楼主: steven_lzs
收起左侧

[病毒样本] [样本测试] 精睿样本测试(15.8.15)

[复制链接]
ELOHIM
发表于 2015-8-15 10:48:44 | 显示全部楼层

WD入库太慢了,,不过看这个成绩还是可以。
aboringman
发表于 2015-8-15 10:51:16 | 显示全部楼层
AVIRA kill 27 files
[mw_shl_code=css,true]Begin scan in 'C:\Documents and Settings\Administrator\桌面\2015.8.15'
C:\Documents and Settings\Administrator\桌面\2015.8.15\02.vir
  [DETECTION] Is the TR/Crypt.ZPACK.152549 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\06.vir
  [DETECTION] Contains recognition pattern of the JS/Scatter.P Java script virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\08.vir
  [DETECTION] Contains code of the W32/Sality.AT Windows virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\09.vir
  [DETECTION] Contains recognition pattern of the LINUX/MrBlack.H Linux virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\12.vir
  [DETECTION] Is the TR/Dropper.MSIL.184850 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\13.vir
  [DETECTION] Contains code of the W97M/Adnel.242176 Word macro virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\15.vir
  [DETECTION] Contains recognition pattern of the EXP/FLASH.Iwandi.Gen exploit
C:\Documents and Settings\Administrator\桌面\2015.8.15\16.vir
  [DETECTION] Is the TR/Confuser.768512 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\17.vir
  [DETECTION] Is the TR/Bodegun.14336.15 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\20.vir
    [0] Archive type: ZIP
    --> a/dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwiiIiiIIIii.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> b/dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwiiIiiIIIii.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.2 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> c/dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwiiIiiIIIii.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.3 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwiiIiiIIIii.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.4 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> Main.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.5 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwIiiiiiIiII.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.6 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwIIiiIiiiII.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.7 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwIiiiiIiIII.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.8 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> dewmhGAv5r0QGW5ll9yAZViufg7Kw96lY5dWkbn4Eq8ZBiNW8azEnBVN7TqbhwMvgiKJW1D3lw9muhhJ2jxGQYjlwIIIiIiIiIi.class
        [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.9 Java virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.15\22.vir
  [DETECTION] Is the TR/Gendal.6100340 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\25.vir
  [DETECTION] Contains code of the WM/Dldr.Agent.25458 Word macro virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\27.vir
    [0] Archive type: ZIP
    --> Purchase_Order_pdf.com
        [DETECTION] Is the TR/Dropper.MSIL.184649 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.15\28.vir
  [DETECTION] Is the TR/Crypt.ZPACK.151920 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\30.vir
  [DETECTION] Contains recognition pattern of the VBS/Spy.Banker.jmh VBS script virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\32.vir
  [DETECTION] Contains code of the WM/Dldr.Agent.mslw Word macro virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\33.vir
  [DETECTION] Contains recognition pattern of the VBS/Dldr.Agent.8620 VBS script virus
C:\Documents and Settings\Administrator\桌面\2015.8.15\39.vir
  [DETECTION] Is the TR/Crypt.ZPACK.152135 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\40.vir
  [DETECTION] Is the TR/Dropper.Gen7 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\41.vir
  [DETECTION] Is the TR/Downloader.Gen Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\42.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen5 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\43.vir
  [DETECTION] Is the TR/Injector.246260 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\44.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\45.vir
  [DETECTION] Contains recognition pattern of the SPR/Patcher.15360 program
C:\Documents and Settings\Administrator\桌面\2015.8.15\46.vir
    [0] Archive type: ZIP
    --> HMRC.Application.081415.scr
        [DETECTION] Is the TR/Rogue.aiohna.17 Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Documents and Settings\Administrator\桌面\2015.8.15\47.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
C:\Documents and Settings\Administrator\桌面\2015.8.15\48.vir
  [DETECTION] Is the TR/Dldr.Agent.17408.105 Trojan

