The statistics that are listed here are the Day0 test. I.E. what are the results on the day that we acquire any binary and is tested. We also have included all the re-test results over the same calendar day. Each vendor should improve as they start detecting the older and more common malicious binaries.

Each of the vendor's update process is executed prior to each run to ensure that the latest virus signatures are loaded for our tests.

The tables on each page represent the results of the Anti-Virus tests against the malware that we collect each day. Each AV vendor has different capabilities and success in detecting malware that is collected. No single vendor detects 100%, nor can they ever. To expect complete protection will always be science-fiction.

That being said, you can see the different statistics of the different vendors in our charts. It can be confusing since each vendor uses a different name for each infection type and family. All tests are done with the same set of binaries for each vendor. We continue to test each of the binaries until each vendor is able to detect each piece of malware in our repository. Where ever possible we have attempted to contact the vendor for assistance with the command line options that we use. Otherwise we try different options to produce the highest detection rate available from the options.

Time Periods

In all cases the time periods listed for the charts are summarizations for that specific time period. So for the Re-Tests, the time period does not represent the interval for testing. ie, the weekly charts are for the last seven days of processing. The seven day Re-Test chart does not represent that the binaries were re-tested once in that period. It does represent a summarization of the processing and testing of the binaries in that time period.

AV Results for Comparisons

It is difficult to not compare one vendor to the next due to how we have the data structured on the pages. It would be impossible not to try and derive conclusions from those results. While that is the case, our goal is not to create a real comparison site for everyone to try and compete to see which AV vendor is better than the next. There are a multitude of those already, each of which have their own sets of malware to test and rules that they follow for complete their testing. That is not our purpose. We do not have a specific set of malware to test. We instead gather in new malware daily and test it against the different vendors.

The versions of AV engines that we have are as new as the vendor can provide us and updated at least hourly if not more frequently. But they are gateway or fileserver products for the most part. We do have plans for using full consumer AV applications as well, but that will take time and much more in donations to allow us to build the back end for that. We will get to it, just not today.

AV Vendor List

The following Vendor tables show which of the AV vendors we are currently using as well as the engine and signature level of each application. In most cases we are using the command-line-interface versions, gateway versions, or file server versions. These are not the normal home user versions and in some cases are special versions for anti-virus test systems. The data within the tables is being pulled from the live systems and updated twice a day. The actual engines and signatures are attempted to be updated prior to each malware run whether it is from the day0 test or for a retry. So the applications should be as updated as possible before testing occurs.

The current list of AV tools that we use are as follows:

Linux Vendor List

Vendor Engine Signatures Command Options
Authentium 4.6.5 201701042327 aiscan --nomem --nombr --noboot --all --pua
Avast 2.1.0 16121901 scan -b -f -u
AVG 13.0.3114 4477/13612 avgscan --heur --arc --macrow --pwdw --repok --pup
Avira avscan --batch -noboot -nombr -s -rs --scan-in-archive --alltypes --allfiles --without-PCK -nomem --heur-level=3 --alert-action=none
BitDefender 7.2 Thu Apr 28 15:58:07 2016 bdc -arc -noclean
Clam 0.99.1 22836 clamscan --no-summary --detect-pua -r
DrWeb drweb -ar -cn -ha -ok -path=$1
eScan 5.6.0 7.65208 escan -ly
Eset 3.0.21 14691 (20161230) esets_scan --adv-heur --adware --sfx --unsafe --unwanted
FProt 201612182114 fpscan --scanlevel=4 --heurlevel=4 --archive=99 --adware --report
FSecure 11.00 build 79 Wednesday, 4 January 2017_16 fsav --allfiles=yes --scanexecutables=yes --archive=yes --mime=yes --riskware=yes --virus-action1=report --riskware-action1=report --suspected-action1=report --auto=yes --list=yes
Ikarus 3.00.11 04.01.2017 t3scan
McAfee 5800.7501 8398 created Jan 4 2017 uvscan --recursive --noboot --program --mime --unzip --secure --!guru --!server
QuickHeal 11.00 02 January, 2017 qhscan -DNAScan -ARCHIVE -WARE -LIST -PACKED -REPORT=$tmp
Sophos 5.16.0 5.34 sweep -all -archive
TrendMicro 9.850-1008 Sunday, 18 December 2016 vscantmrh -S -NC -NM -NB

