楼主: 轩夏
收起左侧

[病毒样本] 精睿样本测试(16.5.6)

[复制链接]
星云劫
发表于 2016-5-6 12:07:50 | 显示全部楼层
蓝天二号 发表于 2016-5-6 12:04
我不是六楼么。。。。9:49

五分钟就多出了三个,那这个入库速度不慢啊。不过应该是在云端,本地好像低峰时一天只更新一次病毒库。
学雷锋做人
头像被屏蔽
发表于 2016-5-6 12:18:43 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
挥泪斩情思
发表于 2016-5-6 12:27:13 | 显示全部楼层
蓝天二号 发表于 2016-5-6 12:04
我不是六楼么。。。。9:49

云响应
蓝天二号
发表于 2016-5-6 12:28:12 | 显示全部楼层

速度可以的
尘梦幽然
发表于 2016-5-6 13:14:39 | 显示全部楼层

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
shiningshining
发表于 2016-5-6 13:14:53 | 显示全部楼层
gdata 43个
尘梦幽然
发表于 2016-5-6 13:54:38 | 显示全部楼层
NS 22.7Beta



[mw_shl_code=css,true]Scan Information:
  Virus Defs Version: 2016.05.05.016
  Virus Defs Seq ID: 177135

Scan Statistics:
  Scan Start:
   Local: 2016/5/6 13:49
   UTC: 2016/5/6 5:49
  Scan Time: 47 seconds
  Scan Targets: C:\Users\simplr\Desktop\新建文件夹
  Counts:
   Total items scanned: 87
   - Files & Directories: 87
   - Registry Entries: 0
   - Processes & Start-up Items: 0
   - Network & Browser Items: 0
   - Other: 0
   - Trusted Files: 0
   - Skipped Files: 0

   Total security risks detected: 7
   Total items resolved: 7
   Total items that require attention: 0

Resolved Threats:
JS.Downloader
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
21 Infected Files
c:\users\simplr\desktop\新建文件夹\24.vir - Deleted
c:\users\simplr\desktop\新建文件夹\11.vir - Deleted
c:\users\simplr\desktop\新建文件夹\21.vir - Deleted
c:\users\simplr\desktop\新建文件夹\40.vir - Deleted
c:\users\simplr\desktop\新建文件夹\07.vir - Deleted
c:\users\simplr\desktop\新建文件夹\08.vir - Deleted
c:\users\simplr\desktop\新建文件夹\01.vir - Deleted
c:\users\simplr\desktop\新建文件夹\09.vir - Deleted
c:\users\simplr\desktop\新建文件夹\12.vir - Deleted
c:\users\simplr\desktop\新建文件夹\26.vir - Deleted
c:\users\simplr\desktop\新建文件夹\14.vir - Deleted
c:\users\simplr\desktop\新建文件夹\10.vir - Deleted
c:\users\simplr\desktop\新建文件夹\04.vir - Deleted
c:\users\simplr\desktop\新建文件夹\49.vir - Deleted
c:\users\simplr\desktop\新建文件夹\43.vir - Deleted
c:\users\simplr\desktop\新建文件夹\46.vir - Deleted
c:\users\simplr\desktop\新建文件夹\16.vir - Deleted
c:\users\simplr\desktop\新建文件夹\17.vir - Deleted
c:\users\simplr\desktop\新建文件夹\18.vir - Deleted
c:\users\simplr\desktop\新建文件夹\22.vir - Deleted
c:\users\simplr\desktop\新建文件夹\23.vir - Deleted
1 Browser Cache



W97M.Downloader
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
5 Infected Files
c:\users\simplr\desktop\新建文件夹\19.vir - Deleted
c:\users\simplr\desktop\新建文件夹\03.vir - Repaired
c:\users\simplr\desktop\新建文件夹\28.vir - Repaired
c:\users\simplr\desktop\新建文件夹\38.vir - Repaired
c:\users\simplr\desktop\新建文件夹\30.vir - Deleted
1 Browser Cache



Trojan.Malscript!html
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
1 Infected File
c:\users\simplr\desktop\新建文件夹\33.vir - Deleted
1 Browser Cache



Trojan.Smoaler
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
1 Infected File
c:\users\simplr\desktop\新建文件夹\32.vir - Deleted
1 Browser Cache



Trojan.Gen.2
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
2 Infected Files
c:\users\simplr\desktop\新建文件夹\37.vir - Deleted
c:\users\simplr\desktop\新建文件夹\44.vir - Deleted
1 Browser Cache



Trojan.Gen
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Virus
Status: Fully Resolved
-----------
1 Infected File
c:\users\simplr\desktop\新建文件夹\35.vir - Deleted
1 Browser Cache



Suspicious.Cloud.7.F
Type: Anomaly
Risk: High (High Stealth, High Removal, High Performance, High Privacy)
Categories: Heuristic Virus
Status: Fully Resolved
-----------
1 Infected File
c:\users\simplr\desktop\新建文件夹\31.vir - Deleted
1 Browser Cache





Unresolved Threats:
No unresolved risks[/mw_shl_code]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
諾言敵不過時間
发表于 2016-5-6 13:58:02 | 显示全部楼层
COMODO
掃描4X 提交雲比對殺25X 剩餘21

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
shiningshining
发表于 2016-5-6 14:02:49 | 显示全部楼层
熊猫。。。。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
Eset小粉絲
发表于 2016-5-6 19:54:02 | 显示全部楼层
Avira Leftover 6

