查看: 3926|回复: 19
收起左侧

[病毒样本] VMWARESERVICE.EXE

[复制链接]
Nblock
发表于 2008-1-19 12:31:56 | 显示全部楼层 |阅读模式
kaspersky found Worm.Win32.Anilogo.b    Virus.Win32.AutoRun.akk
微点发现未知木马

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
zwl2828
发表于 2008-1-19 12:35:53 | 显示全部楼层

Avira AntiVir

30个~

C:\Users\Administrator\Downloads\df.rar
  [0] Archive type: RAR
  --> VMwareService.exe
      [DETECTION] Contains detection pattern of the worm WORM/Cekar.A
  --> tmp7A.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> pcibus.sys
      [DETECTION] Is the Trojan horse TR/Dldr.Agent.45056
  --> 8838283[1].htm
      [DETECTION] Is the Trojan horse TR/IFrame.AW
  --> XunLei[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
  --> noani[2].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> Ms06014[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
  --> haha[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.ED
  --> jh[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.afm
  --> kong[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.bcd
  --> htm[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.AS
  --> gm[1].htm
      [DETECTION] Is the Trojan horse TR/Dldr.Agent.ala.10
  --> 6671697[1].htm
      [DETECTION] Is the Trojan horse TR/IFrame.AW
  --> Ajax[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
  --> ani[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> 11[1].js
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.CN
  --> rl[2].js
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.E
  --> realplayer[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Agent.ES
  --> kaka[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
  --> down1[1].txt
      [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
  --> 2[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.bxf
  --> 1[1].js
      [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.bxf
  --> realplay_071122_exp[1].htm
      [DETECTION] Contains detection pattern of the Java script virus JS/Agent.ES
  --> realplayer[2].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
  --> lz[1].htm
      [DETECTION] Contains detection pattern of the HTML script virus HTML/Shellcode.Gen
  --> gege[1].htm
      [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.I
  --> ani[1].c
      [DETECTION] Contains detection pattern of the exploits EXP/Ani.Gen
  --> tmp7C.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> tmp77.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
  --> tmp83.tmp
      [DETECTION] Is the Trojan horse TR/Rootkit.Gen
tracydk
发表于 2008-1-19 12:36:07 | 显示全部楼层
10个

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
mofunzone
发表于 2008-1-19 12:36:20 | 显示全部楼层
Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\My Documents\df.rar'
C:\Documents and Settings\Administrator\My Documents\
  df.rar
    [0] Archive type: RAR
    --> VMwareService.exe
        [DETECTION] Contains detection pattern of the worm WORM/Cekar.A
        [WARNING]   Infected files in archives cannot be repaired!
    --> tmp7A.tmp
        [DETECTION] Is the Trojan horse TR/Rootkit.Gen
        [WARNING]   Infected files in archives cannot be repaired!
    --> pcibus.sys
        [DETECTION] Is the Trojan horse TR/Drop.Agent.23552
        [WARNING]   Infected files in archives cannot be repaired!
    --> 8838283[1].htm
        [DETECTION] Is the Trojan horse TR/IFrame.AW
        [WARNING]   Infected files in archives cannot be repaired!
    --> XunLei[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
        [WARNING]   Infected files in archives cannot be repaired!
    --> noani[2].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
        [WARNING]   Infected files in archives cannot be repaired!
    --> Ms06014[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
        [WARNING]   Infected files in archives cannot be repaired!
    --> haha[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.ED
        [WARNING]   Infected files in archives cannot be repaired!
    --> jh[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.afm
        [WARNING]   Infected files in archives cannot be repaired!
    --> kong[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.bcd
        [WARNING]   Infected files in archives cannot be repaired!
    --> htm[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.AS
        [WARNING]   Infected files in archives cannot be repaired!
    --> gm[1].htm
        [DETECTION] Is the Trojan horse TR/Dldr.Agent.ala.10
        [WARNING]   Infected files in archives cannot be repaired!
    --> 6671697[1].htm
        [DETECTION] Is the Trojan horse TR/IFrame.AW
        [WARNING]   Infected files in archives cannot be repaired!
    --> Ajax[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
        [WARNING]   Infected files in archives cannot be repaired!
    --> ani[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
        [WARNING]   Infected files in archives cannot be repaired!
    --> 11[1].js
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Psyme.CN
        [WARNING]   Infected files in archives cannot be repaired!
    --> rl[2].js
        [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.E
        [WARNING]   Infected files in archives cannot be repaired!
    --> realplayer[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Agent.ES
        [WARNING]   Infected files in archives cannot be repaired!
    --> kaka[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
        [WARNING]   Infected files in archives cannot be repaired!
    --> down1[1].txt
        [DETECTION] Contains detection pattern of the HTML script virus HTML/IFrame.gcc
        [WARNING]   Infected files in archives cannot be repaired!
    --> 2[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.bxf
        [WARNING]   Infected files in archives cannot be repaired!
    --> 1[1].js
        [DETECTION] Contains detection pattern of the Java script virus JS/Dldr.Agent.bxf
        [WARNING]   Infected files in archives cannot be repaired!
    --> realplay_071122_exp[1].htm
        [DETECTION] Contains detection pattern of the Java script virus JS/Agent.ES
        [WARNING]   Infected files in archives cannot be repaired!
    --> realplayer[2].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/Dldr.Agent.ZY
        [WARNING]   Infected files in archives cannot be repaired!
    --> lz[1].htm
        [DETECTION] Contains detection pattern of the HTML script virus HTML/Shellcode.Gen
        [WARNING]   Infected files in archives cannot be repaired!
    --> gege[1].htm
        [DETECTION] Contains detection pattern of the exploits EXP/RealPlay.I
        [WARNING]   Infected files in archives cannot be repaired!
    --> ani[1].c
        [DETECTION] Contains detection pattern of the exploits EXP/Ani.Gen
        [WARNING]   Infected files in archives cannot be repaired!
    --> tmp7C.tmp
        [DETECTION] Is the Trojan horse TR/Rootkit.Gen
        [WARNING]   Infected files in archives cannot be repaired!
    --> tmp77.tmp
        [DETECTION] Is the Trojan horse TR/Rootkit.Gen
        [WARNING]   Infected files in archives cannot be repaired!
    --> tmp83.tmp
        [DETECTION] Is the Trojan horse TR/Rootkit.Gen
        [WARNING]   Infected files in archives cannot be repaired!
      [INFO]      The file was deleted!


