查看: 3715|回复: 18
收起左侧

[病毒样本] 精睿样本测试(15.5.2)

[复制链接]
ericdj
发表于 2015-5-2 09:58:38 | 显示全部楼层 |阅读模式
本帖最后由 ericdj 于 2015-5-2 10:10 编辑

地址:http://kuai.xunlei.com/d/zuh.AcgHXSFEVQQA454  

密码:bbs.vc52.cn
数量:100

蛋挞 kill 96  (目测全部是BD引擎干掉的

[mw_shl_code=html,true]Virus check with G DATA INTERNET SECURITY
Version 25.1.0.3 (2015/4/7)
Virus signature dated 2015/5/2
Start time: 2015/5/2 10:03:54
Engine(s): Engine A (AVA 25.1362), Engine B (GD 25.5035)
Heuristics: On
Archives: On
System areas: Off
Check rootkits: Off


Analysis performed in full: 2015/5/2 10:04:34
    100 files checked
    96 infected files detected
    0 suspicious files found


Object: 001.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 002.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.551851 (Engine A)

Object: 003.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 005.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 004.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 006.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 007.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 008.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 010.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 009.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.416908 (Engine A)

Object: 012.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Worm.Generic.559600 (Engine A)

Object: 011.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 014.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.247005 (Engine A)

Object: 015.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 016.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 017.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Worm.Generic.559600 (Engine A)

Object: 013.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Mikey.11601 (Engine A)

Object: 018.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 019.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 022.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Zusy.128824 (Engine A)

Object: 021.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 023.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 024.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Generic.PWStealer.FB037E53 (Engine A)

Object: 025.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 026.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 028.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 029.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit.N (Engine A)

Object: 030.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Generic.Malware.Fdldg.A46E1C31 (Engine A)

Object: 027.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi.8972 (Engine A)

Object: 031.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 032.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 034.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Heur.Loregun.3 (Engine A)

Object: 035.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 036.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Trojan.Krypt.AN (Engine A)

Object: 037.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 038.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 039.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.Elzob.857 (Engine A)

Object: 040.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 041.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit.N (Engine A)

Object: 042.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 043.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Trojan.Heur.LP.Ny4@a4LpSzg (Engine A)

Object: 044.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Gen:Variant.Adware.Wajam.1 (Engine A)

Object: 045.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 033.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Miuref.3 (Engine A)

Object: 047.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 048.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Generic.Malware.SP!Pk!g.02ACDE9A (Engine A)

Object: 050.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Zusy.125909 (Engine A)

Object: 049.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit.N (Engine A)

Object: 051.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 054.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 053.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Trojan.Heur.LP.vy5@aaoc@1l (Engine A)

Object: 055.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 056.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit.N (Engine A)

Object: 058.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.551618 (Engine A)

Object: 059.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 057.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 060.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Zusy.82476 (Engine A)

Object: 062.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 061.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 064.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 065.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 063.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Trojan.Heur.LP.6q4@auElIeb (Engine A)

Object: 066.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 069.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Worm.Generic.560419 (Engine A)

Object: 067.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.95950 (Engine A)

Object: 070.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Trojan.Heur.bi5@I9dlU1p (Engine A)

Object: 071.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Trojan.Generic.12921047 (Engine A)

Object: 072.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 073.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.589111 (Engine A)

Object: 075.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 076.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 077.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Trojan.Microfake.D (Engine A)

Object: 078.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Zusy.54963 (Engine A)

Object: 074.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi.13857 (Engine A)

Object: 079.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Kazy.551661 (Engine A)

Object: 080.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 082.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi.8130 (Engine A)

Object: 083.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.100621 (Engine A)

Object: 081.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit.N (Engine A)

Object: 085.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 084.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.SwiftBrowse.Y (Engine A)

Object: 086.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Trojan.Generic.6278340 (Engine A)

Object: 087.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 088.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Graftor.126819 (Engine A)

Object: 089.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Trojan.Heur.bi4@InYLd5j (Engine A)

Object: 090.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 091.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi1.233 (Engine A)

Object: 092.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 093.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 094.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi.8130 (Engine A)

Object: 095.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Trojan.Generic.13190952 (Engine A)

Object: 096.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Symmi.48237 (Engine A)

Object: 097.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Junkware (PUP) found
        Virus: Adware.Linkury.M (Engine A)

Object: 098.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Buzy.298 (Engine A)

Object: 099.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Win32.Ramnit (Engine A)

Object: 100.vir
        Path: C:\Users\eric\Desktop\virus\2015.5.2
        Status: Virus detected
        Virus: Gen:Variant.Sirefef.2923 (Engine A)
[/mw_shl_code]
学雷锋做人
头像被屏蔽
发表于 2015-5-2 10:00:28 | 显示全部楼层
本帖最后由 学雷锋做人 于 2015-5-2 10:18 编辑

360安全卫士(关伞):99个

FD:100个

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
僵尸爱上猫
发表于 2015-5-2 10:12:42 | 显示全部楼层
本帖最后由 僵尸爱上猫 于 2015-5-2 10:19 编辑

