查看: 3452|回复: 10
收起左侧

[求助] 我的电脑中了好些的病毒啊有红伞杀的大家帮看看

[复制链接]
龙影骑士
发表于 2008-6-12 11:43:48 | 显示全部楼层 |阅读模式
我的电脑中了好些的病毒啊有红伞杀的大家帮看看
也不知道是不是误报
我听说过小红伞常发生这事情
还有听说小红伞总是有死机的问题
不知道是不是真的??
龙影骑士
 楼主| 发表于 2008-6-12 11:59:50 | 显示全部楼层
Avira AntiVir Personal
Report file date: 2008年6月12日  09:59

Scanning for 1327179 virus strains and unwanted programs.

Licensed to:      Avira AntiVir PersonalEdition Classic
Serial number:    0000149996-ADJIE-0001
Platform:         Windows XP
Windows version:  (Service Pack 3)  [5.1.2600]
Boot mode:        Normally booted
Username:         SYSTEM
Computer name:    PC-200806051702

Version information:
BUILD.DAT     : 8.1.00.295      16479 Bytes    2008-4-9 16:24:00
AVSCAN.EXE    : 8.1.2.12       311553 Bytes   2008-3-18 03:02:58
AVSCAN.DLL    : 8.1.1.0         53505 Bytes    2008-2-7 02:43:38
LUKE.DLL      : 8.1.2.9        151809 Bytes   2008-2-28 02:41:24
LUKERES.DLL   : 8.1.2.1         12033 Bytes   2008-2-21 02:28:42
ANTIVIR0.VDF  : 6.40.0.0     11030528 Bytes   2007-7-18 04:33:34
ANTIVIR1.VDF  : 7.0.3.2       5447168 Bytes    2008-3-7 07:08:58
ANTIVIR2.VDF  : 7.0.4.120     2206720 Bytes    2008-6-1 01:52:12
ANTIVIR3.VDF  : 7.0.4.180      326144 Bytes   2008-6-11 01:52:26
Engineversion : 8.1.0.55  
AEVDF.DLL     : 8.1.0.5        102772 Bytes   2008-2-25 03:58:22
AESCRIPT.DLL  : 8.1.0.40       266618 Bytes   2008-6-12 01:54:02
AESCN.DLL     : 8.1.0.21       119156 Bytes   2008-6-12 01:53:46
AERDL.DLL     : 8.1.0.20       418165 Bytes   2008-6-12 01:53:40
AEPACK.DLL    : 8.1.1.5        364918 Bytes   2008-6-12 01:53:30
AEOFFICE.DLL  : 8.1.0.18       192890 Bytes   2008-6-12 01:53:20
AEHEUR.DLL    : 8.1.0.30      1253750 Bytes   2008-6-12 01:53:18
AEHELP.DLL    : 8.1.0.15       115063 Bytes   2008-6-12 01:52:48
AEGEN.DLL     : 8.1.0.28       307572 Bytes   2008-6-12 01:52:46
AEEMU.DLL     : 8.1.0.6        430451 Bytes   2008-6-12 01:52:36
AECORE.DLL    : 8.1.0.31       168310 Bytes   2008-6-12 01:52:32
AVWINLL.DLL   : 1.0.0.7         14593 Bytes   2008-1-23 11:07:54
AVPREF.DLL    : 8.0.0.1         25857 Bytes   2008-2-18 04:37:52
AVREP.DLL     : 7.0.0.1        155688 Bytes   2007-4-16 07:26:48
AVREG.DLL     : 8.0.0.0         30977 Bytes   2008-1-23 11:07:50
AVARKT.DLL    : 1.0.0.23       307457 Bytes   2008-2-12 02:29:24
AVEVTLOG.DLL  : 8.0.0.11       114945 Bytes   2008-2-28 02:31:32
SQLITE3.DLL   : 3.3.17.1       339968 Bytes   2008-1-22 11:28:04
SMTPLIB.DLL   : 1.2.0.19        28929 Bytes   2008-1-23 11:08:40
NETNT.DLL     : 8.0.0.1          7937 Bytes   2008-1-25 06:05:12
RCIMAGE.DLL   : 8.0.0.35      2371841 Bytes   2008-3-10 08:37:26
RCTEXT.DLL    : 8.0.32.0        86273 Bytes    2008-3-6 06:02:12

