免费送瑞星产品序列号?其实送的是Trojan-Downloader.Win32.VB.lbv

免费送瑞星产品序列号?其实送的是Trojan-Downloader.Win32.VB.lbv

 

endurer 原创
2009-03-28 第1

 

在某论坛上看到一个贴子,说是免费送瑞星产品序列号。

 

点击下载附件,卡巴斯基报告:hxxp://bbs.***.com/images/bbs4/attachment/200903/23/瑞星产品序列号.rar//瑞星产品序列号/4501.exe/CaptchaOCR.dll Maxthon Web Browser 检测到威胁: Trojan-Downloader.Win32.VB.lbv

 

把文件下载回来看看。

 

文件说明符 : D:/test/瑞星产品序列号.rar
属性 : A---
数字签名:否
PE文件:否
创建时间 : 2009-3-28 17:33:33
修改时间 : 2009-3-28 17:33:35
大小 : 125839 字节 122.911 KB
MD5 : d2cdb0dfd9ca6288ad3c533ba77a7327
SHA1: 61CD4622F58D42AC98EDCD645ECC50A3A393E547
CRC32: d887ef62

 

里面包含2个文件:

 

1、
文件说明符 : D:/test/瑞星产品序列号/4501.exe
属性 : A---
数字签名:否
PE文件:是
获取文件版本信息大小失败!
创建时间 : 2009-3-28 17:34:34
修改时间 : 2009-3-15 22:14:34
大小 : 190366 字节 185.926 KB
MD5 : d0285eedad884134b8f61176bea7b762
SHA1: 3E67D519D7ADC19B54339B67AD19F56AFC6F9DCA
CRC32: 4f6c53d2

 

 

文件 4501.exe 接收于 2009.03.28 10:38:26 (CET)

反病毒引擎版本最后更新扫描结果
a-squared4.0.0.1012009.03.28Trojan-Dropper.Delf!IK
AhnLab-V35.0.0.22009.03.27Win-Trojan/Xema.variant
AntiVir7.9.0.1292009.03.27TR/Dldr.VB.lbv
Antiy-AVL2.0.3.12009.03.28Trojan/Win32.VB
Authentium5.1.2.42009.03.27W32/Dropper.EUQ
Avast4.8.1335.02009.03.27Win32:Trojan-gen {Other}
AVG8.5.0.2852009.03.27Downloader.Generic8.ACLE
BitDefender7.22009.03.28Trojan.Generic.1556083
CAT-QuickHeal10.002009.03.28-
ClamAV0.94.12009.03.28-
Comodo10872009.03.28-
DrWeb4.44.0.091702009.03.28-
eSafe7.0.17.02009.03.27Suspicious File
eTrust-Vet31.6.64212009.03.27-
F-Prot4.4.4.562009.03.27W32/Dropper.EUQ
F-Secure8.0.14470.02009.03.28Trojan-Downloader.Win32.VB.lbv
Fortinet3.117.0.02009.03.28W32/VB.LBV!tr.dldr
GData192009.03.28Trojan.Generic.1556083
IkarusT3.1.1.48.02009.03.28Trojan-Dropper.Delf
K7AntiVirus7.10.6832009.03.27Trojan-Downloader.Win32.VB.lbv
Kaspersky7.0.0.1252009.03.28Trojan-Downloader.Win32.VB.lbv
McAfee55662009.03.27New Malware.bj
McAfee+Artemis55662009.03.27New Malware.bj
McAfee-GW-Edition6.7.62009.03.28Trojan.Dldr.VB.lbv
Microsoft1.45022009.03.27-
NOD3239712009.03.28-
Norman6.00.062009.03.27-
nProtect2009.1.8.02009.03.28-
Panda10.0.0.102009.03.27Generic Trojan
PCTools4.4.2.02009.03.27-
Prevx1V22009.03.28-
Rising21.22.52.002009.03.28-
Sophos4.40.02009.03.28Sus/Behav-192
Sunbelt3.2.1858.22009.03.28Trojan.1
Symantec1.4.4.122009.03.28Downloader
TheHacker6.3.3.8.2942009.03.28-
TrendMicro8.700.0.10042009.03.28TROJ_DLOADER.OZ
VBA323.12.10.12009.03.27-
ViRobot2009.3.27.16662009.03.27-