tp 97%
[mw_shl_code=css,true]F:\test\2015.5.2\001.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\002.vir Infected! Gen:Variant.Kazy.551851 (Xenon) Quarantined
F:\test\2015.5.2\003.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\004.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\005.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\006.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\007.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\008.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\010.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\009.vir Infected! Gen:Variant.Kazy.416908 (Xenon) Quarantined
F:\test\2015.5.2\012.vir Infected! Worm.Generic.559600 (Xenon) Quarantined
F:\test\2015.5.2\011.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\014.vir Infected! Gen:Variant.Kazy.247005 (Xenon) Quarantined
F:\test\2015.5.2\015.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\013.vir Infected! Gen:Variant.Mikey.11601 (Xenon) Quarantined
F:\test\2015.5.2\017.vir Infected! Worm.Generic.559600 (Xenon) Quarantined
F:\test\2015.5.2\016.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\019.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\018.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\021.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\022.vir Infected! Gen:Variant.Zusy.128824 (Xenon) Quarantined
F:\test\2015.5.2\023.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\024.vir Infected! Generic.PWStealer.FB037E53 (Xenon) Quarantined
F:\test\2015.5.2\025.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\026.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\020.vir Suspected! Generic.809 (Argon) Quarantined
F:\test\2015.5.2\027.vir Infected! Gen:Variant.Symmi.8972 (Xenon) Quarantined
F:\test\2015.5.2\028.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\029.vir Infected! Win32.Ramnit.N (Xenon) Quarantined
F:\test\2015.5.2\030.vir Infected! Generic.Malware.Fdldg.A46E1C31 (Xenon) Quarantined
F:\test\2015.5.2\031.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\032.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\034.vir Infected! Gen:Heur.Loregun.3 (Xenon) Quarantined
F:\test\2015.5.2\035.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\036.vir Infected! Trojan.Krypt.AN (Xenon) Quarantined
F:\test\2015.5.2\037.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\038.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\039.vir Infected! Gen:Variant.Graftor.Elzob.857 (Xenon) Quarantined
F:\test\2015.5.2\040.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\033.vir Infected! Gen:Variant.Miuref.3 (Xenon) Quarantined
F:\test\2015.5.2\042.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\041.vir Infected! Win32.Ramnit.N (Xenon) Quarantined
F:\test\2015.5.2\044.vir Infected! Gen:Variant.Adware.Wajam.1 (Xenon) Quarantined
F:\test\2015.5.2\043.vir Infected! Gen:Trojan.Heur.LP.Ny4@a4LpSzg (Xenon) Quarantined
F:\test\2015.5.2\045.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\048.vir Infected! Generic.Malware.SP!Pk!g.02ACDE9A (Xenon) Quarantined
F:\test\2015.5.2\047.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\050.vir Infected! Gen:Variant.Zusy.125909 (Xenon) Quarantined
F:\test\2015.5.2\049.vir Infected! Win32.Ramnit.N (Xenon) Quarantined
F:\test\2015.5.2\051.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\054.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\053.vir Infected! Gen:Trojan.Heur.LP.vy5@aaoc@1l (Xenon) Quarantined
F:\test\2015.5.2\055.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\056.vir Infected! Win32.Ramnit.N (Xenon) Quarantined
F:\test\2015.5.2\058.vir Infected! Gen:Variant.Kazy.551618 (Xenon) Quarantined
F:\test\2015.5.2\059.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\057.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\060.vir Infected! Gen:Variant.Zusy.82476 (Xenon) Quarantined
F:\test\2015.5.2\061.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\062.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\063.vir Infected! Gen:Trojan.Heur.LP.6q4@auElIeb (Xenon) Quarantined
F:\test\2015.5.2\065.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\064.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\066.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\067.vir Infected! Gen:Variant.Kazy.95950 (Xenon) Quarantined
F:\test\2015.5.2\069.vir Infected! Worm.Generic.560419 (Xenon) Quarantined
F:\test\2015.5.2\071.vir Infected! Trojan.Generic.12921047 (Xenon) Quarantined
F:\test\2015.5.2\070.vir Infected! Gen:Trojan.Heur.bi5@I9dlU1p (Xenon) Quarantined
F:\test\2015.5.2\073.vir Infected! Gen:Variant.Kazy.589111 (Xenon) Quarantined
F:\test\2015.5.2\072.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\075.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\076.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\074.vir Infected! Gen:Variant.Symmi.13857 (Xenon) Quarantined
F:\test\2015.5.2\077.vir Infected! Trojan.Microfake.D (Xenon) Quarantined
F:\test\2015.5.2\078.vir Infected! Gen:Variant.Zusy.54963 (Xenon) Quarantined
F:\test\2015.5.2\079.vir Infected! Gen:Variant.Kazy.551661 (Xenon) Quarantined
F:\test\2015.5.2\080.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\082.vir Infected! Gen:Variant.Symmi.8130 (Xenon) Quarantined
F:\test\2015.5.2\081.vir Infected! Win32.Ramnit.N (Xenon) Quarantined
F:\test\2015.5.2\083.vir Infected! Gen:Variant.Graftor.100621 (Xenon) Quarantined
F:\test\2015.5.2\085.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\084.vir Infected! Adware.SwiftBrowse.Y (Xenon) Quarantined
F:\test\2015.5.2\086.vir Infected! Trojan.Generic.6278340 (Xenon) Quarantined
F:\test\2015.5.2\087.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\088.vir Infected! Gen:Variant.Graftor.126819 (Xenon) Quarantined
F:\test\2015.5.2\089.vir Infected! Gen:Trojan.Heur.bi4@InYLd5j (Xenon) Quarantined
F:\test\2015.5.2\091.vir Infected! Gen:Variant.Symmi1.233 (Xenon) Quarantined
F:\test\2015.5.2\090.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\092.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\093.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\095.vir Infected! Trojan.Generic.13190952 (Xenon) Quarantined
F:\test\2015.5.2\094.vir Infected! Gen:Variant.Symmi.8130 (Xenon) Quarantined
F:\test\2015.5.2\097.vir Infected! Adware.Linkury.M (Xenon) Quarantined
F:\test\2015.5.2\096.vir Infected! Gen:Variant.Symmi.48237 (Xenon) Quarantined
F:\test\2015.5.2\098.vir Infected! Gen:Variant.Buzy.298 (Xenon) Quarantined
F:\test\2015.5.2\099.vir Infected! Win32.Ramnit (Xenon) Quarantined
F:\test\2015.5.2\100.vir Infected! Gen:Variant.Sirefef.2923 (Xenon) Quarantine
[/mw_shl_code]








    神奇的:Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0  (zh-CN)
    ——来自火狐范
    Miostartos
    发表于 2015-5-2 10:47:24 | 显示全部楼层
    EAM 全B,96/100
    aboringman
    发表于 2015-5-2 11:01:05 | 显示全部楼层
    红伞检测99,修复23,隔离76
    [mw_shl_code=css,true]

    Antivirus Pro
    Report file date: 2015年5月2日  10:55


    The program is running as an unrestricted full version.
    Online services are available.


    Platform        : Microsoft Windows XP
    Windows version : (Service Pack 3)  [5.1.2600]
    Boot mode       : Normally booted
    Username        : adminstartor
    Computer name   : 23Q2JEHX1NUPHVO

