楼主: 潘达达
收起左侧

[病毒样本] 精睿样本测试(15.8.13)

  [复制链接]
8yuedeshi
发表于 2015-8-13 10:59:01 | 显示全部楼层
电脑管家12个
aboringman
发表于 2015-8-13 11:09:41 | 显示全部楼层
本帖最后由 aboringman 于 2015-8-13 11:20 编辑

AVIRA kill 28 files
[mw_shl_code=css,true]Begin scan in 'C:\Documents and Settings\Administrator\桌面\2015.8.13'
C:\Documents and Settings\Administrator\桌面\2015.8.13\03.vir
  [DETECTION] Is the TR/Spy.23040.107 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\04.vir
    [0] Archive type: ZIP
    --> Preview Order.exe
        [DETECTION] Is the TR/Dropper.MSIL.183751 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\05.vir
    [0] Archive type: ZIP
    --> Factura sin Papel 09874333 (pdf, 230 KB).exe
        [DETECTION] Is the TR/Crypt.ZPACK.149410 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\07.vir
  [DETECTION] Is the TR/Crypt.ZPACK.149190 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\09.vir
  [DETECTION] Is the TR/Dropper.MSIL.181096 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\10.vir
  [DETECTION] Contains recognition pattern of the JS/Agent.Plak.5 Java script virus
C:\Documents and Settings\Administrator\桌面\2015.8.13\14.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Mutabaha.300696
C:\Documents and Settings\Administrator\桌面\2015.8.13\16.vir
  [DETECTION] Contains recognition pattern of the JS/Agent.HFM.1 Java script virus
C:\Documents and Settings\Administrator\桌面\2015.8.13\19.vir
  [DETECTION] Is the TR/Crypt.Xpack.256285 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\22.vir
  [DETECTION] Is the TR/Dldr.Delphi.Gen Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\23.vir
  [DETECTION] Is the TR/AD.Tenpeq.M.6 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\24.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
C:\Documents and Settings\Administrator\桌面\2015.8.13\26.vir
  [DETECTION] Is the TR/Dropper.MSIL.183486 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\27.vir
  [DETECTION] Is the TR/Dldr.Agent.2009600.1 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\28.vir
  [DETECTION] Is the TR/Crypt.ZPACK.149192 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\29.vir
    [0] Archive type: ACE
    --> Detailed Specification for August_2015 A.exe
        [DETECTION] Is the TR/Dropper.VB.33570 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\32.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/EoRezo.Gen
C:\Documents and Settings\Administrator\桌面\2015.8.13\33.vir
  [DETECTION] Is the TR/Dropper.VB.33610 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\35.vir
  [DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\36.vir
    [0] Archive type: ZIP
    --> Purchase Order _xls.com
        [DETECTION] Is the TR/Dropper.MSIL.183895 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\38.vir
  [DETECTION] Is the TR/Agent.1277459.3 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\40.vir
  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0158 exploit
C:\Documents and Settings\Administrator\桌面\2015.8.13\41.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Esprot.2671616.1
C:\Documents and Settings\Administrator\桌面\2015.8.13\44.vir
    [0] Archive type: ZIP
    --> 703BFD0.scr
        [DETECTION] Is the TR/Dropper.VB.33713 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\45.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen3 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.13\46.vir
    [0] Archive type: ZIP
    --> a/Javaf.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.672 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Main.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.690 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Javan.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.2052 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Javaq.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.2205 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Javam.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.673 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Javav.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.1614 Java virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\49.vir
    [0] Archive type: ZIP
    --> Shipping Documents.exe
        [DETECTION] Is the TR/Dropper.MSIL.183819 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.13\50.vir
  [DETECTION] Contains recognition pattern of the EXP/Pidief.ame exploit

