查看: 3200|回复: 15
收起左侧

[病毒样本] JS x27 有興趣可以試試,不喜勿噴!

[复制链接]
heishen2010
发表于 2015-5-26 18:46:49 | 显示全部楼层 |阅读模式
JS x27 有興趣可以試試,不喜勿噴!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
XywCloud
发表于 2015-5-26 18:52:03 | 显示全部楼层
Collected
诸葛亮
发表于 2015-5-26 18:56:12 | 显示全部楼层
FS剩余5x
浅暮、浅离
发表于 2015-5-26 18:59:27 | 显示全部楼层
卡巴剩下7个,上报!!!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
aboringman
发表于 2015-5-26 19:13:50 | 显示全部楼层
AVIRA kill 21 files.
[mw_shl_code=css,true]Starting the file scan:

Begin scan in 'C:\Documents and Settings\Administrator\桌面\ScriptTrojan'
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\0C35B7F08BFFD80539F2696C973B91F8.txt
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen5 HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\2627B36B99E7248E4DC0E40960CAE8C0.txt
  [DETECTION] Contains recognition pattern of the JS/Expack.CM.4 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\3ECB52C7BC20323C1362BEE0AFCEACA4.txt
  [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.agb Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\46E77B9F95761C18809CA039F795B153.txt
  [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\503DC0446DF6DC0617C5F97BA495B310.txt
  [DETECTION] Contains recognition pattern of the JS/BlacoleRef.W.255 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\530AA19E28A8F067BA95BE56ACC12166.txt
  [DETECTION] Contains recognition pattern of the EXP/JS.Expack.GQ exploit
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\70A14DBC7D9EC883E3BE6F209F85A966.txt
  [DETECTION] Contains recognition pattern of the JS/Blacole.DQ.1 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\76FD2A6E335012C35BA219311E4B306C.txt
  [DETECTION] Contains recognition pattern of the JS/Script.EB.21 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\7719B96AD59E4E14A65EA582588CE7BD.txt
  [DETECTION] Contains recognition pattern of the JS/Blacole.EH.1 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\8F90E0799A4CDB45AF82C69BB0E85295.txt
  [DETECTION] Contains recognition pattern of the HTML/Rce.Gen3 HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\A1B490ECA8AFCBEA998F9C5B08415254.txt
  [DETECTION] Contains recognition pattern of the HTML/Afriem.D HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\AAB5B5BA02E2F75F5C4CF5918F74BBB5.txt
  [DETECTION] Contains recognition pattern of the JS/Agent.akt Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\AD0F4CC961BB8618054766A7B103592D.txt
  [DETECTION] Contains recognition pattern of the JS/Agent.12742 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\B48999A7E3E32563E5C7F46E645E3D8D.txt
  [DETECTION] Contains recognition pattern of the HTML/IFrame.Inje.1 HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\C1EB63255153118645BF83032B506BB8.txt
  [DETECTION] Contains recognition pattern of the EXP/JS.Expack.GQ exploit
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\C34F8C89B264E02647576607ECE538CE.txt
  [DETECTION] Contains recognition pattern of the JS/EXP.Redir.EL.7 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\D1BDC5AAA294B4C52678C4C60F052569.txt
  [DETECTION] Contains recognition pattern of the JS/Twetti.T Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\D550F49077F6B6C4DB7F87484819C6C9.txt
  [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\DCE800E909356E16E10FF12A2DB5F6F3.txt
  [DETECTION] Contains recognition pattern of the JS/BlacoleRef.EB.9 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\E26635647D7F2BEB7DF693FF21C1B16E.txt
  [DETECTION] Contains recognition pattern of the JS/EXP.Redir.EL.7 Java script virus
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\E554EC4CA7204C6CF083DE014628244A.txt
  [DETECTION] Contains recognition pattern of the HTML/IFrame.IC.1 HTML script virus