End of the scan: 2008年1月18日  20:36
Used time: 00:04 min

The scan has been done completely.

      0 Scanning directories
     31 Files were scanned
     30 viruses and/or unwanted programs were found
      0 Files were classified as suspicious:
      1 files were deleted
      0 files were repaired
      0 files were moved to quarantine
      0 files were renamed
      0 Files cannot be scanned
      1 Files not concerned
      1 Archives were scanned
     30 Warnings
      0 Notes
wangjay1980
发表于 2008-1-19 12:38:11 | 显示全部楼层
K

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
a750828
发表于 2008-1-19 12:48:15 | 显示全部楼层
McAfee W32/MumaWow.d!inf
jimmyleo
发表于 2008-1-19 12:55:43 | 显示全部楼层
D:\download\virusscan\df.rar=>VMwareService.exe        infected: Win32.Worm.Cekar.A
D:\download\virusscan\df.rar=>tmp7A.tmp        infected: Trojan.PWS.YCG
D:\download\virusscan\df.rar=>pcibus.sys        infected: Trojan.Agent.AFWL
D:\download\virusscan\df.rar=>8838283[1].htm        infected: Trojan.IFrame.AW
D:\download\virusscan\df.rar=>XunLei[1].htm        infected: Exploit.HTML.MIA
D:\download\virusscan\df.rar=>noani[2].htm        infected: Trojan.IFrame.BM
D:\download\virusscan\df.rar=>Ms06014[1].htm        infected: Exploit.HTML.MIA
D:\download\virusscan\df.rar=>haha[1].htm=>(JAVASCRIPT 2)        infected: Trojan.JS.PVH
D:\download\virusscan\df.rar=>haha[1].htm=>(JAVASCRIPT 3)        infected: Trojan.JS.PVH
D:\download\virusscan\df.rar=>6671697[1].htm        infected: Trojan.IFrame.AW
D:\download\virusscan\df.rar=>Ajax[1].htm        infected: Exploit.HTML.MIA
D:\download\virusscan\df.rar=>ani[1].htm        infected: Trojan.IFrame.BC
D:\download\virusscan\df.rar=>realplayer[1].htm        infected: Trojan.Downloader.JS.Agent.OF
D:\download\virusscan\df.rar=>kaka[1].htm        infected: Exploit.HTML.MIA
D:\download\virusscan\df.rar=>down1[1].txt        infected: Exploit.HTML.MIA
D:\download\virusscan\df.rar=>realplay_071122_exp[1].htm        infected: Trojan.Downloader.JS.Agent.OF
D:\download\virusscan\df.rar=>realplayer[2].htm        infected: Trojan.IFrame.BC
D:\download\virusscan\df.rar=>ani[1].c        infected: Exploit.Win32.MS05-002.Gen
D:\download\virusscan\df.rar=>tmp7C.tmp        infected: Trojan.PWS.OnlineGames.NQC
D:\download\virusscan\df.rar=>tmp77.tmp        infected: Trojan.PWS.YBJ


