查看: 4498|回复: 16
收起左侧

[病毒样本] 精睿样本测试(16.3.9)

[复制链接]
轩夏
发表于 2016-3-9 09:23:20 | 显示全部楼层 |阅读模式
地址:

http://pan.baidu.com/s/1kUt0CvH  提取密码  9bi5


密码:bbs.vc52.cn
数量:50

评分

参与人数 1人气 +1 收起 理由
wjy19800315 + 1 版区有你更精彩: )

查看全部评分

蓝天二号
发表于 2016-3-9 09:31:52 | 显示全部楼层
本帖最后由 蓝天二号 于 2016-3-9 09:47 编辑

诺顿KILL 28X

类别: 已解决的安全风险
日期和时间,风险,活动,状态,推荐的操作,活动
2016/3/9 9:30:37,高,检测到 42.vir (W97M.Downloader) (检测方: 自动防护),已隔离,已解决 - 不需要操作,已执行的威胁操作: 2
2016/3/9 9:30:34,高,检测到 28.vir (Suspicious.Cloud) (检测方: 自动防护),已隔离,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:34,高,检测到 13.vir (Suspicious.Cloud.7.F) (检测方: 自动防护),已隔离,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:34,高,检测到 24.vir (Trojan.Cridex) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 2
2016/3/9 9:30:34,高,检测到 43.vir (Suspicious.Cloud.5) (检测方: 自动防护),已隔离,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:34,高,检测到 29.vir (Infostealer.Limitail) (检测方: 病毒扫描程序),已隔离,已解决 - 不需要操作,已执行的威胁操作: 59
2016/3/9 9:30:33,高,检测到 43.vir (Suspicious.Cloud.5) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:33,高,检测到 37.vir (Trojan.Bebloh) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:32,高,检测到 28.vir (Suspicious.Cloud) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:32,高,检测到 36.vir (Trojan.Cryptolocker.N) (检测方: 病毒扫描程序),已隔离,已解决 - 不需要操作,已执行的威胁操作: 9
2016/3/9 9:30:32,高,检测到 13.vir (Suspicious.Cloud.7.F) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:32,高,检测到 16.vir (Trojan Horse) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:31,高,检测到 32.vir (W97M.Downloader) (检测方: 病毒扫描程序),已隔离,已解决 - 不需要操作,已执行的威胁操作: 6
2016/3/9 9:30:30,高,检测到 14.vir (JS.Downloader) (检测方: 病毒扫描程序),已删除,已解决 - 不需要操作,已执行的威胁操作: 2
2016/3/9 9:30:24,高,检测到 02.vir (SAPE.Heur.96680) (检测方: 自动防护),已隔离,已解决 - 不需要操作,已执行的威胁操作: 1
2016/3/9 9:30:01,高,40.vir (W97M.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,37.vir (Trojan.Bebloh) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,36.vir (Trojan.Cryptolocker.N) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,35.vir (JS.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,33.vir (W97M.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,32.vir (W97M.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,31.vir (Trojan.Cridex) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,30.vir (Infostealer.Limitail) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,29.vir (Infostealer.Limitail) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,27.vir (W97M.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,24.vir (Trojan.Cridex) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,16.vir (Trojan Horse) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
2016/3/9 9:30:01,高,14.vir (JS.Downloader) 检测方 自动防护,已阻止,已解决 - 不需要操作,已执行的威胁操作: 0
轩夏
 楼主| 发表于 2016-3-9 09:33:21 | 显示全部楼层
本帖最后由 轩夏 于 2016-3-9 09:36 编辑