Beginning disinfection:
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\E554EC4CA7204C6CF083DE014628244A.txt
  [DETECTION] Contains recognition pattern of the HTML/IFrame.IC.1 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '51e5f012.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\E26635647D7F2BEB7DF693FF21C1B16E.txt
  [DETECTION] Contains recognition pattern of the JS/EXP.Redir.EL.7 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '4971dfb2.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\DCE800E909356E16E10FF12A2DB5F6F3.txt
  [DETECTION] Contains recognition pattern of the JS/BlacoleRef.EB.9 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1b1d84ab.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\D550F49077F6B6C4DB7F87484819C6C9.txt
  [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '7d1aca9f.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\D1BDC5AAA294B4C52678C4C60F052569.txt
  [DETECTION] Contains recognition pattern of the JS/Twetti.T Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '38a1e7a5.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\C34F8C89B264E02647576607ECE538CE.txt
  [DETECTION] Contains recognition pattern of the JS/EXP.Redir.EL.7 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '4784d5c6.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\C1EB63255153118645BF83032B506BB8.txt
  [DETECTION] Contains recognition pattern of the EXP/JS.Expack.GQ exploit
  [NOTE]      The file was moved to the quarantine directory under the name '0b0df98e.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\B48999A7E3E32563E5C7F46E645E3D8D.txt
  [DETECTION] Contains recognition pattern of the HTML/IFrame.Inje.1 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '7720b9db.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\AD0F4CC961BB8618054766A7B103592D.txt
  [DETECTION] Contains recognition pattern of the JS/Agent.12742 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5a729766.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\AAB5B5BA02E2F75F5C4CF5918F74BBB5.txt
  [DETECTION] Contains recognition pattern of the JS/Agent.akt Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '4328acf9.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\A1B490ECA8AFCBEA998F9C5B08415254.txt
  [DETECTION] Contains recognition pattern of the HTML/Afriem.D HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '2f748139.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\8F90E0799A4CDB45AF82C69BB0E85295.txt
  [DETECTION] Contains recognition pattern of the HTML/Rce.Gen3 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5ef6b95b.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\7719B96AD59E4E14A65EA582588CE7BD.txt
  [DETECTION] Contains recognition pattern of the JS/Blacole.EH.1 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '50e4886d.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\76FD2A6E335012C35BA219311E4B306C.txt
  [DETECTION] Contains recognition pattern of the JS/Script.EB.21 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '15f2f12e.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\70A14DBC7D9EC883E3BE6F209F85A966.txt
  [DETECTION] Contains recognition pattern of the JS/Blacole.DQ.1 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1cf6f583.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\530AA19E28A8F067BA95BE56ACC12166.txt
  [DETECTION] Contains recognition pattern of the EXP/JS.Expack.GQ exploit
  [NOTE]      The file was moved to the quarantine directory under the name '4486ece9.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\503DC0446DF6DC0617C5F97BA495B310.txt
  [DETECTION] Contains recognition pattern of the JS/BlacoleRef.W.255 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '68719526.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\46E77B9F95761C18809CA039F795B153.txt
  [DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '56b1f5fa.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\3ECB52C7BC20323C1362BEE0AFCEACA4.txt
  [DETECTION] Contains recognition pattern of the JS/Dldr.Agent.agb Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '35b1df7a.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\2627B36B99E7248E4DC0E40960CAE8C0.txt
  [DETECTION] Contains recognition pattern of the JS/Expack.CM.4 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '13489e94.qua'!
C:\Documents and Settings\Administrator\桌面\ScriptTrojan\0C35B7F08BFFD80539F2696C973B91F8.txt
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen5 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '21dde4c4.qua'!


End of the scan: 2015年5月26日  19:11
Used time: 00:04 Minute(s)

The scan has been done completely.

