查看: 4473|回复: 21
收起左侧

[病毒样本] 精睿样本测试(15.8.31)

[复制链接]
神迹般存在
发表于 2015-8-31 09:28:56 | 显示全部楼层 |阅读模式
本帖最后由 神迹般存在 于 2015-8-31 10:01 编辑

地址:http://pan.baidu.com/s/1BItzg 提取密码  ebej
密码:bbs.vc52.cn
数量:50
-----分割线-----
KIS 2015 killed 32x, fixed 5x, missed 13x.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
MXCERILYF!
发表于 2015-8-31 09:29:33 | 显示全部楼层
本帖最后由 MXCERILYF! 于 2015-8-31 10:02 编辑

金山毒霸10

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
aboringman
发表于 2015-8-31 09:47:18 | 显示全部楼层
本帖最后由 aboringman 于 2015-8-31 10:53 编辑

NS 扫描:kill 10,fix 2

下载智能分析:kill 01、38、21、27、18、49、30、28、08、46、39、41、17、35、34、03、23、40、50、24、31(1程序)、15;

改rar:其中42、43、24、15、31、19是压缩包格式;31解压杀一程序(另外两个dll不杀,且信誉良好),19解压杀(监控),24解压出另一个压缩包中程序被杀(下载智能分析),15解压杀(下载智能分析);

另:06、36、20不是程序/压缩包格式。

31:
[mw_shl_code=css,true]Filename: call of ddos.exe
Threat name: WS.Reputation.1Full Path: c:\documents and settings\administrator\桌面\2015.8.31\call of ddos\call of ddos.exe

____________________________

____________________________


On computers as of 
2015-8-31 at 10:06:36

Last Used 
2015-8-31 at 10:08:36

Startup Item 
No

Launched 
No

Threat type: Insight Network Threat. There are many indications that this file is untrustworthy and therefore not safe


____________________________


call of ddos.exe Threat name: WS.Reputation.1
Locate


Very Few Users
Fewer than 5 users in the Norton Community have used this file.

Very New
This file was released less than 1 week  ago.

Medium
This file risk is medium.


____________________________


Source: External Media

Source File:
call of ddos.exe

____________________________


File Thumbprint - SHA:
4d6bad852631f9928d6e79bb406dbabdbd9453f7515efc972995b84d0e3be3cd
File Thumbprint - MD5:
Not available
[/mw_shl_code]
24:
[mw_shl_code=css,true]Filename: peter mattiske ausgleich - stellvertretender rechtsanwalt directpay gmbh.com
Threat name: Trojan.Gen.2Full Path: c:\documents and settings\administrator\桌面\peter mattiske ausgleich - stellvertretender rechtsanwalt directpay gmbh.com

____________________________

____________________________


On computers as of 
2015-8-31 at 10:09:33

Last Used 
2015-8-31 at 10:11:33

Startup Item 
No

Launched 
No

Threat type: Virus. Programs that infect other programs, files, or areas of a computer by inserting themselves or attaching themselves to that medium.


____________________________


peter mattiske ausgleich - stellvertretender rechtsanwalt directpay gmbh.com Threat name: Trojan.Gen.2
Locate


Very Few Users
Fewer than 5 users in the Norton Community have used this file.

Very New
This file was released less than 1 week  ago.

High
This file risk is high.


____________________________


Source: External Media

Source File:
peter mattiske ausgleich - stellvertretender rechtsanwalt directpay gmbh.com

____________________________

File Actions

File: c:\documents and settings\administrator\桌面\ peter mattiske ausgleich - stellvertretender rechtsanwalt directpay gmbh.com Removed
____________________________


File Thumbprint - SHA:
80f2001207bacb976865b4e49e2bc3f026e201f5c568f5a33f7757e94c022ccb
File Thumbprint - MD5:
Not available
[/mw_shl_code]
15:
[mw_shl_code=css,true]Filename: w10privacy.exe
Threat name: WS.Reputation.1Full Path: c:\documents and settings\administrator\桌面\2015.8.31\w10privacy.exe

____________________________

____________________________


On computers as of 
2015-8-31 at 10:11:16

Last Used 
2015-8-31 at 10:13:16

Startup Item 
No

Launched 
No

Threat type: Insight Network Threat. There are many indications that this file is untrustworthy and therefore not safe


____________________________


w10privacy.exe Threat name: WS.Reputation.1
Locate


Very Few Users
Fewer than 5 users in the Norton Community have used this file.

Very New
This file was released less than 1 week  ago.

Medium
This file risk is medium.


____________________________


Source: External Media

Source File:
w10privacy.exe

____________________________

File Actions

File: c:\documents and settings\administrator\桌面\2015.8.31\ w10privacy.exe Removed
____________________________


File Thumbprint - SHA:
cfc267b4a8ea92f39793a2eb7f8413d181aaa17bbf2ce95f182a7342a122f8f0
File Thumbprint - MD5:
Not available
[/mw_shl_code]
19:
[mw_shl_code=css,true]Filename: adobe.snr.patch-painter.exe
Threat name: Trojan.Gen.2Full Path: c:\documents and settings\administrator\桌面\2015.8.31\adobe.snr.patch-painter.exe

____________________________

____________________________


On computers as of 
2015-8-31 at 10:10:15

Last Used 
2015-8-31 at 10:10:15

Startup Item 
No

Launched 
No

Threat type: Virus. Programs that infect other programs, files, or areas of a computer by inserting themselves or attaching themselves to that medium.


____________________________


adobe.snr.patch-painter.exe Threat name: Trojan.Gen.2
Locate


Many Users
Thousands of users in the Norton Community have used this file.

Mature
This file was released 2 months ago.

High
This file risk is high.


