G DATA
- Archive: ca6a04f9f5d1a15be1816d9bd8e16bdb52ede8fecc621572126fa2a766106f54.rtf
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: Exploit.CVE-2018-0802.Gen (2x) (Engine A)
- ----------------------------------------------------------------
- Object: (objdata)=>()
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\ca6a04f9f5d1a15be1816d9bd8e16bdb52ede8fecc621572126fa2a766106f54.rtf
- Status: Virus detected
- Virus: Exploit.CVE-2018-0802.Gen
- Object: (objdata)=>(Embedded DocFile g)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\ca6a04f9f5d1a15be1816d9bd8e16bdb52ede8fecc621572126fa2a766106f54.rtf
- Status: Virus detected
- Virus: Exploit.CVE-2018-0802.Gen
- ----------------------------------------------------------------
- Object: dac2647367ae934133d0dae72b23d61b169dad4fac42976658cbfb8db3bb0ab5.exe
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: DeepScan:Generic.Ransom.Sodinokibi.0D04E91C (Engine A)
- Archive: 940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen (80x), Trojan.GenericKD.5153825 (2x), Trojan.GenericKD.5226166 (2x), Trojan.RTF-COM-Dropper.Gen (Engine A)
- ----------------------------------------------------------------
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX1.bin
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Trojan.GenericKD.5153825
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX1.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX10.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX11.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX12.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX13.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX14.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX15.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX16.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX17.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX18.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX19.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX2.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX20.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX21.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX22.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX23.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX24.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX25.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX26.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX27.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX28.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX29.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX3.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX30.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX31.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX32.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX33.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX34.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX35.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX36.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX37.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX38.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX39.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX4.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX40.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX5.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX6.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX7.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX8.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(8iczka20Qo5VfLgX)=>(Package)=>word/activeX/activeX9.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Trojan.GenericKD.5226166
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX1.bin
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Trojan.GenericKD.5153825
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX1.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX10.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX11.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX12.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX13.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX14.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX15.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX16.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX17.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX18.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX19.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX2.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX20.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX21.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX22.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX23.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX24.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX25.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX26.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX27.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX28.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX29.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX3.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX30.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX31.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX32.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX33.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX34.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX35.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX36.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX37.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX38.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX39.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX4.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX40.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX5.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX6.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX7.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX8.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(Embedded DocFile g)=>(Package)=>word/activeX/activeX9.xml=>(dummy)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Exploit.CVE-2012-1856.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(oTKloaDr.wRAssEMBly.1)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Trojan.RTF-COM-Dropper.Gen
- Object: [Subject: Attached Purchase order][Date: 14 Oct 2019 07:52:23 -0700]=>Purchase Order 74802 Port Jo'burg - Copy.doc=>(objdata)=>(PfB5fL)=>(Package)
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\940dd34e399d97247494b83ea41ad140b8bb1d8008db4097703c865e2bef8a22.exe
- Status: Virus detected
- Virus: Trojan.GenericKD.5226166
- ----------------------------------------------------------------
