文件 setup.exe 接收于 2009.03.10 05:45:24 (CET)
当前状态: 正在读取 ... 队列中 等待中 扫描中 完成 未发现 停止

结果: 23/39 (58.98%)
正在读取服务器信息中...
您的文件所排队列位置: ___.
预计开始时间为 ___ 和 ___
之间.
扫描完成前请勿关闭窗口.
目前针对您的文件所进行的扫描进程已停止, 我们将会在稍后恢复.
如果您的等候时间超过 5 分钟, 请重新发送文件.
您的文件目前正在被 VirusTotal 扫描中,
结果将会稍后完成时生成.
您的文件已过期或不存在.
目前服务已停止, 您的文件将会稍后的未知时间内进行扫描 (位置:
). 您可以继续等待回应 (自动读取) 或者在下面的表单内输入您的电子邮件地址, 并按下 "获取", 当扫描完成时, 系统会自动给您发送电子邮件通知.
| 反病毒引擎 | 版本 | 最后更新 | 扫描结果 | | a-squared | 4.0.0.101 | 2009.03.10 | Trojan.Win32.Agent!IK | | AhnLab-V3 | 5.0.0.2 | 2009.02.27 | - | | AntiVir | 7.9.0.107 | 2009.03.09 | TR/Drop.Xorer.FD | | Authentium | 5.1.0.4 | 2009.03.09 | W32/Trojan.NRZ | | Avast | 4.8.1335.0 | 2009.03.09 | Win32:Small-IHO | | AVG | 8.0.0.237 | 2009.03.09 | Win32/Small.Z | | BitDefender | 7.2 | 2009.03.10 | Trojan.Agent.ABJ | | CAT-QuickHeal | 10.00 | 2009.03.09 | - | | ClamAV | 0.94.1 | 2009.03.09 | Trojan.Downloader-1967 | | Comodo | 1039 | 2009.03.09 | - | | DrWeb | 4.44.0.09170 | 2009.03.10 | Trojan.Bweah | | eSafe | 7.0.17.0 | 2009.03.09 | - | | eTrust-Vet | 31.6.6388 | 2009.03.09 | INF/Pagipef.AE | | F-Prot | 4.4.4.56 | 2009.03.09 | W32/Trojan.NRZ | | F-Secure | 8.0.14470.0 | 2009.03.10 | Virus.Win32.Xorer.fd | | Fortinet | 3.117.0.0 | 2009.03.10 | - | | GData | 19 | 2009.03.10 | Trojan.Agent.ABJ | | Ikarus | T3.1.1.45.0 | 2009.03.10 | Trojan.Win32.Agent | | K7AntiVirus | 7.10.664 | 2009.03.09 | Trojan.Win32.Agent.abj | | Kaspersky | 7.0.0.125 | 2009.03.10 | Virus.Win32.Xorer.fd | | McAfee | 5548 | 2009.03.09 | W32/Xorer | | McAfee+Artemis | 5548 | 2009.03.09 | W32/Xorer | | Microsoft | 1.4405 | 2009.03.09 | Virus:Win32/Xorer.I | | NOD32 | 3922 | 2009.03.09 | probably a variant of Win32/Small.NAV | | Norman | 6.00.06 | 2009.03.09 | - | | nProtect | 2009.1.8.0 | 2009.03.10 | - | | Panda | 10.0.0.10 | 2009.03.09 | Suspicious file | | PCTools | 4.4.2.0 | 2009.03.09 | - | | Prevx1 | V2 | 2009.03.10 | - | | Rising | 21.20.10.00 | 2009.03.10 | - | | SecureWeb-Gateway | 6.7.6 | 2009.03.09 | Trojan.Drop.Xorer.FD | | Sophos | 4.39.0 | 2009.03.10 | Troj/Agent-GFD | | Sunbelt | 3.2.1858.2 | 2009.03.10 | - | | Symantec | 1.4.4.12 | 2009.03.10 | - | | TheHacker | 6.3.3.0.277 | 2009.03.09 | - | | TrendMicro | 8.700.0.1004 | 2009.03.10 | PE_PAGIPEF.CH | | VBA32 | 3.12.10.1 | 2009.03.10 | - | | ViRobot | 2009.3.9.1641 | 2009.03.09 | - | | VirusBuster | 4.5.11.0 | 2009.03.09 | - |
| 附加信息 | | File size: 122880 bytes | | MD5...: fa1aa5cdc2b79798518b5d3e4cf83165 | | SHA1..: 535aa9e5db06b4797f9d5aa7269a5d2fa09c42b9 | | SHA256: 449962cab1208a2e0809dab1753373a83bda8917708522b8d7f2a797b1c30a90 | SHA512: 36e1fb70ac653d1a6383d899e1dcce71343013d94fc771dd213cf73e8462f7b6
9428efede074b71f3a7224376ce1c885ad760f545e494dd4799f7fe55cda58dc | ssdeep: 1536:JzePKva1aFVHtgUHfFd/7liIVuG5UR8fNVuG5UR8f:Jze6mUtdjliWuTR8f
7uTR8f
| | PEiD..: - | TrID..: File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%) | PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x1025
timedatestamp.....: 0x43c09e03 (Sun Jan 08 05:07:15 2006)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x89da 0x9000 6.44 763e792001b55ff0aa6e0ec56ac45788
.rdata 0xa000 0x1978 0x2000 4.38 ba81181f2244622ebabda6c5de537923
.data 0xc000 0x1cd8 0x1000 0.99 ff7252ae518cde598f821719723c1f83
.rsrc 0xe000 0x8a8 0x1000 2.32 9d62b461ff93848ffb28dd1c917ea9d4
( 4 imports )
> KERNEL32.dll: ExitProcess, GetProcAddress, TerminateProcess, GetCurrentProcess, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetLastError, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapDestroy, HeapCreate, VirtualFree, HeapFree, LoadLibraryA, GetACP, GetOEMCP, GetCPInfo, HeapAlloc, VirtualAlloc, HeapReAlloc, RtlUnwind, GetVersionExA, VirtualQuery, HeapSize, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, VirtualProtect, GetSystemInfo, FreeLibrary, CloseHandle, DeleteFileA, GetTempFileNameA, GetTempPathA, CreateProcessA, FindClose, FindFirstFileA, GetCurrentDirectoryA, GetCommandLineW, SetEndOfFile, SetEnvironmentVariableA, CompareStringW, GetCommandLineA, GetStartupInfoA, InterlockedExchange, GetModuleHandleA, CompareStringA, SetStdHandle, FlushFileBuffers, ReadFile, CreateFileA, SetFilePointer, SetEnvironmentVariableW
> USER32.dll: WaitForInputIdle, MessageBoxA
> ADVAPI32.dll: RegQueryValueExA, RegCloseKey, RegOpenKeyA
> SHELL32.dll: CommandLineToArgvW
( 0 exports )
|
http://www.virustotal.com/zh-cn/analisis/31813a2061daa6d5de5b1339f45ad7f4
[ 本帖最后由 qihuakai 于 2009-3-10 12:52 编辑 ] |