1 square 20 10 February 24th-Dr. An -V3' s 5.0.0.220/kloc-0 February 24th-Xiaohong 8.2.1.17220/kloc-0. February 24th, 0 -Authentium Company 20 10 February 24th Lineage. BVF BitDefender 7.2 2065438. Cat-Quick Healing 10.00 2065438+2065438 in Troy. AutoRun.mo ClamAV 0. 96. 0. 0-GIT 00 February 24th. 24 exploitation. MS03-43 Magic Island 4045 20 10 February 24th, Trojware. Win32。 Trojan spy. Fly studio ~ b drweb 5.0.1.12222010 February 24th-esafe 7.0.17.0 2065438+February 23rd, Win32. PswaduveTrust-Veterinary 35.2.22002006438+0.852010 February 23rd W32/ Autorun. GC F-Secure 9. 0. 15370. 0 20 10 February 24th -Fortinet company's 4.0.14.0 2065438+February 20th 2 1 possible treat's gdata/kloc. Win32 Other Names: Malware Root Card Lusi T3.1.1.80.0 2065438+Trojan. Win32.AutoRun Jiang Min13.0.900 2065438+2400-k7 antivirus 7.6509.000000000006 Troy 438+00.02.23. Win32。 Malware. 1 Kaspersky 7.0.0.125 20/kloc-0 February 24th-McAfee 590120/kloc-0 February 23rd back door, DRV. CBD788F4C7 1B McAfee-gross weight-version 6. 8. 5 20 10 February 23rd-Microsoft10 February 24th-nod 32 48910. It's packed. FlyStudio variant Norman 6.04.08 2065438+February 24, 2000 Smalldoor. LNLR NProtect hides 2009. 1. 8. 0 20 10 February 24th-Panda 10.0.2.2 2065438+ CI. A tool software 7.0.3.5 2065438+Troy on February 24th, 00. Automatic operation. KKU Shanghai Composite Index 3.0 2065438+February 24th 00 High-risk worms rose 22.34.01.03 2065438+February1day -SOP. February 24th, 5438+00 W32/AutoRun-MO Sunbelt 5696 20 10 February 24th. Win32. Generic! Telecom Symantec 20091.2.0.412010 was suspicious on February 24th. Insight into hackers 6. 5. 1. 6. 208 2065438+ Trojan horse February 24, 2000/downloader. Flystudio.gen Trend Micro 9.120.0.10042010 February 24th-VBA 323.12.12.22010 February 2nd. February 24th-Virus buster Company 5. 0. 27. 0 20 10 February 24th Troy. Additional information file size of KKU: 194 1470 bytes MD5 ...: f96ade5914bb9bcbcd14. 5438+0 ...: Beibei DD 8B458427BA8674Ba7114EC2D04149A58ESA256 Verification: 683368C7 C3A7EB23933 DFBD 94D29A76A E060453D490E3 466. 08 fssdeep: 49152: ywl7teo3fffzfsb4bxprg0ocwab2qndqfshr6fimk1WAC: yw1teoz4jxprloaqkhqfh6uv1lcpeid ..-peinfo:-railway. Tribune ..: RAR file (83.3%) uses REALbasic project (16.6%) packaging machine (Kaspersky): UPX compression, PE_Patch. UPX, using UPX packaging (shelf F-Prot): UPX_LZMA sigcheck: publisher ...? /copyright ... /product ...:? /1 introduction ..: unknowN/ 1 original name: N/ 1 internal name: n/file version. : Unknown/1 comments ... /1 signature ...:-date of signature. -Check ...: unsigned /aboutprogramtext.asp? Px5 = da39b5b00d88643c01/2b2e6dc003d0d0baf This is the scanning result. What exactly is this document from the Department of Security?
This is translated by Google browser.