123
返回列表 发新帖
楼主: bajefghy
收起左侧

[求助] 红伞查不到病毒的问题

[复制链接]
y37007
发表于 2008-10-13 23:27:51 | 显示全部楼层
  不用我多说了,晓月说的很明白了,不过真是有毒,你解压缩出来,一样会报的,不用担心
bajefghy
 楼主| 发表于 2008-10-14 11:16:27 | 显示全部楼层
哦,原来是这样。

知道了。可以锁帖了
huifcx
发表于 2008-10-14 11:55:53 | 显示全部楼层
杀出42个。



Avira AntiVir Premium
Report file date: 2008年10月14日  11:53

Scanning for 1681179 virus strains and unwanted programs.

Licensed to:      Guenther Meier
Serial number:    1101440874-PEPWE-0001
Platform:         Windows XP
Windows version:  (Service Pack 3)  [5.1.2600]
Boot mode:        Normally booted
Username:         sunbird
Computer name:    AA-76587E804D46

Version information:
BUILD.DAT     : 8.1.0.367      20012 Bytes   2008-8-12 11:31:00
AVSCAN.EXE    : 8.1.4.7       315649 Bytes   2008-6-26 02:57:53
AVSCAN.DLL    : 8.1.4.0        40705 Bytes   2008-5-26 01:56:40
LUKE.DLL      : 8.1.4.5       164097 Bytes   2008-6-12 06:44:19
LUKERES.DLL   : 8.1.4.0        12033 Bytes   2008-5-26 01:58:52
ANTIVIR0.VDF  : 6.40.0.0    11030528 Bytes   2007-7-18 04:33:34
ANTIVIR1.VDF  : 7.0.5.1      8182784 Bytes   2008-6-24 07:54:15
ANTIVIR2.VDF  : 7.0.7.12     4066816 Bytes   2008-10-8 01:40:04
ANTIVIR3.VDF  : 7.0.7.35      175104 Bytes  2008-10-13 01:08:15
Engineversion : 8.1.1.35  
AEVDF.DLL     : 8.1.0.5       102772 Bytes    2008-7-9 02:46:50
AESCRIPT.DLL  : 8.1.0.76      319867 Bytes   2008-10-6 01:30:14
AESCN.DLL     : 8.1.0.23      119156 Bytes   2008-10-6 01:30:12
AERDL.DLL     : 8.1.1.2       438644 Bytes   2008-10-6 01:30:11
AEPACK.DLL    : 8.1.2.3       364918 Bytes   2008-10-6 01:30:09
AEOFFICE.DLL  : 8.1.0.25      196986 Bytes   2008-10-6 01:30:06
AEHEUR.DLL    : 8.1.0.59     1438071 Bytes   2008-10-6 01:29:56
AEHELP.DLL    : 8.1.0.15      115063 Bytes    2008-7-9 02:46:50
AEGEN.DLL     : 8.1.0.36      315764 Bytes   2008-10-6 01:29:46
AEEMU.DLL     : 8.1.0.7       430452 Bytes   2008-10-6 01:29:43
AECORE.DLL    : 8.1.1.11      172406 Bytes   2008-10-6 01:29:41
AEBB.DLL      : 8.1.0.1        53617 Bytes   2008-4-24 02:50:42
AVWINLL.DLL   : 1.0.0.12       15105 Bytes    2008-7-9 02:40:05
AVPREF.DLL    : 8.0.2.0        38657 Bytes   2008-5-16 03:28:01
AVREP.DLL     : 8.0.0.2        98344 Bytes   2008-10-6 01:29:39
AVREG.DLL     : 8.0.0.1        33537 Bytes    2008-5-9 05:26:40
AVARKT.DLL    : 1.0.0.23      307457 Bytes   2008-2-12 02:29:23
AVEVTLOG.DLL  : 8.0.0.16      119041 Bytes   2008-6-12 06:27:49
SQLITE3.DLL   : 3.3.17.1      339968 Bytes   2008-1-22 11:28:02
SMTPLIB.DLL   : 1.2.0.23       28929 Bytes   2008-6-12 06:49:40
NETNT.DLL     : 8.0.0.1         7937 Bytes   2008-1-25 06:05:10
RCIMAGE.DLL   : 8.0.0.51     2564353 Bytes   2008-6-12 07:29:30
RCTEXT.DLL    : 8.0.51.0       86273 Bytes   2008-6-27 05:00:56