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:, D:, E:, F:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: 2008年6月12日  09:59

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'QQ.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'notepad.exe' - '1' Module(s) have been scanned
Scan process 'EXCEL.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'TXPlatform.exe' - '1' Module(s) have been scanned
Scan process 'QQ.exe' - '1' Module(s) have been scanned
Scan process 'ipmsg_ch.exe' - '1' Module(s) have been scanned
Scan process 'conime.exe' - '1' Module(s) have been scanned
Scan process 'GreenBrowser.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'PRLDHCP.EXE' - '1' Module(s) have been scanned
Scan process 'NVSVC32.EXE' - '1' Module(s) have been scanned
Scan process 'CTFMON.EXE' - '1' Module(s) have been scanned
Scan process 'safeboxTray.exe' - '0' Module(s) have been scanned
Scan process '360TRAY.EXE' - '0' Module(s) have been scanned
Scan process 'EXPLORER.EXE' - '1' Module(s) have been scanned
Scan process 'SPOOLSV.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'SVCHOST.EXE' - '1' Module(s) have been scanned
Scan process 'LSASS.EXE' - '1' Module(s) have been scanned
Scan process 'SERVICES.EXE' - '1' Module(s) have been scanned
Scan process 'WINLOGON.EXE' - '1' Module(s) have been scanned
Scan process 'CSRSS.EXE' - '1' Module(s) have been scanned
Scan process 'SMSS.EXE' - '1' Module(s) have been scanned
33 processes with 33 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
      [INFO]      No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
      [INFO]      No virus was found!
Boot sector 'D:\'
      [INFO]      No virus was found!
Boot sector 'E:\'
      [INFO]      No virus was found!
Boot sector 'F:\'
      [INFO]      No virus was found!

Starting to scan the registry.
The registry was scanned ( '20' files ).


Starting the file scan:

Begin scan in 'C:\' <WINXP>
C:\pagefile.sys
      [WARNING]   The file could not be opened!
Begin scan in 'D:\'
D:\TDDOWNLOAD\TY身份证复印件制作.rar
  [0] Archive type: RAR
发表帖子  --> ￉■ᄋ￝ᅱᄂᄌᄡᅮᄀᄐ?ᅱᅥᅲ?\AutoUpdate.exe
      [DETECTION] Is the Trojan horse TR/FlyStudio.AI.838
[完成后可按 Ctr  --> ￉■ᄋ￝ᅱᄂᄌᄡᅮᄀᄐ?ᅱᅥᅲ?\￉■ᄋ￝ᅱᄂᄌᄡᅮᄀᄐ?ᅱᅥᅲ?.exe
      [DETECTION] Is the Trojan horse TR/FlyStudio.AI.842
      [NOTE]      The file was deleted!
D:\TDDOWNLOAD\0001234OAschool\一个多学校OA办公系统(独有的)\context.asp
      [DETECTION] Contains suspicious code HEUR/HTML.Malware
      [NOTE]      The fund was classified as suspicious.
      [NOTE]      The file was moved to '48be8bc7.qua'!
D:\TDDOWNLOAD\0001234OAschool\一个多学校OA办公系统(独有的)\context_.asp
      [DETECTION] Contains suspicious code HEUR/HTML.Malware
      [NOTE]      The fund was classified as suspicious.
      [NOTE]      The file was moved to '48be8c59.qua'!
D:\TDDOWNLOAD\0001234OAschool\一个多学校OA办公系统(独有的)\include\clsUp.asp
      [DETECTION] Contains detection pattern of the HTML script virus HTML/ADODB.Exploit.Gen
      [NOTE]      The file was moved to '48c38c58.qua'!
龙影骑士
 楼主| 发表于 2008-6-12 12:32:34 | 显示全部楼层
D:\TDDOWNLOAD\图章制作专家绿色破解版\图章制作专家绿色破解版\图章制作专家4.20.exe
      [DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
      [NOTE]      The file was moved to '9a8706e2.qua'!
Begin scan in 'E:\' <ENGLISH XP>
E:\Program Files\Alexa Toolbar\uninstall.exe
      [DETECTION] Is the Trojan horse TR/Horse2.ewv.28
      [NOTE]      The file was moved to '48b98c76.qua'!
E:\zyh\工具备份\杀病毒\通用病毒杀灭机1.rar
  [0] Archive type: RAR
  --> fix.exe
      [DETECTION] Is the Trojan horse TR/Doreg
      [NOTE]      The file was moved to 'be16027a.qua'!
E:\zyh\工具备份\杀病毒\通用病毒杀灭机1\fix.exe
      [DETECTION] Is the Trojan horse TR/Doreg
      [NOTE]      The file was moved to '48c88dc1.qua'!
E:\zyh\工具备份\常用的\HtmlEdit.rar
  [0] Archive type: RAR
l+Enter 发布]  预  --> HtmlEdit\ᅨ￉ᅧ?HTMLᄆ¢ᄐᆳᅥ?.exe
      [DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
      [NOTE]      The file was moved to '48bd8dd8.qua'!
E:\zyh\HtmlEdit\HtmlEdit\松鼠HTML编辑器.exe
      [DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
      [NOTE]      The file was moved to '48992c92.qua'!
E:\TDDOWNLOAD\TweakAssistCenter.rar
  [0] Archive type: RAR
  --> TweakAssistCenter\sp2tcppatch.exe
      [DETECTION] Is the Trojan horse TR/Virtl.Tcppatch.A.3
      [NOTE]      The file was moved to '48b58dee.qua'!
E:\TDDOWNLOAD\999gold\admin\Ft_code.asp
      [DETECTION] Contains detection pattern of the HTML script virus HTML/ADODB.Exploit.Gen
      [NOTE]      The file was moved to '48af8e4c.qua'!
E:\TDDOWNLOAD\999gold\admin\Ft_upfile_class.asp
      [DETECTION] Contains detection pattern of the HTML script virus HTML/ADODB.Exploit.Gen
      [NOTE]      The file was moved to '48af8e4d.qua'!
E:\winxp\aa\AlexaInstaller.exe
      [DETECTION] Is the Trojan horse TR/Horse2.ewv.36
      [NOTE]      The file was moved to '48b58ef0.qua'!
E:\需要发邮件给我的\zwf\gaohui\COSMOCOM\presentation\CD Presentation 6-25f_files\slide0045_image088.emz
      [WARNING]   An exception has been identified!
      [WARNING]   In the module 'aecore.dll' an exception occured.
Calling the function AVEPROC_TestFile in file: \\?\E:\需要发邮件给我的\zwf\gaohui\COSMOCOM\presentation\CD Presentation 6-25f_files\slide0045_image088.emz
Error description:ACCESS_VIOLATION
  EAX = 00000000  EBX = 010DF338
  ECX = 00000300  EDX = 02B609D8
  ESI = 02B609A8  EDI = 02b609a8
  EIP = 00000B02  EBP = 02B609A8
  ESP = 01F6E694  Flg = 00010216
  CS = 00000023   SS = 0000001B
E:\u\新建文件夹\txzs.rar
  [0] Archive type: RAR
    --> txzs\bangzhu.chm