      1 Scanned directories
     27 Files were scanned
     21 Viruses and/or unwanted programs were found
      0 Files were classified as suspicious
      0 Files were deleted
      0 Viruses and unwanted programs were repaired
     21 Files were moved to quarantine
      0 Files were renamed
      0 Files cannot be scanned
      6 Files not concerned
      0 Archives were scanned
      0 Warnings
     21 Notes
[/mw_shl_code]
pal家族
发表于 2015-5-26 19:39:24 | 显示全部楼层
这为何会喷呢?
lz要是发27个帖子,才会被喷嘛~
EnZhSTReLniKoVa
发表于 2015-5-26 19:44:19 | 显示全部楼层
本帖最后由 君陌潇 于 2015-5-26 19:54 编辑



BD右键压缩包 扫描 25个

[mw_shl_code=xml,true]<ResolvedDetails>
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/3ECB52C7BC20323C1362BEE0AFCEACA4.txt" threatType="0" threatName="Trojan.Agent.JS.FZ" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;0C35B7F08BFFD80539F2696C973B91F8.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Exploit.BlackHole.NC" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/A1B490ECA8AFCBEA998F9C5B08415254.txt" threatType="0" threatName="Trojan.JS.QLS" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;190C193EAE29A25BED1C47DD3021091D.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Trojan.HideLink.A" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/70A14DBC7D9EC883E3BE6F209F85A966.txt" threatType="0" threatName="Exploit.BlackHole.Script.H" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/C34F8C89B264E02647576607ECE538CE.txt" threatType="0" threatName="Trojan.Script.489524" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/2627B36B99E7248E4DC0E40960CAE8C0.txt" threatType="0" threatName="Trojan.JS.Agent.JBT" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/503DC0446DF6DC0617C5F97BA495B310.txt" threatType="0" threatName="Generic.JS.BlackHole.D7EDA2E6" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/C1EB63255153118645BF83032B506BB8.txt" threatType="0" threatName="Trojan.Script.8339" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;46E77B9F95761C18809CA039F795B153.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Exploit.JS.Redirector.F" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;AD0F4CC961BB8618054766A7B103592D.txt=&gt;(JAVASCRIPT-COMPILATION)" threatType="0" threatName="Trojan.JS.Iframe.COE" action="1" allActions="" initialStatus="3" finalStatus="1" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/530AA19E28A8F067BA95BE56ACC12166.txt" threatType="0" threatName="Trojan.Script.8339" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/76FD2A6E335012C35BA219311E4B306C.txt" threatType="0" threatName="Trojan.Script.488135" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/7719B96AD59E4E14A65EA582588CE7BD.txt" threatType="0" threatName="Generic.JS.BlackHole.710CC657" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;8F90E0799A4CDB45AF82C69BB0E85295.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Trojan.JS.Redirector.BJ" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/AAB5B5BA02E2F75F5C4CF5918F74BBB5.txt" threatType="0" threatName="Trojan.Agent.AKT" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;AD0F4CC961BB8618054766A7B103592D.txt=&gt;(JAVASCRIPT 1)" threatType="0" threatName="Trojan.JS.Iframe.COE" action="1" allActions="" initialStatus="3" finalStatus="1" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;AD0F4CC961BB8618054766A7B103592D.txt=&gt;(JAVASCRIPT 2)" threatType="0" threatName="Trojan.Script.395493" action="1" allActions="" initialStatus="3" finalStatus="1" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;AD0F4CC961BB8618054766A7B103592D.txt=&gt;(JAVASCRIPT 6)" threatType="0" threatName="Trojan.Script.395493" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/B48999A7E3E32563E5C7F46E645E3D8D.txt" threatType="0" threatName="Trojan.Script.AH" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;CED22E100A8E49B993D37493B4168679.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Trojan.Crypt.LX" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/D1BDC5AAA294B4C52678C4C60F052569.txt" threatType="0" threatName="Trojan.JS.Agent.GCI" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan=&gt;D550F49077F6B6C4DB7F87484819C6C9.txt=&gt;(INFECTED_JS)" threatType="0" threatName="JS:Exploit.JS.Redirector.F" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/DCE800E909356E16E10FF12A2DB5F6F3.txt" threatType="0" threatName="Generic.JS.BlackHole.DB5F6871" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                        <Item type="0" objectType="0" path="C:\Users\健\Desktop\ScriptTrojan.zip=&gt;ScriptTrojan/E26635647D7F2BEB7DF693FF21C1B16E.txt" threatType="0" threatName="Trojan.Script.489524" action="5" allActions="1 5" initialStatus="3" finalStatus="5" quarId="" failReason="0" />
                </ResolvedDetails>[/mw_shl_code]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
心痛的伤不起
发表于 2015-5-26 19:47:03 | 显示全部楼层
本帖最后由 y3312068 于 2015-5-26 19:49 编辑