[mw_shl_code=css,true]C:\Users\User\Desktop\2016.5.6\03.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Dldr.Agent.AM.65755777 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.5.6\06.vir
  [DETECTION] Is the TR/AD.Teerac.Y.wesf Trojan
C:\Users\User\Desktop\2016.5.6\15.vir
  [DETECTION] Is the TR/Symmi.mxhg Trojan
C:\Users\User\Desktop\2016.5.6\19.vir
  [DETECTION] Contains code of the W2000M/Dldr.Agent.AM.73050 macro virus
C:\Users\User\Desktop\2016.5.6\20.vir
    [0] Archive type: RAR
    --> акт сверки.doc.exe
        [DETECTION] Is the TR/Agent.plqq Trojan
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.5.6\27.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Adware.Gen3
C:\Users\User\Desktop\2016.5.6\28.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Dldr.Agent.556958 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.5.6\29.vir
  [DETECTION] Is the TR/ATRAPS.Gen Trojan
C:\Users\User\Desktop\2016.5.6\30.vir
  [DETECTION] Contains code of the W2000M/Dropper.C macro virus
C:\Users\User\Desktop\2016.5.6\31.vir
  [DETECTION] Is the TR/Crypt.Xpack.qbqr Trojan
C:\Users\User\Desktop\2016.5.6\32.vir
  [DETECTION] Is the TR/VBInject.szbk Trojan
C:\Users\User\Desktop\2016.5.6\35.vir
  [DETECTION] Is the TR/Crypt.Xpack.iosu Trojan
C:\Users\User\Desktop\2016.5.6\37.vir
  [DETECTION] Is the TR/Rogue.11198243 Trojan
    [0] Archive type: Portable Executable Resource
    --> C:\Users\User\Desktop\2016.5.6\38.vir
        [1] Archive type: ZIP
      --> word/vbaProject.bin
          [DETECTION] Contains code of the W2000M/Dldr.Agent.556958 macro virus
          [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.5.6\38.vir
  [DETECTION] Contains code of the W2000M/Dldr.Agent.556958 macro virus
C:\Users\User\Desktop\2016.5.6\39.vir
  [DETECTION] Contains patterns of software PUA/LoadMoney.D
C:\Users\User\Desktop\2016.5.6\40.vir
  [DETECTION] Contains recognition pattern of the JS/Nemucod.FC Java script virus
C:\Users\User\Desktop\2016.5.6\43.vir
  [DETECTION] Contains recognition pattern of the JS/Nemucod.FC Java script virus
C:\Users\User\Desktop\2016.5.6\44.vir
  [DETECTION] Is the TR/Symmi.uonf Trojan
C:\Users\User\Desktop\2016.5.6\45.vir
  [DETECTION] Contains code of the W2000M/Dldr.Agent.90969548 macro virus
C:\Users\User\Desktop\2016.5.6\46.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Dridex.777 Java script virus
C:\Users\User\Desktop\2016.5.6\49.vir
  [DETECTION] Contains recognition pattern of the JS/Nemucod.FC Java script virus

C:\Users\User\Desktop\2016.5.6\22.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5139124d.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\01.vir'
C:\Users\User\Desktop\New folder\01.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '515c17e9.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\04.vir'
C:\Users\User\Desktop\New folder\04.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '49cb3841.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\07.vir'
C:\Users\User\Desktop\New folder\07.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1b9462ac.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\08.vir'
C:\Users\User\Desktop\New folder\08.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '7da32d6f.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\09.vir'
C:\Users\User\Desktop\New folder\09.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '38270053.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\10.vir'
C:\Users\User\Desktop\New folder\10.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Dridex.555 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '473c323b.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\11.vir'
C:\Users\User\Desktop\New folder\11.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '0b841e70.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\12.vir'
C:\Users\User\Desktop\New folder\12.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Dridex.555 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '779c5e2f.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\14.vir'
C:\Users\User\Desktop\New folder\14.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.wry Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5ac67160.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\16.vir'
C:\Users\User\Desktop\New folder\16.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Dridex.555 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '43ae4afc.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\17.vir'
C:\Users\User\Desktop\New folder\17.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '2ff266ce.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\18.vir'
C:\Users\User\Desktop\New folder\18.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5e4b5f5a.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\21.vir'
C:\Users\User\Desktop\New folder\21.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Dridex.555 Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '50516f9a.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\23.vir'
C:\Users\User\Desktop\New folder\23.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '157816da.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\24.vir'
C:\Users\User\Desktop\New folder\24.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '1c731270.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\26.vir'
C:\Users\User\Desktop\New folder\26.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.EL Java script virus
  [NOTE]      The file was moved to the quarantine directory under the name '44320b1f.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\36.vir'
C:\Users\User\Desktop\New folder\36.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '68c672d0.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\41.vir'
C:\Users\User\Desktop\New folder\41.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '5638120d.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\42.vir'
C:\Users\User\Desktop\New folder\42.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '3536397d.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\47.vir'
C:\Users\User\Desktop\New folder\47.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '13fe7965.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\48.vir'
C:\Users\User\Desktop\New folder\48.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '216a02de.qua'!
Begin scan in 'C:\Users\User\Desktop\New folder\50.vir'
C:\Users\User\Desktop\New folder\50.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen2 HTML script virus
  [NOTE]      The file was moved to the quarantine directory under the name '2b2f29b8.qua'![/mw_shl_code]
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-15 02:31 , Processed in 0.102767 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表