    Version information:
    BUILD.DAT       : 15.0.9.504     94784 Bytes   2015-3-24 14:59:00
    AVSCAN.EXE      : 15.0.9.504   1027528 Bytes   2015-3-24 06:59:28
    AVSCANRC.DLL    : 15.0.9.460     54064 Bytes   2015-3-24 06:59:28
    LUKE.DLL        : 15.0.9.460     60664 Bytes   2015-3-24 06:59:30
    AVSCPLR.DLL     : 15.0.9.460     95536 Bytes   2015-3-24 06:59:28
    REPAIR.DLL      : 15.0.9.504    374064 Bytes   2015-3-24 06:59:28
    REPAIR.RDF      : 1.0.7.58      881292 Bytes   2015-4-30 09:18:50
    AVREG.DLL       : 15.0.9.460    273712 Bytes   2015-3-24 06:59:28
    AVLODE.DLL      : 15.0.9.504    596272 Bytes   2015-3-24 06:59:26
    AVLODE.RDF      : 14.0.4.64      79226 Bytes   2015-4-26 02:10:10
    XBV00019.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00020.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00021.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00022.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00023.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00024.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00025.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00026.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00027.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00028.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00029.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00030.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00031.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00032.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00033.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00034.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00035.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00036.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00037.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00038.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00039.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00040.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00041.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00118.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00119.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00120.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00121.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00122.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00123.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00124.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00125.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00126.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00127.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00128.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00129.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00130.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00131.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00132.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00133.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00134.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00135.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00136.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00137.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00138.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00139.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00140.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00141.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00142.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00143.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00144.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00145.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00146.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00147.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00148.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00149.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00150.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00151.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00152.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00153.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00154.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00155.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00156.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00157.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00158.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00159.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00160.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00161.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00162.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00163.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00164.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00165.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00166.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00167.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00168.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00169.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00170.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00171.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00172.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00173.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00174.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00175.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00176.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00177.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00178.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00179.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00180.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00181.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00182.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00183.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00184.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00185.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00186.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00187.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00188.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00189.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00190.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00191.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00192.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00193.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00194.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00195.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00196.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00197.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00198.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00199.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00200.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00201.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00202.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00203.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00204.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00205.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00206.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00207.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00208.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00209.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00210.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00211.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00212.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00213.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00214.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00215.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00216.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00217.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00218.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00219.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00220.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00221.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00222.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00223.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00224.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00225.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00226.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00227.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00228.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00229.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00230.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00231.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00232.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00233.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00234.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00235.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00236.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00237.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00238.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00239.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00240.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00241.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00242.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00243.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00244.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00245.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00246.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00247.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00248.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00249.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00250.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00251.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00252.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00253.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00254.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00255.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00000.VDF    : 7.11.70.0   66736640 Bytes    2013-4-4 06:59:31
