查看: 3764|回复: 12
收起左侧

[病毒样本] 20090329 1个

[复制链接]
killloop
发表于 2009-3-29 11:54:19 | 显示全部楼层 |阅读模式



Scan taken on 29 Mar 2009 03:34:18 (GMT)
A-Squared Found Trojan-Spy.Win32.Montp.y!IK
AntiVir Found nothing
ArcaVir Found Trojan.Dropper.Agent.Aitv
Avast Found Win32:Trojan-gen {Other}
AVG Antivirus Found Agent.AWUA
BitDefender Found Trojan.Generic.1428105
ClamAV Found nothing
CPsecure Found nothing
Dr.Web Found nothing
F-Prot Antivirus Found nothing
F-Secure Anti-Virus Found nothing
Ikarus Found Trojan-Spy.Win32.Montp.y
Kaspersky Anti-Virus Found nothing
NOD32 Found nothing
Norman Virus Control Found nothing
Panda Antivirus Found Generic
Quick Heal Found Trojan.Agent.irc
Sophos Antivirus Found nothing
VirusBuster Found nothing
VBA32 Found nothing






软件名称引擎版本
病毒库版本
病毒库时间
扫描结果
时间
a-squared4.0.0.32200903290053122009-03-29-
40.126
AntiVir7.9.0.1297.1.2.2282009-03-27-
1.977
Authentium5.1.12009032817392009-03-28-
3.134
AVAST!3.0.1090328-02009-03-28Win32:Trojan-gen {Other}
0.062
AVG7.5.52.442270.11.31/20282009-03-28Agent.AWUA
1.969
BitDefender7.81008.28159077.244782009-03-29Trojan.Generic.1428105
4.933
CA (VET)9.0.0.14331.6.64212009-03-28-
40.131
ClamAV0.94.291782009-03-29-
0.245
Comodo3.810872009-03-28-
40.127
CP Secure1.1.0.7152009.03.292009-03-29-
7.848
Dr.Web4.44.0.91702009.03.292009-03-29-
4.496
F-Prot4.4.4.56200903282009-03-28-
2.979
F-Secure5.51.61002009.03.28.092009-03-28-
0.098
GData19.4291/19.279200903292009-03-29-
40.127
IkarusT3.1.01.482009.03.29.724922009-03-29Trojan-Spy.Win32.Montp.y
2.953
Microsoft1.45022009.03.282009-03-28-
40.126
mks_vir2.012009.03.292009-03-29-
2.726
Norman6.00.066.00.002009-03-27-
8.009
nProtect20090328.0133818412009-03-28-
40.130
Quick Heal10.002009.03.282009-03-28-
40.127
Sophos2.85.04.402009-03-29-
1.934
Sunbelt506650662009-03-28-
40.127
The Hacker6.3.3.8v002952009-03-28-
40.126
VBA323.12.10.120090327.15542009-03-27-
4.559
ViRobot200903272009.03.272009-03-27-
40.126
VirusBuster4.5.11.1010.102.26/10548002009-03-28-
1.775
卡巴斯基5.5.102009.03.282009-03-28-
0.071
安博士V32009.03.28.022009.03.282009-03-28-
40.140
安天2.0.1820090329.22524472009-03-29-
0.169
江民杀毒11.0.7062009.03.282009-03-28-
40.127
熊猫卫士9.05.012009.03.282009-03-28-
40.126
瑞星20.021.22.60.002009-03-29-
40.142
赛门铁克1.3.0.2420090328.0032009-03-28-
33.688
趋势科技8.700-10045.928.152009-03-28-
0.029
迈克菲5.3.0055672009-03-28-
3.886
金山毒霸2009.2.5.152009.3.28.152009-03-28-
40.132
飞塔2.81-3.11710.2142009-03-28-
40.128




