其实弱弱的告诉你,查看卡巴斯基的 traces 还有一个惊人的发现。有谁想研究下迅雷的一个进程?
INF aveng klavsys: #31574136 Scan process memory, pid = 4764, upid = 15404938729991562234, imagePath = C:\Windows\ThunderboltService.exe
15:04:22.467 0x16b0 INF aveng klavsys: #446478 avengine::IEngine (clsid 0x712d948d) iface ptr = 1E53DBB0
15:04:22.467 0x16b0 INF aveng [CTX:0x0E597158] Context created : 0xc0102
15:04:22.467 0x16b0 INF aveng [CTX:0x0E597158] engineExt:0x00000000 engineInt:0x0C1E25E0 klavEngine:0x1E53DB40
15:04:22.467 0x16b0 INF aveng ITemporaryIoFactory - global
15:04:22.467 0x16b0 INF aveng DbgCntrs:0x0E5BF9B0 ret:0x0
15:04:22.467 0x16b0 INF aveng !IObjectNotifications
15:04:22.467 0x16b0 INF esm Can't provide interface requested iface=0xc2b9b0bd, serviceKey=0x00000000, hostId=0x00000000, accessPointId=0x00000000, requestor={unknown}. result=0xa6440003 (Can't find service specified)
15:04:22.467 0x16b0 INF bl [SrvLocator] GetInterface no interface for iid: 0xc2b9b0bd, clsid: 0x00000000
15:04:22.467 0x16b0 INF aveng [CTX:0x0E597158] !IContextRuntimeProperties
15:04:22.467 0x16b0 INF aveng CTX MODF 200
15:04:22.467 0x16b0 INF aveng [CTX:0x0E597158] Context initialized : 0xc0102
15:04:22.467 0x16b0 INF aveng SafeScan State:1 Policy:0 DeepScope:0
15:04:22.467 0x16b0 INF aveng [PJIM] PSP
15:04:22.467 0x16b0 INF aveng [PJIM] pp-e
15:04:22.467 0x16b0 INF aveng [CTX:0x0E597158] PP buf=0x00000000 size=0x00000000 flags=0x00000001 fmt=0x00000000 result=0x00000000
15:04:22.467 0x16b0 INF aveng astr: #33520212 err 0x80000046 at #177
15:04:22.467 0x16b0 INF aveng http: #29127711 err 0x80000046 at #88
15:04:22.473 0x16b0 INF aveng RNAM(K) OFF 7ABBF->#92:782AB[2D4D]
15:04:22.473 0x16b0 INF aveng klavsys: #28697567 Check rms for: Memory.MemoryScanner.ScanExtractedPE, 43404138, 0, 0, 5, 0
15:04:22.474 0x16b0 INF aveng klavsys: #28697567 Check rms for: Memory.MemoryScanner.ScanExtractedPE, 43404138, 0, 0, 5, 0
15:04:22.474 0x16b0 INF aveng klavsys: #28697567 Check rms for: Memory.MemoryScanner.ScanExtractedPE, 43404138, 0, 0, 5, 0
15:04:22.474 0x16b0 INF aveng klavsys: #28697567 P2P data send limits check result: key = MEM:Trojan-Spy.Win64.Lotus.mem.silent:48386269, result = 0x00000000 (isLimitsExceeded = false)
15:04:22.474 0x16b0 INF aveng klavsys: #28697567 Check rms for: MEM:Trojan-Spy.Win64.Lotus.mem.silent, 48386269, 0, 0, 2, 0
|