随风的蒲公英 - 2006-8-3 11:12:00
前两天中了灰鸽子病毒,手工进安全模式清理了,但仍看到这个hacker.com.cn.ini在启动中.
删除后重启又会自动生成.请高手看一下
随风的蒲公英 - 2006-8-3 11:12:00
2006-08-03,09:40:36
System Repair Engineer 2.0.21.505 (2.0 RC 2)
Smallfrogs (http://www.KZTechs.com)
Windows XP Professional Service Pack 2 (Build 2600)
- 管理权限用户 - 完整功能
以下内容被选中:
所有的启动项目(包括注册表、启动文件夹、服务等)
浏览器加载项
正在运行的进程(包括进程模块信息)
启动项目
注册表
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
<ctfmon.exe><C:\WINDOWS\system32\ctfmon.exe> [Microsoft Corporation]
<Skype><"C:\Program Files\Skype\Phone\Skype.exe" /nosplash /minimized> []
<eMuleAutoStart><; C:\Program Files\eMule\eMule.exe -AutoStart> [http://www.emule.org.cn]
<googletalk><; "F:\backup\Downloads\googletalk\googletalk\googletalk.exe" /autostart> [Google]
<msnmsgr><; "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background> [Microsoft Corporation]
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
<load><> []
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
<SoundMan><SOUNDMAN.EXE> [Realtek Semiconductor Corp.]
<RavTask><"C:\Program Files\Rising\Rav\RavTask.exe" -system> [Beijing Rising Technology Co., Ltd.]
<Alcmtr><; ALCMTR.EXE> [Realtek Semiconductor Corp.]
<AlcWzrd><; ALCWZRD.EXE> [RealTek Semicoductor Corp.]
<High Definition Audio Property Page Shortcut><; HDAShCut.exe> [Windows (R) Server 2003 DDK provider]
<igfxhkcmd><; C:\WINDOWS\system32\hkcmd.exe> [Intel Corporation]
<igfxpers><; C:\WINDOWS\system32\igfxpers.exe> [Intel Corporation]
<igfxtray><; C:\WINDOWS\system32\igfxtray.exe> [Intel Corporation]
<IMSCMig><; C:\PROGRA~1\COMMON~1\MICROS~1\IME\IMSC40A\IMSCMIG.EXE /Preload> [Microsoft Corporation]
<KBD><; C:\HP\KBD\KBD.EXE> [Hewlett-Packard Company]
<KernelFaultCheck><; %systemroot%\system32\dumprep 0 -k> []
<NeroFilterCheck><; C:\WINDOWS\system32\NeroCheck.exe> [Ahead Software Gmbh]
<Picasa Media Detector><; C:\Program Files\Picasa2\PicasaMediaDetector.exe> [Google Inc.]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce]
<RavStub><"C:\Program Files\Rising\Rav\ravstub.exe" /RUNONCE> [Beijing Rising Technology Co., Ltd.]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
<shell><EXPLORER.EXE> [Microsoft Corporation]
<Userinit><C:\WINDOWS\system32\userinit.exe,> [Microsoft Corporation]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows]
<AppInit_DLLs><> []
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
<UIHost><"\Program Files\Logonui\Royale.exe"> [Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
<{32CD708B-60A7-4C00-9377-D73EAA495F0F}><C:\WINDOWS\system32\RavExt.dll> [Beijing Rising Technology Co., Ltd.]
随风的蒲公英 - 2006-8-3 11:13:00
==================================
启动文件夹
服务
[Rising Process Communication Center / RsCCenter]
<"C:\Program Files\Rising\Rav\CCenter.exe"><Beijing Rising Technology Co., Ltd.>
[RsRavMon Service / RsRavMon]
<"C:\Program Files\Rising\Rav\Ravmond.exe"><Beijing Rising Technology Co., Ltd.>
[Windows XP Vista / Windows XP Vista ]
<C:\WINDOWS\Hacker.com.cn.ini><N/A>
==================================
浏览器加载项
[PPGou BHO]
{00000000-0000-0000-0000-C4CA9A05F1E2} <D:\PPGou\PPG2IEDown1.dll, N/A>
[IExpress]
{27E96DE0-8211-42CF-9A1E-FA6246A95B77} <C:\WINDOWS\system32\iexpress.dll, N/A>
[QQBrowserHelperObject Class]
{54EBD53A-9BC1-480B-966A-843A333CA162} <D:\Tencent\QQ\QQIEHelper.dll, 深圳市腾讯计算机系统有限公司>
[VeryCD超级搜索]