我也测测,微软KILL 38X

[mw_shl_code=css,true]Scan started on Wed Mar 09 09:26:27 2016

C:\Users\XuanXia\Desktop\2016.3.9\01.vir                                 Infected: Trojan:Win32/Skeeyah.A!rfn
C:\Users\XuanXia\Desktop\2016.3.9\03.vir                                 Infected: Trojan:Win32/Ddosaz.A
C:\Users\XuanXia\Desktop\2016.3.9\07.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\08.vir->NeWlod.class                   Infected: TrojanDownloader:Java/Banload.B
C:\Users\XuanXia\Desktop\2016.3.9\09.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Adnel[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\11.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Adnel[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\12.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\13.vir                                 Infected: VirTool:Win32/Injector.IG
C:\Users\XuanXia\Desktop\2016.3.9\14.vir                                 Infected: TrojanDownloader:JS/Swabfex.H
C:\Users\XuanXia\Desktop\2016.3.9\15.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Adnel[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\17.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\18.vir                                 Infected: TrojanDownloader:MSIL/Lorozoad.A
C:\Users\XuanXia\Desktop\2016.3.9\20.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Adnel[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\21.vir                                 Infected: Trojan:O97M/Madeba.A!det
C:\Users\XuanXia\Desktop\2016.3.9\22.vir->(Rtf0000)->Word.Document.12    Infected: Exploit:Win32/CVE-2012-0158[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\23.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Adnel[non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\24.vir                                 Infected: Backdoor:Win32/Drixed.M
C:\Users\XuanXia\Desktop\2016.3.9\25.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\27.vir                                 Infected: TrojanDownloader:O97M/Bartallex
C:\Users\XuanXia\Desktop\2016.3.9\28.vir                                 Infected: Trojan:Win32/Matta.A!gfc
C:\Users\XuanXia\Desktop\2016.3.9\29.vir                                 Infected: Ransom:Win32/Crowti.A
C:\Users\XuanXia\Desktop\2016.3.9\30.vir->(UPX)                          Infected: Trojan:Win32/Tepoyx.K [non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\31.vir                                 Infected: Backdoor:Win32/Drixed
C:\Users\XuanXia\Desktop\2016.3.9\32.vir                                 Infected: TrojanDownloader:O97M/Bartallex
C:\Users\XuanXia\Desktop\2016.3.9\33.vir->[RtfMso]->(ActiveMime)         Infected: TrojanDownloader:O97M/Donoff [non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\34.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\35.vir                                 Infected: TrojanDownloader:JS/Swabfex.H
C:\Users\XuanXia\Desktop\2016.3.9\36.vir                                 Infected: Ransom:Win32/Tescrypt!rfn
C:\Users\XuanXia\Desktop\2016.3.9\39.vir                                 Infected: Trojan:Win32/Skeeyah.A!rfn
C:\Users\XuanXia\Desktop\2016.3.9\40.vir                                 Infected: TrojanDownloader:O97M/Bartallex
C:\Users\XuanXia\Desktop\2016.3.9\41.vir                                 Infected: TrojanDownloader:O97M/Bartallex
C:\Users\XuanXia\Desktop\2016.3.9\42.vir->word/vbaProject.bin            Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.3.9\44.vir                                 Infected: Ransom:Win32/Crowti.A
C:\Users\XuanXia\Desktop\2016.3.9\45.vir->word/vbaProject.bin            Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.3.9\47.vir->(SWC)                          Infected: Exploit:SWF/Axpergle.F [non_writable_container]
C:\Users\XuanXia\Desktop\2016.3.9\48.vir                                 Infected: TrojanDownloader:JS/Garisee.A
C:\Users\XuanXia\Desktop\2016.3.9\49.vir                                 Infected: TrojanDownloader:JS/Swabfex.P
C:\Users\XuanXia\Desktop\2016.3.9\50.vir                                 Infected: TrojanDownloader:JS/Swabfex.C

Successfully checked: C:\Users\XuanXia\Desktop\2016.3.9[/mw_shl_code]
为你心碎
发表于 2016-3-9 09:42:18 | 显示全部楼层
卡巴24个+2修复
Eset小粉絲
发表于 2016-3-9 09:44:43 | 显示全部楼层
本帖最后由 Eset小粉絲 于 2016-3-9 09:51 编辑