360杀3个 补日志
360杀毒扫描日志

病毒库版本:
扫描时间:2015-05-26 19:46:46
扫描用时:00:00:01
扫描类型:右键扫描
扫描文件总数:26
项目总数:2
清除项目数:2

扫描选项
----------------------
扫描所有文件:是
扫描压缩包:否
发现病毒处理方式:由360杀毒自动处理
扫描磁盘引导区:是
扫描 Rootkit:是
使用云查杀引擎:是
使用QVM人工智能引擎:是
扫描建议修复项:否
常规引擎设置:未使用

扫描内容
----------------------
C:\Users\115\Desktop\新建文件夹


白名单设置
----------------------
d:\hd tune pro v5.60 chs.exe


扫描结果
======================
高危风险项
----------------------
C:\Users\115\Desktop\新建文件夹\AAB5B5BA02E2F75F5C4CF5918F74BBB5.txt        木马程序(trojan-clicker.js.agent.ma)        已删除
C:\Users\115\Desktop\新建文件夹\E554EC4CA7204C6CF083DE014628244A.txt        木马程序(trojan-clicker.js.agent.ma)        已删除

监控杀1个,总3个
开开心心卖手机
发表于 2015-5-26 20:13:30 | 显示全部楼层
蛋挞
[mw_shl_code=xml,true]Virus check with G DATA INTERNET SECURITY
Version 25.1.0.3 (2015/4/7)
Virus signature dated 2015/5/26
Start time: 2015/5/26 20:09:22
Engine(s): Engine A (AVA 25.1743), Engine B (GD 25.5152)
Heuristics: On
Archives: On
System areas: Off
Check rootkits: Off

Check the following directories and files:
  

Analysis performed in full: 2015/5/26 20:09:33
    27 files checked
    22 infected files detected
    0 suspicious files found


Object: 2627B36B99E7248E4DC0E40960CAE8C0.txt

        Status: File moved to quarantine
        Virus: Trojan.JS.Agent.JBT (Engine A)

Archive: 190C193EAE29A25BED1C47DD3021091D.txt

        Status: File moved to quarantine
        Virus: JS:Trojan.HideLink.A (Engine A)
Object: (INFECTED_JS)
        In archive: 190C193EAE29A25BED1C47DD3021091D.txt
        Status: Virus detected
        Virus: JS:Trojan.HideLink.A

Archive: 0C35B7F08BFFD80539F2696C973B91F8.txt

        Status: File moved to quarantine
        Virus: JS:Exploit.BlackHole.NC (Engine A)
Object: (INFECTED_JS)
        In archive: 0C35B7F08BFFD80539F2696C973B91F8.txt
        Status: Virus detected
        Virus: JS:Exploit.BlackHole.NC

Archive: 46E77B9F95761C18809CA039F795B153.txt

        Status: File moved to quarantine
        Virus: JS:Exploit.JS.Redirector.F (Engine A)
Object: (INFECTED_JS)
        In archive: 46E77B9F95761C18809CA039F795B153.txt
        Status: Virus detected
        Virus: JS:Exploit.JS.Redirector.F

Object: 503DC0446DF6DC0617C5F97BA495B310.txt

        Status: Virus removed
        Virus: Generic.JS.BlackHole.D7EDA2E6 (Engine A)

Object: 3ECB52C7BC20323C1362BEE0AFCEACA4.txt

        Status: Virus removed
        Virus: Trojan.Agent.JS.FZ (Engine A)

Object: 530AA19E28A8F067BA95BE56ACC12166.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.8339 (Engine A)

Object: 70A14DBC7D9EC883E3BE6F209F85A966.txt

        Status: File moved to quarantine
        Virus: Exploit.BlackHole.Script.H (Engine A)

