ba9cfc5223ff1b0   wd.pif

====================
3月8日第2次:
9bd44cd67d2acfd71ee264d00d4bd44b   1.exe2
to kl
一生成跟前面一样,一生成是本体

Trojan-Dropper.Win32.Agent.aiwf
====================
3月8日:
f9a777cca871134c4e962ad009ea6454   x.gif
e10a5c35d5a82cbb6b0424ce882ad742   mm.exe
74c52d23fc63a0d9739a6320c294decc   1.exe
2f48d4e70b526e777e306a666c0ab031   9.exe
to kl


52a41180bad83619dfb4ce81a8d2dc63   wd.pif
9d65236edc4049698f9fd91f86c4101e   TIMPIatform.exe2
74c52d23fc63a0d9739a6320c294decc   wuauclt.exe3
to kl

Its detection will be included in the next update.Thank you for your help.
====================
3月7日第2次:
3154582edb4ebb837d9061f43ac97b27   x.gif
84970ce1717874c2da524189ae0c8b1c   mm.exe
5958adf5a52b4de7daaf7f2545a25d2a   1.exe
to kl


5958adf5a52b4de7daaf7f2545a25d2a   wuauclt.exe
332d728c41c6eb6580a74a6e2478fcc4   ls.pif
54db97060a9699962d4058305b9abcc8   TIMPIatform.exe
to kl

====================
3月7:
87f3ce5ab3466ffd3f67ef0a76eda937   9.ex2e
909859f4a61b92e047684fa4f171c4c7   mm.exe2
d6ba4b345a20b467a2b889ac4d798caf   1.exe2
to kl


ac5c69f67311c46b445365d0072770bc   TIMPIatform.ex2e
1b77a76920b9ee916ccfdeefb3fba609   ls.pif
d6ba4b345a20b467a2b889ac4d798caf   wuauclt.exe2
to kl

====================
3月6第2次:
cf5343a60ed5a56f92ab9996136afdd7   1.exe
42702ece92926b20f428ab133b06ccf3   x.gif
20f0fbb08211303c6c6bc9f57167a188   mm.exe
30e7e6b40e60f411cbb5557a4aa0cc4a   9.exe
to kl


1b77a76920b9ee916ccfdeefb3fba609   fs.pif
cf5343a60ed5a56f92ab9996136afdd7   wuauclt.exe
1ad3767dc15b9ca3527ed7b4ac750369   TIMPIatform.exe
to kl

This file is already detected. Please update your bases.
====================
3月6:
f018c3f4f268c3118d414899049b0d61   x.gif
d4d879b19a3e7623612429e77afb3167   mm.exe(此文件已能查)
c4ec4e8d4f06af91dc47c12ac91ed181   1.exe
to kl


50d6f1c6a66023d83420667d0e117495   fs.pif
c4ec4e8d4f06af91dc47c12ac91ed181   wuauclt.exe2
983537ce2e8db37533618fe052f481ae   TIMPIatform.e2xe
to kl

Detection will be included in the next update.
====================
3月5第3次:
fd2de77a3709bbac5d24560208c665ec   xx.exe
466d1fd526cdea1f38036b53c95d0158   9.exe
e3dfc8acc575aa2b930c7e25b7e43fd0   1.exe
83e5b9012c1926e0b7742fb5973ed96b   x.gif
to kl


生成跟上一包一样

1.ex2e - Trojan-Downloader.Win32.Small.jir
9.e2xe - Trojan.Win32.Agent.btlj
mm.exe2,x.gi2f.--_ .exe - Worm.Win32.AutoRun.fej
====================
3月5第2次:
c4f976eb7c5be11ee8df8c1b5fc9229f   mm.exe
4f90525425c172968cbc1b3bee434275   x.gif
e3dfc8acc575aa2b930c7e25b7e43fd0   1.exe
to kl


e3dfc8acc575aa2b930c7e25b7e43fd0   wuauclt.exe
50d6f1c6a66023d83420667d0e117495   siam.pif
983537ce2e8db37533618fe052f481ae   TIMPIatform.exe
872b055f3b49282f077b1ce17f45ce87   om.dll
to kl

Its detection will be included in the next update.Thank you for your help.
====================
3月5:
082c0837932615e84b718b6f1ecc49ef   1.exe
78d83932b24512ddc01482f829d18b81   x.gif
4fd0cb47a8bcc3b1e44ff9e35aee500b   mm.exe
to kl


