查看: 2625|回复: 10
收起左侧

[病毒样本] BD启发出的鸽子[MD5: 421B3B 2B56FB]

[复制链接]
allenhippo
发表于 2007-6-28 19:47:20 | 显示全部楼层 |阅读模式
强大的BD

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
The EQs
发表于 2007-6-28 19:48:58 | 显示全部楼层

这个是鸽子???

Scan performed at: 2007-6-28 19:48:41
Scanning Log
NOD32 version 2361 (20070628) NT
Command line: C:\Documents and Settings\EQ2\桌面\virus.rar
Operating memory - is OK

Date: 28.6.2007  Time: 19:48:46
Anti-Stealth technology is enabled.
Scanned disks, folders and files: C:\Documents and Settings\EQ2\桌面\virus.rar
C:\Documents and Settings\EQ2\桌面\virus.rar ?RAR ?SERVER[1].exe - a variant of Win32/Delf.NFE trojan
C:\Documents and Settings\EQ2\桌面\virus.rar ?RAR ?SERVER[2].exe - a variant of Win32/Delf.NFE trojan
Number of scanned files: 3
Number of threats found: 2
Number of files cleaned: 1
Time of completion: 19:48:46 Total scanning time: 0 sec (00:00:00)
小邪邪
发表于 2007-6-28 19:51:44 | 显示全部楼层
扫一下看看是不是

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
tracydk
发表于 2007-6-28 19:53:05 | 显示全部楼层

启发

Starting the file scan:

Begin scan in 'F:\病毒样本\virus.rar'
F:\病毒样本\virus.rar
  [0] Archive type: RAR
  --> SERVER[1].exe
      [DETECTION] Contains suspicious code HEUR/Malware
  --> SERVER[2].exe
      [DETECTION] Contains suspicious code HEUR/Malware
      [INFO]      The file was deleted!
scottxzt
发表于 2007-6-28 19:59:50 | 显示全部楼层

DR,WEB

virus.rar\SERVER[1].exe;D:\Documents and Settings\dell\桌面\virus.rar;BackDoor.Beizhu.origin;;
virus.rar\SERVER[2].exe;D:\Documents and Settings\dell\桌面\virus.rar;BackDoor.Beizhu.origin;;
virus.rar;D:\Documents and Settings\dell\桌面;Archive contains infected objects;;
1688388728
发表于 2007-6-28 20:07:08 | 显示全部楼层
发表回复

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
wangjay1980
发表于 2007-6-28 20:08:09 | 显示全部楼层
detected: virus Trojan.Generic (modification)        File: C:\Documents and Settings\Owner\×ÀÃæ\virus.rar/SERVER[2].exe
dericyeoh
发表于 2007-6-28 20:18:42 | 显示全部楼层
已删除: 病毒 Trojan.Generic (变种)        文件: C:\Documents and Settings\Deric Yeoh\桌面\virus.rar/SERVER[2].exe
woai_jolin
发表于 2007-6-28 20:39:10 | 显示全部楼层
2007/6/28 20:35:46        eAmon        file        D:\VIRUS\SERVER[2].EXE        a variant of Win32/Delf.NFE trojan        cleaned by deleting - quarantined        NT AUTHORITY\SYSTEM        Event occurred during an attempt to access the file by the application: C:\Program Files\Micropoint\MPSVC2.exe.
2007/6/28 20:35:43        eAmon        file        D:\VIRUS\SERVER[1].EXE        a variant of Win32/Delf.NFE trojan        cleaned by deleting - quarantined        NT AUTHORITY\SYSTEM        Event occurred during an attempt to access the file by the application: C:\Program Files\Micropoint\MPSVC2.exe.
promised
发表于 2007-6-28 23:20:10 | 显示全部楼层
酝屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯屯图
License expired
License #000000119 Valid till 2006-12-31
Demo mode
Command line options:
/r=susp.rpt /ha=3 /collect_suspects /nc /af+ /ar+ /bt- /mr- /ml+ /rw+ /as-
Ctrl-C will terminate program execution

*:
C:\
C:...\SERVER[1].exe : is suspected of Trojan-Spy.Banker.68 (paranoid heuristics)
C:...\SERVER[2].exe : is suspected of Trojan-Spy.Banker.68 (paranoid heuristics)
Program execution terminated by user


Directories       : 4       Files in archives:      Files on disks:
Archives:                   - total       : 3       - total       : 20
- scanned         : 2       -  scanned    : 3       - scanned     : 20
- contain viruses : 0       -  infected   : 0       - infected    : 0
- deleted         : 0       -  suspicious : 2       - suspicious  : 1

Startup    : 23:19:50 28-06-2007
End        : 23:19:55 28-06-2007
Total time : 00:00:05
终止批处理操作吗(Y/N)?
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-10 17:11 , Processed in 0.129906 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表