查看: 1594|回复: 9
收起左侧

[病毒样本] 13个

[复制链接]
qianwenxiang
发表于 2009-3-17 22:05:26 | 显示全部楼层 |阅读模式
..

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
wrq
发表于 2009-3-17 22:34:32 | 显示全部楼层
占位等红伞v9成绩单 下不来 先被defender干掉了When accessing data from the URL, "http://bbs.kafan.cn/attachment.php?aid=487616&k=d984f151b4709732704ece47100d34b5&t=1237302996"
a virus or unwanted program 'WORM/Autorun.abqo' [worm] was found.
Action taken: Ignored

[ 本帖最后由 wrq 于 2009-3-17 23:19 编辑 ]
cliffboy
发表于 2009-3-17 22:55:02 | 显示全部楼层
rs miss some~~~
sam.to
发表于 2009-3-17 23:05:14 | 显示全部楼层
上报8个到卡巴

[ 本帖最后由 sam.to 于 2009-3-17 23:20 编辑 ]
kingmuro
头像被屏蔽
发表于 2009-3-17 23:19:36 | 显示全部楼层

BD 7个

文件或对象名称 病毒名称 最终处理状态
E:\My Documents\桌面\test\13\Install.exe Application.Generic.9 已移动至隔离区
E:\My Documents\桌面\test\13\load.exe Backdoor.Generic.158408 已移动至隔离区
E:\My Documents\桌面\test\13\file.exe DeepScan:Generic.Malware.SFYddldg.9558E950 已移动至隔离区
E:\My Documents\桌面\test\13\yiq.exe Dropped:Application.Generic.9 已移动至隔离区
E:\My Documents\桌面\test\13\yqu.exe Dropped:Application.Generic.9 已移动至隔离区
E:\My Documents\桌面\test\13\load2.exe Rootkit.16381 已移动至隔离区
E:\My Documents\桌面\test\13\install0.exe Trojan.Generic.1549874 已移动至隔离区
nosferatu
头像被屏蔽
发表于 2009-3-18 00:14:31 | 显示全部楼层
Begin scan in 'C:\Documents and Settings\Administrator\桌面\13.rar'
C:\Documents and Settings\Administrator\桌面\13.rar
  [0] Archive type: RAR
    --> fv.exe
      [DETECTION] Contains recognition pattern of the WORM/Autorun.abqo worm
    --> Install.exe
      [DETECTION] Contains recognition pattern of the ADSPY/Ourxin adware or spyware
    --> install0.exe
      [DETECTION] Is the TR/Dropper.Gen Trojan
    --> load.exe
      [DETECTION] Is the TR/Dropper.Gen Trojan
    --> load2.exe
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
    --> promo.exe
      [DETECTION] Is the TR/Dldr.FraudLoad.dvf Trojan
    --> setup.exe
      --> Object
        [DETECTION] Contains recognition pattern of the WORM/Koobface.EZ worm
    --> yiq.exe
      [DETECTION] Contains recognition pattern of the DR/Agent.GUT dropper
      --> [ProgramFilesDir]/AD4All/Install.exe
        [DETECTION] Contains recognition pattern of the ADSPY/Ourxin adware or spyware
    --> yqu.exe
      [DETECTION] Contains recognition pattern of the DR/Agent.GUS dropper
      --> yiq.exe
        [DETECTION] Contains recognition pattern of the DR/Agent.GUT dropper
        --> [ProgramFilesDir]/AD4All/Install.exe
          [DETECTION] Contains recognition pattern of the ADSPY/Ourxin adware or spyware

Beginning disinfection:
C:\Documents and Settings\Administrator\桌面\13.rar
    [NOTE]      The file was moved to '49edcc82.qua'!


End of the scan: 星期三 2009年3月18日  00:14
Used time: 00:02 Minute(s)

The scan has been done completely.

      0 Scanned directories
     30 Files were scanned
     12 Viruses and/or unwanted programs were found
      0 Files were classified as suspicious
      0 files were deleted
      0 Viruses and unwanted programs were repaired
      1 Files were moved to quarantine
      0 Files were renamed
      0 Files cannot be scanned
     18 Files not concerned
      4 Archives were scanned
      0 Warnings
      1 Notes
ledled
发表于 2009-3-18 09:25:24 | 显示全部楼层
VB Kill 2
揍敌客
发表于 2009-3-18 19:31:17 | 显示全部楼层
ik kill 6
sam.to
发表于 2009-3-19 12:13:33 | 显示全部楼层

回复 4楼 sam.to 的帖子

Hello,

3x.exe_ - Trojan.Win32.TDSS.tbt,
file.exe_ - Trojan-Proxy.Win32.Small.zz,
InstallAVg_880293.exe_ - Trojan-Downloader.Win32.FraudLoad.dwk,
load2.exe_ - Trojan.Win32.Agent.bvvx,
tops.exe_ - Packed.Win32.Klone.bl

New malicious software was found in these files. Detection will be included in the next update. Thank you for your help.

Install.exe_, yiq.exe_, yqu.exe_

No malicious code were found in these files.

Please quote all when answering.
The answer is relevant to the latest bases from update sources.
1688388728
发表于 2009-3-19 12:58:42 | 显示全部楼层
使用 G DATA AntiVirus 进行病毒检测
版本 20.0.2.0 (16.03.2009)
病毒特征库日期 18.03.2009
开始时间: 19.03.2009 12:56
引擎: 引擎 A (AVA 19.4382), 引擎 B (AVB 19.266)
高启发: 开启
文件: 开启
系统区域: 开启
RootKits 检测: 关闭

检测系统区域
检测选中目录和文件:
  C:\Documents and Settings\Administrator\桌面\病毒\13\

项目: 3x.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Dropped:Trojan.TDss.DP (Engine A)
项目: file.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: DeepScan:Generic.Malware.SFYddldg.9558E950 (Engine A)
项目: fv.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Win32:Trojan-gen {Other} (Engine B)
项目: Install.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Application.Generic.9 (Engine A)
项目: install0.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Trojan.Generic.1549874 (Engine A)
项目: load.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Backdoor.Generic.158408 (Engine A)
项目: load2.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Rootkit.16381 (Engine A)
项目: promo.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Win32:Trojan-gen {Other} (Engine B)
项目: setup.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Win32.Worm.Koobface.AR (Engine A)
项目: yiq.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Dropped:Application.Generic.9 (Engine A)
项目: yqu.exe
        路径: C:\Documents and Settings\Administrator\桌面\病毒\13
        状态: 病毒,文件已删除
        病毒: Dropped:Application.Generic.9 (Engine A)

检测执行时间: 19.03.2009 12:56
    已检测 13 个文件
    已发现 11 个病毒文件
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-11-7 00:48 , Processed in 0.112262 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表