836894b988f99e38f7988b0a9ddf5033   pp.dll
to kl

====================
3月4第2次:
243a86059e7e78035759f710cd9b7da0   x.gif
bb2ab7ed92e6481d65f63015bc188d92   mm.exe
082c0837932615e84b718b6f1ecc49ef   1.exe
29d7a6285d6a6680f4bcba05d7804833   9.exe
to kl


2a8d7da281daacf1a16e8aaa278fb0df   lm.pif
082c0837932615e84b718b6f1ecc49ef   wuauclt.exe
fc7604c34e56d1e9a9d6a52068d8da31   TIMPIatform.exe
to kl

Its detection will be included in the next update.Thank you for your help.
====================
3月4:
5f6e8319e6f277e035c50184161ed347   1.exe
1cbf95fceaa7117deeebe7f3cc658897   x.gif
ab671d0eeda9a9a4c364fa170aa7e415   mm.exe
cf3a4ce3e2a4f03674fc85326be39f25   9.exe
to kl


5f6e8319e6f277e035c50184161ed347   wuauclt.exe
081cf923d1d5433af3d0e87f38002e9e   TIMPIatform.exe
1491d858b7f4c77b888e5823f2410e7a   mp.dll_
43cfa97e4791c18dcc6116fddce445a4   lm.pif
to kl

1.exe2,
wuauclt.exe - Trojan-Dropper.Win32.Agent.aiqg
9.exe2 - Trojan-GameThief.Win32.OnLineGames.usdr
mm.exe2 - Worm.Win32.AutoRun.abkt
x.gif2.--_ .exe - Worm.Win32.AutoRun.abku
mp.dll_ - Worm.Win32.AutoRun.abkx
TIMPIatform.exe - Trojan.Win32.Agent2.eqb
lm.pif - Trojan.Win32.Agent.bthg
====================
3月3第3次
308f795be48a1a538c041dc858e0f515   mm.exe
ba9b5b5918e27c0c0af63d3c29c14489   x.gif
a0da89b4db66c2a7f1a7e36bcdf67eef   1.exe
056aa8052771f45057e3711c25b28ad9   9.exe
to kl


a453a9fa681ee2141c95fe1420e9451f   lm.pif
a0da89b4db66c2a7f1a7e36bcdf67eef   wuauclt.exe
be8f29ed9771965f2f4c8fd23e40cee2   TIMPIatform.exe
to kl

23803012_96176120_1.exe2,
23803012_96176126_wuauclt.exe_ - Trojan-Downloader.Win32.Small.jik,

23803012_96176121_9.exe2 - Trojan-GameThief.Win32.OnLineGames.uscv,

23803012_96176122_mm.exe2,
23803012_96176123_x.gif2,
23803012_96176124_lm.pif_,
23803012_96176127_x.gif2.-_.exe_ - Worm.Win32.AutoRun.fdr,
23803012_96176125_TIMPIatform.exe_ - Trojan-Downloader.Win32.Agent.bjrj
====================
3月3第2次
1c25a695b065fdce01e00f6ebed32020   1.exe2
4f357f54215c7f6e26a338215ed294a0   mm.exe2



1c25a695b065fdce01e00f6ebed32020  wuauclt.exe
to kl

New malicious software was found in these files.
====================
3月3:
500c9034c65ff601ca1899a565e909f5  1.exe2
19295eb9478eac638d93a1b907541778  9.e3xe
a27b61eff49cb9a43a5561e9cf0df9e1  mm.ex2e
4a8807196c71530dc243a8c4db523d77  x.gi3f
to kl


8bfb556b3f7c58bafd7055c2b2e79878  nb.pif
500c9034c65ff601ca1899a565e909f5  wuauclt.exe2
be8f29ed9771965f2f4c8fd23e40cee2  TIMPIatform.exe2
to kl

New malicious software was found in these files.
====================
3月2第3次:
5252372c1e104cd24b80d50012417050   9.exe
8704d6f97f6a9e57553ea0936cc4bab0   1.exe
bdec86969f2861ce6bd739505a5532a9   x.gif
269aa2f8eddda0d3dac0ee997493568b   mm.exe
to kl


e046237853da9e5e1f9aa827ea12ea6c   dbs.pif
8704d6f97f6a9e57553ea0936cc4bab0   wuauclt.exe2
f34771b1a31bff44e6a2adc8db28c71e   TIMPIatform.exe2
to kl