Object: 76FD2A6E335012C35BA219311E4B306C.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.488135 (Engine A)

Object: 7719B96AD59E4E14A65EA582588CE7BD.txt

        Status: Virus removed
        Virus: Generic.JS.BlackHole.710CC657 (Engine A)

Archive: 8F90E0799A4CDB45AF82C69BB0E85295.txt

        Status: File moved to quarantine
        Virus: JS:Trojan.JS.Redirector.BJ (Engine A)
Object: (INFECTED_JS)
        In archive: 8F90E0799A4CDB45AF82C69BB0E85295.txt
        Status: Virus detected
        Virus: JS:Trojan.JS.Redirector.BJ

Object: AAB5B5BA02E2F75F5C4CF5918F74BBB5.txt

        Status: File moved to quarantine
        Virus: Trojan.Agent.AKT (Engine A)

Object: A1B490ECA8AFCBEA998F9C5B08415254.txt

        Status: File moved to quarantine
        Virus: Trojan.JS.QLS (Engine A)

Object: B48999A7E3E32563E5C7F46E645E3D8D.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.AH (Engine A)

Archive: AD0F4CC961BB8618054766A7B103592D.txt

        Status: Virus removed
        Virus: Trojan.JS.Iframe.COE (2x), Trojan.Script.395493 (2x) (Engine A)
Object: (JAVASCRIPT 1)
        In archive: AD0F4CC961BB8618054766A7B103592D.txt
        Status: Virus detected
        Virus: Trojan.JS.Iframe.COE
Object: (JAVASCRIPT 2)
        In archive: AD0F4CC961BB8618054766A7B103592D.txt
        Status: Virus detected
        Virus: Trojan.Script.395493
Object: (JAVASCRIPT 6)
        In archive: AD0F4CC961BB8618054766A7B103592D.txt
        Status: Virus detected
        Virus: Trojan.Script.395493
Object: (JAVASCRIPT-COMPILATION)
        In archive: AD0F4CC961BB8618054766A7B103592D.txt
        Status: Virus detected
        Virus: Trojan.JS.Iframe.COE

Object: C1EB63255153118645BF83032B506BB8.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.8339 (Engine A)

Object: C34F8C89B264E02647576607ECE538CE.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.489524 (Engine A)

Archive: CED22E100A8E49B993D37493B4168679.txt

        Status: File moved to quarantine
        Virus: JS:Trojan.Crypt.LX (Engine A)
Object: (INFECTED_JS)
        In archive: CED22E100A8E49B993D37493B4168679.txt
        Status: Virus detected
        Virus: JS:Trojan.Crypt.LX

Archive: D550F49077F6B6C4DB7F87484819C6C9.txt

        Status: File moved to quarantine
        Virus: JS:Exploit.JS.Redirector.F (Engine A)
Object: (INFECTED_JS)
        In archive: D550F49077F6B6C4DB7F87484819C6C9.txt
        Status: Virus detected
        Virus: JS:Exploit.JS.Redirector.F

Object: DCE800E909356E16E10FF12A2DB5F6F3.txt

        Status: Virus removed
        Virus: Generic.JS.BlackHole.DB5F6871 (Engine A)

Object: D1BDC5AAA294B4C52678C4C60F052569.txt

        Status: File moved to quarantine
        Virus: Trojan.JS.Agent.GCI (Engine A)

Object: E26635647D7F2BEB7DF693FF21C1B16E.txt

        Status: File moved to quarantine
        Virus: Trojan.Script.489524 (Engine A)
[/mw_shl_code]
EnZhSTReLniKoVa
发表于 2015-5-26 20:15:39 | 显示全部楼层
开开心心卖手机 发表于 2015-5-26 20:13
蛋挞
[mw_shl_code=xml,true]Virus check with G DATA INTERNET SECURITY
Version 25.1.0.3 (2015/4/7)

BD 25个 可能 GDATA还没更新- -
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-25 04:26 , Processed in 0.129850 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表