Avira left 22x

[mw_shl_code=css,true]Begin scan in 'C:\Users\IVAN\Desktop\2016.3.9'
C:\Users\IVAN\Desktop\2016.3.9\01.vir
  [DETECTION] Is the TR/Injector.672769 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '52ededc2.qua'!
C:\Users\IVAN\Desktop\2016.3.9\02.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/InstallRex.HI
  [NOTE]      The file was moved to the quarantine directory under the name '4a7ac262.qua'!
C:\Users\IVAN\Desktop\2016.3.9\03.vir
  [DETECTION] Is the TR/Agent.45056.2700 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1825988b.qua'!
C:\Users\IVAN\Desktop\2016.3.9\10.vir
  [DETECTION] Is the TR/Dldr.Agent.19456.80 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '7e12d74a.qua'!
Successful Cloud SDK initialization and license check.
The file 'C:\Users\IVAN\Desktop\2016.3.9\13.vir' has been uploaded to the Protection Cloud and analyzed. SHA256 = AB81F8169A05FB5D6D5599D9A5553D19068131E04911BA52FA0D95B0C9249E03
C:\Users\IVAN\Desktop\2016.3.9\13.vir (SHA-256: ab81f8169a05fb5d6d5599d9a5553d19068131e04911ba52fa0d95b0c9249e03)
  [DETECTION] Contains suspicious code HEUR/APC (Cloud)
  [INFO]      The file 'C:\Users\IVAN\Desktop\2016.3.9\13.vir' has been uploaded to the Protection Cloud and analyzed.
  [NOTE]      The file was moved to the quarantine directory under the name '5f69d14e.qua'!
C:\Users\IVAN\Desktop\2016.3.9\16.vir
  [DETECTION] Is the TR/FileCoder.lsose Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '3b96fa50.qua'!
C:\Users\IVAN\Desktop\2016.3.9\18.vir
  [DETECTION] Is the TR/Dropper.MSIL.270650 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '448dc833.qua'!
C:\Users\IVAN\Desktop\2016.3.9\21.vir
  [DETECTION] Contains code of the W2000M/Dldr.Agent.54632 macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '0835e440.qua'!
C:\Users\IVAN\Desktop\2016.3.9\24.vir
  [DETECTION] Is the TR/Dridex.Y.768545 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '742da415.qua'!
The file 'C:\Users\IVAN\Desktop\2016.3.9\26.vir' has been uploaded to the Protection Cloud and analyzed. SHA256 = D6C97E2405003E5A9B50150F4E1F697257FF7A0969A6A7029215080AA066A2F1
C:\Users\IVAN\Desktop\2016.3.9\26.vir (SHA-256: d6c97e2405003e5a9b50150f4e1f697257ff7a0969a6a7029215080aa066a2f1)
  [INFO]      The file 'C:\Users\IVAN\Desktop\2016.3.9\26.vir' has been uploaded to the Protection Cloud and analyzed.
C:\Users\IVAN\Desktop\2016.3.9\27.vir
  [DETECTION] Contains code of the X2000M/Dldr.Agent.567646 Excel macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '59778b86.qua'!
The file 'C:\Users\IVAN\Desktop\2016.3.9\28.vir' has been uploaded to the Protection Cloud and analyzed. SHA256 = 5E87A7EB6937201C23598F64C229F8896417B80812A7124A4B4EC98B36ECD989
C:\Users\IVAN\Desktop\2016.3.9\28.vir (SHA-256: 5e87a7eb6937201c23598f64c229f8896417b80812a7124a4b4ec98b36ecd989)
  [DETECTION] Is the TR/Crypt.ZPACK.Gen4 (Cloud) Trojan
  [INFO]      The file 'C:\Users\IVAN\Desktop\2016.3.9\28.vir' has been uploaded to the Protection Cloud and analyzed.
  [NOTE]      The file was moved to the quarantine directory under the name '47fefe20.qua'!
C:\Users\IVAN\Desktop\2016.3.9\29.vir