Its detection will be included in the next update.Thank you for your help.
====================
3月2第2次:
4771613bc0de413ed4a309458df0f4d5  mm.exe
0660b1988577932f9340c477d0532833  x.gif
7550ffa849d52e7c6c8be6e3408e1e6f  1.exe
5252372c1e104cd24b80d50012417050  9.exe
to kl


1020cebceaaa52cf1c4d8ddf873e8939  dbs.pif
7b67cadbe661492463498b0c377afadc  pa.dll2
f2f1fcb1c4bd194d0892ebb24313d8dd  TIMPIatform.ex2e
7550ffa849d52e7c6c8be6e3408e1e6f  wuauclt.ex2e
to kl

9.exe_ - Trojan-GameThief.Win32.OnLineGames.usbi,
pa.dll2 - Rootkit.Win32.TDSS.cx,
TIMPIatform.ex2e - Trojan.Win32.Agent.btaf
dbs.pi2f - Trojan-Dropper.Win32.Small.cuz,
mm.exe_ - Worm.Win32.AutoRun.abih,
wuauclt.ex2e - Trojan-Dropper.Win32.Agent.aimw,
x.gif_ - Worm.Win32.AutoRun.abii
====================
3月2:
24cce5c117873c95cf8953edcad2701f   1.exe
212567bcd7c00765ac5b12b424392fea   mm.exe
62d5391f4e8509b0c4d29c8a12aabe55   x.gif
f1ffe975c1c13e67eeb0b880e6cf4367   9.exe
to kl


cb852367c8d7af269557a0370790806d   dbs.pif
24cce5c117873c95cf8953edcad2701f   wuauclt.exe2
ac234f4254e92d2b79242d88758dd5ff   TIMPIatform.exe2
to kl

detection will be included in the next update.Thank you for your help.
====================
3月1第2次:
32a8866776f55429570b865b5d62a19e   1.exe
0225e5ad2f41e0f4510bd66ab46fcd20   9.exe
to kl


e9d501d85d0a17831430ba0cdf2f2664   TIMPIatform.exe
32a8866776f55429570b865b5d62a19e   wuauclt.exe
to kl

Its detection will be included in the next update.Thank you for your help.
====================
3月1:
2c787013e2c76c6a5d038c8eb6c5adfe  9.exe
88a3f0da01206f86181cd722f57d29d0  1.exe
ec877bffdc74a3cc308ab37a2018156e  x.gif
0fb20a54f8a2ff2ac205bef0ab9600c5  mm.exe
to kl


f5ce3e7d20985299f8e414ac5081c121  dbs.pif
dab043404533a95845f07c39d58d69b2  TIMPIatform.exe
to kl

New malicious software was found in the attached file. Its detection will be included in the next update.
====================
2月28第2次:
58df494cec4af7251d866ddcf8252f4d  x.gif
f12eae9968bfa35e5020dc3cf5808dc9  mm.exe
to kl


eb276accb0e95cc1259cff8644115ffc  dbs.pif
to kl

====================
2月28:
52801d5f03a2ba07abc161fc5b2a218d   9.exe2
746345d87e12c9234d4b8964bab48814   mm.exe2
ba356da9715ec5cd9689bd45a0b2c48c   1.exe2
0345deffcfea8a36cc6121e5ddd74625   x.gif2
to kl


6f3be3b970c288cfe57944403e163efb  TIMPIatform.exe1
ba356da9715ec5cd9689bd45a0b2c48c  wuauclt.exe1
cdea6d86c6af69a466d72626c3e4836b  db.pif
to kl

====================
2月27第3次:
4e3d91f236e37e14ab699c92a1723061   mm.exe1
8a6ed45399eb38f0317eb7c741226699   1.exe1
4ba7e35077730b6984d204bf1f55fa12   x.gif1
10483252302917f296481db80f3f120b   9.exe1
to kl


3e1f18c63b030542932e90033646d50e   TIMPIatform.exe
faf8c72b7bc7182ec682a82619e9a0fe   note.exe
7cc0932c3711fcbbf3b5b7d566ce6c52   bj.pif
8a6ed45399eb38f0317eb7c741226699   wuauclt.exe
to kl

