本帖最后由 墨家小子 于 2016-3-12 09:15 编辑
SHA256: 179ed217996cc9fded7a763b4dc12656b3221fb99e008288cb002c85c5ac6010
File name: ABD0.tmp.exe
Detection ratio: 2 / 56
Analysis date: 2016-03-12 01:07:02 UTC ( 1 minute ago )
https://www.virustotal.com/en/file/179ed217996cc9fded7a763b4dc12656b3221fb99e008288cb002c85c5ac6010/analysis/1457744822/
AegisLab Troj.W32.Gen 20160311
Qihoo-360 HEUR/QVM07.1.Malware.Gen 20160312
2016/3/12 9:09:49,高,阻止了 localhost 的入侵企图,已阻止,不需要操作,Web Attack: Angler Exploit Kit Website 6,不需要操作,不需要操作,"localhost (127.0.0.1, 5XXX2)",esarhadd.business-dna.eu/topic/62917-naivete-doorstop-worthless-politically-crispiest-projection-kingfisher-sheltering/,"localhost (127.0.0.1, XXX9)",localhost (127.0.0.1),"TCP, 端口 5XXX2",
类别: 已解决的安全风险
日期和时间,风险,活动,状态,推荐的操作,活动
2016/3/12 9:09:40,高,检测到 shahrooz7[1].htm (Trojan.Malscript) (检测方: 下载智能分析),已隔离,已解决 - 不需要操作,已执行的威胁操作: 1
|