Beginning disinfection:
C:\Documents and Settings\Administrator\桌面\2015.8.15\48.vir
  [DETECTION] Is the TR/Dldr.Agent.17408.105 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '49f123f1.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\47.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen7 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1bae7918.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\46.vir
  [DETECTION] Is the TR/Rogue.aiohna.17 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '7d9936d5.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\45.vir
  [DETECTION] Contains recognition pattern of the SPR/Patcher.15360 program
  [NOTE]      The file was moved to the quarantine directory under the name '381d1bea.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\44.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '47062988.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\43.vir
  [DETECTION] Is the TR/Injector.246260 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '0bbe05c3.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\42.vir
  [DETECTION] Is the TR/Crypt.XPACK.Gen5 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '77a64594.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\41.vir
  [DETECTION] Is the TR/Downloader.Gen Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '5afc6ad8.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\40.vir
  [DETECTION] Is the TR/Dropper.Gen7 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '43945141.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\39.vir
  [DETECTION] Is the TR/Crypt.ZPACK.152135 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '2fc87d7b.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\33.vir
  [DETECTION] Contains recognition pattern of the VBS/Dldr.Agent.8620 VBS script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5e7144e0.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\32.vir
  [DETECTION] Contains code of the WM/Dldr.Agent.mslw Word macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '506b7426.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\30.vir
  [DETECTION] Contains recognition pattern of the VBS/Spy.Banker.jmh VBS script virus
  [NOTE]      The file was moved to the quarantine directory under the name '15420d62.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\28.vir
  [DETECTION] Is the TR/Crypt.ZPACK.151920 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '1c4909c1.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\27.vir
  [DETECTION] Is the TR/Dropper.MSIL.184649 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '440810ab.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\25.vir
  [DETECTION] Contains code of the WM/Dldr.Agent.25458 Word macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '68fc6969.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\22.vir
  [DETECTION] Is the TR/Gendal.6100340 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '560209b0.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\20.vir
  [DETECTION] Contains recognition pattern of the JAVA/Adwind.gfs.9 Java virus
  [NOTE]      The file was moved to the quarantine directory under the name '350c22c5.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\17.vir
  [DETECTION] Is the TR/Bodegun.14336.15 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '13c462d3.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\16.vir
  [DETECTION] Is the TR/Confuser.768512 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '21501977.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\15.vir
  [DETECTION] Contains recognition pattern of the EXP/FLASH.Iwandi.Gen exploit
  [NOTE]      The file was moved to the quarantine directory under the name '2b153206.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\13.vir
  [DETECTION] Contains code of the W97M/Adnel.242176 Word macro virus
  [NOTE]      The file was moved to the quarantine directory under the name '14465641.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\12.vir
  [DETECTION] Is the TR/Dropper.MSIL.184850 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '6a6a5a67.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\09.vir
  [DETECTION] Contains recognition pattern of the LINUX/MrBlack.H Linux virus
  [NOTE]      The file was moved to the quarantine directory under the name '3f125ea3.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\08.vir
  [DETECTION] Contains code of the W32/Sality.AT Windows virus
  [NOTE]      The file was repaired.
C:\Documents and Settings\Administrator\桌面\2015.8.15\06.vir
  [DETECTION] Contains recognition pattern of the JS/Scatter.P Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '32842f8b.qua'!
C:\Documents and Settings\Administrator\桌面\2015.8.15\02.vir
  [DETECTION] Is the TR/Crypt.ZPACK.152549 Trojan
  [NOTE]      The file was moved to the quarantine directory under the name '2ed93b8e.qua'![/mw_shl_code]
狐狸糊涂
发表于 2015-8-15 10:54:12 | 显示全部楼层
BD杀26,其中修复5,余24

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
xcvbaby
发表于 2015-8-15 11:03:24 | 显示全部楼层
金山毒霸:14

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
温馨小屋
头像被屏蔽
发表于 2015-8-15 12:28:50 | 显示全部楼层
狐狸糊涂 发表于 2015-8-15 10:54
BD杀26,其中修复5,余24

今天bd和wd一个成绩。。。
sjneng
发表于 2015-8-15 13:47:40 | 显示全部楼层

小a+360卫士不冲突?
HonEy
发表于 2015-8-15 13:48:52 | 显示全部楼层
sjneng 发表于 2015-8-15 13:47
小a+360卫士不冲突?

暂时还好吧,没什么问题很流畅
sjneng
发表于 2015-8-15 13:49:31 | 显示全部楼层
HonEy 发表于 2015-8-15 13:48
暂时还好吧,没什么问题很流畅

小A杀了几点?
HonEy
发表于 2015-8-15 13:54:59 | 显示全部楼层

小a高启发下kl26个样本
狐狸糊涂
发表于 2015-8-15 14:09:38 | 显示全部楼层
温馨小屋 发表于 2015-8-15 12:28
今天bd和wd一个成绩。。。

哦,没留意哦.要不你上一个双击的?
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-21 23:35 , Processed in 0.090364 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表