- Archive: 36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: Trojan.Generic.5848174, Trojan.Ransom.Petya.C, Trojan.Ransom.WannaCryptor.A (Engine A), Win32.Trojan-Ransom.WannaCry.A, Win32.Trojan.Agent.IT92BA (Engine B)
- ----------------------------------------------------------------
- Object: (RAR Sfx o)=>1.exe
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Status: Virus detected
- Virus: Trojan.Generic.5848174
- Object: (RAR Sfx o)=>3.EXE
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Status: Virus detected
- Virus: Trojan.Ransom.WannaCryptor.A
- Object: (RAR Sfx o)=>9.exe
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Status: Virus detected
- Virus: Trojan.Ransom.Petya.C
- Object: 3.EXE
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Status: Virus detected
- Virus: Win32.Trojan-Ransom.WannaCry.A
- Object: 9.exe
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\36dadfcae878c299ea1b563eac0240a7b352a0ff24c599225b42b503ea2f63a9.dll
- Status: Virus detected
- Virus: Win32.Trojan.Agent.IT92BA
- ----------------------------------------------------------------
- Archive: e23cdad77fa6de90822e92ae19f17abc833bb38685b415f5813d280fa1a6a590.docx
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: Trojan.Script.1026663 (Engine A)
- ----------------------------------------------------------------
- Object: word/_rels/webSettings.xml.rels
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\e23cdad77fa6de90822e92ae19f17abc833bb38685b415f5813d280fa1a6a590.docx
- Status: Virus detected
- Virus: Trojan.Script.1026663
- ----------------------------------------------------------------
- Archive: f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Path: C:\Users\Jkc\Desktop\virus\归档 (2)
- Status: Virus detected
- Virus: Backdoor.Generic.929786, Gen:HackTool.WinCred.2 (3x), Gen:Trojan.Ipatre.1, Gen:Variant.Cabby.3 (6x), Gen:Variant.Cabby.4, Gen:Variant.Graftor.144274 (2x), Gen:Variant.Graftor.148873, Gen:Variant.Kazy.400775, Gen:Variant.Ser.Johnnie.3796, Gen:Variant.Ser.Zusy.3303, Gen:Variant.Symmi.51484, Trojan.Agent.BEUB, Trojan.Foreign.Gen.2 (3x), Trojan.Generic.11675213, Trojan.GenericKD.31673419 (Engine A), Win32.Trojan-Downloader.Cabby.C (2x), Win32.Trojan-Ransom.Cryptolocker.F@susp (3x) (Engine B)
- ----------------------------------------------------------------
- Object: 322d2273733ae21329d9adb26ff7c9b08eccd89fc0a0d706a541be86942e05bb
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.Generic.11675213
- Object: 427bc071b21f6e715e1a0181275bf5cc6897aceb5942fcdcf05bed661a61b2e2
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
- Object: 4c740b7f0bdc728daf9fca05241e85d921a54a6e17ae47ed1577a2b30792cf5c
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Win32.Trojan-Ransom.Cryptolocker.F@susp
- Object: 4c740b7f0bdc728daf9fca05241e85d921a54a6e17ae47ed1577a2b30792cf5c
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.4
- Object: 4cb2d08cfc3ea3549f3caa147ef899f808ccedd131c7a58ed281ef52de12f7a2
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.Foreign.Gen.2
- Object: 4cc61f47b9aaddc03fa981bf580b4c54df2686484c27a96b3aff3b7871e0fc2a
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.Foreign.Gen.2
- Object: 4cf536f330b711ec46b1893d977bfa92c5036c103f57d2b0ea161d1d04af37cd
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Win32.Trojan-Downloader.Cabby.C
- Object: 4cf536f330b711ec46b1893d977bfa92c5036c103f57d2b0ea161d1d04af37cd
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
- Object: 4ebab908cc77dc9daf85909e737f7885bb0ca2568c35bae4a762e26de6d9032e
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:HackTool.WinCred.2
- Object: 51a9a45446bf656a681d41971d6f4b008a0bb21a298efe9a8feed8d22057462b
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Win32.Trojan-Ransom.Cryptolocker.F@susp
- Object: 51a9a45446bf656a681d41971d6f4b008a0bb21a298efe9a8feed8d22057462b
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Ser.Johnnie.3796
- Object: 56733093b97481ba54d82ce372335876602e679e57492559e984839c76bbfe60
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Graftor.148873
- Object: 66220c002f66085d9f873e796ad51925ad9a71addf1c4ff3fdd3101904ed60c3
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Symmi.51484
- Object: 664d484960d70f0dabeddeb9ac4dfb8ed2e990ad0e044eb90db19f9828ac4711
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Backdoor.Generic.929786
- Object: 6923940b1bec588095ea8327f30804b82e5bbb316d3466971f14ea7ba1b93f83
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
- Object: 79658e005c464bab422f87a1b5c562f2fcc87d984677e82e8b0bee63c2f92e91
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:HackTool.WinCred.2
- Object: 8425e21ff8e67b7a234b1f93a869809d03cdd325835fbaf9c61749d6e1810341
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
- Object: 90e935f3e5917842f0cc4560633e35c749a916f024c009c2bd3f9ec54930f72f
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.Foreign.Gen.2
- Object: 92d0e67507f277389a27a6534200698b24aaaf48c2e2983b1e828040cb876284
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:HackTool.WinCred.2
- Object: 9a51f6861c6c5dde68c3ef153e53cfbbf9ea965307291b86b493bd916cc03f04
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Graftor.144274
- Object: b02dc0fcb42c444d2fadab7814afb7148a1a81b576a4d6c1220d5d11a279de64
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
- Object: b85c712180519f819c0ce7bfb0b178fe05385caa6426ba5b32c1551788165f39
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Ser.Zusy.3303
- Object: bbb5ae14de09bf560a206ced8769d24c35af27232dc01c3f59a5f4762398d711
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Graftor.144274
- Object: bea5b1e72c25d978222b27766acd89cc83ff715ef6699589d0422a31393698f0
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Kazy.400775
- Object: ea5981c8268d3b73f82865935234bb28f1172ff34e61b45439753c9c6b4991ad
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.Agent.BEUB
- Object: ec17168e49cd12795819e1ca4cddce608f14a894a54b3a4384ee390cad8d6580
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Trojan.GenericKD.31673419
- Object: f916002bf7277149eae7b725d92e3f55b758d79938a1c576295c3087722e8087
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Win32.Trojan-Ransom.Cryptolocker.F@susp
- Object: f916002bf7277149eae7b725d92e3f55b758d79938a1c576295c3087722e8087
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Trojan.Ipatre.1
- Object: ff9c36dab952808c638183e8363d1c364b77dfe1df269125b82e5037c73d17bb
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Win32.Trojan-Downloader.Cabby.C
- Object: ff9c36dab952808c638183e8363d1c364b77dfe1df269125b82e5037c73d17bb
- In archive: C:\Users\Jkc\Desktop\virus\归档 (2)\f34afe43df50f08c7d62250d4348b3c902858eb5555338c97de5375bf867bac4.exe
- Status: Virus detected
- Virus: Gen:Variant.Cabby.3
复制代码
|