  [DETECTION] Is the TR/Crypt.Xpack.413632 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '401fb009.qua'!
C:\Users\IVAN\Desktop\2016.3.9\30.vir
  [DETECTION] Is the TR/Crypt.ZPACK.232733 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '2c439c20.qua'!
C:\Users\IVAN\Desktop\2016.3.9\31.vir
  [DETECTION] Is the TR/Dridex.4 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '5dfaa5b4.qua'!
C:\Users\IVAN\Desktop\2016.3.9\32.vir
  [DETECTION] Contains code of the X2000M/Dldr.Agent.567646 Excel macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '53e09570.qua'!
C:\Users\IVAN\Desktop\2016.3.9\36.vir
  [DETECTION] Is the TR/Crypt.Xpack.420308 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '16c9ec2e.qua'!
C:\Users\IVAN\Desktop\2016.3.9\37.vir
  [DETECTION] Is the TR/AD.Bublik.Y.12 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1fc2e884.qua'!
C:\Users\IVAN\Desktop\2016.3.9\39.vir
  [DETECTION] Is the TR/Dropper.MSIL.268848 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '4783f1eb.qua'!
C:\Users\IVAN\Desktop\2016.3.9\40.vir
  [DETECTION] Contains code of the X2000M/Dldr.Agent.567646 Excel macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '6b77883e.qua'!
C:\Users\IVAN\Desktop\2016.3.9\41.vir
  [DETECTION] Contains code of the X2000M/Dldr.Agent.567646 Excel macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '5589e8e5.qua'!
C:\Users\IVAN\Desktop\2016.3.9\42.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Dldr.FileCoder.1 macro virus
        [WARNING]   Infected files in archives cannot be repaired
  [NOTE]      The file was moved to the quarantine directory under the name '3687c395.qua'!
C:\Users\IVAN\Desktop\2016.3.9\43.vir
  [DETECTION] Is the TR/Crypt.Xpack.BI Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '104f8389.qua'!
The file 'C:\Users\IVAN\Desktop\2016.3.9\44.vir' has been uploaded to the Protection Cloud and analyzed. SHA256 = E65F7C5D873C0BA3A1C29413D55E40D47EAED098D33D92EA46A893E3873B23FB
C:\Users\IVAN\Desktop\2016.3.9\44.vir (SHA-256: e65f7c5d873c0ba3a1c29413d55e40d47eaed098d33d92ea46a893e3873b23fb)
  [DETECTION] Is the TR/Crypt.XPACK.Gen (Cloud) Trojan
  [INFO]      The file 'C:\Users\IVAN\Desktop\2016.3.9\44.vir' has been uploaded to the Protection Cloud and analyzed.
  [NOTE]      The file was moved to the quarantine directory under the name '15a1a4c1.qua'!
C:\Users\IVAN\Desktop\2016.3.9\45.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Dldr.FileCoder.1 macro virus
        [WARNING]   Infected files in archives cannot be repaired
  [NOTE]      The file was moved to the quarantine directory under the name '22dbf83d.qua'!
C:\Users\IVAN\Desktop\2016.3.9\14.vir
  [DETECTION] Contains recognition pattern of the JS/Locky.D1 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '525aeb35.qua'!
C:\Users\IVAN\Desktop\2016.3.9\49.vir
  [DETECTION] Contains recognition pattern of the JS/Locky.C1 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '4a1fc50a.qua'!
C:\Users\IVAN\Desktop\2016.3.9\50.vir
  [DETECTION] Contains recognition pattern of the JS/Locky.2 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '18409fe9.qua'![/mw_shl_code]
sorom
发表于 2016-3-9 09:58:50 | 显示全部楼层
迈克菲网络安全