____________________________


Source: External Media


____________________________

File Actions

File: c:\documents and settings\administrator\桌面\2015.8.31\ adobe.snr.patch-painter.exe Blocked
____________________________


File Thumbprint - SHA:
Not available
File Thumbprint - MD5:
Not available
[/mw_shl_code]

ESET kill 36 files and fix 1 file
[mw_shl_code=css,true]掃描防護記錄
病毒資料庫的版本: 12175 (20150830)
日期: 2015-8-31  時間: 10:43:19
已掃描的磁碟、資料夾及檔案: C:\Documents and Settings\Administrator\桌面\2015.8.31
C:\Documents and Settings\Administrator\桌面\2015.8.31\01.vir - Generik.FCAKTCD 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\02.vir - Win32/Battdil.AJ 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\03.vir - MSIL/Injector.LRB 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\04.vir - Win32/Dridex.P 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\05.vir - Win32/Kryptik.DUTG 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\07.vir > ZIP > A1-2015-21-08.exe - Win32/Injector.CHFP 木馬 的一個變種 - 已刪除 - 已隔離
C:\Documents and Settings\Administrator\桌面\2015.8.31\09.vir > ZIP > Invoice.scr - Win32/TrojanDownloader.Waski.Z 木馬 - 已刪除 - 已隔離
C:\Documents and Settings\Administrator\桌面\2015.8.31\10.vir - Win32/Spatet.A 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\12.vir - MSIL/Injector.LKR 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\13.vir - Win32/Exploit.Agent.NCY 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\14.vir - VBA/TrojanDownloader.Agent.AAV 木馬 - 已清除 - 已隔離
C:\Documents and Settings\Administrator\桌面\2015.8.31\16.vir - PDF/TrojanDropper.Agent.B 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\17.vir - MSIL/Kryptik.DLV 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\20.vir - Win32/Injector.CHSC 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\21.vir - Win32/Injector.TLN 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\22.vir - Win32/CrisisHT.B 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\24.vir > ZIP > Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip > ZIP > Peter Mattiske Ausgleich - Stellvertretender Rechtsanwalt DirectPay GmbH.com - Win32/Kryptik.DVAR 木馬 的一個變種 - 已刪除 - 已隔離
C:\Documents and Settings\Administrator\桌面\2015.8.31\26.vir - Win32/Poxters.C 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\27.vir - MSIL/Injector.LQP 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\29.vir > ZIP > CkfxBrLd_jRquh_08kQrm8T_653.class - Java/TrojanDropper.Agent.AZ 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\30.vir - MSIL/Injector.LQP 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\31.vir > RAR > Call of DDoS\Call of DDoS.exe - Win32/TrojanDropper.Binder.NBH 木馬 - 掃描完成後再選擇處理方式
C:\Documents and Settings\Administrator\桌面\2015.8.31\33.vir - Win32/TrojanDownloader.Agent.BJJ 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\34.vir > AUTOIT > script.bin - 正常
C:\Documents and Settings\Administrator\桌面\2015.8.31\35.vir - Win32/Kryptik.DVBJ 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\36.vir - VBS/Kryptik.DV 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\37.vir - MSIL/Injector.CXC 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\38.vir - Generik.FESIBJQ 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\39.vir > RAR - 錯誤 - 檔案受密碼保護
C:\Documents and Settings\Administrator\桌面\2015.8.31\40.vir - MSIL/Spy.Agent.ADR 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\41.vir - MSIL/Kryptik.AAK 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\42.vir > ZIP > b.class - Java/Jacksbot.F 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\42.vir > ZIP > c.class - Java/Jacksbot.F 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\42.vir > ZIP > d.class - Java/Jacksbot.F 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\43.vir > ZIP > classes.dex - Android/Agent.BG 木馬 的一個變種 - 掃描完成後再選擇處理方式
C:\Documents and Settings\Administrator\桌面\2015.8.31\45.vir - Win32/TrojanDownloader.Zurgop.BK 木馬 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\46.vir - MSIL/Injector.LOW 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\47.vir - MSIL/Kryptik.DFE 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\48.vir - Win32/Spy.KeyLogger.NSM 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\49.vir - Generik.IWZHQPD 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\50.vir - MSIL/Injector.LQZ 木馬 的一個變種 - 已利用刪除的方式清除 - 已隔離 [1]
C:\Documents and Settings\Administrator\桌面\2015.8.31\31.vir > RAR > Call of DDoS\Call of DDoS.exe - Win32/TrojanDropper.Binder.NBH 木馬 - 已刪除 - 已隔離
C:\Documents and Settings\Administrator\桌面\2015.8.31\43.vir > ZIP > classes.dex - Android/Agent.BG 木馬 的一個變種 - 已刪除 - 已隔離
已掃描的檔案數目: 149
已發現的威脅數目: 39
已清除檔案數: 39
完成時間: 10:43:51  掃描時間總計: 32 秒 (00:00:32)

注意:
[1] 已刪除病毒檔案。[/mw_shl_code]
另:信誉表示39良好
steven_lzs
发表于 2015-8-31 09:52:33 | 显示全部楼层
本帖最后由 steven_lzs 于 2015-8-31 09:56 编辑

EAV杀37

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
MXCERILYF!
发表于 2015-8-31 09:54:51 | 显示全部楼层
360TS(只开启自主引擎)
文件后缀为vir时:杀34个

文件后缀为zip时:补杀3个

文件后缀为exe时:补杀1个

无后缀时:补杀1个

实际共查杀39个,剩余:11个

Bitdefender Total Security 2015补杀8个(实际为6个)

排除一个修复的,最终剩余:5

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
cxy密斯
发表于 2015-8-31 09:58:40 | 显示全部楼层
[mw_shl_code=css,true]
Dr.Web Scanner SE for Windows v9.1.3.08170
Platform: Windows 10 Professional x64/WOW (Build 10240)
Scanning Engine version: 10.0.8.8100
Virus Finding Engine version: 7.0.14.8060
-----------------------------------------------------------------------------
Start scanning
-----------------------------------------------------------------------------
Object(s) to scan:
- C:\Users\Shiloh\Desktop\2015.8.31