bd 20
bmw760li
发表于 2008-1-19 13:05:04 | 显示全部楼层
全英语啊,啥都没看懂
欠妳緈諨
发表于 2008-1-19 13:17:01 | 显示全部楼层
ESS26
D:\病毒测试\未解压样本\df.rar » RAR » VMwareService.exe - Win32/Mypis.H virus
D:\病毒测试\未解压样本\df.rar » RAR » tmp7A.tmp - Win32/PSW.OnLineGames.NJY trojan
D:\病毒测试\未解压样本\df.rar » RAR » pcibus.sys - Win32/Jalous.Z worm
D:\病毒测试\未解压样本\df.rar » RAR » XunLei[1].htm - HTML/TrojanClicker.IFrame.GC trojan
D:\病毒测试\未解压样本\df.rar » RAR » noani[2].htm - JS/TrojanDownloader.Agent.ALN trojan
D:\病毒测试\未解压样本\df.rar » RAR » Ms06014[1].htm - HTML/TrojanClicker.IFrame.GC trojan
D:\病毒测试\未解压样本\df.rar » RAR » haha[1].htm - JS/TrojanDownloader.Agent.ALJ trojan
D:\病毒测试\未解压样本\df.rar » RAR » jh[1].htm - JS/Exploit.RealPlay.H trojan
D:\病毒测试\未解压样本\df.rar » RAR » kong[1].htm - HTML/TrojanDownloader.IFrame trojan
D:\病毒测试\未解压样本\df.rar » RAR » htm[1].htm - JS/TrojanDownloader.Agent.ALW trojan
D:\病毒测试\未解压样本\df.rar » RAR » gm[1].htm - JS/TrojanDownloader.Agent.ALA trojan
D:\病毒测试\未解压样本\df.rar » RAR » Ajax[1].htm - JS/TrojanDownloader.Psyme.NCR trojan
D:\病毒测试\未解压样本\df.rar » RAR » ani[1].htm - JS/TrojanDownloader.Agent.ALN trojan
D:\病毒测试\未解压样本\df.rar » RAR » 11[1].js - JS/TrojanDownloader.Agent.ALM trojan
D:\病毒测试\未解压样本\df.rar » RAR » realplayer[1].htm - HTML/TrojanClicker.IFrame.GC trojan
D:\病毒测试\未解压样本\df.rar » RAR » kaka[1].htm - HTML/TrojanClicker.IFrame.GC trojan
D:\病毒测试\未解压样本\df.rar » RAR » 2[1].htm - JS/TrojanDownloader.Agent.AKD trojan
D:\病毒测试\未解压样本\df.rar » RAR » 1[1].js - JS/TrojanDownloader.Agent.WK trojan
D:\病毒测试\未解压样本\df.rar » RAR » realplay_071122_exp[1].htm - JS/Exploit.RealPlay.E trojan
D:\病毒测试\未解压样本\df.rar » RAR » realplayer[2].htm - JS/Exploit.RealPlay.NAA trojan
D:\病毒测试\未解压样本\df.rar » RAR » lz[1].htm - JS/TrojanDownloader.Agent.ALO trojan
D:\病毒测试\未解压样本\df.rar » RAR » gege[1].htm - JS/Exploit.RealPlay.NAB trojan
D:\病毒测试\未解压样本\df.rar » RAR » ani[1].c - a variant of Win32/TrojanDownloader.Ani.Gen trojan
D:\病毒测试\未解压样本\df.rar » RAR » tmp7C.tmp - Win32/PSW.OnLineGames.JOJ trojan
D:\病毒测试\未解压样本\df.rar » RAR » tmp77.tmp - Win32/PSW.OnLineGames.JER trojan
D:\病毒测试\未解压样本\df.rar » RAR » tmp83.tmp - Win32/PSW.OnLineGames.NKI trojan
当空皓月
发表于 2008-1-19 15:04:35 | 显示全部楼层
费尔 27 其中2个报可以程序
C:\Documents and Settings\502-QFL1\桌面\df.rar>>VMwareService.exe        Worm.Anilogo.b.caop        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>tmp7A.tmp        TrojanPSW.OnLineGames.kmp.abtk        木马        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>pcibus.sys        Worm.Downloader.cb.bceu        木马        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>XunLei[1].htm        Script.SoftExploit.c        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>noani[2].htm        JS.Agent.lvazi.qtzx        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>Ms06014[1].htm        Script.SoftExploit.c        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>haha[1].htm        JS.WindowObject.Exploit.a        可疑程序        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>jh[1].htm        JS.Decoder.ai        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>htm[1].htm        JS.WindowObject.Exploit.a        可疑程序        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>gm[1].htm        JS.Decoder.aa        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>Ajax[1].htm        Script.SoftExploit.c        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>ani[1].htm        JS.Agent.lvazi.qtzx        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>11[1].js        JS.Decoder.af        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>rl[2].js        JS.RealExploit.b        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>realplayer[1].htm        JS.RealExplit.a        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>kaka[1].htm        Script.SoftExploit.c        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>down1[1].txt        TrojanClicker.HTML.IFrame.gc.emkd        木马        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>2[1].htm        JS.Decoder.ae        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>1[1].js        JS.Decoder.ae        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>realplay_071122_exp[1].htm        JS.RealExplit.a        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>realplayer[2].htm        JS.Agent.lvazi.qtzx        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>lz[1].htm        JS.Decoder.ah        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>gege[1].htm        JS.Decoder.v        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>ani[1].c        Exploit.ANI.a        病毒        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>tmp7C.tmp        TrojanPSW.OnLineGames.joj.qcyo        木马        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>tmp77.tmp        TrojanPSW.OnLineGames.jer.jwol        木马        还未处理
C:\Documents and Settings\502-QFL1\桌面\df.rar>>tmp83.tmp        TrojanPSW.OnLineGames.kpe.khsf        木马        还未处理
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-5-6 13:28 , Processed in 0.138485 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表