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
喝汤小王子
发表于 2016-3-9 10:24:56 | 显示全部楼层
轩夏 发表于 2016-3-9 09:33
我也测测,微软KILL 38X

[mw_shl_code=css,true]Scan started on Wed Mar 09 09:26:27 2016

微软自带杀毒这么厉害了吗
Luca.l
发表于 2016-3-9 10:52:40 | 显示全部楼层
[mw_shl_code=html,true]扫描报告
2016年3月9日 星期三 10:52:07 - 10:52:10
扫描类型: 选择的文件和文件夹
目标: "E:\下载\样本\2016.3.9"
结果

已扫描项目: 210
找到的恶意项目: 53
详细信息

BehavesLike:BAT.KillAV.Gen
E:\下载\样本\2016.3.9\2016.3.9\04.vir: 已跳过
Application.Generic.659599
E:\下载\样本\2016.3.9\2016.3.9\02.vir: 已隔离
Trojan.Java.Downloader.DO
E:\下载\样本\2016.3.9\2016.3.9\08.vir\NeWlod.class: 已跳过
Trojan-Downloader:W97M/Dridex.S
E:\下载\样本\2016.3.9\2016.3.9\09.vir\no name: 已跳过
Trojan.GenericKD.3087083
E:\下载\样本\2016.3.9\2016.3.9\01.vir: 已清除
Trojan-Downloader:JS/Dridex.W
E:\下载\样本\2016.3.9\2016.3.9\07.vir: 已清除
Exploit.CVE-2012-0158.Gen
E:\下载\样本\2016.3.9\2016.3.9\05.vir\no name: 已跳过
Dropped:Generic.Malware.Fdld.975F7600
E:\下载\样本\2016.3.9\2016.3.9\03.vir: 已清除
Trojan.GenericKD.3088254
E:\下载\样本\2016.3.9\2016.3.9\10.vir: 已清除
Trojan-Downloader:W97M/Dridex.S
E:\下载\样本\2016.3.9\2016.3.9\11.vir\no name: 已跳过
Trojan.Java.Downloader.DO
E:\下载\样本\2016.3.9\2016.3.9\08.vir: 已清除
Exploit.CVE-2012-0158.Gen
E:\下载\样本\2016.3.9\2016.3.9\05.vir: 已清除
Trojan.Doc.Downloader.KA
E:\下载\样本\2016.3.9\2016.3.9\09.vir: 已清除
Trojan-Downloader:JS/Dridex.W
E:\下载\样本\2016.3.9\2016.3.9\12.vir: 已清除
Trojan-Downloader:JS/TeslaCrypt.C
E:\下载\样本\2016.3.9\2016.3.9\14.vir: 已清除
Trojan.GenericKD.3075180
E:\下载\样本\2016.3.9\2016.3.9\13.vir: 已清除
Trojan-Downloader:W97M/Dridex.S
E:\下载\样本\2016.3.9\2016.3.9\15.vir\no name: 已跳过
Trojan.Doc.Downloader.KA
E:\下载\样本\2016.3.9\2016.3.9\11.vir: 已清除
Trojan-Downloader:JS/Dridex.W
E:\下载\样本\2016.3.9\2016.3.9\17.vir: 已清除
Gen:Variant.Barys.49896
E:\下载\样本\2016.3.9\2016.3.9\18.vir: 已清除
Trojan.GenericKD.3087189
E:\下载\样本\2016.3.9\2016.3.9\16.vir: 已清除
Trojan-Downloader:W97M/Dridex.S
E:\下载\样本\2016.3.9\2016.3.9\20.vir\no name: 已跳过
Trojan.Doc.Downloader.KD
E:\下载\样本\2016.3.9\2016.3.9\21.vir: 无法清理
Exploit.CVE-2014-1761.D
E:\下载\样本\2016.3.9\2016.3.9\22.vir: 已清除
Trojan-Downloader:W97M/Dridex.S
E:\下载\样本\2016.3.9\2016.3.9\23.vir\no name: 已跳过
Trojan.Doc.Downloader.KA
E:\下载\样本\2016.3.9\2016.3.9\15.vir: 已清除
Trojan.GenericKD.3083085
E:\下载\样本\2016.3.9\2016.3.9\24.vir: 已清除
Trojan-Downloader:W97M/Dridex.R
E:\下载\样本\2016.3.9\2016.3.9\27.vir: 无法清理
Trojan.Doc.Downloader.KA
E:\下载\样本\2016.3.9\2016.3.9\20.vir: 已清除
Trojan.Doc.Downloader.KA
E:\下载\样本\2016.3.9\2016.3.9\23.vir: 已清除
Gen:Variant.Razy.23052
E:\下载\样本\2016.3.9\2016.3.9\26.vir: 已清除
Trojan.GenericKD.3082483
E:\下载\样本\2016.3.9\2016.3.9\28.vir: 已清除
Trojan.GenericKD.3073753
E:\下载\样本\2016.3.9\2016.3.9\29.vir: 已清除
Gen:Variant.Graftor.273750
E:\下载\样本\2016.3.9\2016.3.9\30.vir: 已清除
Trojan-Downloader:W97M/Dridex.R
E:\下载\样本\2016.3.9\2016.3.9\32.vir: 无法清理
Trojan-Downloader:JS/TeslaCrypt.C
E:\下载\样本\2016.3.9\2016.3.9\35.vir: 已清除
Trojan-Downloader:JS/Dridex.W
E:\下载\样本\2016.3.9\2016.3.9\34.vir: 已清除
Trojan.GenericKD.3079829
E:\下载\样本\2016.3.9\2016.3.9\37.vir: 已清除
Trojan.GenericKD.3082534
E:\下载\样本\2016.3.9\2016.3.9\36.vir: 已清除
Trojan.GenericKD.3083050
E:\下载\样本\2016.3.9\2016.3.9\31.vir: 已清除
Trojan.GenericKD.3082261
E:\下载\样本\2016.3.9\2016.3.9\39.vir: 已清除
Trojan-Downloader:W97M/Dridex.R
E:\下载\样本\2016.3.9\2016.3.9\41.vir: 无法清理
Trojan-Downloader:W97M/Dridex.R
E:\下载\样本\2016.3.9\2016.3.9\40.vir: 无法清理
Trojan.GenericKD.3082085
E:\下载\样本\2016.3.9\2016.3.9\43.vir: 已清除
w97M.Downloader.AYU
E:\下载\样本\2016.3.9\2016.3.9\42.vir\word\vbaProject.bin: 已跳过
w97M.Downloader.AYU
E:\下载\样本\2016.3.9\2016.3.9\45.vir\word\vbaProject.bin: 已跳过
Gen:Variant.Symmi.61330
E:\下载\样本\2016.3.9\2016.3.9\44.vir: 已清除
Script.SWF.C336
E:\下载\样本\2016.3.9\2016.3.9\47.vir: 已清除
Trojan.Downloader.JS.Agent.PZ
E:\下载\样本\2016.3.9\2016.3.9\48.vir: 已清除
Trojan-Downloader:JS/Dridex.W
E:\下载\样本\2016.3.9\2016.3.9\49.vir: 已清除
Trojan-Downloader:JS/TeslaCrypt.B
E:\下载\样本\2016.3.9\2016.3.9\50.vir: 已清除
w97M.Downloader.AYU
E:\下载\样本\2016.3.9\2016.3.9\42.vir: 已清除
w97M.Downloader.AYU
E:\下载\样本\2016.3.9\2016.3.9\45.vir: 已清除
版本信息