C:\Users\Shiloh\Desktop\2015.8.31\01.vir:Zone.Identifier - Ok - 9ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\02.vir:Zone.Identifier - Ok - 6ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\03.vir - infected with Trojan.Siggen6.47749
C:\Users\Shiloh\Desktop\2015.8.31\03.vir - infected - 346ms, 562176 bytes
C:\Users\Shiloh\Desktop\2015.8.31\03.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\01.vir is NSIS container
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\script.bin - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\_g8LfKPP9ncbeBXsM6 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\Lavonne - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\blt_plus.gif - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\broccoli.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir\_殌\System.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\01.vir - container - 552ms, 598987 bytes
C:\Users\Shiloh\Desktop\2015.8.31\04.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\04.vir - infected with Trojan.Dridex.179
C:\Users\Shiloh\Desktop\2015.8.31\04.vir - infected - 337ms, 227840 bytes
C:\Users\Shiloh\Desktop\2015.8.31\05.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\06.vir - is hacktool program Tool.Linux.Scanner.1
C:\Users\Shiloh\Desktop\2015.8.31\06.vir - infected - 7ms, 596756 bytes
C:\Users\Shiloh\Desktop\2015.8.31\06.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\07.vir is ZIP archive
C:\Users\Shiloh\Desktop\2015.8.31\07.vir\A1-2015-21-08.exe - infected with Trojan.Inject1.55577
C:\Users\Shiloh\Desktop\2015.8.31\07.vir\A1-2015-21-08.exe - infected
C:\Users\Shiloh\Desktop\2015.8.31\07.vir - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\07.vir - infected archive - 22ms, 111802 bytes
C:\Users\Shiloh\Desktop\2015.8.31\07.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\05.vir - infected with Trojan.Upatre.7448
C:\Users\Shiloh\Desktop\2015.8.31\05.vir - infected - 289ms, 53760 bytes
C:\Users\Shiloh\Desktop\2015.8.31\08.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\09.vir is ZIP archive
C:\Users\Shiloh\Desktop\2015.8.31\09.vir\Invoice.scr - infected with Trojan.Upatre.7434
C:\Users\Shiloh\Desktop\2015.8.31\09.vir\Invoice.scr - infected
C:\Users\Shiloh\Desktop\2015.8.31\09.vir - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\09.vir - infected archive - 8ms, 13609 bytes
C:\Users\Shiloh\Desktop\2015.8.31\09.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\02.vir - infected with Trojan.Dyre.553
C:\Users\Shiloh\Desktop\2015.8.31\02.vir - infected - 1096ms, 604160 bytes
C:\Users\Shiloh\Desktop\2015.8.31\10.vir:Zone.Identifier - Ok - 6ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\08.vir - Ok - 423ms, 875520 bytes
C:\Users\Shiloh\Desktop\2015.8.31\11.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\10.vir - infected with BackDoor.Cybergate.1
C:\Users\Shiloh\Desktop\2015.8.31\10.vir - infected - 443ms, 279552 bytes
C:\Users\Shiloh\Desktop\2015.8.31\12.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\13.vir is RTF container
C:\Users\Shiloh\Desktop\2015.8.31\13.vir\OLEstream-1 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\13.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\13.vir - container - 42ms, 1021114 bytes
C:\Users\Shiloh\Desktop\2015.8.31\13.vir:Zone.Identifier - Ok - 3ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\14.vir - infected with W97M.DownLoader.586
C:\Users\Shiloh\Desktop\2015.8.31\14.vir - infected - 6ms, 89088 bytes
C:\Users\Shiloh\Desktop\2015.8.31\14.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\15.vir is ZIP archive
>C:\Users\Shiloh\Desktop\2015.8.31\12.vir is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\12.vir\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\12.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\12.vir\data003 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\12.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\12.vir - container - 384ms, 1188864 bytes
C:\Users\Shiloh\Desktop\2015.8.31\15.vir:Zone.Identifier - Ok - 6ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\16.vir is PDF container
>>C:\Users\Shiloh\Desktop\2015.8.31\16.vir\JavaString[00000001][00000051] is JS-HTML container
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\JavaString[00000001][00000051]\JSTAG_1[20][53] - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\JavaString[00000001][00000051] - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe - packed by UPX
>>C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B] is OPEN XML container
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\[Content_Types].xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\_rels\.rels - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\_rels\document.xml.rels - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\document.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\vbaProject.bin - infected with W97M.DownLoader.552
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\vbaProject.bin - infected
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\_rels\vbaProject.bin.rels - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\theme\theme1.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\vbaData.xml - Ok
>C:\Users\Shiloh\Desktop\2015.8.31\11.vir is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\settings.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\11.vir\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\docProps\app.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\styles.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\docProps\core.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\fontTable.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B]\word\webSettings.xml - Ok
C:\Users\Shiloh\Desktop\2015.8.31\16.vir\EmbeddedStream[00000001][0000008B] - infected container
C:\Users\Shiloh\Desktop\2015.8.31\16.vir - infected container
C:\Users\Shiloh\Desktop\2015.8.31\16.vir - infected container - 145ms, 42605 bytes
C:\Users\Shiloh\Desktop\2015.8.31\16.vir:Zone.Identifier - Ok - 6ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\11.vir\data002 is ZLIB container
C:\Users\Shiloh\Desktop\2015.8.31\11.vir\data002\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\11.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\11.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\11.vir - container - 715ms, 1325568 bytes
C:\Users\Shiloh\Desktop\2015.8.31\17.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>>>C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe is AUTOIT container
C:\Users\Shiloh\Desktop\2015.8.31\18.vir - Ok - 572ms, 1230848 bytes
C:\Users\Shiloh\Desktop\2015.8.31\18.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\19.vir is 7-ZIP archive
C:\Users\Shiloh\Desktop\2015.8.31\19.vir\Visit original article link for more resources.url - Ok
>>>>C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Users\bsc\AppData\Local\AutoIt v3\Aut2Exe\aut462E.tmp.tok - packed by ASCRIPT
>>C:\Users\Shiloh\Desktop\2015.8.31\19.vir\adobe.snr.patch-painter.exe - packed by UPX
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Users\bsc\AppData\Local\AutoIt v3\Aut2Exe\aut462E.tmp.tok - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\W10Privacy\Languages.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\W10Privacy\W10Privacy_HOSTS.txt - Ok
C:\Users\Shiloh\Desktop\2015.8.31\19.vir\adobe.snr.patch-painter.exe - infected with Trojan.KillProc.34763
C:\Users\Shiloh\Desktop\2015.8.31\19.vir\adobe.snr.patch-painter.exe - infected
C:\Users\Shiloh\Desktop\2015.8.31\19.vir - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\Icons\Leeres_Icon.ico - Ok
C:\Users\Shiloh\Desktop\2015.8.31\19.vir - infected archive - 387ms, 605689 bytes
C:\Users\Shiloh\Desktop\2015.8.31\17.vir - infected with Trojan.PWS.Steam.2912
C:\Users\Shiloh\Desktop\2015.8.31\17.vir - infected - 1069ms, 790528 bytes
C:\Users\Shiloh\Desktop\2015.8.31\19.vir:Zone.Identifier - Ok - 6ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\20.vir:Zone.Identifier - Ok - 7ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\tools\Anheften.vbs - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\W10Privacy\Tools\Internet Explorer_X64.lnk - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe\Systemsoftware\MyApps\AutoIT_v3\BSC-Scripte\W10Privacy\Tools\Internet Explorer_X86.lnk - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir\W10Privacy.exe - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\15.vir - archive - 1535ms, 639227 bytes