      [1] Archive type: CHM
      --> /bangzhu/￧ラナ₩ᆵメ¥ナヘ￧ヨᆱ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¥ナᄈ¦ᄎホ₩マミ¦ᄎᄂ₩ワᆰ￧゚ᆬ₩ユᄚ₩ヘᆴ¥ᄎモ¦﾿ᄀ₩チᆵ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/│ᄑᆵ¦ᄏᄊ¥ᄐタ¥マム.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/₩ト゚│ᄚᄁ¥ミヘ¥ヘユ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/¥゚ᄎ₩ワᆲ¦﾿ᄀ₩チᆵ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¦﾿ᄀ₩チᆵ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¦﾿ᆴ¥ᄂヘ/¥ᆴノ¥ナᄄ₩ᆪタ₩゚ᆬ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¦﾿ᆴ¥ᄂヘ/¥ミᆵ¥ハᄄ←ᄀᄍ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/¦ᄐリ¥フヨ│ᆴᄒ￧ᄑᆴ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /NewTopic.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /¥ナᄈ¦ᄎホ│ᄡᄡ¥﾿テ¥ハᄅ₩ノヒ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¥ナᄈ¦ᄎホ│ᄡᄡ¥﾿テ¥ハᄅ₩ノヒ/│ᄡᄡ¥﾿テ¥ハᄅ₩ノヒ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚￧ロム₩ホᄃ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚│ᆴᄒ￧ᄑᆴ/₩ワヘ¥ハᄀ¦ᄐリ¥フヨ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚│ᆴᄒ￧ᄑᆴ/₩マメ¦ᄏᄊ¥ナヘ￧ヨᆱ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¥ᄋᆬ¥ナᄋ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¦﾿ᆴ¥ᄂヘ/¥゚ᄎ₩ワᆲ¦﾿ᆴ¥ᄂヘ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/│ᄡᄡ¥﾿テ│﾿ロ￧ᄄヒ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚│ᆴᄒ￧ᄑᆴ/￧ᄑム¥ンタ¥ナヘ￧ヨᆱ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/￧ᄈᄏ￧ᄏ゚¦﾿ᆴ¥ᄂヘ/₩ノᆱ₩ママ¦﾿ᆴ¥ᄂヘ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¦ᄑ﾿￧ヤᄄ│ᆵᄡ₩リホ/│ᄑᆵ¦ᄏᄊ¥ヘᄌ│ᄑᄑ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/₩ヘミ¥ハᄅ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/￧ノネ₩ワᆲ¥ホニ¥マᄇ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/│チヤ￧ᄈᄏ₩ヨᄍ¥ᄐマ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      --> /bangzhu/¥ᄌᄌ│ᄃチ←ラᆴ←ᄁリ.htm
          [DETECTION] Contains detection pattern of the HTML script virus HTML/Infected.WebPage.Gen
      [NOTE]      The file was moved to '48ca91df.qua'!
E:\10\qqchat.zip
  [0] Archive type: ZIP
  --> qqchat.exe
      [DETECTION] Contains detection pattern of the dropper DR/Agent.1137
    --> qqchat.exe
      [1] Archive type: RAR SFX (self extracting)
      --> vsf.rdu
          [DETECTION] Is the Trojan horse TR/Dldr.VB.cpe
      [NOTE]      The file was moved to '48b3921d.qua'!
E:\10\qqchat\qqchat.exe
  [0] Archive type: RAR SFX (self extracting)
  --> vsf.rdu
      [DETECTION] Is the Trojan horse TR/Dldr.VB.cpe
      [DETECTION] Contains detection pattern of the dropper DR/Agent.1137
      [NOTE]      The file was moved to '49346c96.qua'!
Begin scan in 'F:\'
F:\桌面上的东西\luan\shop\飞达网上商城购物网站系统源代码网页模板正式版\bbs\boke\UploadFile\1\2007-9\20079231649655816.jpg
      [DETECTION] Contains a detection pattern of the (dangerous) backdoor program BDS/ASP.Ace Backdoor server programs
      [NOTE]      The file was moved to '4880981f.qua'!
F:\桌面上的东西\luan\shop\飞达网上商城购物网站系统源代码网页模板正式版\bbs\UploadFile\2007-9\200792316381389068.jpg
      [DETECTION] Contains a detection pattern of the (dangerous) backdoor program BDS/ASP.Ace Backdoor server programs
      [NOTE]      The file was moved to '48809821.qua'!
F:\桌面上的东西\luan\任务栏时间增强器\任务栏时间增强器.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XPACK.Gen
      [NOTE]      The file was moved to 'b05fea93.qua'!
F:\桌面上的东西\luan\xms\QQ空间小秘书\QQ空间小秘书.exe
      [DETECTION] Contains suspicious code HEUR/Crypted
      [NOTE]      The file was moved to 'c2ca9845.qua'!
F:\System Volume Information\_restore{EB64E17A-F156-4AA0-8E97-B0E43410E362}\RP5\A0000478.exe
      [DETECTION] Contains detection pattern of the worm WORM/Nuj.A.274
      [NOTE]      The file was moved to '48809979.qua'!