    XBV00001.VDF    : 7.11.74.226  2201600 Bytes   2013-4-30 06:59:31
    XBV00002.VDF    : 7.11.80.60   2751488 Bytes   2013-5-28 06:59:31
    XBV00003.VDF    : 7.11.85.214  2162688 Bytes   2013-6-21 06:59:31
    XBV00004.VDF    : 7.11.91.176  3903488 Bytes   2013-7-23 06:59:31
    XBV00005.VDF    : 7.11.98.186  6822912 Bytes   2013-8-29 06:59:31
    XBV00006.VDF    : 7.11.139.38 15708672 Bytes   2014-3-27 06:59:31
    XBV00007.VDF    : 7.11.152.100  4193792 Bytes    2014-6-2 06:59:31
    XBV00008.VDF    : 8.11.165.192  4251136 Bytes    2014-8-7 06:59:31
    XBV00009.VDF    : 8.11.172.30  2094080 Bytes   2014-9-15 06:59:31
    XBV00010.VDF    : 8.11.178.32  1581056 Bytes  2014-10-14 06:59:31
    XBV00011.VDF    : 8.11.184.50  2178560 Bytes  2014-11-11 06:59:31
    XBV00012.VDF    : 8.11.190.32  1876992 Bytes   2014-12-3 06:59:31
    XBV00013.VDF    : 8.11.201.28  2973696 Bytes   2015-1-14 06:59:31
    XBV00014.VDF    : 8.11.206.252  2695680 Bytes    2015-2-4 06:59:31
    XBV00015.VDF    : 8.11.213.84  3175936 Bytes    2015-3-3 06:59:31
    XBV00016.VDF    : 8.11.213.176   212480 Bytes    2015-3-5 06:59:31
    XBV00017.VDF    : 8.11.219.166  2033664 Bytes   2015-3-25 02:10:10
    XBV00018.VDF    : 8.11.225.88  2367488 Bytes   2015-4-22 02:10:10
    XBV00042.VDF    : 8.11.225.112    23040 Bytes   2015-4-22 02:10:10
    XBV00043.VDF    : 8.11.225.138     2048 Bytes   2015-4-22 02:10:10
    XBV00044.VDF    : 8.11.225.164    43520 Bytes   2015-4-22 02:10:11
    XBV00045.VDF    : 8.11.225.188    27136 Bytes   2015-4-22 02:10:11
    XBV00046.VDF    : 8.11.225.190     2048 Bytes   2015-4-22 02:10:11
    XBV00047.VDF    : 8.11.225.192    24064 Bytes   2015-4-22 02:10:11
    XBV00048.VDF    : 8.11.225.196    35328 Bytes   2015-4-23 02:10:11
    XBV00049.VDF    : 8.11.225.198    14848 Bytes   2015-4-23 02:10:11
    XBV00050.VDF    : 8.11.225.202     2048 Bytes   2015-4-23 02:10:11
    XBV00051.VDF    : 8.11.225.224    30208 Bytes   2015-4-23 02:10:11
    XBV00052.VDF    : 8.11.225.244     2048 Bytes   2015-4-23 02:10:11
    XBV00053.VDF    : 8.11.226.8     21504 Bytes   2015-4-23 02:10:11
    XBV00054.VDF    : 8.11.226.30    35328 Bytes   2015-4-23 02:10:11
    XBV00055.VDF    : 8.11.226.34     2048 Bytes   2015-4-24 02:10:11
    XBV00056.VDF    : 8.11.226.42    32256 Bytes   2015-4-24 02:10:11
    XBV00057.VDF    : 8.11.226.44    39424 Bytes   2015-4-24 02:10:11
    XBV00058.VDF    : 8.11.226.46     7680 Bytes   2015-4-24 02:10:11
    XBV00059.VDF    : 8.11.226.48     6656 Bytes   2015-4-24 02:10:11
    XBV00060.VDF    : 8.11.226.68    14336 Bytes   2015-4-24 02:10:11
    XBV00061.VDF    : 8.11.226.88    19456 Bytes   2015-4-24 02:10:11
    XBV00062.VDF    : 8.11.226.112    24576 Bytes   2015-4-24 02:10:11
    XBV00063.VDF    : 8.11.226.134    55808 Bytes   2015-4-25 02:10:11
    XBV00064.VDF    : 8.11.226.136     2560 Bytes   2015-4-25 02:10:11
    XBV00065.VDF    : 8.11.226.138     9728 Bytes   2015-4-25 02:10:11
    XBV00066.VDF    : 8.11.226.140    12800 Bytes   2015-4-25 02:10:11
    XBV00067.VDF    : 8.11.226.160    94208 Bytes   2015-4-26 09:37:05
    XBV00068.VDF    : 8.11.226.178    10240 Bytes   2015-4-26 11:20:56
    XBV00069.VDF    : 8.11.226.196    10240 Bytes   2015-4-26 13:37:20
    XBV00070.VDF    : 8.11.226.214     7680 Bytes   2015-4-26 00:50:59
    XBV00071.VDF    : 8.11.226.216    59904 Bytes   2015-4-27 10:08:49
    XBV00072.VDF    : 8.11.226.220     7168 Bytes   2015-4-27 10:08:50
    XBV00073.VDF    : 8.11.226.222    10752 Bytes   2015-4-27 10:08:50
    XBV00074.VDF    : 8.11.226.242    10752 Bytes   2015-4-27 12:08:42
    XBV00075.VDF    : 8.11.227.4     23040 Bytes   2015-4-27 14:09:02
    XBV00076.VDF    : 8.11.227.6      2048 Bytes   2015-4-27 14:09:03
    XBV00077.VDF    : 8.11.227.28    52736 Bytes   2015-4-27 00:30:04
    XBV00078.VDF    : 8.11.227.46     9216 Bytes   2015-4-27 00:30:04
    XBV00079.VDF    : 8.11.227.52    11264 Bytes   2015-4-27 00:30:05
    XBV00080.VDF    : 8.11.227.54     6656 Bytes   2015-4-28 00:30:05
    XBV00081.VDF    : 8.11.227.56     5120 Bytes   2015-4-28 09:52:18
    XBV00082.VDF    : 8.11.227.58    26112 Bytes   2015-4-28 09:52:19
    XBV00083.VDF    : 8.11.227.78     6144 Bytes   2015-4-28 09:52:20
    XBV00084.VDF    : 8.11.227.94     6656 Bytes   2015-4-28 09:52:22
    XBV00085.VDF    : 8.11.227.110     5632 Bytes   2015-4-28 09:52:23
    XBV00086.VDF    : 8.11.227.126    15872 Bytes   2015-4-28 11:07:07
    XBV00087.VDF    : 8.11.227.130    41984 Bytes   2015-4-28 02:02:37
    XBV00088.VDF    : 8.11.227.132     7168 Bytes   2015-4-28 02:02:37
    XBV00089.VDF    : 8.11.227.134    17408 Bytes   2015-4-28 02:02:38
    XBV00090.VDF    : 8.11.227.136     7168 Bytes   2015-4-28 02:02:38
    XBV00091.VDF    : 8.11.227.138    11776 Bytes   2015-4-28 02:02:38
    XBV00092.VDF    : 8.11.227.140    19456 Bytes   2015-4-29 06:07:41
    XBV00093.VDF    : 8.11.227.156    32256 Bytes   2015-4-29 06:07:42
    XBV00094.VDF    : 8.11.227.172     7168 Bytes   2015-4-29 08:53:38
    XBV00095.VDF    : 8.11.227.188     7680 Bytes   2015-4-29 11:51:45
    XBV00096.VDF    : 8.11.227.190     2048 Bytes   2015-4-29 11:51:45
    XBV00097.VDF    : 8.11.227.206    23040 Bytes   2015-4-29 03:17:36
    XBV00098.VDF    : 8.11.227.208     2048 Bytes   2015-4-29 03:17:37
    XBV00099.VDF    : 8.11.227.212    55808 Bytes   2015-4-29 03:17:37
    XBV00100.VDF    : 8.11.227.216     2560 Bytes   2015-4-29 03:17:38
    XBV00101.VDF    : 8.11.227.232    13824 Bytes   2015-4-29 03:17:38
    XBV00102.VDF    : 8.11.227.246     7680 Bytes   2015-4-29 03:17:38
    XBV00103.VDF    : 8.11.228.6     30208 Bytes   2015-4-30 09:18:38
    XBV00104.VDF    : 8.11.228.8      2048 Bytes   2015-4-30 09:18:38
    XBV00105.VDF    : 8.11.228.22     2048 Bytes   2015-4-30 09:18:39
    XBV00106.VDF    : 8.11.228.36    15360 Bytes   2015-4-30 11:14:25
    XBV00107.VDF    : 8.11.228.38     6656 Bytes   2015-4-30 15:14:14
    XBV00108.VDF    : 8.11.228.40     2048 Bytes   2015-4-30 15:14:14
    XBV00109.VDF    : 8.11.228.42     8704 Bytes   2015-4-30 15:14:15
    XBV00110.VDF    : 8.11.228.44     8192 Bytes   2015-4-30 15:14:15
    XBV00111.VDF    : 8.11.228.46    23040 Bytes   2015-4-30 00:03:35
    XBV00112.VDF    : 8.11.228.50    46080 Bytes   2015-4-30 00:03:36
    XBV00113.VDF    : 8.11.228.52     6656 Bytes   2015-4-30 00:03:36
    XBV00114.VDF    : 8.11.228.66    32256 Bytes    2015-5-1 11:52:20
    XBV00115.VDF    : 8.11.228.80    16896 Bytes    2015-5-1 11:52:20
    XBV00116.VDF    : 8.11.228.94     2048 Bytes    2015-5-1 11:52:20
    XBV00117.VDF    : 8.11.228.108    17920 Bytes    2015-5-1 14:53:05
    LOCAL001.VDF    : 8.11.228.108 128680960 Bytes    2015-5-1 14:53:38
    Engine version  : 8.3.30.28
    AEVDF.DLL       : 8.3.1.6       133992 Bytes   2015-3-24 06:59:23
    AESCRIPT.DLL    : 8.2.2.62      567208 Bytes   2015-4-26 02:10:10
    AESCN.DLL       : 8.3.2.2       139456 Bytes   2015-3-24 06:59:23
    AESBX.DLL       : 8.2.20.34    1615784 Bytes   2015-3-24 06:59:23
    AERDL.DLL       : 8.2.1.20      731040 Bytes   2015-3-24 06:59:23
    AEPACK.DLL      : 8.4.0.62      793456 Bytes   2015-3-24 06:59:23
    AEOFFICE.DLL    : 8.3.1.22      363376 Bytes   2015-4-26 02:10:10
    AEMOBILE.DLL    : 8.1.7.2       281720 Bytes   2015-4-26 02:10:10
    AEHEUR.DLL      : 8.1.4.1668   8289136 Bytes   2015-4-30 09:18:36
    AEHELP.DLL      : 8.3.2.0       281456 Bytes   2015-3-24 06:59:23
    AEGEN.DLL       : 8.1.7.40      456608 Bytes   2015-3-24 06:59:23
    AEEXP.DLL       : 8.4.2.82      260968 Bytes   2015-4-26 02:10:10
    AEEMU.DLL       : 8.1.3.4       399264 Bytes   2015-3-24 06:59:23
    AEDROID.DLL     : 8.4.3.116    1050536 Bytes   2015-3-24 06:59:23
    AECORE.DLL      : 8.3.4.0       243624 Bytes   2015-3-24 06:59:23
    AEBB.DLL        : 8.1.2.0        60448 Bytes   2015-3-24 06:59:23
    AVWINLL.DLL     : 15.0.9.460     26872 Bytes   2015-3-24 06:59:29
    AVPREF.DLL      : 15.0.9.460     52984 Bytes   2015-3-24 06:59:28
    AVREP.DLL       : 15.0.9.460    220464 Bytes   2015-3-24 06:59:28
    AVARKT.DLL      : 15.0.9.460    228088 Bytes   2015-3-24 06:59:24
    AVEVTLOG.DLL    : 15.0.9.460    193328 Bytes   2015-3-24 06:59:25
    SQLITE3.DLL     : 15.0.9.460    455472 Bytes   2015-3-24 06:59:31
    AVSMTP.DLL      : 15.0.9.460     79096 Bytes   2015-3-24 06:59:28
    NETNT.DLL       : 15.0.9.460     15152 Bytes   2015-3-24 06:59:30
    CommonImageRc.dll: 15.0.9.460   4355376 Bytes   2015-3-24 06:59:30
    CommonTextRc.DLL: 15.0.9.476     71416 Bytes   2015-3-24 06:59:30