C:\Users\Shiloh\Desktop\2015.8.31\21.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\20.vir - infected with Trojan.PWS.Siggen1.40960
C:\Users\Shiloh\Desktop\2015.8.31\20.vir - infected - 308ms, 98554 bytes
C:\Users\Shiloh\Desktop\2015.8.31\22.vir:Zone.Identifier - Ok - 9ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\22.vir - infected with BackDoor.DaVinci.29
C:\Users\Shiloh\Desktop\2015.8.31\22.vir - infected - 332ms, 1064448 bytes
C:\Users\Shiloh\Desktop\2015.8.31\23.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\24.vir is ZIP archive
>>C:\Users\Shiloh\Desktop\2015.8.31\24.vir\Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip is ZIP archive
>C:\Users\Shiloh\Desktop\2015.8.31\21.vir - packed by UPX
C:\Users\Shiloh\Desktop\2015.8.31\24.vir\Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip\Peter Mattiske Ausgleich - Stellvertretender Rechtsanwalt DirectPay GmbH.com - infected with Trojan.DownLoader16.469
C:\Users\Shiloh\Desktop\2015.8.31\24.vir\Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip\Peter Mattiske Ausgleich - Stellvertretender Rechtsanwalt DirectPay GmbH.com - infected
C:\Users\Shiloh\Desktop\2015.8.31\24.vir\Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\24.vir - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\24.vir - infected archive - 32ms, 68066 bytes
C:\Users\Shiloh\Desktop\2015.8.31\24.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\21.vir - Ok - 730ms, 621675 bytes
C:\Users\Shiloh\Desktop\2015.8.31\25.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\23.vir is 7-ZIP archive
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\settings\SplashScreen.jpg - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\VirtualBox.ico - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\LiesMich.txt - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\ReadMe.txt - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\catalan.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\chinese.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\english.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\french.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\german.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\italian.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\japanese.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\polish.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\portuguese.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\russian.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\settings\settings.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\spanish.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\language\ukrainian.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\settings\vboxinstall.ini - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\ColorConstants.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\Constants.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\DirConstants.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\FileConstants.au3 - Ok
>C:\Users\Shiloh\Desktop\2015.8.31\25.vir - packed by UPX
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\FrameConstants.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\GUIConstantsEx.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\IE.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\Portable-VirtualBox.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\ProcessConstants.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\String.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\UpDate.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\source\WinAPIError.au3 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\26.vir - infected with Trojan.Packed.21724
C:\Users\Shiloh\Desktop\2015.8.31\26.vir - infected - 307ms, 73728 bytes
C:\Users\Shiloh\Desktop\2015.8.31\26.vir:Zone.Identifier - Ok - 6ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\25.vir - infected with DDoS.Ender.3
C:\Users\Shiloh\Desktop\2015.8.31\25.vir - infected - 641ms, 142848 bytes
C:\Users\Shiloh\Desktop\2015.8.31\27.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\7z.exe - packed by UPX
C:\Users\Shiloh\Desktop\2015.8.31\27.vir - infected with Trojan.KeyLogger.23529
C:\Users\Shiloh\Desktop\2015.8.31\27.vir - infected - 315ms, 692224 bytes
C:\Users\Shiloh\Desktop\2015.8.31\28.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\29.vir is JAR container
C:\Users\Shiloh\Desktop\2015.8.31\29.vir\META-INF\MANIFEST.MF - Ok
C:\Users\Shiloh\Desktop\2015.8.31\29.vir\data - Ok
C:\Users\Shiloh\Desktop\2015.8.31\29.vir\CkfxBrLd_jRquh_08kQrm8T_653.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\29.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\29.vir - container - 31ms, 91351 bytes
C:\Users\Shiloh\Desktop\2015.8.31\29.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\7z.exe - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\devcon_x64.exe - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\devcon_x86.exe - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe - packed by MPRESS
>>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe\data003 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\30.vir - infected with Trojan.PWS.Steam.5605
C:\Users\Shiloh\Desktop\2015.8.31\30.vir - infected - 351ms, 1089536 bytes
C:\Users\Shiloh\Desktop\2015.8.31\30.vir:Zone.Identifier - Ok - 6ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe\data004 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\mpress.exe - Ok
>C:\Users\Shiloh\Desktop\2015.8.31\31.vir is RAR archive
C:\Users\Shiloh\Desktop\2015.8.31\31.vir\Call of DDoS\Call of DDoS.exe - infected with Trojan.MulDrop2.39589
C:\Users\Shiloh\Desktop\2015.8.31\31.vir\Call of DDoS\Call of DDoS.exe - infected
C:\Users\Shiloh\Desktop\2015.8.31\31.vir\Call of DDoS\JRPC.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\31.vir\Call of DDoS\XDevkit.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\31.vir - infected archive
C:\Users\Shiloh\Desktop\2015.8.31\31.vir - infected archive - 93ms, 749167 bytes
C:\Users\Shiloh\Desktop\2015.8.31\31.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\32.vir is JAR container
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\META-INF\MANIFEST.MF - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\b.txt - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\a.txt - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\a\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\b\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\c\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\c\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAk.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\d\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\d\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAk.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\Main.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAw.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir\ASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAk.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\32.vir - container - 93ms, 96581 bytes
C:\Users\Shiloh\Desktop\2015.8.31\32.vir:Zone.Identifier - Ok - 6ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\Portable-VirtualBox.exe is AUTOIT container
>>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\Portable-VirtualBox.exe\Users\Runarb\AppData\Local\AutoIt v3\Aut2Exe\aut185B.tmp.tok - packed by ASCRIPT
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\Portable-VirtualBox.exe\Users\Runarb\AppData\Local\AutoIt v3\Aut2Exe\aut185B.tmp.tok - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\Portable-VirtualBox.exe - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\snetcfg_x64.exe - Ok
>C:\Users\Shiloh\Desktop\2015.8.31\28.vir is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\snetcfg_x86.exe - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\28.vir\data001 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\28.vir\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\28.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\28.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\28.vir - container - 1102ms, 326656 bytes
C:\Users\Shiloh\Desktop\2015.8.31\33.vir:Zone.Identifier - Ok - 7ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\33.vir - infected with Trojan.DownLoader15.59920
C:\Users\Shiloh\Desktop\2015.8.31\33.vir - infected - 280ms, 8205 bytes
C:\Users\Shiloh\Desktop\2015.8.31\34.vir:Zone.Identifier - Ok - 6ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\upx.exe - packed by UPX