====================
2月27:(包括第2次)
d4e6247df523e37a3418bc49b3c904ea  1.exe1
7d7097cf19b1129f997d13678b0e6b30  mm.exe2
df31d43c488d23dddf303d741dd2dcd1  9.exe1
30478e31d8ae2467ffa7d9c86005fe3a  x.gif2
45cf42fe02e323491c941042b5530d45  x.exe1
5f958aae0542bfb02fcf73ca3218c5ff  mm.exe1
to kl


3e1f18c63b030542932e90033646d50e  TIMPIatform.exe2
d4e6247df523e37a3418bc49b3c904ea  wuauclt.exe2
6f903896d8ce000d9aa61809cb99d2b3  vts.dll2
59e714b65997e67a6bc1e73e7e687369  aVj.pif
to kl

====================
2月26第3次:
e9c883e177af7f77f427c268d00ef4ad  9.exe
b7155abd6234d65e20d4953bbb982a7e  1.exe
to kl


3a4585ce4602b3523bec2987c37be625  TIMPIatform.exe1
b7155abd6234d65e20d4953bbb982a7e  wuauclt.exe2
to kl

Detection will be included in the next update.Thank you for your help.
====================
2月26第2次:
7a0f34d15752ecca378e7cab0ce05e9d  x.gif
d54841ac5e686e757198462e6b85383b  mm.exe
to kl


602ea4f14cb2f8c39db5cc49672b96c8  aVj.pif
4ef5b85652182602831b3a131008baed  vts.dll
to kl

Detection will be included in the next update.
====================
2月26:
51b9a4d3a12334332bffccd7198db8b2  9.ex2e
44f86b2ecf25e668a288841f5d59ad9c  mm.exe2
7a0f34d15752ecca378e7cab0ce05e9d  x.gi2f
60f31725888ec134e444cb963a95d548  1.ex2e
to kl


602ea4f14cb2f8c39db5cc49672b96c8  aVj.pif
52bed4f96d98bb61da118e88dac9c5a6  TIMPIatform.exe2
to kl

1.ex2e - Trojan-Downloader.Win32.Small.ajju
9.ex2e - Trojan-GameThief.Win32.OnLineGames.urve
mm.exe2 - Worm.Win32.AutoRun.abbm
x.gi2f.--_ .exe - Worm.Win32.AutoRun.abcf
====================
2月25第2次:
e891429b12ee305fa70a41ba2b51ef26   9.exe
dfe5b815a73d764866684040e02ff274   1.exe
fcf6ff888f1e3bf8779a92711946e71a   mm.exe
fe8911bf3617088308a6039900356beb   x.gif
to kl


a01f6d85dba4a70ea7df730253cec9bf   vvs.dll
dfe5b815a73d764866684040e02ff274   wuauclt.exe
e82933ba7cd932d53dced4729b606958   aVj.pif
to kl


1.exe2,wuauclt.exe - Trojan-Downloader.Win32.Small.ajjk
9.exe2 - Trojan-GameThief.Win32.OnLineGames.urty
mm.exe2,x.gif2.--_ .exe - Worm.Win32.AutoRun.fbw
aVj.pif - Trojan-Dropper.Win32.Agent.ahxd
vvs.dll - Rootkit.Win32.TDSS.j
====================
2月25:
b3d213449f4c18f546b7a6394985df44  9.exe0
6eaf00e4409b4fb3078ee6384af8e3e9  mm.exe2
66f83eddfa112a1b1a5ac1bd8ca2df49  x.gif2
9de9c92731b6ee4bb14db593c27b8a9d  1.ex2e
to kl


e82933ba7cd932d53dced4729b606958   aVj.pif
9de9c92731b6ee4bb14db593c27b8a9d   wuauclt.exe
778b68d0ab0afaa4ebc5cd18e251c00c   TIMPIatform.exe

Detection will be included in the next update
====================
2月24第3次:
a92a2650077c24d8294b8daa885664fd   x.gif_
8862c367987783df45576e6973017ba5   mm.exe_
48e1eaeeba317cbe1e3602ebac070506   1.exe_
to kl


48e1eaeeba317cbe1e3602ebac070506   wuauclt.exe
af15792fbc7c6791858f203f6af23701   aVj.pif
to kl