    Configuration settings for the scan:
    Jobname.............................: ShlExt
    Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\a05e49d7.avp
    Reporting...........................: default
    Primary action......................: Interactive
    Secondary action....................: Ignore
    Scan master boot sector.............: on
    Scan boot sector....................: on
    Boot sectors........................: C:,
    Process scan........................: off
    Scan registry.......................: off
    Search for rootkits.................: off
    Integrity checking of system files..: off
    Scan all files......................: All files
    Scan archives.......................: on
    Limit recursion depth...............: 20
    Smart extensions....................: on
    Deviating archive types.............: +, +, +, +, +, +, +, +,
    Macrovirus heuristic................: on
    File heuristic......................: Complete
    Deviating risk categories...........: +APPL,+JOKE,+SPR,

    Start of the scan: 2015年5月2日  10:55

    Starting the file scan:

    Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.2'
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\001.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\002.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\003.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\004.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\005.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\006.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\007.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\008.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\009.vir
      [DETECTION] Is the TR/Kazy.220672.112 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\010.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\011.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\012.vir
      [DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\013.vir
      [DETECTION] Is the TR/Banhguo.aone Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\014.vir
      [DETECTION] Contains code of the W32/Virut.Gen Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\015.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\016.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\017.vir
      [DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\018.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\019.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\020.vir
      [DETECTION] Contains recognition pattern of the APPL/GetNow.ersd application
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\021.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\022.vir
      [DETECTION] Is the TR/Agent.310815 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\023.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\024.vir
      [DETECTION] Is the TR/PSW.Agent.73728.45 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\025.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\026.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\027.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\028.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\029.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\030.vir
      [DETECTION] Is the TR/Patched.Ren.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\031.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\032.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\033.vir
      [DETECTION] Is the TR/Miuref.A.25063 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\034.vir
      [DETECTION] Is the TR/Spy.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\035.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\036.vir
      [DETECTION] Is the TR/Rogue.104050271 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\037.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\038.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\039.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\040.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\042.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\044.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1080832
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\045.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\046.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\047.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\048.vir
      [DETECTION] Is the TR/Spy.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\049.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\050.vir
      [DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\051.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\052.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\053.vir
      [DETECTION] Is the TR/Black.Gen2 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\054.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\055.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\056.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\057.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\058.vir
      [DETECTION] Is the TR/ATRAPS.Gen2 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\059.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\060.vir
      [DETECTION] Contains recognition pattern of the WORM/Debris.adjh.1 worm
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\061.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\062.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\063.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/MultiPlug.Gen7
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\064.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\065.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\066.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\067.vir
      [DETECTION] Is the TR/Kazy.95950.3 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\068.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\069.vir
      [DETECTION] Is the TR/PSW.Yunsip.axyza Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\070.vir
      [DETECTION] Is the TR/Estiwir.A.47 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\071.vir
      [DETECTION] Is the TR/Zegost.A.154 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\072.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\073.vir
      [DETECTION] Is the TR/Agent.19456.267 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\074.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\075.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\076.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\077.vir
      [DETECTION] Is the TR/Nitol.blanu Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\078.vir
      [DETECTION] Is the TR/Spy.Gen7 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\079.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\080.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\081.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\082.vir
      [DETECTION] Is the TR/PSW.OGames.AC Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\083.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\084.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.apb
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\085.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\086.vir
      [DETECTION] Contains recognition pattern of the W32/Virut.CEE Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\087.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\088.vir
      [DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\089.vir
      [DETECTION] Is the TR/Agent.18944.298 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\090.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\091.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\092.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\093.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\094.vir
      [DETECTION] Is the TR/PSW.OGames.AC Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\095.vir
      [DETECTION] Is the TR/Crypt.ZPACK.139189 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\096.vir
      [DETECTION] Is the TR/Spy.Gen2 Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\097.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\098.vir
      [DETECTION] Is the TR/Starter.Y Trojan
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\099.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\100.vir
      [DETECTION] Is the TR/ATRAPS.Gen2 Trojan

    Beginning disinfection:
    [INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
    [INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
    [INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
    [INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
    [INFO] RepairMalware: Disinfection of malware W32/Ramnit.C needs a reboot to complete
    [ERROR] RepairMalware: Not able to Repair Malware APPL/GetNow.ersd
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\100.vir
      [DETECTION] Is the TR/ATRAPS.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '510c9818.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\099.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\098.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '4993b648.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\097.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '1bcbeca9.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\096.vir
      [DETECTION] Is the TR/Spy.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '7dfda36b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\095.vir
      [DETECTION] Is the TR/Crypt.ZPACK.139189 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '387a8e55.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\094.vir
      [DETECTION] Is the TR/PSW.OGames.AC Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '4760bc34.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\093.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '0bd7907e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\092.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '77ced02e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\091.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '5a97ff63.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\090.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\089.vir
      [DETECTION] Is the TR/Agent.18944.298 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '43f7c4f8.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\088.vir
      [DETECTION] Contains recognition pattern of the WORM/Debris.J.1 worm
      [NOTE]      The file was moved to the quarantine directory under the name '2faae8c8.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\087.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '5e14d145.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\086.vir
      [DETECTION] Contains recognition pattern of the W32/Virut.CEE Windows virus
      [NOTE]      The file was moved to the quarantine directory under the name '500fe182.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\085.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '152598c0.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\084.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.apb
      [NOTE]      The file was moved to the quarantine directory under the name '1c2f9c63.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\083.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '4461850a.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\082.vir
      [DETECTION] Is the TR/PSW.OGames.AC Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6894fcc6.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\081.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\080.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '56689c1c.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\079.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '356fb760.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\078.vir
      [DETECTION] Is the TR/Spy.Gen7 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '13a6f77d.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\077.vir
      [DETECTION] Is the TR/Nitol.blanu Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '21358cd8.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\076.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\075.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '2b72a790.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\074.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '1420c3d5.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\073.vir
      [DETECTION] Is the TR/Agent.19456.267 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6a03cff2.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\072.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\071.vir
      [DETECTION] Is the TR/Zegost.A.154 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '3f79cb39.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\070.vir
      [DETECTION] Is the TR/Estiwir.A.47 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '32eeba11.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\069.vir
      [DETECTION] Is the TR/PSW.Yunsip.axyza Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '2ebaae19.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\068.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '1f68e3d7.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\067.vir
      [DETECTION] Is the TR/Kazy.95950.3 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '7339f7e1.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\066.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\065.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '3aa1d2e6.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\064.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6135da37.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\063.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/MultiPlug.Gen7
      [NOTE]      The file was moved to the quarantine directory under the name '0788d6d6.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\062.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '5007a47e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\061.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\060.vir
      [DETECTION] Contains recognition pattern of the WORM/Debris.adjh.1 worm
      [NOTE]      The file was moved to the quarantine directory under the name '7275f30b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\059.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '1a6c899b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\058.vir
      [DETECTION] Is the TR/ATRAPS.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '3a1b8d1e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\057.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\056.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\055.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\054.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\053.vir
      [DETECTION] Is the TR/Black.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6f34cbaa.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\052.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen2 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '0e15ea15.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\051.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6bbaa89e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\050.vir
      [DETECTION] Contains a recognition pattern of the (harmful) BDS/Backdoor.Gen back-door program
      [NOTE]      The file was moved to the quarantine directory under the name '0e6cdc3f.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\049.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\048.vir
      [DETECTION] Is the TR/Spy.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '1d80e0ad.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\047.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\046.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
      [NOTE]      The file was moved to the quarantine directory under the name '0f3f9c09.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\045.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\044.vir
      [DETECTION] Contains virus patterns of Adware ADWARE/Wajam.1080832
      [NOTE]      The file was moved to the quarantine directory under the name '186dffcc.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\042.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\040.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '4243cd54.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\039.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6747b74f.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\038.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '131daf3c.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\037.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '3118fdb0.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\036.vir
      [DETECTION] Is the TR/Rogue.104050271 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '448a85a9.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\035.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6fded9a9.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\034.vir
      [DETECTION] Is the TR/Spy.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '08b89116.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\033.vir
      [DETECTION] Is the TR/Miuref.A.25063 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '43c7a800.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\032.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '4338a251.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\031.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\030.vir
      [DETECTION] Is the TR/Patched.Ren.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '0995f74e.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\029.vir
      [DETECTION] Contains code of the W32/Ramnit.C Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\028.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '67b4d889.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\027.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '2a9386f9.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\026.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\025.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '42b5a1d5.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\024.vir
      [DETECTION] Is the TR/PSW.Agent.73728.45 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '38059b1c.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\023.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\022.vir
      [DETECTION] Is the TR/Agent.310815 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '4959c759.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\021.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\020.vir
      [DETECTION] Contains recognition pattern of the APPL/GetNow.ersd application
      [NOTE]      The file was moved to the quarantine directory under the name '39bced43.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\019.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '42c59115.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\018.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '0c9fe27f.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\017.vir
      [DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
      [NOTE]      The file was moved to the quarantine directory under the name '72e3995a.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\016.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\015.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '067bb112.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\014.vir
      [DETECTION] Contains code of the W32/Virut.Gen Windows virus
      [NOTE]      The file was moved to the quarantine directory under the name '0d4eed7b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\013.vir
      [DETECTION] Is the TR/Banhguo.aone Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '5e99feb9.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\012.vir
      [DETECTION] Contains recognition pattern of the W32/Elkern.B Windows virus
      [NOTE]      The file was moved to the quarantine directory under the name '3bf1d5d3.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\011.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '13098571.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\010.vir
      [DETECTION] Is the TR/Starter.Y Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '67abdccb.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\009.vir
      [DETECTION] Is the TR/Kazy.220672.112 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '28afa443.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\008.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '177afde5.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\007.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '6d4bfe5b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\006.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '3d42f92b.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\005.vir
      [DETECTION] Is the TR/Graftor.254304 Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '6b49f369.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\004.vir
      [DETECTION] Contains code of the W32/Ramnit.A Windows virus
      [NOTE]      The file was repaired.
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\003.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '2cf7f7a3.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\002.vir
      [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '0fba9921.qua'!
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\001.vir
      [DETECTION] Contains patterns of software PUA/Linkury.iona
      [NOTE]      The file was moved to the quarantine directory under the name '4832b0c7.qua'!