C:\Users\Shiloh\Desktop\2015.8.31\35.vir - infected with Trojan.Siggen.65341
C:\Users\Shiloh\Desktop\2015.8.31\35.vir - infected - 339ms, 265216 bytes
C:\Users\Shiloh\Desktop\2015.8.31\35.vir:Zone.Identifier - Ok - 7ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\upx.exe - Ok
C:\Users\Shiloh\Desktop\2015.8.31\36.vir - probably infected with SCRIPT.Virus
C:\Users\Shiloh\Desktop\2015.8.31\36.vir - infected - 152ms, 99563 bytes
C:\Users\Shiloh\Desktop\2015.8.31\36.vir:Zone.Identifier - Ok - 6ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\7z.dll - packed by UPX
>C:\Users\Shiloh\Desktop\2015.8.31\34.vir is AUTOIT container
>>C:\Users\Shiloh\Desktop\2015.8.31\34.vir\Users\ethan the cum squirt\AppData\Local\AutoIt v3\Aut2Exe\aut2644.tmp.tok - packed by ASCRIPT
C:\Users\Shiloh\Desktop\2015.8.31\34.vir\Users\ethan the cum squirt\AppData\Local\AutoIt v3\Aut2Exe\aut2644.tmp.tok - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir\Portable-VirtualBox\data\tools\7z.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\23.vir - archive - 2710ms, 1558177 bytes
C:\Users\Shiloh\Desktop\2015.8.31\37.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\37.vir - infected with Trojan.KeyLogger.23529
C:\Users\Shiloh\Desktop\2015.8.31\37.vir - infected - 366ms, 667136 bytes
C:\Users\Shiloh\Desktop\2015.8.31\38.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\34.vir\Users\ethan the cum squirt\AppData\Local\Temp\RazorCrypt\q2Y4AsDKMT - Ok
C:\Users\Shiloh\Desktop\2015.8.31\34.vir\Users\ethan the cum squirt\AppData\Local\Temp\RazorCrypt\pFBp0U8Ebk - Ok
C:\Users\Shiloh\Desktop\2015.8.31\34.vir\Users\ethan the cum squirt\AppData\Local\Temp\RazorCrypt\qMzStTqKTr - Ok
C:\Users\Shiloh\Desktop\2015.8.31\34.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\34.vir - container - 1187ms, 1263616 bytes
C:\Users\Shiloh\Desktop\2015.8.31\39.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\38.vir is NSIS container
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\script.bin - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\_g8LfKPP9ncbeBXsM6 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\Lydia - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\rules_90231135.js - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\mod_csgo.png - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\38.vir\tag(1) is JS-HTML container
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\tag(1)\JSFile_1[0][12f7] - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\tag(1) - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\default(5).jpg - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\Manchuria.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir\_殌\System.dll - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\38.vir - container - 572ms, 604105 bytes
C:\Users\Shiloh\Desktop\2015.8.31\40.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\39.vir is RAR archive
C:\Users\Shiloh\Desktop\2015.8.31\39.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\39.vir - ignored, unpack error - 583ms, 1749540 bytes
C:\Users\Shiloh\Desktop\2015.8.31\41.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\42.vir is JAR container
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\META-INF\MANIFEST.MF - Ok
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\b.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\c.class - Ok
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\d.class - infected with Java.Jacksbot.3
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\d.class - infected
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\enc.dat - Ok
C:\Users\Shiloh\Desktop\2015.8.31\42.vir\key.dat - Ok
C:\Users\Shiloh\Desktop\2015.8.31\42.vir - infected container
C:\Users\Shiloh\Desktop\2015.8.31\42.vir - infected container - 53ms, 183331 bytes
C:\Users\Shiloh\Desktop\2015.8.31\42.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\43.vir is ZIP archive
>C:\Users\Shiloh\Desktop\2015.8.31\40.vir is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\classes.dex - Ok
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\AndroidManifest.xml - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data003 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data003 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\resources.arsc - Ok
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data004 - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data005 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data005 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\META-INF\MANIFEST.MF - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\META-INF\SIGNFILE.SF - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir\META-INF\SIGNFILE.RSA - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\43.vir - archive - 50ms, 7896 bytes
C:\Users\Shiloh\Desktop\2015.8.31\43.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data006 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data006 - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data007 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\40.vir\data007 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\40.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\40.vir - container - 428ms, 656384 bytes
C:\Users\Shiloh\Desktop\2015.8.31\44.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\41.vir - infected with Trojan.DownLoader15.60567
C:\Users\Shiloh\Desktop\2015.8.31\41.vir - infected - 313ms, 306176 bytes
C:\Users\Shiloh\Desktop\2015.8.31\45.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\44.vir - packed by SHAOLIN
C:\Users\Shiloh\Desktop\2015.8.31\45.vir - infected with Trojan.DownLoader11.32458
C:\Users\Shiloh\Desktop\2015.8.31\45.vir - infected - 333ms, 201728 bytes
C:\Users\Shiloh\Desktop\2015.8.31\46.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>>C:\Users\Shiloh\Desktop\2015.8.31\44.vir - packed by UPX
>C:\Users\Shiloh\Desktop\2015.8.31\46.vir is BINARYRES container
>>C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data001 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data001\EGEmzSO - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data001 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data003 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data004 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data005 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data006 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data007 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data008 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data009 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data010 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data011 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir\data012 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\46.vir - container - 468ms, 399872 bytes
C:\Users\Shiloh\Desktop\2015.8.31\47.vir:Zone.Identifier - Ok - 5ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\47.vir - infected with Trojan.DownLoader15.43774
C:\Users\Shiloh\Desktop\2015.8.31\47.vir - infected - 287ms, 225280 bytes
C:\Users\Shiloh\Desktop\2015.8.31\48.vir:Zone.Identifier - Ok - 5ms, 26 bytes
>>>C:\Users\Shiloh\Desktop\2015.8.31\44.vir - packed by BINARYRES
C:\Users\Shiloh\Desktop\2015.8.31\44.vir - Ok - 816ms, 485888 bytes
C:\Users\Shiloh\Desktop\2015.8.31\49.vir:Zone.Identifier - Ok - 4ms, 26 bytes
C:\Users\Shiloh\Desktop\2015.8.31\48.vir - infected with Trojan.DownLoader5.18733
C:\Users\Shiloh\Desktop\2015.8.31\48.vir - infected - 295ms, 139776 bytes
C:\Users\Shiloh\Desktop\2015.8.31\50.vir:Zone.Identifier - Ok - 4ms, 26 bytes
>C:\Users\Shiloh\Desktop\2015.8.31\49.vir is BINARYRES container
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data001 - Ok
>>C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data002 is NET container
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data002 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data003 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data004 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data005 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data006 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir\data007 - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir - Ok
C:\Users\Shiloh\Desktop\2015.8.31\49.vir - container - 433ms, 414720 bytes
C:\Users\Shiloh\Desktop\2015.8.31\50.vir - infected with Trojan.PWS.Steam.5707
C:\Users\Shiloh\Desktop\2015.8.31\50.vir - infected - 1066ms, 904704 bytes