附加信息
File size: 190366 bytes
MD5...: d0285eedad884134b8f61176bea7b762
SHA1..: 3e67d519d7adc19b54339b67ad19f56afc6f9dca
SHA256: d06a189440647ca37db30546677c9c9ffa315c0dfdd31a444fd294db6bb2eac7
SHA512: 47c27929394821fa00f45e04f51a0e52b99b9422e57b87167cf3016969a6ade9
567d61604ee0dd5df1bddd3aa5528b165fe1cb798337c89deec9e6089d607177
ssdeep: 3072:TzNWMKKRZYchObK91C8sV6Xmoo4LEpYs+38phJk1e7jP7nu/+XdgzQbI6mD
/SF:TZuuObR8sVImcyYtghJX7jP7XZ22F
PEiD..: -
TrID..: File type identification
WinRAR Self Extracting archive (96.2%)
Win32 Executable Generic (1.5%)
Win32 Dynamic Link Library (generic) (1.4%)
Generic Win/DOS Executable (0.3%)
DOS Executable Generic (0.3%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x1000
timedatestamp.....: 0x46f268e6 (Thu Sep 20 12:34:46 2007)
machinetype.......: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x14000 0x13800 6.47 8c499086717691066d921075ed5bdb09
.data 0x15000 0x7000 0xa00 4.91 0cb811e47f78b5404a658fb36b591857
.idata 0x1c000 0x1000 0x1000 5.12 8bf175092a70a21f11fd06cc4087c7d0
.rsrc 0x1d000 0x79c0 0x7a00 4.35 9fd7abf531c84e1e793882ab2a21bcf3

( 8 imports )
> ADVAPI32.DLL: AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCloseKey, RegCreateKeyExA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, SetFileSecurityA, SetFileSecurityW
> KERNEL32.DLL: CloseHandle, CompareStringA, CreateDirectoryA, CreateDirectoryW, CreateFileA, CreateFileW, DeleteFileA, DeleteFileW, DosDateTimeToFileTime, ExitProcess, ExpandEnvironmentStringsA, FileTimeToLocalFileTime, FileTimeToSystemTime, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileA, FindNextFileW, FindResourceA, FreeLibrary, GetCPInfo, GetCommandLineA, GetCurrentDirectoryA, GetCurrentProcess, GetDateFormatA, GetFileAttributesA, GetFileAttributesW, GetFileType, GetFullPathNameA, GetLastError, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetNumberFormatA, GetProcAddress, GetProcessHeap, GetStdHandle, GetTempPathA, GetTickCount, GetTimeFormatA, GetVersionExA, GlobalAlloc, HeapAlloc, HeapFree, HeapReAlloc, IsDBCSLeadByte, LoadLibraryA, LocalFileTimeToFileTime, MoveFileA, MoveFileExA, MultiByteToWideChar, ReadFile, SetCurrentDirectoryA, SetEndOfFile, SetEnvironmentVariableA, SetFileAttributesA, SetFileAttributesW, SetFilePointer, SetFileTime, SetLastError, Sleep, SystemTimeToFileTime, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcmpiA, lstrlenA
> COMCTL32.DLL: -
> COMDLG32.DLL: CommDlgExtendedError, GetOpenFileNameA, GetSaveFileNameA
> GDI32.DLL: DeleteObject
> SHELL32.DLL: SHBrowseForFolderA, SHChangeNotify, SHFileOperationA, SHGetFileInfoA, SHGetMalloc, SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA
> USER32.DLL: CharToOemA, CharToOemBuffA, CharUpperA, CopyRect, CreateWindowExA, DefWindowProcA, DestroyIcon, DestroyWindow, DialogBoxParamA, DispatchMessageA, EnableWindow, EndDialog, FindWindowExA, GetClassNameA, GetClientRect, GetDlgItem, GetDlgItemTextA, GetMessageA, GetParent, GetSysColor, GetSystemMetrics, GetWindow, GetWindowLongA, GetWindowRect, GetWindowTextA, IsWindow, IsWindowVisible, LoadBitmapA, LoadCursorA, LoadIconA, LoadStringA, MapWindowPoints, MessageBoxA, OemToCharA, OemToCharBuffA, PeekMessageA, PostMessageA, RegisterClassExA, SendDlgItemMessageA, SendMessageA, SetDlgItemTextA, SetFocus, SetMenu, SetWindowLongA, SetWindowPos, SetWindowTextA, ShowWindow, TranslateMessage, UpdateWindow, WaitForInputIdle, wsprintfA, wvsprintfA
> OLE32.DLL: CLSIDFromString, CoCreateInstance, CreateStreamOnHGlobal, OleInitialize, OleUninitialize

( 0 exports )
RDS...: NSRL Reference Data Set
-
packers (Kaspersky): PE_Patch.UPX, UPX, WScript, PE_Patch
packers (F-Prot): RAR, UPX, RLPack
packers (Authentium): RAR, UPX, RAR, RLPack

 

 

2、
文件说明符 : D:/test/瑞星产品序列号/瑞星产品序列号.txt
属性 : A---
数字签名:否
PE文件:否
创建时间 : 2009-3-28 17:34:34
修改时间 : 2009-3-17 1:36:10
大小 : 29 字节
MD5 : de3a546c5b52cd68bc71222e225fb04e
SHA1: 6E08409B2889018BA78BD47CB2120EA80BD3E4A2
CRC32: ec9f7cc8

 

文件中还真有一个序列号:D92PVF-JAA67J-CRUWRJ-FK23**

 

不过没有ID,也用不了罢?


其实瑞星杀毒软件有一个理论上是永久免费的版本:

 

瑞星(Google 软件精选版)
下载地址:http://pack.google.com/intl/zh-cn/pack_installer.html?hl=zh-cn

 

安装时不需要ID、序列号,免费、可升级

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

紫郢剑侠

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值