    End of the scan: 2015年5月2日  10:58
    Used time: 00:25 Minute(s)

    The scan has been done completely.

          1 Scanned directories
        100 Files were scanned
         99 Viruses and/or unwanted programs were found
          0 Files were classified as suspicious
          0 Files were deleted
         23 Viruses and unwanted programs were repaired
         76 Files were moved to quarantine
          0 Files were renamed
          0 Files cannot be scanned
          1 Files not concerned
          3 Archives were scanned
          0 Warnings
         99 Notes
    [/mw_shl_code]


    其中41.vir修复后仍为病毒,二扫kill
    [mw_shl_code=css,true]

    Antivirus Pro
    Report file date: 2015年5月2日  10:59


    The program is running as an unrestricted full version.
    Online services are available.


    Platform        : Microsoft Windows XP
    Windows version : (Service Pack 3)  [5.1.2600]
    Boot mode       : Normally booted
    Username        : adminstartor
    Computer name   : 23Q2JEHX1NUPHVO

    Version information:
    BUILD.DAT       : 15.0.9.504     94784 Bytes   2015-3-24 14:59:00
    AVSCAN.EXE      : 15.0.9.504   1027528 Bytes   2015-3-24 06:59:28
    AVSCANRC.DLL    : 15.0.9.460     54064 Bytes   2015-3-24 06:59:28
    LUKE.DLL        : 15.0.9.460     60664 Bytes   2015-3-24 06:59:30
    AVSCPLR.DLL     : 15.0.9.460     95536 Bytes   2015-3-24 06:59:28
    REPAIR.DLL      : 15.0.9.504    374064 Bytes   2015-3-24 06:59:28
    REPAIR.RDF      : 1.0.7.58      881292 Bytes   2015-4-30 09:18:50
    AVREG.DLL       : 15.0.9.460    273712 Bytes   2015-3-24 06:59:28
    AVLODE.DLL      : 15.0.9.504    596272 Bytes   2015-3-24 06:59:26
    AVLODE.RDF      : 14.0.4.64      79226 Bytes   2015-4-26 02:10:10
    XBV00019.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00020.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00021.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00022.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00023.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00024.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00025.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00026.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00027.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00028.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00029.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00030.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00031.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00032.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00033.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00034.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00035.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00036.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00037.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00038.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00039.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00040.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00041.VDF    : 8.11.165.190     2048 Bytes    2014-8-7 06:59:31
    XBV00118.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00119.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00120.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00121.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00122.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00123.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00124.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00125.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00126.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00127.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00128.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00129.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00130.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00131.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00132.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00133.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00134.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00135.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00136.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00137.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00138.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00139.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00140.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00141.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00142.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00143.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00144.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00145.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00146.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00147.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00148.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00149.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00150.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00151.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00152.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00153.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00154.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00155.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00156.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00157.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00158.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00159.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00160.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00161.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00162.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:12
    XBV00163.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00164.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00165.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00166.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00167.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00168.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00169.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00170.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00171.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00172.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00173.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00174.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00175.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00176.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00177.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00178.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00179.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00180.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00181.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00182.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00183.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00184.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00185.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00186.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00187.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00188.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00189.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00190.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00191.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00192.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00193.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00194.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00195.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00196.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00197.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00198.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00199.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00200.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00201.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00202.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00203.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00204.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00205.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00206.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00207.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00208.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00209.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00210.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00211.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00212.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00213.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00214.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00215.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00216.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00217.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00218.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00219.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00220.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00221.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00222.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00223.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00224.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00225.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00226.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00227.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00228.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00229.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00230.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00231.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00232.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00233.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00234.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00235.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00236.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00237.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00238.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00239.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00240.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00241.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00242.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00243.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00244.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00245.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00246.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00247.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00248.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00249.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00250.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00251.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00252.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00253.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00254.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00255.VDF    : 8.11.225.88     2048 Bytes   2015-4-22 02:10:13