Total 26115140 bytes in 100 files scanned (261 objects, 5 containers)
Total 70 files (222 objects) are clean
Total 29 files are infected
Total 1 file are suspicious
Total 1 file is raised error condition
Scan time is 00:00:08.529
-----------------------------------------------------------------------------
Start curing
-----------------------------------------------------------------------------
C:\Users\Shiloh\Desktop\2015.8.31\03.vir - quarantined - 1021 ms
C:\Users\Shiloh\Desktop\2015.8.31\04.vir - quarantined - 75 ms
C:\Users\Shiloh\Desktop\2015.8.31\06.vir - quarantined - 39 ms
C:\Users\Shiloh\Desktop\2015.8.31\07.vir - quarantined - 27 ms
C:\Users\Shiloh\Desktop\2015.8.31\05.vir - quarantined - 47 ms
C:\Users\Shiloh\Desktop\2015.8.31\09.vir - quarantined - 24 ms
C:\Users\Shiloh\Desktop\2015.8.31\02.vir - quarantined - 67 ms
C:\Users\Shiloh\Desktop\2015.8.31\10.vir - quarantined - 182 ms
C:\Users\Shiloh\Desktop\2015.8.31\14.vir - cured - 19 ms
C:\Users\Shiloh\Desktop\2015.8.31\16.vir - quarantined - 26 ms
C:\Users\Shiloh\Desktop\2015.8.31\19.vir - quarantined - 39 ms
C:\Users\Shiloh\Desktop\2015.8.31\17.vir - quarantined - 73 ms
C:\Users\Shiloh\Desktop\2015.8.31\20.vir - quarantined - 39 ms
C:\Users\Shiloh\Desktop\2015.8.31\22.vir - quarantined - 88 ms
C:\Users\Shiloh\Desktop\2015.8.31\24.vir - quarantined - 27 ms
C:\Users\Shiloh\Desktop\2015.8.31\26.vir - quarantined - 52 ms
C:\Users\Shiloh\Desktop\2015.8.31\25.vir - quarantined - 305 ms
C:\Users\Shiloh\Desktop\2015.8.31\27.vir - quarantined - 65 ms
C:\Users\Shiloh\Desktop\2015.8.31\30.vir - quarantined - 88 ms
C:\Users\Shiloh\Desktop\2015.8.31\31.vir - quarantined - 43 ms
C:\Users\Shiloh\Desktop\2015.8.31\33.vir - quarantined - 36 ms
C:\Users\Shiloh\Desktop\2015.8.31\35.vir - quarantined - 70 ms
C:\Users\Shiloh\Desktop\2015.8.31\36.vir - quarantined - 27 ms
C:\Users\Shiloh\Desktop\2015.8.31\37.vir - quarantined - 107 ms
C:\Users\Shiloh\Desktop\2015.8.31\42.vir - quarantined - 30 ms
C:\Users\Shiloh\Desktop\2015.8.31\41.vir - quarantined - 74 ms
C:\Users\Shiloh\Desktop\2015.8.31\45.vir - quarantined - 52 ms
C:\Users\Shiloh\Desktop\2015.8.31\47.vir - quarantined - 44 ms
C:\Users\Shiloh\Desktop\2015.8.31\48.vir - quarantined - 51 ms
C:\Users\Shiloh\Desktop\2015.8.31\50.vir - quarantined - 73 ms