Windows Vendor List

Vendor Engine Signatures Command Options
AhnLab Thursday, 5 January 2017.00 Thursday, 5 January 2017.00 v3tmedic.exe /scantype:all /cure:off
Authentium 5.4.11 201701042142 aiscan.exe --nomem --nombr --noboot --all --pua
Avast command-line scanner 170104-0 ashcmd /_ /s /d /p /a /c /i /t=a /x=P /e=100 /r=report
AVG 10.0.4311 271/13203 avgscanx.exe /HEUR /ARC /MACROW /PWDW /REPOK /PUP
Avira scancl --nombr /s /z /a --nomem --heurlevel=3
BitDefender 7.1 Thu Jan 5 01:02:53 2017 bdc.exe -arc -noclean
Clam 0.99 22836 clamscan --no-summary --detect-pua -r
Comodo 5.1 26392 cavscons /h2 /c
DrWeb Wednesday, 28 December 2016 12:37 dwscancl /ar /ha /ok /sls- /sps-
eScan 14.0.241 Tue Dec 20 04:50:31 2016 mwavscan.com /subfolders /snoc /fs /self /nomutex /silent
Eset 14717 (20170104) ecls /adv-heur /adware /sfx /unsafe /unwanted
Fortinet 5.4.233 41.913, vscanner.exe -V -gALL
FProt 201701050007 bin64\\MS\\fpscan64.exe -i \\antivir.def --scanlevel=4 --heurlevel=4 --archive=99 --adware --report
FSecure 11.00.19100 Monday, 21 December 2015 fsav /ALL /ARCHIVE /NOBOOT /SPYWARE
GData AVA 25.9971,GD 25.8552 04.01.2017,04.01.2017 avkcmd.exe /scan(e0):
Ikarus 1.09.05 22.08.2015 t3scan
K7 9.247.22000 k7cscn32.exe
K7GW 9.213.18722 k7cscn32.exe
McAfee 5800.7501 8398 created Jan 4 2017 scan.exe /RECURSIVE /NOBOOT /ALLOLE /MIME /PROGRAM /UNZIP /SECURE
Microsoft 1.13303 Wed Jan 04 09:18:51 2017 mpscanp.exe /report /rptall
QuickHeal 14.00 04 January, 2017 qhscan /DNAScan /ARCHIVE /WARE /LIST /PACKED
Sophos 3.61.0 5.34 sav32cli.exe -ndi -ns -nb -all -rec -nremove -eec -sc -f -tnef -mime -oe -pua -suspicious -archive -nmbr -nmem
Sunbelt 3.9.2557.2 54968 vscan /r /v
Symantec Norton360 LiveUpdate symscan.exe /defs
TrendMicro 9.850-1008 Wednesday, 4 January 2017 vscantm.exe /S /NM /NB /NC


These reports are updated once a day.

Getting New Scanners Added

If you are an AV vendor and would like to have your scanner added to our list, please email admin<at>shadowserver.org for that request. We will need a CLI version of the scanner for Linux or Windows (or both if you have them). We will need to know how to update the subscriptions and data files. We would also like to have the suggested running options for your scanner.

AV Processing Statistics

This chart is the total number of files processed by the AV test system.

Zero AV Detection Statistics

These statistics are the result of AV testing over a 48-hour period and how many files were still not detected by any single vendor. There is a severe change in the results after 2011-07 which is when we added in the Windows AV scanners to our test suite. While on most days the results are not zero, the values are so low as to not be seen in the current chart.

<< | Statistics | >>