    XBV00000.VDF    : 7.11.70.0   66736640 Bytes    2013-4-4 06:59:31
    XBV00001.VDF    : 7.11.74.226  2201600 Bytes   2013-4-30 06:59:31
    XBV00002.VDF    : 7.11.80.60   2751488 Bytes   2013-5-28 06:59:31
    XBV00003.VDF    : 7.11.85.214  2162688 Bytes   2013-6-21 06:59:31
    XBV00004.VDF    : 7.11.91.176  3903488 Bytes   2013-7-23 06:59:31
    XBV00005.VDF    : 7.11.98.186  6822912 Bytes   2013-8-29 06:59:31
    XBV00006.VDF    : 7.11.139.38 15708672 Bytes   2014-3-27 06:59:31
    XBV00007.VDF    : 7.11.152.100  4193792 Bytes    2014-6-2 06:59:31
    XBV00008.VDF    : 8.11.165.192  4251136 Bytes    2014-8-7 06:59:31
    XBV00009.VDF    : 8.11.172.30  2094080 Bytes   2014-9-15 06:59:31
    XBV00010.VDF    : 8.11.178.32  1581056 Bytes  2014-10-14 06:59:31
    XBV00011.VDF    : 8.11.184.50  2178560 Bytes  2014-11-11 06:59:31
    XBV00012.VDF    : 8.11.190.32  1876992 Bytes   2014-12-3 06:59:31
    XBV00013.VDF    : 8.11.201.28  2973696 Bytes   2015-1-14 06:59:31
    XBV00014.VDF    : 8.11.206.252  2695680 Bytes    2015-2-4 06:59:31
    XBV00015.VDF    : 8.11.213.84  3175936 Bytes    2015-3-3 06:59:31
    XBV00016.VDF    : 8.11.213.176   212480 Bytes    2015-3-5 06:59:31
    XBV00017.VDF    : 8.11.219.166  2033664 Bytes   2015-3-25 02:10:10
    XBV00018.VDF    : 8.11.225.88  2367488 Bytes   2015-4-22 02:10:10
    XBV00042.VDF    : 8.11.225.112    23040 Bytes   2015-4-22 02:10:10
    XBV00043.VDF    : 8.11.225.138     2048 Bytes   2015-4-22 02:10:10
    XBV00044.VDF    : 8.11.225.164    43520 Bytes   2015-4-22 02:10:11
    XBV00045.VDF    : 8.11.225.188    27136 Bytes   2015-4-22 02:10:11
    XBV00046.VDF    : 8.11.225.190     2048 Bytes   2015-4-22 02:10:11
    XBV00047.VDF    : 8.11.225.192    24064 Bytes   2015-4-22 02:10:11
    XBV00048.VDF    : 8.11.225.196    35328 Bytes   2015-4-23 02:10:11
    XBV00049.VDF    : 8.11.225.198    14848 Bytes   2015-4-23 02:10:11
    XBV00050.VDF    : 8.11.225.202     2048 Bytes   2015-4-23 02:10:11
    XBV00051.VDF    : 8.11.225.224    30208 Bytes   2015-4-23 02:10:11
    XBV00052.VDF    : 8.11.225.244     2048 Bytes   2015-4-23 02:10:11
    XBV00053.VDF    : 8.11.226.8     21504 Bytes   2015-4-23 02:10:11
    XBV00054.VDF    : 8.11.226.30    35328 Bytes   2015-4-23 02:10:11
    XBV00055.VDF    : 8.11.226.34     2048 Bytes   2015-4-24 02:10:11
    XBV00056.VDF    : 8.11.226.42    32256 Bytes   2015-4-24 02:10:11
    XBV00057.VDF    : 8.11.226.44    39424 Bytes   2015-4-24 02:10:11
    XBV00058.VDF    : 8.11.226.46     7680 Bytes   2015-4-24 02:10:11
    XBV00059.VDF    : 8.11.226.48     6656 Bytes   2015-4-24 02:10:11
    XBV00060.VDF    : 8.11.226.68    14336 Bytes   2015-4-24 02:10:11
    XBV00061.VDF    : 8.11.226.88    19456 Bytes   2015-4-24 02:10:11
    XBV00062.VDF    : 8.11.226.112    24576 Bytes   2015-4-24 02:10:11
    XBV00063.VDF    : 8.11.226.134    55808 Bytes   2015-4-25 02:10:11
    XBV00064.VDF    : 8.11.226.136     2560 Bytes   2015-4-25 02:10:11
    XBV00065.VDF    : 8.11.226.138     9728 Bytes   2015-4-25 02:10:11
    XBV00066.VDF    : 8.11.226.140    12800 Bytes   2015-4-25 02:10:11
    XBV00067.VDF    : 8.11.226.160    94208 Bytes   2015-4-26 09:37:05
    XBV00068.VDF    : 8.11.226.178    10240 Bytes   2015-4-26 11:20:56
    XBV00069.VDF    : 8.11.226.196    10240 Bytes   2015-4-26 13:37:20
    XBV00070.VDF    : 8.11.226.214     7680 Bytes   2015-4-26 00:50:59
    XBV00071.VDF    : 8.11.226.216    59904 Bytes   2015-4-27 10:08:49
    XBV00072.VDF    : 8.11.226.220     7168 Bytes   2015-4-27 10:08:50
    XBV00073.VDF    : 8.11.226.222    10752 Bytes   2015-4-27 10:08:50
    XBV00074.VDF    : 8.11.226.242    10752 Bytes   2015-4-27 12:08:42
    XBV00075.VDF    : 8.11.227.4     23040 Bytes   2015-4-27 14:09:02
    XBV00076.VDF    : 8.11.227.6      2048 Bytes   2015-4-27 14:09:03
    XBV00077.VDF    : 8.11.227.28    52736 Bytes   2015-4-27 00:30:04
    XBV00078.VDF    : 8.11.227.46     9216 Bytes   2015-4-27 00:30:04
    XBV00079.VDF    : 8.11.227.52    11264 Bytes   2015-4-27 00:30:05
    XBV00080.VDF    : 8.11.227.54     6656 Bytes   2015-4-28 00:30:05
    XBV00081.VDF    : 8.11.227.56     5120 Bytes   2015-4-28 09:52:18
    XBV00082.VDF    : 8.11.227.58    26112 Bytes   2015-4-28 09:52:19
    XBV00083.VDF    : 8.11.227.78     6144 Bytes   2015-4-28 09:52:20
    XBV00084.VDF    : 8.11.227.94     6656 Bytes   2015-4-28 09:52:22
    XBV00085.VDF    : 8.11.227.110     5632 Bytes   2015-4-28 09:52:23
    XBV00086.VDF    : 8.11.227.126    15872 Bytes   2015-4-28 11:07:07
    XBV00087.VDF    : 8.11.227.130    41984 Bytes   2015-4-28 02:02:37
    XBV00088.VDF    : 8.11.227.132     7168 Bytes   2015-4-28 02:02:37
    XBV00089.VDF    : 8.11.227.134    17408 Bytes   2015-4-28 02:02:38
    XBV00090.VDF    : 8.11.227.136     7168 Bytes   2015-4-28 02:02:38
    XBV00091.VDF    : 8.11.227.138    11776 Bytes   2015-4-28 02:02:38
    XBV00092.VDF    : 8.11.227.140    19456 Bytes   2015-4-29 06:07:41
    XBV00093.VDF    : 8.11.227.156    32256 Bytes   2015-4-29 06:07:42
    XBV00094.VDF    : 8.11.227.172     7168 Bytes   2015-4-29 08:53:38
    XBV00095.VDF    : 8.11.227.188     7680 Bytes   2015-4-29 11:51:45
    XBV00096.VDF    : 8.11.227.190     2048 Bytes   2015-4-29 11:51:45
    XBV00097.VDF    : 8.11.227.206    23040 Bytes   2015-4-29 03:17:36
    XBV00098.VDF    : 8.11.227.208     2048 Bytes   2015-4-29 03:17:37
    XBV00099.VDF    : 8.11.227.212    55808 Bytes   2015-4-29 03:17:37
    XBV00100.VDF    : 8.11.227.216     2560 Bytes   2015-4-29 03:17:38
    XBV00101.VDF    : 8.11.227.232    13824 Bytes   2015-4-29 03:17:38
    XBV00102.VDF    : 8.11.227.246     7680 Bytes   2015-4-29 03:17:38
    XBV00103.VDF    : 8.11.228.6     30208 Bytes   2015-4-30 09:18:38
    XBV00104.VDF    : 8.11.228.8      2048 Bytes   2015-4-30 09:18:38
    XBV00105.VDF    : 8.11.228.22     2048 Bytes   2015-4-30 09:18:39
    XBV00106.VDF    : 8.11.228.36    15360 Bytes   2015-4-30 11:14:25
    XBV00107.VDF    : 8.11.228.38     6656 Bytes   2015-4-30 15:14:14
    XBV00108.VDF    : 8.11.228.40     2048 Bytes   2015-4-30 15:14:14
    XBV00109.VDF    : 8.11.228.42     8704 Bytes   2015-4-30 15:14:15
    XBV00110.VDF    : 8.11.228.44     8192 Bytes   2015-4-30 15:14:15
    XBV00111.VDF    : 8.11.228.46    23040 Bytes   2015-4-30 00:03:35
    XBV00112.VDF    : 8.11.228.50    46080 Bytes   2015-4-30 00:03:36
    XBV00113.VDF    : 8.11.228.52     6656 Bytes   2015-4-30 00:03:36
    XBV00114.VDF    : 8.11.228.66    32256 Bytes    2015-5-1 11:52:20
    XBV00115.VDF    : 8.11.228.80    16896 Bytes    2015-5-1 11:52:20
    XBV00116.VDF    : 8.11.228.94     2048 Bytes    2015-5-1 11:52:20
    XBV00117.VDF    : 8.11.228.108    17920 Bytes    2015-5-1 14:53:05
    LOCAL001.VDF    : 8.11.228.108 128680960 Bytes    2015-5-1 14:53:38
    Engine version  : 8.3.30.28
    AEVDF.DLL       : 8.3.1.6       133992 Bytes   2015-3-24 06:59:23
    AESCRIPT.DLL    : 8.2.2.62      567208 Bytes   2015-4-26 02:10:10
    AESCN.DLL       : 8.3.2.2       139456 Bytes   2015-3-24 06:59:23
    AESBX.DLL       : 8.2.20.34    1615784 Bytes   2015-3-24 06:59:23
    AERDL.DLL       : 8.2.1.20      731040 Bytes   2015-3-24 06:59:23
    AEPACK.DLL      : 8.4.0.62      793456 Bytes   2015-3-24 06:59:23
    AEOFFICE.DLL    : 8.3.1.22      363376 Bytes   2015-4-26 02:10:10
    AEMOBILE.DLL    : 8.1.7.2       281720 Bytes   2015-4-26 02:10:10
    AEHEUR.DLL      : 8.1.4.1668   8289136 Bytes   2015-4-30 09:18:36
    AEHELP.DLL      : 8.3.2.0       281456 Bytes   2015-3-24 06:59:23
    AEGEN.DLL       : 8.1.7.40      456608 Bytes   2015-3-24 06:59:23
    AEEXP.DLL       : 8.4.2.82      260968 Bytes   2015-4-26 02:10:10
    AEEMU.DLL       : 8.1.3.4       399264 Bytes   2015-3-24 06:59:23
    AEDROID.DLL     : 8.4.3.116    1050536 Bytes   2015-3-24 06:59:23
    AECORE.DLL      : 8.3.4.0       243624 Bytes   2015-3-24 06:59:23
    AEBB.DLL        : 8.1.2.0        60448 Bytes   2015-3-24 06:59:23
    AVWINLL.DLL     : 15.0.9.460     26872 Bytes   2015-3-24 06:59:29
    AVPREF.DLL      : 15.0.9.460     52984 Bytes   2015-3-24 06:59:28
    AVREP.DLL       : 15.0.9.460    220464 Bytes   2015-3-24 06:59:28
    AVARKT.DLL      : 15.0.9.460    228088 Bytes   2015-3-24 06:59:24
    AVEVTLOG.DLL    : 15.0.9.460    193328 Bytes   2015-3-24 06:59:25
    SQLITE3.DLL     : 15.0.9.460    455472 Bytes   2015-3-24 06:59:31
    AVSMTP.DLL      : 15.0.9.460     79096 Bytes   2015-3-24 06:59:28
    NETNT.DLL       : 15.0.9.460     15152 Bytes   2015-3-24 06:59:30
    CommonImageRc.dll: 15.0.9.460   4355376 Bytes   2015-3-24 06:59:30
    CommonTextRc.DLL: 15.0.9.476     71416 Bytes   2015-3-24 06:59:30