反病毒引擎版本最后更新扫描结果
a-squared4.0.0.1012009.03.29Trojan-Spy.Win32.Montp.y!IK
AhnLab-V35.0.0.22009.03.28Win-Trojan/Xema.variant
AntiVir7.9.0.1292009.03.27-
Antiy-AVL2.0.3.12009.03.29-
Authentium5.1.2.42009.03.28-
Avast4.8.1335.02009.03.28Win32:Trojan-gen {Other}
AVG8.5.0.2852009.03.28Agent.AWUA
BitDefender7.22009.03.29Trojan.Generic.1428105
CAT-QuickHeal10.002009.03.28Trojan.Agent.irc
ClamAV0.94.12009.03.29-
Comodo10872009.03.28-
DrWeb4.44.0.091702009.03.29-
eSafe7.0.17.02009.03.27-
eTrust-Vet31.6.64212009.03.27-
F-Prot4.4.4.562009.03.28-
F-Secure8.0.14470.02009.03.28-
Fortinet3.117.0.02009.03.28PossibleThreat
GData192009.03.29Trojan.Generic.1428105
IkarusT3.1.1.48.02009.03.29Trojan-Spy.Win32.Montp.y
K7AntiVirus7.10.6842009.03.28Trojan.Win32.Malware.3
Kaspersky7.0.0.1252009.03.29-
McAfee55672009.03.28-
McAfee+Artemis55672009.03.28Generic!Artemis
McAfee-GW-Edition6.7.62009.03.28-
Microsoft1.45022009.03.28Trojan:Win32/Meredrop
NOD3239722009.03.28-
Norman6.00.062009.03.27-
nProtect2009.1.8.02009.03.29Trojan-Dropper/W32.Agent.1403160
Panda10.0.0.102009.03.29Generic Trojan
PCTools4.4.2.02009.03.28-
Prevx1V22009.03.29-
Rising21.22.60.002009.03.29Dropper.Win32.Nodef.bj
Sophos4.40.02009.03.29-
Sunbelt3.2.1858.22009.03.28Trojan.1
Symantec1.4.4.122009.03.29-
TheHacker6.3.3.8.2952009.03.28Trojan/Agent.bwnd
TrendMicro8.700.0.10042009.03.28-
VBA323.12.10.12009.03.27-
ViRobot2009.3.27.16662009.03.27Trojan.Win32.Agent.916762

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
江湖的fans
发表于 2009-3-29 12:24:01 | 显示全部楼层
瑞星杀掉
黑衣~魂
发表于 2009-3-29 12:25:55 | 显示全部楼层
TO DW
sbbdms
发表于 2009-3-29 14:31:59 | 显示全部楼层
Kaspersky miss
TO KL

Hello,


waigua.exe

No malicious code was found in this file.

>From: lovefuwa0411@qq.com
>Sent: Mar 29 2009 10:33AM
>To: "New Virus" <newvirus@kaspersky.com>
>Subject: virus
>
>
>
Regards, Tatarinov Ivan
Virus Analyst

10/1, 1st Volokolamsky Proezd, Moscow, 123060, Russia
Tel./Fax: + 7 (495) 797 8700
http://www.kaspersky.com http://www.viruslist.com

[ 本帖最后由 sbbdms 于 2009-3-29 14:55 编辑 ]
saga3721
发表于 2009-3-29 14:36:45 | 显示全部楼层
红伞运行报'TR/PSW.49152.52 [trojan]'
Palkia
发表于 2009-3-29 14:47:52 | 显示全部楼层
上报金山
sbbdms
发表于 2009-3-29 14:56:13 | 显示全部楼层
Hello,


waigua.exe

No malicious code was found in this file.

>From: lovefuwa0411@qq.com
>Sent: Mar 29 2009 10:33AM
>To: "New Virus" <newvirus@kaspersky.com>
>Subject: virus
>
>
>
Regards, Tatarinov Ivan
Virus Analyst

10/1, 1st Volokolamsky Proezd, Moscow, 123060, Russia
Tel./Fax: + 7 (495) 797 8700
http://www.kaspersky.com http://www.viruslist.com
SUZAKU
发表于 2009-3-29 18:52:54 | 显示全部楼层
卡巴斯基杀毒报告

扫描文件数:6

查杀(病毒、木马)数:0

详细杀毒报告列表:
kxmp
发表于 2009-3-29 19:15:52 | 显示全部楼层
Hello,

Thanks for taking the time to submit your samples to the Norman
Sandbox Information Center.  Customer delight is our top priority at
Norman.  With that in mind we have developed Sandbox Solutions for
organizations that are committed to speedy analysis and debugging.

Norman Sandbox Solutions give your organization the opportunity to
analyze files immediately in your own environment.

To find out how to bring the power of Norman Sandbox into your test
environments follow the links below.

Norman Sandbox Solutions
http://www.norman.com/Product/Sandbox-products/

Norman Sandbox Analyzer
http://www.norman.com/Product/Sandbox-products/Analyzer/

Norman Sandbox Analyzer Pro
http://www.norman.com/Product/Sandbox-products/Analyzer-pro/

Norman SandBox Reporter
http://www.norman.com/Product/Sandbox-products/Reporter/

waigua.rar : Not detected by Sandbox (Signature: NO_VIRUS)

[ DetectionInfo ]
    * Sandbox name: NO_MALWARE
    * Signature name: NO_VIRUS

[ General information ]
    * File length:         1030021 bytes.
    * MD5 hash: fa3e4aa5783bdc9c05bfa7c94eec1523.


(C) 2004-2006 Norman ASA. All Rights Reserved.

The material presented is distributed by Norman ASA as an information source only.

This file is not flagged as malicious by the Norman Sandbox Information Center. However, we can not guarantee that the file is harmless. If you still suspect the file to be malicious and if you urgently need to know for sure, please submit it to your local Norman support department for manual analysis.


************************************
Sent from an unmonitored email address.
Please DO NOT reply.
************************************
kxmp
发表于 2009-3-29 19:24:47 | 显示全部楼层
Submission Summary:
Submission details:
Submission received: 29 March 2009, 22:12:16
Processing time: 10 min 7 sec
Submitted sample:
File MD5: 0xAACA1EB2EF0DBAD6440891A87DD7C534
File SHA-1: 0xE6988028273464342C114B1F22B286ABA50ABE13
Filesize: 1,402,585 bytes
Alias:
Trojan:Win32/Meredrop [Microsoft]
Trojan-Spy.Win32.Montp.y [Ikarus]
Win-Trojan/Xema.variant [AhnLab]
Summary of the findings:

What's been found Severity Level
Downloads/requests other files from Internet.  
Registers a 32-bit in-process server DLL.  
Contains characteristics of an identified security risk.  




Technical Details:


Possible Security Risk

Attention! Characteristics of the following security risk was identified in the system:

Security Risk Description
Trojan-PWS.Stealer.HF This trojan steals login and password information stored on an infected machine and sends the stolen information to the attacker without the users permission.




File System Modifications

The following files were created in the system:

# Filename(s) File Size File Hash Alias
1 %ProgramFiles%\WAIGUA\Script\XX.Script  1,510 bytes MD5: 0x20A29DAE88F0BE599C9DE92D7498DF0F
SHA-1: 0xE3B7CEA4ACBA88FE2F7766DDEB72EE466BE5328F (not available)
2 %ProgramFiles%\WAIGUA\Tes.dll  188,416 bytes MD5: 0x13525467781BFCB558372E19DC32FFF6
SHA-1: 0xA4739E6C3E2A96E5401B25FFF8A5C301E4ED528B packed with PE_Patch.UPX [Kaspersky Lab]
3 %ProgramFiles%\WAIGUA\XX.ini  1,585 bytes MD5: 0x98FAFA20AF8ADEC66AAA3C1E08AFF235
SHA-1: 0x4A513448891F6DC1399973B4257A4A9271091FDA (not available)
4 %ProgramFiles%\WAIGUA\Ѱ��.exe  863,744 bytes MD5: 0xD1716CE62F3475E5F83EC7C825513D3C
SHA-1: 0xF2C7A9E9088414A3CE4AA1A66E764EC54F716FB8 (not available)
5 %FontsDir%\gzqqxx01.dat  42 bytes MD5: 0xFDB2399D052C1A7E43F1F0C0AEFA8E48
SHA-1: 0x3615E7CE14A0CEA160FBB96A12014DB46433D957 (not available)
6 %FontsDir%\oefhemdi.dll  49,152 bytes MD5: 0xDFE595335726A370A8BF28A5221BFF62
SHA-1: 0x896B0DEB8394E1D4A7FC8EDCC43A7648A5084A9C PWS-QQPass.dll [McAfee]
Mal/Behav-010, Mal/Behav-027 [Sophos]
PWS:Win32/OnLineGames.CQ [Microsoft]
Generic.PWS.Games [Ikarus]
Win-Trojan/OnlineGameHack.49152.FY [AhnLab]
7 [file and pathname of the sample #1]  1,402,585 bytes MD5: 0xAACA1EB2EF0DBAD6440891A87DD7C534
SHA-1: 0xE6988028273464342C114B1F22B286ABA50ABE13 Trojan:Win32/Meredrop [Microsoft]
Trojan-Spy.Win32.Montp.y [Ikarus]
Win-Trojan/Xema.variant [AhnLab]
8 %System%\YingInstall\409.ini  3,829 bytes MD5: 0x743F4CFCFAAEF1A3BDAF49C23F69E5EB
SHA-1: 0xF3EC13632490C6D20EDB7BAE8CA11544952AC047 (not available)
9 %Windir%\Ying-UnInstall.exe  450,048 bytes MD5: 0x23BA5FA2CC6714373B37A189BDD4BC18
SHA-1: 0x9CADD66B8F1145BFA5DD0CA459CCA7739AA186DE (not available)


Notes:
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
%FontsDir% is a variable that refers to a virtual folder containing fonts. A typical path is C:\Windows\Fonts.
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
%Windir% is a variable that refers to the Windows installation folder. By default, this is C:\Windows or C:\Winnt.
The following directories were created:
%ProgramFiles%\WAIGUA
%ProgramFiles%\WAIGUA\Config
%ProgramFiles%\WAIGUA\Script
%System%\YingInstall


Memory Modifications

There were new processes created in the system:

Process Name Process Filename Main Module Size
xxwg.exe %ProgramFiles%\WAIGUA\xxwg.exe 81,920 bytes
[generic host process] [generic host process filename] 20,480 bytes
ying-uninstall.exe %Windir%\ying-uninstall.exe 475,136 bytes
[filename of the sample #1] [file and pathname of the sample #1] 634,880 bytes


Notes:
[generic host process filename] is a full path filename of [generic host process].
The following modules were loaded into the address space of other process(es):

Module Name Module Filename Address Space Details
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: explorer.exe
Process filename: %Windir%\explorer.exe
Address space: 0x19C0000 - 0x19CF000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: msmsgs.exe
Process filename: %ProgramFiles%\messenger\msmsgs.exe
Address space: 0xBA0000 - 0xBAF000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: dllhost.exe
Process filename: %System%\dllhost.exe
Address space: 0x2530000 - 0x253F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: sdnsmain.exe
Process filename: %Windir%\dns\sdnsmain.exe
Address space: 0x1620000 - 0x162F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x1B30000 - 0x1B3F000
oefhemdi.dll %FontsDir%\oefhemdi.dll Process name: Ѱ��.exe
Process filename: %ProgramFiles%\waigua\���.exe
Address space: 0x390000 - 0x39F000




Registry Modifications

The following Registry Keys were created:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\Programmable
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0\win32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\FLAGS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\HELPDIR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CurVer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1\CLSID
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA
HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA\1.1
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\VersionIndependentProgID]
(Default) = "QQXX.qqxxatl"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\TypeLib]
(Default) = "{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\ProgID]
(Default) = "QQXX.qqxxatl.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}\InprocServer32]
(Default) = "%FontsDir%\oefhemdi.dll"
ThreadingModel = "Apartment"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\TypeLib]
(Default) = "{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}"
Version = "1.0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid32]
(Default) = "{00020424-0000-0000-C000-000000000046}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}\ProxyStubClsid]
(Default) = "{00020424-0000-0000-C000-000000000046}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{334E586E-C2FF-44DB-953D-1C6B988C638F}]
(Default) = "Iqqxxatl"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\0\win32]
(Default) = "%FontsDir%\oefhemdi.dll"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\HELPDIR]
(Default) = "%FontsDir%\"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0\FLAGS]
(Default) = "0"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{FBB7ADFA-C76C-4BD4-864D-F438D2DDCE80}\1.0]
(Default) = "QQXX 1.0 Type Library"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CurVer]
(Default) = "QQXX.qqxxatl.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl\CLSID]
(Default) = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1\CLSID]
(Default) = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\QQXX.qqxxatl.1]
(Default) = "qqxxatl Class"
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C} = ""
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
%FontsDir%\oefhemdi.dll = "{E58B05EE-6CA5-42E1-A0CE-82169DDEE42C}"
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA\1.1]
ProgramFolder = ""
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall\Ѱ�����\WAIGUA]
Path = "%ProgramFiles%\WAIGUA"
Version = "1.1"
[HKEY_LOCAL_MACHINE\SOFTWARE\YingSoft\YingInstall]
LastVersion = "5.8"
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-12-29 07:22 , Processed in 0.088775 second(s), 2 queries , Redis On.

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表