Total 26115140 bytes in 100 files scanned (261 objects, 5 containers)
Total 70 files (222 objects) are clean
Total 29 files are infected
Total 1 file are suspicious
Total 30 files are neutralized
Total 1 file is raised error condition
Scan time is 00:00:08.529[/mw_shl_code]
ericdj
发表于 2015-8-31 09:59:04 | 显示全部楼层
本帖最后由 ericdj 于 2015-8-31 10:08 编辑

BD

剩余19个,其中修复6个(miss13个)




日志
[mw_shl_code=css,true]C:\Users\eric_dj\Desktop\virus\2015.8.31\14.vir        Trojan.Doc.Downloader.EP
C:\Users\eric_dj\Desktop\virus\2015.8.31\50.vir        Gen:Variant.Zusy.159069
C:\Users\eric_dj\Desktop\virus\2015.8.31\49.vir        Gen:Variant.Kazy.719712
C:\Users\eric_dj\Desktop\virus\2015.8.31\41.vir        Gen:Variant.Barys.2440
C:\Users\eric_dj\Desktop\virus\2015.8.31\05.vir        Trojan.GenericKD.2681209
C:\Users\eric_dj\Desktop\virus\2015.8.31\29.vir        Trojan.Agent.BMCE
C:\Users\eric_dj\Desktop\virus\2015.8.31\47.vir        Trojan.GenericKD.2679653
C:\Users\eric_dj\Desktop\virus\2015.8.31\48.vir        Trojan.Generic.7602331
C:\Users\eric_dj\Desktop\virus\2015.8.31\27.vir        Trojan.GenericKD.2688028
C:\Users\eric_dj\Desktop\virus\2015.8.31\42.vir=>d.class        Backdoor.Java.KBY
C:\Users\eric_dj\Desktop\virus\2015.8.31\45.vir        Trojan.GenericKD.2097322
C:\Users\eric_dj\Desktop\virus\2015.8.31\46.vir        Gen:Variant.Barys.20285
C:\Users\eric_dj\Desktop\virus\2015.8.31\08.vir        Adware.Toolbar.N
C:\Users\eric_dj\Desktop\virus\2015.8.31\26.vir        Dropped:Generic.Malware.SYdg.AA66B46B
C:\Users\eric_dj\Desktop\virus\2015.8.31\42.vir=>c.class        Backdoor.Java.KBY
C:\Users\eric_dj\Desktop\virus\2015.8.31\44.vir        Trojan.Generic.14534943
C:\Users\eric_dj\Desktop\virus\2015.8.31\16.vir        Trojan.Doc.Agent.J
C:\Users\eric_dj\Desktop\virus\2015.8.31\43.vir=>META-INF/SIGNFILE.RSA        Android.Riskware.Metasploit.A
C:\Users\eric_dj\Desktop\virus\2015.8.31\09.vir=>Invoice.scr        Trojan.GenericKD.2678795
C:\Users\eric_dj\Desktop\virus\2015.8.31\42.vir=>b.class        Backdoor.Java.KBY
C:\Users\eric_dj\Desktop\virus\2015.8.31\37.vir        Trojan.GenericKD.2431295
C:\Users\eric_dj\Desktop\virus\2015.8.31\38.vir        Trojan.GenericKD.2687683
C:\Users\eric_dj\Desktop\virus\2015.8.31\33.vir        Gen:Variant.Zusy.146404
C:\Users\eric_dj\Desktop\virus\2015.8.31\31.vir=>Call of DDoS\Call of DDoS.exe        MemScan:Trojan.Inject.AUZ
C:\Users\eric_dj\Desktop\virus\2015.8.31\30.vir        Trojan.GenericKD.2685955
C:\Users\eric_dj\Desktop\virus\2015.8.31\12.vir        Trojan.GenericKD.2648532
C:\Users\eric_dj\Desktop\virus\2015.8.31\24.vir=>Ausgleich an Peter Mattiske  - Stellvertretender Rechtsanwalt DirectPay GmbH 27.08.2015.zip=>Peter Mattiske Ausgleich - Stellvertretender Rechtsanwalt DirectPay GmbH.com        Trojan.GenericKD.2686056
C:\Users\eric_dj\Desktop\virus\2015.8.31\21.vir        Gen:Trojan.Heur.LmTfraiI@0hO
C:\Users\eric_dj\Desktop\virus\2015.8.31\02.vir        Trojan.GenericKD.2679901
C:\Users\eric_dj\Desktop\virus\2015.8.31\20.vir        Gen:Variant.Symmi.55802
C:\Users\eric_dj\Desktop\virus\2015.8.31\04.vir        Trojan.GenericKD.2675840
C:\Users\eric_dj\Desktop\virus\2015.8.31\22.vir        Gen:Variant.Kazy.675927
C:\Users\eric_dj\Desktop\virus\2015.8.31\10.vir        Generic.Rebhip.DD50C149
C:\Users\eric_dj\Desktop\virus\2015.8.31\11.vir        Trojan.GenericKD.2317205
C:\Users\eric_dj\Desktop\virus\2015.8.31\07.vir=>A1-2015-21-08.exe        Gen:Variant.Retefe.4
[/mw_shl_code]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
諾言敵不過時間
发表于 2015-8-31 09:59:29 | 显示全部楼层
本帖最后由 諾言敵不過時間 于 2015-8-31 10:13 编辑

