a31cb730212ea0ed9775158b336c0b9e steelman_a.ex1e
6030c0e742f87d6271a9ee700dcae42c william_b.exe3
6030c0e742f87d6271a9ee700dcae42c william_b.e2xe
bb9dcdc21f8a22f2a2e5bf7523b53b8c william_b.e1xe
dc6a28569177caabef431bbe58c67548 test_b.exe3
dc6a28569177caabef431bbe58c67548 test_b.ex2e
2dddeffd549acba645f93d9e6ba497da test_b.ex1e
1c6de5d32df09eeab7fd0c5d2dd1b512 steelman_b.ex1e
8d0c0820631fc21b9d1c1e04cfd93284 steelman_b.e3xe
8d0c0820631fc21b9d1c1e04cfd93284 steelman_b.e2xe
4ac47b4662209f6842a03d3d74757ab4 steelman_a.ex2e
526540e9acbe633fc3439b2f25847e36 aunt_b.exe1
70e74046bf6c19a5d47297ac0dba4e2a aunt_b.ex3e
70e74046bf6c19a5d47297ac0dba4e2a aunt_b.ex2e
303896014a813d8900728653f71c9704 aunt_a.exe3
to kl,ll,antivir
25450916 aunt_b.exe1 1.03 MB UNDER ANALYSIS
25450917 william_b.exe3 1.03 MB UNDER ANALYSIS
25450918 steelman_a.ex1e 737.5 KB UNDER ANALYSIS
25450919 steelman_a.ex2e 401 KB UNDER ANALYSIS
25450920 aunt_a.exe3 399.5 KB UNDER ANALYSIS
Hello,
aunt_a.exe3 - Email-Worm.Win32.Iksmas.euk
aunt_b.ex2e, aunt_b.ex3e - Trojan-Downloader.Win32.FraudLoad.wrmf
aunt_b.exe1, steelman_b.ex1e, test_b.ex1e, william_b.e1xe - Trojan-Dropper.Win32.FrauDrop.nr
steelman_a.ex1e - Email-Worm.Win32.Iksmas.eul
steelman_a.ex2e - Email-Worm.Win32.Iksmas.eum
steelman_b.e2xe, steelman_b.e3xe - Trojan-Downloader.Win32.FraudLoad.wrmh
test_b.ex2e, test_b.exe3 - Trojan-Downloader.Win32.FraudLoad.wrme
william_b.e2xe, william_b.exe3 - Trojan-Downloader.Win32.FraudLoad.wrmj
New malicious software was found in these files. Detection will be included in the next update. Thank you for your help.
>
>
Regards, Tatarinov Ivan
Virus Analyst
Filename Result aunt_b.exe1 MALWARE
The file 'aunt_b.exe1' has been determined to be 'MALWARE'. Our analysts named the threat TR/Dropper.Gen. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.This malware is detected by a special detection routine from the engine module.
Filename Result william_b.exe3 MALWARE
The file 'william_b.exe3' has been determined to be 'MALWARE'. Our analysts named the threat TR/Dropper.Gen. The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.This malware is detected by a special detection routine from the engine module.
Filename Result steelman_a.ex1e MALWARE
The file 'steelman_a.ex1e' has been determined to be 'MALWARE'. Our analysts named the threat Worm/Iksmas.eul. The term "WORM/" denotes a worm that is able to spread itself for instance over the Internet (using eMail, peer-to-peer networks, IRC networks etc.).Detection is added to our virus definition file (VDF) starting with version 7.01.05.237.
Filename Result steelman_a.ex2e MALWARE
The file 'steelman_a.ex2e' has been determined to be 'MALWARE'. Our analysts named the threat Worm/Iksmas.eum. The term "WORM/" denotes a worm that is able to spread itself for instance over the Internet (using eMail, peer-to-peer networks, IRC networks etc.).Detection is added to our virus definition file (VDF) starting with version 7.01.05.237.
Filename Result aunt_a.exe3 MALWARE
The file 'aunt_a.exe3' has been determined to be 'MALWARE'. Our analysts named the threat Worm/Iksmas.euk. The term "WORM/" denotes a worm that is able to spread itself for instance over the Internet (using eMail, peer-to-peer networks, IRC networks etc.).Detection is added to our virus definition file (VDF) starting with version 7.01.05.237.
[ 本帖最后由 sam.to 于 2009-9-14 16:40 编辑 ] |