Beginning disinfection:
[ERROR] RepairMalware: Not able to Repair Malware ADWARE/Esprot.2671616.1
[ERROR] RepairMalware: Not able to Repair Malware ADWARE/EoRezo.Gen
[ERROR] RepairMalware: Not able to Repair Malware ADWARE/BrowseFox.Gen7
[ERROR] RepairMalware: Not able to Repair Malware ADWARE/Mutabaha.300696
C:\Documents and Settings\Administrator\桌面\2015.8.13\50.vir
  [DETECTION] Contains recognition pattern of the EXP/Pidief.ame exploit
  [NOTE]      The file was moved to the quarantine directory under the name '51a8a85a.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\49.vir
  [DETECTION] Is the TR/Dropper.MSIL.183819 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '493f87f6.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\46.vir
  [DETECTION] Contains recognition pattern of the JAVA/Adwind.T.1614 Java virus
  [NOTE]      The file was moved to the quarantine directory under the name '1b60dd1b.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\45.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen3 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '7d5792d8.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\44.vir
  [DETECTION] Is the TR/Dropper.VB.33713 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '38d3bfe5.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\41.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Esprot.2671616.1
  [NOTE]      The file was moved to the quarantine directory under the name '47c88d8b.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\40.vir
  [DETECTION] Contains recognition pattern of the EXP/CVE-2012-0158 exploit
  [NOTE]      The file was moved to the quarantine directory under the name '0b70a1c2.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\38.vir
  [DETECTION] Is the TR/Agent.1277459.3 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '7768e19a.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\36.vir
  [DETECTION] Is the TR/Dropper.MSIL.183895 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '5a32ced1.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\35.vir
  [DETECTION] Is the TR/ATRAPS.Gen Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '435af54a.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\33.vir
  [DETECTION] Is the TR/Dropper.VB.33610 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '2f06d978.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\32.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/EoRezo.Gen
  [NOTE]      The file was moved to the quarantine directory under the name '5ebfe0ed.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\29.vir
  [DETECTION] Is the TR/Dropper.VB.33570 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '50a5d02d.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\28.vir
  [DETECTION] Is the TR/Crypt.ZPACK.149192 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '158ca96e.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\27.vir
  [DETECTION] Is the TR/Dldr.Agent.2009600.1 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1c87adc6.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\26.vir
  [DETECTION] Is the TR/Dropper.MSIL.183486 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '44c6b4ae.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\24.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/BrowseFox.Gen7
  [NOTE]      The file was moved to the quarantine directory under the name '6832cd64.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\23.vir
  [DETECTION] Is the TR/AD.Tenpeq.M.6 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '56ccadbd.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\22.vir
  [DETECTION] Is the TR/Dldr.Delphi.Gen Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '35c286ce.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\19.vir
  [DETECTION] Is the TR/Crypt.Xpack.256285 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '130ac6aa.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\16.vir
  [DETECTION] Contains recognition pattern of the JS/Agent.HFM.1 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '219ebd72.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\14.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Mutabaha.300696
  [NOTE]      The file was moved to the quarantine directory under the name '2bdb960a.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\10.vir
  [DETECTION] Contains recognition pattern of the JS/Agent.Plak.5 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1488f243.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\09.vir
  [DETECTION] Is the TR/Dropper.MSIL.181096 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '6aa4fe13.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\07.vir
  [DETECTION] Is the TR/Crypt.ZPACK.149190 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '3fdcfaa6.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\05.vir
  [DETECTION] Is the TR/Crypt.ZPACK.149410 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '324a8b8c.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\04.vir
  [DETECTION] Is the TR/Dropper.MSIL.183751 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '2e179f82.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.13\03.vir
  [DETECTION] Is the TR/Spy.23040.107 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1fc4d24d.qua'!
[/mw_shl_code]
xcvbaby
发表于 2015-8-13 11:22:18 | 显示全部楼层
金山毒霸:12

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
星猫
发表于 2015-8-13 11:44:39 | 显示全部楼层
SEP 杀22个,修复2个
maomao110
发表于 2015-8-13 11:58:24 | 显示全部楼层

你测的太早了   
nick20010117
发表于 2015-8-13 12:28:17 | 显示全部楼层
drweb kill28x
主防DPD,DPH kill43的衍生物

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ELOHIM
发表于 2015-8-13 13:11:39 | 显示全部楼层
Windows Defender 23 个。
水墨静音
发表于 2015-8-13 14:45:42 | 显示全部楼层

火绒得靠在这的卧底拉黑才有成绩
諾言敵不過時間
发表于 2015-8-13 15:17:47 | 显示全部楼层
AVG kill21 剩餘29

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
光芒之星
发表于 2015-8-13 16:02:54 | 显示全部楼层
火绒一个没报,全部miss
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-22 00:12 , Processed in 0.091831 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表