1.exe_,wuauclt.e2xe - Trojan-Downloader.Win32.Small.ajix,
aVj.pif2 - Trojan.Win32.Small.bus,
mm.exe_,x.gif_.-_.exe_ - Backdoor.Win32.Agent.aeda
====================
2月24第2次:
4f07416b87cbe17f59bdd6a49d944fbb  x.gif2
7a52cfeb752e0acf3533ca43e4bfabf6  mm.exe2
to kl


3706879c52c10ddc502415ddb3f7154b  aVj.pif
to kl

These files are already detected.
====================
2月24:
8c2c479e3efb109392afc31ca7ddb9ed  mm.exe
0541f7deba39d5e47802f49af171db2a  x.gif
133fb13b3c50f8d44a2b2cbe94cd3da3  1.exe
to kl


ea293d420e78fbdaf685992e27a89940  aVj.pif
c679dc17e9269af1687a8f35f05f6ec4  TIMPIatform.exe2
133fb13b3c50f8d44a2b2cbe94cd3da3  wuauclt.exe1
to kl

These files are already detected.
====================
2月23第2次:
e86db6c2dc6fde215c41335913527242  mm.exe
d106ce9b5d970da2fe8426539c7d19f3  x.gif
ba66065c0f74cce4f0bc586ba51aa718  1.exe


5f4adb6fa03d475340198e55d674ced6  aVj.pif
22d785a7ae6e125073232534e84c0f20  ls.dll
1330683a795fa9d2fef441f3c03cab44  TIMPIatform.exe
ba66065c0f74cce4f0bc586ba51aa718  wuauclt.exe

====================
2月23:
df01b58a7bdb7b52e343e079ffe178c1  mm.exe
39ace2200765f48a92caff2c63bc63d4  x.gif


5f4adb6fa03d475340198e55d674ced6   aVj.pif

====================
2月22第3次:
aa24e8820832e996c32c6450edf170d3  mm.exe
ef2dc49a986fede4ed779c3d80576a25  x.gif
ba66065c0f74cce4f0bc586ba51aa718  1.exe
1c7f520227eb9cd887794a545a71d54b  9.exe


4ffbad7c9bc5365352f3458a7e4315d3  aVj.pif
5bf4adcaa77065e067464f49d22cbbb5  ls.dll2
1330683a795fa9d2fef441f3c03cab44  TIMPIatform.exe
ba66065c0f74cce4f0bc586ba51aa718  wuauclt.exe

====================
2月22第2次:
1c7f520227eb9cd887794a545a71d54b   9.exe
e20a9c7c24f29fd1544172b8b9ac8aa9   1.exe
e68d1790a0b5a6254ab2309285570faf   x.gif
39b555bbc81cf5641cd3511dcb28cef7   mm.exe


e6125ccf2afa14f9fa5d54b5f2d9f0e2   TIMPIatform.exe2
4ffbad7c9bc5365352f3458a7e4315d3   aVj.pif
e20a9c7c24f29fd1544172b8b9ac8aa9   wuauclt.ex2e

Detection will be included in the next update.
====================
2月22:
d9c90efbf949318cc94e154005943d9e  x.gif
5d48d75939ed9c85bca7a34620dc5eb0  mm.exe


37358d249c3a3c83ef335707614be08f   aVj.pif

Detection will be included in the next update.
====================
2月21第2次:
1cf2a7b06e29c2d63f10e53f29b9774b   9.exe
d0be36f5d74f5e01eee4cdd9a18a2664   1.exe


e70e96be0abc9accb9497abb2fe7b79d   TIMPIatform.ex2e
d0be36f5d74f5e01eee4cdd9a18a2664   wuauclt.exe2

====================
2月21:
e71db6ae8825de303bcd98b58a080f84  1.exe2
1d567888ee6fe8dddcf0e23371432318  9.e2xe
9f2bad704e22f6390ab4ccf5b6785139  mm.ex2e
31418f0f50f0779eb9f5aa8994812a0e  x.g2if


e71db6ae8825de303bcd98b58a080f84  wuauclt.exe2
7d0dc5585f7476600777d1b64513ab1e  aj.pif
b8f54de0820c6d142e8174c0398b445d  TIMPIatform.exe2

aj.pif2 - Trojan.Win32.Agent.brrt
mm.ex2e,
x.g2if.--_ .exe - Trojan-Dropper.Win32.Mudrop.xc
TIMPIatform.exe2,
wuauclt.exe2 - Trojan-Downloader.Win32.Small.jgs
p,s:1和9已能查出來
====================
2月20第2次:
0ea143874eaac231365eb340246b2dc7   9.exe
c902c45595733eabdb1506d041d93198   x.gif
60124604d620e562ce1e647b90de7ebd   mm.exe