Configuration settings for the scan:
Jobname..........................: ShlExt
Configuration file...............: C:\DOCUME~1\sunbird\LOCALS~1\Temp\7a0ca42a.avp
Logging..........................: low
Primary action...................: repair
Secondary action.................: delete
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Process scan.....................: off
Scan registry....................: off
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: high

Start of the scan: 2008年10月14日  11:53

Starting the file scan:

Begin scan in 'C:\Documents and Settings\sunbird\桌面\AviraDos\111.rar'
C:\Documents and Settings\sunbird\桌面\AviraDos\111.rar
    [0] Archive type: RAR
      --> ᄇᄀᄊᄒ￑ᄆᄒ\10ᄌ￶￑ᄆᄒ.rar
        [1] Archive type: RAR
        --> 3.exe
          [DETECTION] Contains recognition pattern of the DR/BHO.abh dropper
        --> 360safe.exe
          [DETECTION] Is the TR/Spy.Small.bua Trojan
        --> host.exe
          [DETECTION] Contains recognition pattern of the DR/Drop.Exebinder.K.6 dropper
        --> lsass.exe
          [DETECTION] Contains recognition pattern of the DR/BHO.abh dropper
        --> Temp0.exe
          [DETECTION] Contains recognition pattern of the DR/BHO.aai.13 dropper
        --> Temp1.exe
          [DETECTION] Contains recognition pattern of the DR/Cinmus.jvp dropper
        --> Temp2.exe
          [DETECTION] Contains recognition pattern of the DR/Cinmus.mvg dropper
        --> Temp4.exe
          [DETECTION] Is the TR/Drop.Agent.rga.2 Trojan
      --> ᄇᄀᄊᄒ￑ᄆᄒ\9129837.rar
        [1] Archive type: RAR
        --> 9129837.exe
          [DETECTION] Is the TR/PCK.Tibs.LF Trojan
      --> ᄇᄀᄊᄒ￑ᄆᄒ\Beat_Obama_152.rar
        [1] Archive type: RAR
        --> Beat_Obama_152.exe
          [DETECTION] Is the TR/Killwin.EA.1 Trojan
      --> ᄇᄀᄊᄒ￑ᄆᄒ\df.rar
        [1] Archive type: RAR
        --> VMwareService.exe
          [DETECTION] Contains recognition pattern of the WORM/Cekar.A worm
        --> tmp7A.tmp
          [DETECTION] Is the TR/Rootkit.Gen Trojan
        --> pcibus.sys
          [DETECTION] Is the TR/Drop.Agent.23552 Trojan
        --> 8838283[1].htm
          [DETECTION] Is the TR/IFrame.AW Trojan
        --> XunLei[1].htm
          [DETECTION] Contains recognition pattern of the HTML/IFrame.gcc HTML script virus
        --> noani[2].htm
          [DETECTION] Contains recognition pattern of the HTML/Dldr.Agent.ZY HTML script virus
        --> Ms06014[1].htm
          [DETECTION] Contains recognition pattern of the HTML/IFrame.gcc HTML script virus
        --> haha[1].htm
          [DETECTION] Contains recognition pattern of the JS/Dldr.Psyme.ED Java script virus
        --> jh[1].htm
          [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.afm Java script virus
        --> kong[1].htm
          [DETECTION] Contains recognition pattern of the HTML/Dldr.Agent.bcd HTML script virus
        --> htm[1].htm
          [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.AS Java script virus
        --> gm[1].htm
          [DETECTION] Is the TR/Dldr.Agent.ala.10 Trojan
        --> 6671697[1].htm
