如果你想获得更好的查杀体验,建议下载我们的客户端
在线查杀
SHELLPUB 专注查杀 WEBSHELL,免费好用的在线 WEBSHELL 查杀工具
请拖拽zip文件到区域内,最大支持10MB
安全
Result for URL_QUERY.zip
SHA1
ca872cfaff841d474ad9baf9e1f4df30893cdf3d
MD5
ea7e321e1db34138f3b804fb9a970cf9
Size
84932 Byte
Version
1.0.0 alpha
检测结果
25/71/144(后门/疑似/文件总数)
结果列表
下载
结果详情文件名
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S0__B1__da8cceda8139.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S0__B4__955e469a283f.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S1__B2__8eec187dbdd8.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S0__B2__0e6181e78e19.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S1__B1__214704ca114f.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S1__B3__b8bdb0708e45.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S0__B3__449b76c85090.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S1__B4__ad5c1b72fb39.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S2__B1__f66a9d44a69e.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S2__B3__ea054922e31a.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S3__B1__c94c68d9a27b.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S2__B2__6a881b0ea994.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S2__B4__d443d692813b.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S0__B1__540febd89037.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S3__B3__284179c6a1df.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S3__B2__322e96ca7e6e.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S1__B1__93462164093f.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__FILTER_INPUT_GET__SK_S3__B4__fb9c3ae6c66e.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S0__B2__d5558b0c3e54.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S0__B3__bd57a8fd3c2d.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S0__B4__ad805cabc422.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S1__B2__318681f1725f.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S1__B4__6047b2e153fa.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S1__B3__a8380173f969.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S2__B1__4454484777eb.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S3__B1__f1ccfcc86c0d.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S2__B3__bc75731ee1ea.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S3__B4__2f5d48860de9.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__GET_ISSET__SK_S0__B1__730232027f92.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S2__B2__e964fcbb566d.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S2__B4__976d48a8235e.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S3__B2__b11e3c6957b5.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_DIRECT__SK_S3__B3__08010fa8bde9.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S0__B2__dcb7400e4abf.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S0__B4__46f0f2de70f5.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S0__B3__eed3d4d6ea20.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S1__B1__583713fac056.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S1__B2__6d61b1c27870.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S1__B4__b679ad54e213.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S1__B3__381c5e8b4e9b.php
BLACKPHP命令执行类木马/URL_QUERY/URL_QUERY__GET_ISSET__SK_S3__B1__35e215cc6b6f.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S2__B1__444203bf17dd.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S2__B3__7ad0999f715f.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S2__B2__f8318d311f50.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S2__B4__02dd6dace626.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S3__B2__a9b40f809ec7.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S3__B3__344eb808dd3c.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__GET_ISSET__SK_S3__B4__ecea96a635d3.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S0__B2__ed6469f60569.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S0__B1__8ad8362d866d.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S0__B3__e33ed2d5971a.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S0__B4__e9338e716b6d.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S1__B2__e2daddb98c57.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S1__B1__cce2831e2ed3.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S1__B3__2c446aa0bad8.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S1__B4__7583548be0d6.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S2__B1__d213e4316e6a.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S2__B2__267cf12ccca9.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S2__B4__aacff81cccc2.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S2__B3__0d9177e8a9a2.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S3__B1__8c46e678fcd4.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S3__B2__77939b8ef2ed.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S3__B3__fe9a2e0682f4.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__QUERY_STRING_PARSE__SK_S3__B4__5a314f2193db.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S0__B1__bb3aa7979442.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S0__B2__43794f3bf548.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S0__B4__2d940ffe66e3.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S0__B3__df337dd82eaf.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S1__B1__0800097932e4.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S1__B3__1cd524565ee5.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S1__B2__c67314d48bd2.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S2__B1__d1be53b87f96.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S1__B4__e8b5f47b640d.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S2__B2__17f074686236.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S2__B4__558b0d1603cd.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S2__B3__07cd383178dc.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S3__B1__0134f5568fa3.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S3__B3__79e7dbe2abd2.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S3__B2__3bb07bc94128.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REGEX_IN_URI__SK_S3__B4__48ee6848256a.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S0__B1__7a7fcfbf64fa.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S0__B3__d57f9bcd6a31.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S0__B2__a449e2e2a6b8.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S0__B4__e8a14d59b269.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S1__B1__4e3e98ad01f2.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S1__B2__8b1a5e02ba22.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S1__B4__7fe8188d6ab3.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S1__B3__22bf4db58c32.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S2__B1__f2c91d9e3cab.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S2__B2__af3cff82a016.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S2__B3__16f539c34c17.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S2__B4__892114c2f524.php
BLACKPHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S3__B1__522bbae763e8.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S3__B2__69bb14d4bb67.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S3__B3__f2efcde51eeb.php
SUSP疑似PHP命令执行webshell/URL_QUERY/URL_QUERY__REQUEST_URI_QUERY_PARSE__SK_S3__B4__beecb4d77bfc.php
如果检测到恶意文件,该怎么操作
1
移除网站中的恶意文件
2
移除后,在重新打包并上传检测是否存在恶意文件
3
更改你的密码(如ftp密码,网站后台密码,数据库密码,系统密码等)
4
定期检查网站是否存在后门以及安全问题,确保网站安全
Q&A
为什么上传会失败?

上传失败,原因可能有四种:

1.上传的文件大小超过了10MB, 文件多扫描时请耐心等待

2.上传的文件格式不正确,不是标准的zip包文件

3.网络不稳定,文件上传不完全;这种请刷新并重新上传

4.浏览器版本太低,推荐使用chrome或者包含chrome内核的第三方浏览器(如:360浏览器)

结果不准确?

如果您发现有误报、漏报的情况,可以将误报、漏报的样本压缩后发送到feedback@shellpub.com,并在邮件标题中注明【漏报】或【误报】,其他任何关于webshell查杀方面的问题,均可以联系我们

这个服务是免费的吗?

目前不收费,多次上传不限制数量,下载客户端 会体验更好

河马在线查杀,是河马查杀客户端的在线版本,最新的检测能力均会首先集成到在线版上;河马查杀自主开发的webshell检测引擎拥有完整的知识产权,采用静态分析、动态分析、特征匹配、机器学习多种技术检测webshell