c824eac2178e1328a976d25cba0c1c4a   aj.pif

====================
2月20:
e0719f8864ddd04625bd8fdf4fdf6c80   mm.exe
e6a6e9aa8e7053fec6f26c19e06112a0   x.gif
3eacd054a953725b2e01d3f0e449cd14   1.exe
9adf43cc9bdd5fc25e7c691a4d6bff6a   9.exe


d99c934e0149a4e38cac99e543ee5e29   userinit.exe2
83a3824bbee0737fec475af44ed62c25   conime.exe2
42739dc3c0d400eccdb3213c5eada434   cvts.dll2
6141fd71b557d55990f0757bbef7cf9a   dfln.dll2
903beec2622fe0ce3737da05544151db   aj.pif

====================
2月19第3次:
d8bbb22ed4abacfb2e2fa9b26d100fdc   mm.exe
c1073822229c60043a8779fd2af58435   x.gif
6c9ebab391dcf3e483521ee953f32fe5   9.exe


21278d4e65d38c83ec680c1d2cb60864   lTj.pif

====================
2月19第2次:
bc72c7f6da72e02b8f14b66b96cffcd7   mm.exe
e29a22c76ed9ae2830c9e662635407b8   x.gif
e298b1d739df0a907d2df58ae1c07117   1.exe
c227c6ebb1c9dc45311ecfa20a45b303   9.exe
to kl


d521da2e20c493ae6267c01cf0875775   conime.ex2e(跟上一包重覆)
73dad8b2799c195b147e9d184a40f250   userinit.ex2e
b05e86fa59e2589efccf32023c95cc31   lvsj.pif
b3be31c39ddfd4c939843a2668141f05   scvts.dll
ec0beb19e15de511521e9492d2112064   dafln.dl2l
to kl

====================
2月19:
ad12b593229e26c14740c0eb14e067ee   1.exe2
to kl

d521da2e20c493ae6267c01cf0875775   conime.exe2
to kl

1.exe_ - Trojan-Downloader.Win32.Agent.bias
conime.exe_ - Trojan-Dropper.Win32.Agent.ahot
====================
2月18第3次:
3084c9aeddc902fdb15690ada0afd955   9.exe
b2613c4e5de9228314fa34827464bc86   mm.exe
ea63785e15793c497276e0e9957b4435   x.gif
to kl


f641cfd9d997c0116672e029f2de55d6   lvsj.pif
feabb47c9789ecefcb40cad18fb55f61   sbvts.dll
to kl

====================
2月18第2次:
90bab562213113127b9aee7d3eba76ce   x.gif2
b1aeb5fbb68c0422d1f0441c3fb95c2b   1.e2xe
fde497e5cf5555407d575094b0b67c82   mm.ex2e
to kl


beff807d469e16efd10ecc628cb365d8   lvsj.pif
dde01ce82dad059f75361c29c456fd73   ribs.dll
to kl

====================
2月18:
b1aeb5fbb68c0422d1f0441c3fb95c2b   1.exe
46a449d45bef2900b9d87baa28081d59   9.exe
to kl


1adc147bff5a675fe6d8e2bf02c5ef29   fasadf.dll
to kl

部分生成跟2月17第2次重覆
====================
2月17第3次:
3d300bd1068d251c8c5c6406c1ce98c4   mm.exe
06a4969fbdef83b52a42cbe7c441b849   x.gif
to kl


ab2bd91b5167a5374074ee2b23e59e0f   lvsj.pif
to kl

====================
2月17第2次:
240aab9f586da3a3bc1b42385e79aebd   1.exe
to kl


72b5ea4b1349d9f0e695d6d9a927238d   userinit.exe2
0eac27be184581053949682aad3e9b2b   conime.ex2e
to kl

====================
2月17:
fc6840fb288415d6d2b9b94725118799  x.gi3f
387cacef40aed1074549d26f4b8041c0  9.ex3e
d25802b34c6db7e5f6e9a5f5c18de3c5  mm.e3xe
to kl

9.ex3e - Trojan-GameThief.Win32.OnLineGames.uqzv
mm.ex3e,x.gi3f.--_ .exe - Backdoor.Win32.Small.hmx