          [DETECTION] Is the TR/IFrame.AW Trojan
        --> Ajax[1].htm
          [DETECTION] Contains recognition pattern of the HTML/IFrame.gcc HTML script virus
        --> ani[1].htm
          [DETECTION] Contains recognition pattern of the HTML/Dldr.Agent.ZY HTML script virus
        --> 11[1].js
          [DETECTION] Contains recognition pattern of the JS/Dldr.Psyme.CN Java script virus
        --> rl[2].js
          [DETECTION] Contains recognition pattern of the EXP/RealPlay.E exploit
        --> realplayer[1].htm
          [DETECTION] Contains recognition pattern of the EXP/RealPlr.CT exploit
        --> kaka[1].htm
          [DETECTION] Contains recognition pattern of the HTML/IFrame.gcc HTML script virus
        --> down1[1].txt
          [DETECTION] Contains recognition pattern of the HTML/IFrame.gcc HTML script virus
        --> 2[1].htm
          [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.bxf Java script virus
        --> 1[1].js
          [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.bxf Java script virus
        --> realplay_071122_exp[1].htm
          [DETECTION] Contains recognition pattern of the EXP/RealPlr.CT exploit
        --> realplayer[2].htm
          [DETECTION] Contains recognition pattern of the HTML/Dldr.Agent.ZY HTML script virus
        --> lz[1].htm
          [DETECTION] Contains recognition pattern of the HTML/Shellcode.Gen HTML script virus
        --> gege[1].htm
          [DETECTION] Contains recognition pattern of the EXP/RealPlay.I exploit
        --> ani[1].c
          [DETECTION] Contains recognition pattern of the EXP/Ani.Gen exploit
        --> tmp7C.tmp
          [DETECTION] Is the TR/Rootkit.Gen Trojan
        --> tmp77.tmp
          [DETECTION] Is the TR/Rootkit.Gen Trojan
        --> tmp83.tmp
          [DETECTION] Is the TR/Rootkit.Gen Trojan
      --> ᄇᄀᄊᄒ￑ᄆᄒ\ᅲᄁᄇ£ᄆ■ᄉᄐ￈→ᄍᄂᄒ￟.rar
        [1] Archive type: RAR
        --> ᅲᄁᄇ£ᄆ■ᄉᄐ￈→ᄍᄂᄒ￟.exe
            [DETECTION] Is the TR/Agent.msd.1 Trojan
      --> ᄇᄀᄊᄒ￑ᄆᄒ\￐ᅵᅢᄄ￉ᅰᅬ ̄ᄇᄀᄊᄒ￑ᄆᄒ.RAR
        [1] Archive type: RAR
        --> GameSetup.exe
            [DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
    [NOTE]      A backup was created as '492517e9.qua'  ( QUARANTINE )
    [NOTE]      Attempting to perform action using the ARK lib.
    [NOTE]      A backup was created as '4b787132.qua'  ( QUARANTINE )


End of the scan: 2008年10月14日  11:53
Used time: 00:06 Minute(s)

The scan has been done completely.

      0 Scanning directories
     55 Files were scanned
     42 viruses and/or unwanted programs were found
      0 Files were classified as suspicious:
      0 files were deleted
      0 files were repaired
      2 files were moved to quarantine
      0 files were renamed
      0 Files cannot be scanned
     13 Files not concerned
      9 Archives were scanned
      0 Warnings
      1 Notes
as5261660
发表于 2008-10-14 13:40:32 | 显示全部楼层
红伞查到了病毒,不知lz是怎么的了
bajefghy
 楼主| 发表于 2008-10-14 15:46:59 | 显示全部楼层
绿色版默认不扫描压缩包

要修改才行。。。

修改一下好了。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-26 11:00 , Processed in 0.109204 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表