Virus check with AntiVirusKit
Version 16.0.7
Virus signatures of 2007-5-4
Start time: 2007-5-8 20:23
Engine(s): KAV engine (AVK 17.5061), BD-Engine (BD 17.4685)
Heuristic: On
Archives: On
System areas: On
Check system areas...
Check selected directories and files...
Object: alg32.dat
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nw (KAV engine), Trojan.PWS.OnLineGames.ASC (BD-Engine)
Object: alg32.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nw (KAV engine), Trojan.PWS.OnLineGames.ASC (BD-Engine)
Object: cmdbcs.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.PWS.Games.F73C9754 (BD-Engine)
Object: cmdbcs.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.es (KAV engine), Trojan.PWS.OnLineGames.ARI (BD-Engine)
Object: ctfnom.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-Downloader.Win32.Small.czl (KAV engine), Trojan.PWS.Lmir.AII (BD-Engine)
Object: javavm.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.Malware.PWS.7A619E10 (BD-Engine)
Object: javavm.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.es (KAV engine), Generic.Malware.Sdld!gPWS.11911CA4 (BD-Engine)
Object: Kvsc3.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.Malware.Sdld!gPWS.3CF39842 (BD-Engine)
Object: LYLOADER.EXE
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nn (KAV engine), Trojan.PWS.OnLineGames.ASF (BD-Engine)
Object: LYMANGR.DLL
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nn (KAV engine), Trojan.PWS.OnLineGames.ASF (BD-Engine)
Object: mppds.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.es (KAV engine), Trojan.PWS.OnLineGames.ARJ (BD-Engine)
Object: mppds.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.qy (KAV engine), Generic.Malware.SdldgPWS.0C928B5E (BD-Engine)
Object: msccrt.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.es (KAV engine), Generic.PWS.Games.4B2DD4A6 (BD-Engine)
Object: msccrt.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nb (KAV engine), Generic.Malware.SdldgPWS.46002698 (BD-Engine)
Object: MSTCS.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nw (KAV engine), Trojan.PWS.OnLineGames.ASC (BD-Engine)
Object: nwizAsktao.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.Malware.gPWS.E13ACEA3 (BD-Engine)
Object: nwizAsktao.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.WOW.qp (KAV engine)
Object: nwizqjsj.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.ql (KAV engine), Trojan.PWS.OnLineGames.ASE (BD-Engine)
Object: nwiztlbu.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.Nilage.bjp (KAV engine), Generic.Malware.gPWS.0A10B377 (BD-Engine)
Object: nwiztlbu.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.Nilage.bjp (KAV engine)
Object: qjsj100.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.rc (KAV engine), Trojan.PWS.OnLineGames.FF (BD-Engine)
Object: rising883.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.Delf.qc (KAV engine), Generic.PWStealer.3E162211 (BD-Engine)
Object: servet.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan.PWS.Onlinegames.EF (BD-Engine)
Object: serveter.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.Malware.WBdld.D4E87332 (BD-Engine)
Object: shualai.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.PWS.Games.2F724471 (BD-Engine)
Object: shualai.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.sa (KAV engine), Generic.Malware.SdldPWS.BD42B1AE (BD-Engine)
Object: data.rar systemt.exe
In archive: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER\SMSSS.exe
Status: Virus detected
Virus: Backdoor.Win32.Agent.alh (KAV engine)
Object: (RAR Sfx o) systemt.exe
In archive: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER\SMSSS.exe
Status: Virus detected
Virus: Trojan.Spy.Agent.QP (BD-Engine)
Object: SMSSS.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Backdoor.Win32.Agent.alh (KAV engine), Trojan.Spy.Agent.QP (BD-Engine)
Object: svchost.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Generic.Malware.WBdld.D4E87332 (BD-Engine)
Object: winform.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.qh (KAV engine), Generic.PWS.Games.5E8C9078 (BD-Engine)
Object: winform.exe
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.lc (KAV engine), Generic.Malware.SgPWS.0D5A49ED (BD-Engine)
Object: Winhttps.dat
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nw (KAV engine), Trojan.PWS.OnLineGames.ASC (BD-Engine)
Object: Winhttps.dll
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Trojan-PSW.Win32.OnLineGames.nw (KAV engine), Trojan.PWS.OnLineGames.ASC (BD-Engine)
Object: ~tmp.tmp
Path: C:\Documents and Settings\Administrator\桌面\LYLOADER[1]\LYLOADER
Status: Move file into quarantine
Virus: Worm.Win32.Viking.lh (KAV engine), Trojan.PWS.Onlinegames.EF (BD-Engine)
Analysis complete: 2007-5-8 20:23
35 files checked
33 infected files detected
0 suspected files detected |