67c209d46e3d7f9dd1a97b68b4d31f71   lvsj.pif
to kl

=============================================================

[ 本帖最后由 sam.to 于 2009-3-15 16:34 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x

评分

参与人数 4人气 +5 收起 理由
尤金卡巴斯基 + 2 精品文章
电影结束了 + 1 明天闪了,今天送RQ,支持!
sbbdms + 1 感谢提供分享~
dreams521 + 1 版区有你更精彩: )

查看全部评分

rok827
发表于 2009-2-17 12:29:56 | 显示全部楼层
红伞3个启发
to avira
328397663
发表于 2009-2-17 12:43:12 | 显示全部楼层

回复 1楼 sam.to 的帖子

Hello,

9.ex3e - Trojan-GameThief.Win32.OnLineGames.uqzv
mm.ex3e,
x.gi3f.--_ .exe - Backdoor.Win32.Small.hmx

New malicious software was found in these files. Detection will be included in the next update. Thank you for your help.
Sherry.ai
发表于 2009-2-17 12:44:34 | 显示全部楼层
Ka8 Miss
sam.to
 楼主| 发表于 2009-2-17 16:45:00 | 显示全部楼层
第299次更新
qwer9909
发表于 2009-2-17 16:50:22 | 显示全部楼层
0217-1227mm.rar/9.ex3e\data001;C:\Documents and Settings\Administrator\桌面\0217-1227mm.rar/9.ex3e;Trojan.Sniff;;
9.ex3e;C:\Documents and Settings\Administrator\桌面;隔离区包含被传染的对象;;
0217-1227mm.rar/mm.ex3e\data002;C:\Documents and Settings\Administrator\桌面\0217-1227mm.rar/mm.ex3e;Trojan.KillProc.1565;;
0217-1227mm.rar/mm.ex3e\data003;C:\Documents and Settings\Administrator\桌面\0217-1227mm.rar/mm.ex3e;Trojan.KillProc.1565;;
mm.ex3e;C:\Documents and Settings\Administrator\桌面;隔离区包含被传染的对象;;
0217-1227mm.rar/x.gi3f/照片                                                                                                     \rK;C:\Documents and Settings\Administrator\桌面\0217-1227mm.rar/x.gi3f/照片                                                        \rK;Trojan.KillProc.1565;;
0217-1227mm.rar/x.gi3f/照片                                                                                                     \rK;C:\Documents and Settings\Administrator\桌面\0217-1227mm.rar/x.gi3f/照片                                                        \rK;Trojan.KillProc.1565;;
照片                                                                                                                  .exe;C:\Documents and Settings\Administrator\桌面;隔离区包含被传染的对象;;
x.gi3f;C:\Documents and Settings\Administrator\桌面;发现压缩文件中有被感染的对象;;
0217-1227mm.rar;C:\Documents and Settings\Administrator\桌面;发现压缩文件中有被感染的对象;;



0217-1642mm.rar/1.ex2e\data001;C:\Documents and Settings\Administrator\桌面\0217-1642mm.rar/1.ex2e;Trojan.Siggen.564;;
1.ex2e;C:\Documents and Settings\Administrator\桌面;隔离区包含被传染的对象;;
0217-1642mm.rar;C:\Documents and Settings\Administrator\桌面;发现压缩文件中有被感染的对象;;




0217-1642mm-c.rar\conime.ex2e;C:\Documents and Settings\Administrator\桌面\0217-1642mm-c.rar;Trojan.Siggen.564;;
0217-1642mm-c.rar\userinit.exe2;C:\Documents and Settings\Administrator\桌面\0217-1642mm-c.rar;可能 STPAGE.Trojan;;
0217-1642mm-c.rar;C:\Documents and Settings\Administrator\桌面;发现压缩文件中有被感染的对象;;
ledled
发表于 2009-2-17 16:56:15 | 显示全部楼层

回复 5楼 sam.to 的帖子

lvsj.pif2 to VB
kingmuro
头像被屏蔽
发表于 2009-2-17 17:00:55 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
kingmuro
头像被屏蔽
发表于 2009-2-17 17:02:42 | 显示全部楼层
MCAFEE8.7

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
江湖的fans
发表于 2009-2-17 17:22:59 | 显示全部楼层
Trojan.Win32.Agent.zri
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-21 18:20 , Processed in 0.132178 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表