End of the scan: 2008年6月12日  11:34
Used time:  1:35:21 min

The scan has been done completely.

   5182 Scanning directories
339763 Files were scanned
     46 viruses and/or unwanted programs were found
      3 Files were classified as suspicious:
      1 files were deleted
      0 files were repaired
     21 files were moved to quarantine
      0 files were renamed
      1 Files cannot be scanned
339717 Files not concerned
   3800 Archives were scanned
      2 Warnings
     22 Notes
饼爱饼
发表于 2008-6-12 12:35:02 | 显示全部楼层
信不过的怕误报的话,要不上传样本到论坛,要不自己上传到http://www.virustotal.com/看结果
~fishx
发表于 2008-6-12 15:07:52 | 显示全部楼层
有啥问题??
龙影骑士
 楼主| 发表于 2008-6-12 15:51:25 | 显示全部楼层
上面这些是小红伞扫出来的
我看不懂,你们看看,是不是有病毒
snakebone
头像被屏蔽
发表于 2008-6-12 16:18:21 | 显示全部楼层
看不全懂,但发现有一些被报了HTML/ADODB.Exploit.Gen的asp文件可能是误报,我最近在做毕业设计,下载了一下模板,里面有一些就被报成了HTML/ADODB.Exploit.Gen
其它一些被明确说出名称的BDS/ASP.Ace Backdoor server 、TR/Doreg等就还是删了吧,看到楼主有一些像QQ小秘书、任务栏时间增强器这样的小软件,个人觉得不是很正规,请小心查一下,如果真是误报就排除。
will
发表于 2008-6-12 18:15:29 | 显示全部楼层
建议楼主还是把样本上传上来吧 :-)
流动的云
发表于 2008-6-12 18:16:06 | 显示全部楼层
一些不出名的小软件极有可能是误报(如果楼主十分确定他们不是病毒的话),比如
E:\zyh\工具备份\杀病毒\通用病毒杀灭机1.rar
  [0] Archive type: RAR
  --> fix.exe
      [DETECTION] Is the Trojan horse TR/Doreg
      [NOTE]      The file was moved to 'be16027a.qua'!
E:\zyh\工具备份\杀病毒\通用病毒杀灭机1\fix.exe
      [DETECTION] Is the Trojan horse TR/Doreg
      [NOTE]      The file was moved to '48c88dc1.qua'!
E:\zyh\工具备份\常用的\HtmlEdit.rar
  [0] Archive type: RAR
l+Enter 发布]  预  --> HtmlEdit\ᅨ￉ᅧ?HTMLᄆ¢ᄐᆳᅥ?.exe
      [DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
      [NOTE]      The file was moved to '48bd8dd8.qua'!
E:\zyh\HtmlEdit\HtmlEdit\松鼠HTML编辑器.exe
      [DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
      [NOTE]      The file was moved to '48992c92.qua'!
E:\TDDOWNLOAD\TweakAssistCenter.rar
  [0] Archive type: RAR
  --> TweakAssistCenter\sp2tcppatch.exe
      [DETECTION] Is the Trojan horse TR/Virtl.Tcppatch.A.3
      [NOTE]      The file was moved to '48b58dee.qua'!

楼主可以上报,不行的话就添加到exceptions
spaceplane
发表于 2008-6-12 18:16:37 | 显示全部楼层
我明和你说吧,全是误报
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-22 17:10 , Processed in 0.116056 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表