-
Sorry Another Sample
pass: infected /applications/core/interface/file/attachment.php?id=4169" data-fileid="4169" rel="">Setup.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4168" data-fileid="4168" rel="">Foto_Mensagem_Oi.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4167" data-fileid="4167" rel="">CasasBahia.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4161" data-fileid="4161" rel="">atendimento.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4141" data-fileid="4141" rel="">install_511_MHwzNnwxMDAwMDAwMDAwfHx8fHx8fHw_.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4139" data-fileid="4139" rel="">www.visualizar.zip
-
Fun Card
it has a huge variant, i do remember some years ago it named itself as: msn symbol, and directdownload, so thus cound of variant is a polymorphic. here is the sample Lab, /applications/core/interface/file/attachment.php?id=4084" data-fileid="4084" rel="">MyFunCardsSetup2.3.50.22.ZUman000.rar
-
Pdf_writer
malicious software is droped when the application is installed. password archive "infected". /applications/core/interface/file/attachment.php?id=4069" data-fileid="4069" rel="">Souches.zip
-
Usb Virus Please Help
delete autorun files automatically display in pen drive /applications/core/interface/file/attachment.php?id=4074" data-fileid="4074" rel="">link.txt
-
Sample 22
pass: infected /applications/core/interface/file/attachment.php?id=4065" data-fileid="4065" rel="">Install.zip
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4064" data-fileid="4064" rel="">Messenger_recadastramento.zip
-
Trojan.win32.autoit.fn
Trojan.Win32.Autoit.fn Archive password: infected /applications/core/interface/file/attachment.php?id=4062" data-fileid="4062" rel="">aicebc.exe.rar
-
Trojan.agentmb.jixq513316
hi all! i was infected with this virus days ago and bit defender was able to identify this as Trojan.AgentMB.JIXQ513316...i can't upload a sample because bitdefender's blocking any activity from this virus. i can't risk unblocking in because it's already spread quite a bit before i was able to install bitdefender. i need…
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4042" data-fileid="4042" rel="">www.visualizar.zip
-
Sample44
pass: infected /applications/core/interface/file/attachment.php?id=4038" data-fileid="4038" rel="">sample44.zip
-
New Sampe
pass: infected /applications/core/interface/file/attachment.php?id=4034" data-fileid="4034" rel="">A9installertest_77025304.zip
-
Possible Packer.pespin.a
Hi Guys, I get it this warn message from BitDefender, but i need this file. How can clean it, or maybe not a virus?! Please take a quick look to the file, the rar password is: infected Best Regards /applications/core/interface/file/attachment.php?id=4033" data-fileid="4033" rel="">MediaCatcher.rar
-
China Virus Sample
Is virus samples , Can't detected !!! /applications/core/interface/file/attachment.php?id=19764" data-fileExt='zip' data-fileid='19764'>Kafan_Virlist_081027__2.rar.zip /applications/core/interface/file/attachment.php?id=19763" data-fileExt='zip' data-fileid='19763'>Kafan_Virlist_081027__1.rar.zip…
-
Virus Sample
pass. infected /applications/core/interface/file/attachment.php?id=4021" data-fileid="4021" rel="">explorer.zip
-
New Samples (phishing)
Hello, in this moment nothing vendor have this phishing only Avira have soon this pattern. I send you the singular file zip where contains various PHISHING. Please send the your viruslab for adds the pattern. /applications/core/interface/file/attachment.php?id=3960" data-fileid="3960" rel="">PHISHING.zip
-
Virus Not Detected
Running Bitdefender business client with latest updates. The following virus is not detected. Raila Odinga Virus - Malware Aliases DR/NSIS.Voter.A (H+Bedv) TROJ_VOTERAI.A (Trend) Trojan.NSIS.Voter.a (Kaspersky) W32/Voterai.worm.b Worm/ Bit Defender does NOT detect this infection, not even on a memory/flash disk
-
Fake, Antivirus, Antispyware, Antimalware. Antiboot, Etc....
here are more Zlob, Codec, FAKE-ANTIMALWARE, Please do something against them IT WON'T HELP TO PUT THEM TO SIGNATURE. they have a big familiar of Variant /applications/core/interface/file/attachment.php?id=4011" data-fileid="4011" rel="">Unknown.Undetected.AGAIN.ohh.rar
-
Sample
pass: infected /applications/core/interface/file/attachment.php?id=4006" data-fileid="4006" rel="">IAInstall.zip
-
Sample
password: infected /applications/core/interface/file/attachment.php?id=4000" data-fileid="4000" rel="">zvxopz__pp_.zip
-
I Have A Trojan Generic.567724 In My Exe File
I really need this file please show me how to remove the Trojan out of this file. Here are the BD Log: BitDefender Log File !!!!! Product : BitDefender Antivirus 2008 Version : BitDefender UIScanner v.11 Log date : 12:32:05 11/10/2008 Log path : C:\Documents and Settings\gamerz\Application…
-
Sample
Setup.zip http://www.virustotal.com/analisis/47714a0...7a597a398191887 Install.zip http://www.virustotal.com/analisis/7304b3b...8f64378bc8a2b0a WinDefender2009.zip http://www.virustotal.com/analisis/3887c0b...dfc3c17ff94dcd9 The password to unpack is: infected
-
New Bagle
http://www.virustotal.com/analisis/2a66931...3c4253a93b4da5e http://anubis.iseclab.org/?action=result&a...amp;format=html http://www.threatexpert.com/report.aspx?md...8d1cc962c37772e The password to unpack is: infected
-
And Another Sample
pass: infected /applications/core/interface/file/attachment.php?id=3974" data-fileid="3974" rel="">Setupsteel.zip
-
Possible Malware In File
Hi, Sending on a new file which I beleive may contain malware; Password 'infected' Kind Regards Jlo /applications/core/interface/file/attachment.php?id=3969" data-fileid="3969" rel="">Element___Acc.zip
-
Bd10 Undetected Files - Possible Trojans Etc
Password: infected Encryption: AES-256 Progam used: 7-zip Hi, In late Sep, I sent similar undetected files via BD10 quarantine folder. I don't think they were analysed, so I'm uploading the files here. These uploaded files are from the same computer, which just got re-infected when same family member visited the same…