| 引用: |
| 【玉面修罗的贴子】发现的什么。。。有报告吗? 文件的名字及路径 ...........................[/qu病毒名称 处理结果 发现日期 扫描方式 路径 文件 病毒来源 Exploit.HTML.CodeExec 需要解压缩后杀毒 2005-12-26 14:09 手动扫描 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\7B6VNCVW down[1].chm>>/down.htm 本机 Exploit.HTML.CodeExec 需要解压缩后杀毒 2005-12-26 14:09 手动扫描 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\0PWI4QFS 30686[1].chm>>/30686.htm 本机 Trojan.DL.Agent.egv 删除成功 2005-12-26 14:29 手动扫描 C:\FOUND.001 FILE0000.CHK 本机 ote]病毒名称 处理结果 发现日期 扫描方式 路径 文件 Exploit.HTML.Mht.cj 删除成功 2005-12-16 13:01 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\G5AB4HYF a6.a6[1].htm Exploit.HTML.Mht.cj 跳过脚本 2005-12-16 13:01 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 101639927720.tmp VBS.StartPage.d 跳过脚本 2005-12-17 19:23 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 239224590112.tmp Js.hta.StartPage 忽略 2005-12-17 19:40 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\H012UVEX test[1].hta Js.hta.StartPage 删除成功 2005-12-17 19:40 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\H012UVEX test[2].hta Js.hta.StartPage 忽略 2005-12-18 20:47 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\WXYBSDUB test[1].hta Js.hta.StartPage 删除成功 2005-12-18 20:47 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\GPYVOLER test[1].hta Trojan.Saghost.20 删除成功 2005-12-22 13:43 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\SZ672XYH windows[1].exe Js.hta.StartPage 删除成功 2005-12-22 13:44 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\01ERSTI7 home[1].hta Exploit.HTML.mht.br 重新启动计算机后删除文件 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\SZ672XYH 30686[1].htm VBS.StartPage.h 删除成功 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\0PWI4QFS tongji1[2].hta VBS.StartPage.g 重新启动计算机后删除文件 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\RT4RROHA tongji2[2].hta Exploit.HTML.mht.br 删除成功 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\01ERSTI7 30686[1].htm VBS.StartPage.g 删除成功 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\RT4RROHA tongji2[1].hta VBS.StartPage.h 删除成功 2005-12-25 21:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\E3GNUDWF tongji1[1].hta Exploit.HTML.mht.br 忽略 2005-12-25 21:36 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\IPKRAHO1 30686[1].htm VBS.StartPage.g 删除成功 2005-12-25 21:36 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\RT4RROHA tongji2[1].hta Exploit.HTML.mht.br 删除成功 2005-12-25 21:36 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\RT4RROHA 30686[1].htm VBS.StartPage.h 删除成功 2005-12-25 21:36 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\RT4RROHA tongji1[1].hta VBS.StartPage.d 跳过脚本 2005-12-25 22:08 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 3948117716808.tmp Exploit.HTML.mht.br 删除成功 2005-12-25 22:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\E3GNUDWF 30686[1].htm VBS.StartPage.h 忽略 2005-12-25 22:35 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\0PWI4QFS tongji1[1].hta VBS.StartPage.d 跳过脚本 2005-12-26 14:00 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 2492117978752.tmp VBS.StartPage.d 跳过脚本 2005-12-26 16:36 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 124145831576.tmp VBS.StartPage.d 跳过脚本 2005-12-26 20:49 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 2840136395128.tmp VBS.StartPage.d 跳过脚本 2005-12-27 14:39 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 900116799648.tmp VBS.StartPage.d 跳过脚本 2005-12-27 18:08 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 2096117782184.tmp Backdoor.RBot.bge 删除成功 2005-12-27 21:21 文件监控 C:\WINDOWS\System32 MSWSA32.exe VBS.StartPage.d 跳过脚本 2005-12-27 22:28 网页/脚本监控 C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp 204115554024.tmp Backdoor.RBot.bge 删除成功 2005-12-27 23:03 文件监控 C:\WINDOWS\SYSTEM32 MSWSA32.EXE Exploit.HTML.mht.br 删除成功 2005-12-28 12:14 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\ODMFS9YR 30686[1].htm VBS.StartPage.g 删除成功 2005-12-28 12:15 文件监控 C:\Documents and Settings\Bluewater\Local Settings\Temporary Internet Files\Content.IE5\GPSV4B8N tongji2[2].hta 1
查看完整版本: 都帮俺看看啊,有毒找不到!
© 2000 - 2026 Rising Corp. Ltd.
|