[mw_shl_code=css,true]開始消毒:
C:\Users\Ari\Desktop\2015.8.31\50.vir
  [偵測]        是 TR/Dropper.MSIL.192669 特洛伊木馬程式
  [注意]        檔案會移動至 '50011603.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\49.vir
  [偵測]        是 TR/Agent.414720.63 特洛伊木馬程式
  [注意]        檔案會移動至 '489639ad.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\48.vir
  [偵測]        是 TR/Agent.139776.95 特洛伊木馬程式
  [注意]        檔案會移動至 '1ac96344.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\47.vir
  [偵測]        是 TR/Dropper.MSIL.190894 特洛伊木馬程式
  [注意]        檔案會移動至 '7cfe2c81.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\46.vir
  [偵測]        是 TR/Dropper.MSIL.192319 特洛伊木馬程式
  [注意]        檔案會移動至 '397a01be.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\45.vir
  [偵測]        是 TR/Crypt.ZPACK.117752 特洛伊木馬程式
  [注意]        檔案會移動至 '466133dc.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\44.vir
  [偵測]        包含 DR/Delphi.Gen 病毒植入程式的辨識模式
  [注意]        檔案會移動至 '0ad91f97.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\43.vir
  [偵測]        包含 ANDROID/Agent.EIF.Gen 病毒碼
  [注意]        檔案會移動至 '76c15fc8.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\41.vir
  [偵測]        是 TR/Dropper.MSIL.Gen8 特洛伊木馬程式
  [注意]        檔案會移動至 '5b9b7087.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\38.vir
  [偵測]        是 TR/Injector.604105 特洛伊木馬程式
  [注意]        檔案會移動至 '42f34b14.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\37.vir
  [偵測]        是 TR/ATRAPS.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '2eaf6723.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\35.vir
  [偵測]        是 TR/Crypt.Xpack.27406 特洛伊木馬程式
  [注意]        檔案會移動至 '5f165eb4.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\34.vir
  [偵測]        包含 DR/Autoit.A.12768 病毒植入程式的辨識模式
  [注意]        檔案會移動至 '510c6e72.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\33.vir
  [偵測]        是 TR/ATRAPS.Gen4 特洛伊木馬程式
  [注意]        檔案會移動至 '1425173f.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\31.vir
  [偵測]        是 TR/Crypt.XPACK.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '1d2e1396.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\30.vir
  [偵測]        是 TR/AD.SteamEczemaStealer.Y.95 特洛伊木馬程式
  [注意]        檔案會移動至 '456f0afe.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\26.vir
  [偵測]        是 TR/Spy.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '699b733c.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\25.vir
  [偵測]        是 TR/Dropper.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '576513e5.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\24.vir
  [偵測]        是 TR/AD.Matsnu.Y.45 特洛伊木馬程式
  [注意]        檔案會移動至 '346b3897.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\22.vir
  [偵測]        是 TR/Dropper.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '12a37884.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\21.vir
  [偵測]        是 TR/Crypt.FKM.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '20370322.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\20.vir
  [偵測]        是 TR/Crypt.XPACK.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '2a72285d.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\16.vir
  [偵測]        包含 PDF/Agent.42605 PDF 病毒的辨識模式
  [注意]        檔案會移動至 '15214c16.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\14.vir
  [偵測]        包含 WM/Agent.hag Word 巨集病毒碼
  [注意]        檔案會移動至 '6b0d4033.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\12.vir
  [偵測]        是 TR/PSW.Agent.1188864 特洛伊木馬程式
  [注意]        檔案會移動至 '3e7544f6.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\11.vir
  [偵測]        是 TR/Agent.1325568.12 特洛伊木馬程式
  [注意]        檔案會移動至 '33e335dd.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\10.vir
  [偵測]        包含 WORM/Rebhip.V 蠕蟲的辨識模式
  [注意]        檔案會移動至 '2fbe21d5.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\09.vir
  [偵測]        是 TR/Dldr.Waski.bstw 特洛伊木馬程式
  [注意]        檔案會移動至 '1e6d6c12.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\08.vir
  [偵測]        是 TR/Crypt.XPACK.Gen 特洛伊木馬程式
  [注意]        檔案會移動至 '723b7825.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\07.vir
  [偵測]        是 TR/Crypt.Xpack.275046 特洛伊木馬程式
  [注意]        檔案會移動至 '3ba15d25.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\05.vir
  [偵測]        是 TR/Crypt.ZPACK.7284 特洛伊木馬程式
  [注意]        檔案會移動至 '603455f6.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\04.vir
  [偵測]        是 TR/Crypt.ZPACK.177599 特洛伊木馬程式
  [注意]        檔案會移動至 '0686591e.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\02.vir
  [偵測]        是 TR/Crypt.Xpack.277335 特洛伊木馬程式
  [注意]        檔案會移動至 '51082bb9.qua' 名稱底下的隔離區目錄!
C:\Users\Ari\Desktop\2015.8.31\01.vir
  [偵測]        是 TR/Injector.598987 特洛伊木馬程式
  [注意]        檔案會移動至 '73787ccc.qua' 名稱底下的隔離區目錄!


掃描結束: 2015年8月31日  09:58
已使用時間: 00:01 分鐘

已完成全部的掃描.

      1 掃描的目錄
    216 個檔案已掃描
     35 個已發現的病毒和/或有害的程式
      0 檔案已歸類為可疑
      0 個檔案已刪除
      0 個病毒和有害的程式已修復
     34 檔案已移至隔離區
      0 檔案已重新命名
      0 無法掃描檔案
    181 無疑慮的檔案
     37 已掃描封存
      5 警告
     34 注意

[/mw_shl_code]Avira 剩餘16
毛豆新人
发表于 2015-8-31 10:16:06 | 显示全部楼层
本帖最后由 毛豆新人 于 2015-8-31 10:20 编辑

CIS:   解压后杀5,右键扫描扫描杀5,余40.真是一如既往

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
cy0072005
发表于 2015-8-31 10:32:08 | 显示全部楼层
本帖最后由 cy0072005 于 2015-8-31 10:33 编辑


安博士检测到15个,清除14个。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-22 02:12 , Processed in 0.135645 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表