1   1  /  1  页   跳转

1.exe

1.exe


 附件: 您所在的用户组无法下载或查看附件

解压密码:virus

文件 1.exe 接收于 2008.08.27 04:25:13 (CET)
反病毒引擎版本最后更新扫描结果
AhnLab-V32008.8.21.02008.08.26Win-Trojan/Downloader.79810
AntiVir7.8.1.232008.08.26TR/Agent.75264.7
Authentium5.1.0.42008.08.27W32/Downloader.C.gen!Eldorado
Avast4.8.1195.02008.08.26Win32:Agent-XJP
AVG8.0.0.1612008.08.26BackDoor.Generic9.ALQF
BitDefender7.22008.08.27Dropped:Backdoor.Generic.47110
CAT-QuickHeal9.502008.08.26Trojan.Small.bff
ClamAV0.93.12008.08.27Trojan.Delf-5552
DrWeb4.44.0.091702008.08.26BackDoor.Dgrat
eSafe7.0.17.02008.08.26-
eTrust-Vet31.6.60502008.08.26-
Ewido4.02008.08.26Trojan.Small.bff
F-Prot4.4.4.562008.08.26W32/Downloader.C.gen!Eldorado
F-Secure7.60.13501.02008.08.27Trojan.Win32.Small.bff
Fortinet3.14.0.02008.08.26DelpDldr.B
GData192008.08.27Trojan.Win32.Small.bff
IkarusT3.1.1.34.02008.08.27Trojan.Agent.75264.7
K7AntiVirus7.10.4282008.08.25Backdoor.Win32.Delf.hzq
Kaspersky7.0.0.1252008.08.27Trojan.Win32.Small.bff
McAfee53702008.08.26-
Microsoft1.38072008.08.25Backdoor:Win32/Delf.ADI
NOD32v233902008.08.26Win32/Small.BFF
Norman5.80.022008.08.26W32/Delf.BWZO.dropper
Panda9.0.0.42008.08.26Trj/Small.YT
PCTools4.4.2.02008.08.26-
Rising20.59.11.002008.08.26-
Sophos4.32.02008.08.27Mal/DelpDldr-B
Sunbelt3.1.1582.12008.08.26-
Symantec102008.08.27-
TheHacker6.3.0.6.0602008.08.23-
TrendMicro8.700.0.10042008.08.26-
VBA323.12.8.42008.08.26Backdoor.Win32.Delf.hzq
ViRobot2008.8.26.13502008.08.26-
VirusBuster4.5.11.02008.08.26-
Webwasher-Gateway6.6.22008.08.26Trojan.Agent.75264.7

附加信息
File size: 81442 bytes
MD5...: 284d2bcf6dfbf104750088e42dbb9310
SHA1..: 4700c0bcb36e257aa80b5e3099e145967409aa70
SHA256: 0650b47eb63b70541d99a8fda7382b5876955315655bb9e3bc593876f4b81136
SHA512: e8a9770a98bae6846fb1e626541152447438a68bc95c06a51b44b5b106d2ef13
dc06e90553e5902d3f1ba48a11659d447340b942ebaa8eafd90113ec9f8f2e8b
PEiD..: BobSoft Mini Delphi -> BoB / BobSoft
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x401ad4
timedatestamp.....: 0x2a425e19 (Fri Jun 19 22:22:17 1992)
machinetype.......: 0x14c (I386)
( 6 sections )
name viradd virsiz rawdsiz ntrpy md5
CODE 0x1000 0xaf4 0xc00 5.72 9e4a6bdb86002af477462b176e99c750
DATA 0x2000 0x14 0x200 0.31 6a30d5b8fb81fddd73a7815511c3ab35
BSS 0x3000 0x335 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.idata 0x4000 0x33a 0x400 3.75 e98c48affa99eb8861b3de4f09e87924
.reloc 0x5000 0xc4 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rsrc 0x6000 0x10 0x200 0.08 1de2ac252c79f240445fbc718433cac3
( 3 imports )
> kernel32.dll: GetProcAddress, LoadLibraryA
> advapi32.dll: CreateServiceA, ChangeServiceConfigA, CloseServiceHandle, ControlService, StartServiceA, OpenServiceA, OpenSCManagerA, RegCloseKey, RegQueryValueExA, RegSetValueExA, RegCreateKeyExA, RegOpenKeyExA
> kernel32.dll: lstrlenA, lstrcpyA, lstrcatA, lstrcmpA, GetWindowsDirectoryA, GetSystemDirectoryA, GetShortPathNameA, GetModuleFileNameA, GetLastError, ExitProcess, WinExec, CreateMutexA, SetFileTime, GetFileTime, CloseHandle, GetFileSize, ReadFile, WriteFile, SetFilePointer, CreateFileA
( 0 exports )

Norman Sandbox: [ General information ]
* **IMPORTANT: PLEASE SEND THE SCANNED FILE TO: ANALYSIS@NORMAN.NO - REMEMBER TO ENCRYPT IT (E.G. ZIP WITH PASSWORD)**.
* File length: 81442 bytes.
[ Changes to filesystem ]
* Creates file C:\WINDOWS\12345.dll.
[ Changes to registry ]
* Accesses Registry key \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\".
[ Process/window information ]
* Creates a mutex DGRAT2008.
* Creates process \"cmd.EXE\".
[ Signature Scanning ]
* C:\WINDOWS\12345.dll (75298 bytes) : W32/Delf.BWZO.

用户系统信息:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
http://blog.csdn.net/purpleendurer

宠辱不惊,笑看堂前花开花落; 去留无意,漫随天外云卷云舒。
分享到:
gototop
 

回复:1.exe

该用户帖子内容已被屏蔽
gototop
 

回复: 1.exe



引用:
原帖由 圆噜噜 于 2008-8-27 11:17:00 发表
您所在的用户组无法下载或查看附件
我想怎么什么用户才能看到啊?

看该版置顶帖,不看版规的人真是。。。。唉
gototop
 

回复:1.exe

文件名:1.exe
病毒名:Backdoor.Win32.Mnless.ki


您所上报的病毒文件将在瑞星2008的20.59.21版本中处理解决,如遇特殊情况可能会推后几个版本。
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT