查看: 4491|回复: 31
收起左侧

[病毒样本] 精睿样本测试(16.8.23)

  [复制链接]
轩夏
发表于 2016-8-23 09:27:31 | 显示全部楼层 |阅读模式
地址:
http://pan.baidu.com/s/1bp3doU7  提取密码  4hu3

http://www.vdisk.cn/down/index/19731574

密码:bbs.vc52.cn
数量:50
Eset小粉絲
发表于 2016-8-23 09:29:59 | 显示全部楼层
本帖最后由 Eset小粉絲 于 2016-8-23 09:41 编辑

Avira 32X
Submitted to Avira Virus Lab..

[mw_shl_code=css,true]Start of the scan: Tuesday, 23 August, 2016  09:32

Starting the file scan:

Begin scan in 'C:\Users\User\Desktop\2016.8.23'
C:\Users\User\Desktop\2016.8.23\03.vir
  [DETECTION] Is the TR/Dropper.MSIL.fvxj Trojan
C:\Users\User\Desktop\2016.8.23\04.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\06.vir
  [DETECTION] Is the TR/Dropper.VB.tjuz Trojan
C:\Users\User\Desktop\2016.8.23\08.vir
  [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
C:\Users\User\Desktop\2016.8.23\10.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
C:\Users\User\Desktop\2016.8.23\11.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\13.vir
  [DETECTION] Is the TR/Agent.htuj Trojan
C:\Users\User\Desktop\2016.8.23\14.vir
    [0] Archive type: ZIP
    --> enom/v.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.20 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/g.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.6 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/y.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.23 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/r.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.16 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/newpackage/Libray.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.11 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/t.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.18 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/p.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.14 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/z.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.24 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/f.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.5 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/q.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.15 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/d.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.3 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/k.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.9 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/n.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.12 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/u.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.19 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/b.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.2 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/j.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.8 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/w.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.21 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/o.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.13 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/a.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/l.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.10 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/i.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.7 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/x.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.22 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/e.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.4 Java virus
        [WARNING]   Infected files in archives cannot be repaired
    --> enom/s.class
        [DETECTION] Contains recognition pattern of the JAVA/Agent.jdfs.17 Java virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\18.vir
  [DETECTION] Contains recognition pattern of the HTML/ExpKit.Gen6 HTML script virus
C:\Users\User\Desktop\2016.8.23\19.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Ocna.A
C:\Users\User\Desktop\2016.8.23\21.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\22.vir
  [DETECTION] Is the TR/Dropper.MSIL.hten Trojan
C:\Users\User\Desktop\2016.8.23\24.vir
  [DETECTION] Is the TR/Dropper.MSIL.lnhk Trojan
C:\Users\User\Desktop\2016.8.23\25.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\27.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\28.vir
  [DETECTION] Contains virus patterns of Adware ADWARE/Spigot.Gen7
C:\Users\User\Desktop\2016.8.23\29.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\30.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\31.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\32.vir
  [DETECTION] Contains code of the VBA/Dldr.Agent.E virus
C:\Users\User\Desktop\2016.8.23\33.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\34.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\35.vir
  [DETECTION] Is the TR/Agent.smbh Trojan
C:\Users\User\Desktop\2016.8.23\38.vir
  [DETECTION] Is the TR/Dropper.MSIL.ykri Trojan
C:\Users\User\Desktop\2016.8.23\39.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.237112 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\41.vir
  [DETECTION] Is the TR/Dropper.MSIL.yuxy Trojan
C:\Users\User\Desktop\2016.8.23\42.vir
  [DETECTION] Is the TR/Dropper.Gen Trojan
C:\Users\User\Desktop\2016.8.23\43.vir
  [DETECTION] Contains recognition pattern of the JS/Dldr.Locky.081916 Java script virus
C:\Users\User\Desktop\2016.8.23\44.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\45.vir
  [DETECTION] Is the TR/Dldr.Agent.xxzx Trojan
C:\Users\User\Desktop\2016.8.23\46.vir
    [0] Archive type: ZIP
    --> word/vbaProject.bin
        [DETECTION] Contains code of the W2000M/Agent.221520 macro virus
        [WARNING]   Infected files in archives cannot be repaired
C:\Users\User\Desktop\2016.8.23\48.vir
  [DETECTION] Is the TR/Binder.sgox Trojan[/mw_shl_code]
轩夏
 楼主| 发表于 2016-8-23 09:35:40 | 显示全部楼层
MSE

[mw_shl_code=css,true]Scan started on Tue Aug 23 09:31:29 2016

C:\Users\XuanXia\Desktop\2016.8.23\01.vir->(EncScript)              Infected: TrojanDownloader:JS/Nemucod.GR [non_writable_container]
C:\Users\XuanXia\Desktop\2016.8.23\02.vir                           Infected: TrojanDownloader:JS/Nemucod
C:\Users\XuanXia\Desktop\2016.8.23\04.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\08.vir                           Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\10.vir                           Infected: TrojanDownloader:JS/Nemucod.FJ
C:\Users\XuanXia\Desktop\2016.8.23\11.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\13.vir                           Infected: Backdoor:MSIL/Bladabindi
C:\Users\XuanXia\Desktop\2016.8.23\15.vir                           Infected: Backdoor:Linux/Apmod.gen!A [generic]
C:\Users\XuanXia\Desktop\2016.8.23\18.vir                           Infected: TrojanDownloader:JS/Nemucod.FJ
C:\Users\XuanXia\Desktop\2016.8.23\21.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\22.vir                           Infected: Backdoor:MSIL/Noancooe.C
C:\Users\XuanXia\Desktop\2016.8.23\24.vir                           Infected: TrojanSpy:MSIL/Omaneat.C
C:\Users\XuanXia\Desktop\2016.8.23\25.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\27.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\28.vir                           Infected: Trojan:Win32/Notepices
C:\Users\XuanXia\Desktop\2016.8.23\29.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\30.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\31.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\32.vir                           Infected: Trojan:Win32/Matta.A!gfc
C:\Users\XuanXia\Desktop\2016.8.23\33.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\34.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\38.vir                           Infected: TrojanSpy:MSIL/Omaneat.C
C:\Users\XuanXia\Desktop\2016.8.23\39.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\42.vir                           Infected: Backdoor:MSIL/Noancooe.C
C:\Users\XuanXia\Desktop\2016.8.23\43.vir                           Infected: TrojanDownloader:JS/Nemucod
C:\Users\XuanXia\Desktop\2016.8.23\44.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff
C:\Users\XuanXia\Desktop\2016.8.23\45.vir                           Infected: TrojanDownloader:Win32/Farfli.I!bit
C:\Users\XuanXia\Desktop\2016.8.23\46.vir->word/vbaProject.bin      Infected: TrojanDownloader:O97M/Donoff

Successfully checked: C:\Users\XuanXia\Desktop\2016.8.23

Scan ended on Tue Aug 23 09:31:36 2016

Time: 7 second(s). [0h:00m:07s]
Files/second: 50 (1777 Kb/s).
Objects scanned: 350.
Infected: 28. Suspicious: 0. Clean: 322. Different virus bodies: 11.
Files: 50. Directories: 1. Archives: 71. Packed: 6. Mail files: 2.
Warnings: 28. Scan errors: 0. Protected: 1. Damaged: 0. Unknown method: 0. Spanned: 0.[/mw_shl_code]
a1414007
发表于 2016-8-23 09:36:24 | 显示全部楼层
AVG
统计结果

   原始文件数量: 50

   处理项目数量: 40

   删除项目数量: 26

   修复项目数量: 14

   近似查杀率: 80.00 %

任意键返回
tmcss
发表于 2016-8-23 09:43:02 | 显示全部楼层
ESS 38Kill 1Fix
[mw_shl_code=css,true]日志
正在扫描日志
病毒库版本: 14002 (20160822)
日期: 2016/8/23  时间: 9:40:54
已扫描的磁盘、文件夹和文件: C:\Users\Mistet\Desktop\2016.8.23
C:\Users\Mistet\Desktop\2016.8.23\01.vir - JS/TrojanDownloader.Nemucod.AQM 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\02.vir - JS/TrojanDownloader.Nemucod.APP 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\03.vir - MSIL/Kryptik.HBM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\04.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\05.vir > CWS > file.swf - 正常
C:\Users\Mistet\Desktop\2016.8.23\06.vir - Win32/Tofsee.AZ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\07.vir > 7ZIP > setup.exe - 文件校验和 (CRC) 错误;文件可能受密码保护。
C:\Users\Mistet\Desktop\2016.8.23\08.vir - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\10.vir - JS/TrojanDownloader.Nemucod.AJQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\11.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\13.vir - MSIL/Bladabindi.BC 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/v.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/g.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/y.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/r.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/newpackage/Libray.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/t.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/p.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/z.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/f.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/q.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/d.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/k.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/n.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/u.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/b.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/j.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/w.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/o.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/a.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/l.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/i.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/x.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/e.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/h.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/s.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\14.vir > ZIP > enom/m.class - Java/Adwind.XQ 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\15.vir - Linux/Chapro.A 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\16.vir - VBS/TrojanDownloader.Agent.OKL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\17.vir > ZIP > word/document.xml - DOC/Fraud.BF 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\18.vir - JS/TrojanDownloader.Nemucod.AKM 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\19.vir - Win32/KuaiZip.B 潜在的不受欢迎应用程序 的变种 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\21.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\22.vir - MSIL/Kryptik.HBM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\24.vir - MSIL/Injector.QCW 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\25.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcv.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcg.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabco.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcs.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabch.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcw.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabci.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabct.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcc.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcb.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcj.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcz.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcl.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcq.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcy.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabca.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcr.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcx.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcu.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabce.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcd.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcm.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcf.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabck.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > c/abcabcabcabcp.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\26.vir > ZIP > player/file/DirectoryPlus.class - Java/Adwind.LL 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\27.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\28.vir > NSIS > Script.nsi - Win32/Adware.HPDefender.AU 应用程序 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\28.vir > NSIS > DraughtsStuff.exe - Win32/Adware.HPDefender.AS 应用程序 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\28.vir > NSIS > Draughts.exe - Win32/Adware.HPDefender.AQ 应用程序 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\28.vir > NSIS > uninstaller.exe > NSIS > Script.nsi - Win32/Adware.HPDefender.AP 应用程序 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\29.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\30.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\31.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\32.vir - VBA/TrojanDownloader.Agent.BPO 特洛伊木马 - 已清除
C:\Users\Mistet\Desktop\2016.8.23\33.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\34.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\35.vir - Win32/Kryptik.FEUJ 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\38.vir - MSIL/Kryptik.HBM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\39.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\41.vir - MSIL/Agent.YW 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\42.vir - MSIL/Kryptik.HBM 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\43.vir - JS/TrojanDownloader.Nemucod.ARG 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\44.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\45.vir - Win32/TrojanDownloader.Agent.CPC 特洛伊木马 的变种 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\46.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 扫描完成后再选择处理方式
C:\Users\Mistet\Desktop\2016.8.23\48.vir - MSIL/Riskware.Crypter.JT 应用程序 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\49.vir - VBS/Kryptik.DY 特洛伊木马 - 通过删除清除 [1]
C:\Users\Mistet\Desktop\2016.8.23\50.vir > CWS > file.swf - 解压错误
C:\Users\Mistet\Desktop\2016.8.23\04.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\11.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\17.vir > ZIP > word/document.xml - DOC/Fraud.BF 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\19.vir - Win32/KuaiZip.B 潜在的不受欢迎应用程序 的变种 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\21.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\25.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\27.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\29.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\30.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\31.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\33.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\34.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\39.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQI 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\44.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
C:\Users\Mistet\Desktop\2016.8.23\46.vir > ZIP > word/vbaProject.bin - VBA/TrojanDownloader.Agent.BQG 特洛伊木马 - 已删除
已扫描的对象数: 323
发现的威胁数: 92
已清除对象数: 92
完成时间: 9:41:05  总扫描时间: 11 秒 (00:00:11)

备注:
[1] 由于对象中仅包含病毒主体,因此已被删除。
[/mw_shl_code]
潘中医
发表于 2016-8-23 09:49:00 | 显示全部楼层
火绒 22X

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
xcvbaby
发表于 2016-8-23 10:00:19 | 显示全部楼层
本帖最后由 xcvbaby 于 2016-8-23 10:25 编辑

金山毒霸:10                                                                                     电脑管家国内版:1      (未开启BD引擎)




[=css,true]DUBA
发现威胁:10个
清除威胁:10个
=============================================
[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\03.vir
类型:win32.heur.kvm007.a.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\06.vir
类型:win32.troj.generickd.v.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\13.vir
类型:win32.troj.undef.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\22.vir
类型:win32.troj.generickd.v.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\24.vir
类型:win32.troj.generic_a.a.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\28.vir
类型:win32.troj.hpdefender.f.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\38.vir
类型:win32.troj.generickd.v.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\41.vir
类型:win32.troj.undef.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\42.vir
类型:win32.troj.generickd.v.(kcloud)
处理方式:删除

[2016-08-23 09:57:59]
威胁:d:\我的文档\desktop\2016.8.23\2016.8.23\48.vir
类型:win32.troj.generic_a.a.(kcloud)
处理方式:删除
[/mw_shl_code]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
心醉咖啡
发表于 2016-8-23 10:03:28 | 显示全部楼层
360杀毒扫描日志

病毒库版本:
扫描时间:2016-08-23 10:02:04
扫描用时:00:00:15
扫描类型:右键扫描
扫描文件总数:50
项目总数:7
清除项目数:0

扫描选项
----------------------
扫描所有文件:是
扫描压缩包:是
发现病毒处理方式:由用户选择处理
扫描磁盘引导区:是
扫描 Rootkit:是
使用云查杀引擎:是
使用QVM人工智能引擎:是
扫描建议修复项:是
常规引擎设置:未使用

扫描内容
----------------------
F:\浏览器下载\2016.8.23


白名单设置
----------------------


扫描结果
======================
高危风险项
----------------------
F:\浏览器下载\2016.8.23\19.vir        感染型病毒(Win32/Virus.Adware.913)        未处理
F:\浏览器下载\2016.8.23\06.vir        HEUR/QVM03.0.5362.Malware.Gen        未处理
F:\浏览器下载\2016.8.23\24.vir        HEUR/QVM03.0.5362.Malware.Gen        未处理
F:\浏览器下载\2016.8.23\38.vir        HEUR/QVM03.0.5362.Malware.Gen        未处理
F:\浏览器下载\2016.8.23\42.vir        HEUR/QVM03.0.5362.Malware.Gen        未处理
F:\浏览器下载\2016.8.23\45.vir        HEUR/QVM07.1.5362.Malware.Gen        未处理
F:\浏览器下载\2016.8.23\48.vir        HEUR/QVM03.0.5362.Malware.Gen        未处理



可疑文件上传结果
----------------------
f:\浏览器下载\2016.8.23\42.vir        上传成功
Jerry.Lin
发表于 2016-8-23 10:10:54 | 显示全部楼层
360TS 火力全开 KILL36X

360 Total Security扫描日志

扫描时间:2016-08-23 10:09:23
扫描用时:00:00:17
扫描项目总数:182
威胁总数:36
处理威胁数:36

扫描选项
----------------------
扫描压缩包:否
常规引擎设置:Bitdefender引擎, 小红伞引擎

扫描内容
----------------------
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\

扫描结果
======================
高风险项目
----------------------
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\19.vir.exe        Win32/Virus.Adware.913        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\18.vir.html        virus.wsf.downloader.a        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\04.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\08.vir.doc        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\10.vir.JS        js.url.downloader.q        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\11.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\21.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\25.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\27.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\29.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\30.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\31.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\32.vir.doc        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\33.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\34.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\39.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\44.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\46.vir.docx        virus.office.obfuscated.1        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\01.vir        JS:Trojan.JS.Agent.PF        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\15.vir.Linux_ELF        Backdoor.Linux.Agent.E        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\36.vir.rtf        Trojan.RTF-COM-Dropper.Gen        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\43.vir.html        JS:Trojan.Crypt.PM        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\37.vir.rtf        Trojan.RTF-COM-Dropper.Gen        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\03.vir.exe        Trojan.GenericKD.3477484        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\13.vir.exe        Trojan.GenericKD.3481616        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\24.vir.exe        Gen:Variant.Zusy.109339        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\06.vir.exe        Trojan.GenericKD.3478722        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\38.vir.exe        Trojan.GenericKD.3475999        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\41.vir.exe        Trojan.GenericKD.3476355        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\42.vir.exe        Trojan.GenericKD.3475899        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\45.vir.exe        Trojan.Generic.17930401        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\48.vir.exe        Gen:Heur.MSIL.Binder.22        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\02.vir.JS        JS:Trojan.JS.Agent.OZ        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\35.vir.exe        Trojan.GenericKD.3479089        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\22.vir.exe        Trojan.GenericKD.3480276        已处理
D:\迅雷下载\病毒测试区\2016.8.23\2016.8.23\14.vir.zip        Java.Trojan.Agent.AW        已处理
T.Yoshiyuki
发表于 2016-8-23 10:13:54 | 显示全部楼层
BD的引擎刚更新 扫扫看
kill 38x (其中修复15x)
07.exe有密码保护



[mw_shl_code=css,true]D:\TEST\daily\2016.8.23\41.vir.exe Trojan.GenericKD.3476355 Deleted
D:\TEST\daily\2016.8.23\01.vir=>(SCRENC)=>(INFECTED_JS) JS:Trojan.JS.Agent.PF Deleted
D:\TEST\daily\2016.8.23\45.vir.exe Trojan.Generic.17930401 Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)  Moved to Quarantine
D:\TEST\daily\2016.8.23\29.vir.docx=>word/vbaProject.bin W97M.Downloader.EET Disinfected
D:\TEST\daily\2016.8.23\13.vir.exe Trojan.GenericKD.3481616 Deleted
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\43.vir.html=>(INFECTED_JS) JS:Trojan.Crypt.PM Deleted
D:\TEST\daily\2016.8.23\30.vir.docx=>word/vbaProject.bin W97M.Downloader.EET Disinfected
D:\TEST\daily\2016.8.23\48.vir.exe Gen:Heur.MSIL.Binder.22 Deleted
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>(Word.Document.12)=>(Package)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\46.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\15.vir Backdoor.Linux.Agent.E Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>(Word.Document.12)=>(Package)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\44.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\24.vir.exe Gen:Variant.Zusy.109339 Deleted
D:\TEST\daily\2016.8.23\42.vir.exe Trojan.GenericKD.3475899 Deleted
D:\TEST\daily\2016.8.23\39.vir.docx=>word/vbaProject.bin W97M.Downloader.EES Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>(Embedded DocFile g)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\28.vir.exe=>(NSIS o)=>zlib_nsis0001 Gen:Variant.Razy.71907 Moved to Quarantine
D:\TEST\daily\2016.8.23\38.vir.exe Trojan.GenericKD.3475999 Deleted
D:\TEST\daily\2016.8.23\28.vir.exe=>(NSIS o)=>zlib_nsis0004 Application.Generic.1662760 Moved to Quarantine
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>(otkloadr.WRLoader.1) Trojan.RTF-COM-Dropper.Gen Moved to Quarantine
D:\TEST\daily\2016.8.23\35.vir.exe Trojan.GenericKD.3479089 Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>(otkloadr.WRLoader.1) Trojan.RTF-COM-Dropper.Gen Moved to Quarantine
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\34.vir.docx=>word/vbaProject.bin W97M.Downloader.EET Disinfected
D:\TEST\daily\2016.8.23\33.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\31.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\21.vir.docx=>word/vbaProject.bin W97M.Downloader.EET Disinfected
D:\TEST\daily\2016.8.23\28.vir.exe=>(NSIS o)=>zlib_nsis0002 Trojan.GenericKD.3421393 Moved to Quarantine
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>(Embedded DocFile g)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\26.vir.zip Trojan.GenericKD.3482652 Deleted
D:\TEST\daily\2016.8.23\27.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)=>(Word.Document.12)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\14.vir.zip=>enom/k.class Java.Trojan.Agent.AW Deleted
D:\TEST\daily\2016.8.23\36.vir.rtf=>(objdata)=>(Word.Document.12)=>word/document.xml Exploit.CVE-2015-1641.Gen Deleted
D:\TEST\daily\2016.8.23\25.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\19.vir.exe Trojan.Agent.BTGJ Deleted
D:\TEST\daily\2016.8.23\22.vir.exe Trojan.GenericKD.3480276 Deleted
D:\TEST\daily\2016.8.23\18.vir.html Trojan.Script.DJB Deleted
D:\TEST\daily\2016.8.23\10.vir.JS Trojan.GenericKD.3401979 Deleted
D:\TEST\daily\2016.8.23\16.vir Trojan.VBS.UUQ Deleted
D:\TEST\daily\2016.8.23\28.vir.exe=>(NSIS o)=>zlib_nsis0005 Application.Generic.1662585 Moved to Quarantine
D:\TEST\daily\2016.8.23\11.vir.docx=>word/vbaProject.bin W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\08.vir.doc W97M.Downloader.EER Disinfected
D:\TEST\daily\2016.8.23\04.vir.docx=>word/vbaProject.bin W97M.Downloader.EET Disinfected
D:\TEST\daily\2016.8.23\02.vir.JS=>(INFECTED_JS) JS:Trojan.JS.Agent.OZ Deleted
D:\TEST\daily\2016.8.23\03.vir.exe Trojan.GenericKD.3477484 Deleted
D:\TEST\daily\2016.8.23\06.vir.exe Trojan.GenericKD.3478722 Deleted
D:\TEST\daily\2016.8.23\37.vir.rtf=>(objdata)  Moved to Quarantine

D:\TEST\daily\2016.8.23\07.vir.exe=>(7z o)=>setup.exe Password-protected Not scanned (file was password-protected)

Scanned items : 449
Infected items : 51
Suspicious items : 0 (no suspected items have been detected)
Resolved items : 54
Unresolved items : 0 [/mw_shl_code]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-14 11:28 , Processed in 0.134562 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表