病毒定义数据库:

2016-03-09_02
扫描引擎:

F-Secure Aquarius: 11.00.01, 2016-03-09
F-Secure Gemini: 3.02.384, 2016-03-03
F-Secure Hydra: 5.15.96, 2016-03-08
F-Secure Online: 15.10.229
F-Secure USS: 5.08.181, 2016-01-27
版权 © 1998-2016 产品支持 | 发送样本到 F-Secure

对于 F-Secure 万维网页面所链接的由第三方创建和发布的材料,F-Secure 不承担任何责任。 除非您在向我们任何一台服务器提交材料时,通过电子邮件或 F-Secure CGI 电子邮件明确说明,否则表示您同意在 F-Secure 万维网页面或打印出版物中发布所提供的材料。 单击有下划线的链接,可访问 F-Secure 公共网站。此时,您的访问以及所用的域名会记录入私人访问统计信息中。 此信息不会提供给任何第三方。 您同意不针对所提交的材料向我们提出诉讼。 除非您在提交材料时另有清楚说明,否则表示您同意 F-Secure 可以在其产品/出版物中整合材料中描述的任何概念,而无需承担任何责任。[/mw_shl_code]
轩夏
 楼主| 发表于 2016-3-9 10:57:09 | 显示全部楼层
喝汤小王子 发表于 2016-3-9 10:24
微软自带杀毒这么厉害了吗

这是偶尔~~!!
毛豆新人
发表于 2016-3-9 12:31:29 | 显示全部楼层
CIS   2x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-12 06:48 , Processed in 0.135383 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表