    Configuration settings for the scan:
    Jobname.............................: ShlExt
    Configuration file..................: C:\DOCUME~1\ADMINS~1\LOCALS~1\Temp\a8e90008.avp
    Reporting...........................: default
    Primary action......................: Interactive
    Secondary action....................: Ignore
    Scan master boot sector.............: on
    Scan boot sector....................: on
    Boot sectors........................: C:,
    Process scan........................: off
    Scan registry.......................: off
    Search for rootkits.................: off
    Integrity checking of system files..: off
    Scan all files......................: All files
    Scan archives.......................: on
    Limit recursion depth...............: 20
    Smart extensions....................: on
    Deviating archive types.............: +, +, +, +, +, +, +, +,
    Macrovirus heuristic................: on
    File heuristic......................: Complete
    Deviating risk categories...........: +APPL,+JOKE,+SPR,

    Start of the scan: 2015年5月2日  10:59

    Starting the file scan:

    Begin scan in 'C:\Documents and Settings\adminstartor\桌面\2015.5.2'
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
      [DETECTION] Is the TR/Hijacker.Gen Trojan

    Beginning disinfection:
    C:\Documents and Settings\adminstartor\桌面\2015.5.2\041.vir
      [DETECTION] Is the TR/Hijacker.Gen Trojan
      [NOTE]      The file was moved to the quarantine directory under the name '51139aca.qua'!


    End of the scan: 2015年5月2日  11:01
    Used time: 00:00 Minute(s)

    The scan has been done completely.

          1 Scanned directories
         24 Files were scanned
          1 Viruses and/or unwanted programs were found
          0 Files were classified as suspicious
          0 Files were deleted
          0 Viruses and unwanted programs were repaired
          1 Files were moved to quarantine
          0 Files were renamed
          0 Files cannot be scanned
         23 Files not concerned
          2 Archives were scanned
          0 Warnings
          1 Notes
    [/mw_shl_code]
    dongwenqi
    发表于 2015-5-2 11:20:33 | 显示全部楼层
    关闭BD试试看
    ericdj
     楼主| 发表于 2015-5-2 11:27:02 | 显示全部楼层
    本帖最后由 ericdj 于 2015-5-2 11:33 编辑

    失败了……

    手动扫描,单引擎,还是全部是BD报
    @dongwenqi

    本帖子中包含更多资源

    您需要 登录 才可以下载或查看,没有帐号?快速注册

    x
    开开心心卖手机
    发表于 2015-5-2 11:36:56 | 显示全部楼层
    ericdj 发表于 2015-5-2 11:27
    失败了……

    手动扫描,单引擎,还是全部是BD报

    我就是有一次提示引擎错误才开始只用引擎B,关不了引擎A的正常情况下,那次只用引擎B精睿包两个只杀35、27个
    cxy密斯
    发表于 2015-5-2 11:38:12 | 显示全部楼层
    Dr.web检测88x,修复23x

    本帖子中包含更多资源

    您需要 登录 才可以下载或查看,没有帐号?快速注册

    x
    ericdj
     楼主| 发表于 2015-5-2 11:41:35 | 显示全部楼层
    开开心心卖手机 发表于 2015-5-2 11:36
    我就是有一次提示引擎错误才开始只用引擎B,关不了引擎A的正常情况下,那次只用引擎B精睿包两个只杀35、2 ...


    BD系果然还是BD引擎挑大旗啊
    您需要登录后才可以回帖 登录 | 快速注册

    本版积分规则

    手机版|杀毒软件|软件论坛| 卡饭论坛

    Copyright © KaFan  KaFan.cn All Rights Reserved.

    Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-4-25 11:00 , Processed in 0.165621 second(s), 17 queries .

    卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

    快速回复 客服 返回顶部 返回列表