{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688} <C:\Program Files\YOK.com\SuperSearch\YOK_SuperSearch.dll, www.yok.com>
[IeCatch2 Class]
{A5366673-E8CA-11D3-9CD9-0090271D075B} <C:\PROGRA~1\FLASHGET\jccatch.dll, Amaze Soft>
[信息检索(&R)]
{92780B25-18CC-41C8-B9BE-3C9C571A8263} <C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL, Microsoft Corporation>
[QQ]
{c95fe080-8f5d-11d2-a20b-00aa003c157b} <D:\Tencent\QQ\QQ.EXE, TENCENT>
[FlashGet]
{D6E814A0-E0C5-11d4-8D29-0050BA6940E3} <C:\PROGRA~1\FLASHGET\flashget.exe, Amaze Soft>
[QQIEFloatBarCfgCmd Class]
{DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} <D:\Tencent\QQ\QQIEHelper.dll, 深圳市腾讯计算机系统有限公司>
[FlashGet Bar]
{E0E899AB-F487-11D5-8D29-0050BA6940E3} <C:\PROGRA~1\FLASHGET\fgiebar.dll, Amaze Soft>
[VeryCD超级搜索]
{F869BB38-FFEF-4589-B986-610B7AD0ADA2} <C:\Program Files\YOK.com\SuperSearch\YOK_SuperSearch.dll, www.yok.com>
[PPGou BHO]
{00000000-0000-0000-0000-C4CA9A05F1E2} <D:\PPGou\PPG2IEDown1.dll, N/A>
[Web Browser Applet Control]
{08B0E5C0-4FCB-11CF-AAA5-00401C608501} <C:\WINDOWS\system32\msjava.dll, Microsoft Corporation>
[Windows Media Player]
{22D6F312-B0F6-11D0-94AB-0080C74C7E95} <C:\WINDOWS\system32\wmpdxm.dll, Microsoft Corporation>
[HTML Document]
{25336920-03F9-11CF-8FD0-00AA00686F13} <%SystemRoot%\system32\mshtml.dll, N/A>
[IExpress]
{27E96DE0-8211-42CF-9A1E-FA6246A95B77} <C:\WINDOWS\system32\iexpress.dll, N/A>
[HHCtrl Object]
{41B23C28-488E-4E5C-ACE2-BB0BBABE99E8} <C:\WINDOWS\system32\hhctrl.ocx, Microsoft Corporation>
[Redirect Control]
{47F66446-563D-11D3-9733-906958C17458} <C:\HP\KBD\REDIRECT.OCX, Hewlett-Packard Company>
[QQBrowserHelperObject Class]
{54EBD53A-9BC1-480B-966A-843A333CA162} <D:\Tencent\QQ\QQIEHelper.dll, 深圳市腾讯计算机系统有限公司>
[Shell Name Space]
{55136805-B2DE-11D1-B9F2-00A0C98BC547} <%SystemRoot%\system32\shdocvw.dll, N/A>
[Windows Media Player]
{6BF52A52-394A-11D3-B153-00C04F79FAA6} <C:\WINDOWS\system32\wmp.dll, Microsoft Corporation>
[VeryCD超级搜索]
{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688} <C:\Program Files\YOK.com\SuperSearch\YOK_SuperSearch.dll, www.yok.com>
[Microsoft Web 浏览器]
{8856F961-340A-11D0-A96B-00C04FD705A2} <C:\WINDOWS\system32\shdocvw.dll, Microsoft Corporation>
[Keyroute Control]
{9D450881-607A-11D3-9733-208858C10000} <C:\HP\KBD\KEYROUTE.OCX, Hewlett-Packard Company>
[IeCatch2 Class]
{A5366673-E8CA-11D3-9CD9-0090271D075B} <C:\PROGRA~1\FLASHGET\jccatch.dll, Amaze Soft>
[Microsoft Scriptlet Component]
{AE24FDAE-03C6-11D1-8B76-0080C744F389} <C:\WINDOWS\system32\mshtml.dll, Microsoft Corporation>
[SearchAssistantOC]
{B45FF030-4447-11D2-85DE-00C04FA35C89} <%SystemRoot%\system32\shdocvw.dll, N/A>
[AUDIO__MID Moniker Class]
{CD3AFA74-B84F-48F0-9393-7EDC34128127} <C:\WINDOWS\system32\wmp.dll, Microsoft Corporation>
[AUDIO__MP3 Moniker Class]
{CD3AFA76-B84F-48F0-9393-7EDC34128127} <C:\WINDOWS\system32\wmp.dll, Microsoft Corporation>
[Shockwave Flash Object]
{D27CDB6E-AE6D-11CF-96B8-444553540000} <C:\WINDOWS\system32\macromed\flash\Flash.ocx, Macromedia, Inc.>
[FlashGet Bar]
{E0E899AB-F487-11D5-8D29-0050BA6940E3} <C:\PROGRA~1\FLASHGET\fgiebar.dll, Amaze Soft>
[VeryCD超级搜索]
{F869BB38-FFEF-4589-B986-610B7AD0ADA2} <C:\Program Files\YOK.com\SuperSearch\YOK_SuperSearch.dll, www.yok.com>
[&使用屁屁狗[PPGou]下载全部链接]
<D:\PPGou\getAll.htm, N/A>
[&使用屁屁狗[PPGou]加速下载]
<D:\PPGou\geturl.htm, N/A>
[YOK搜索]
<C:\Program Files\YOK.com\SuperSearch\yoksch.htm, N/A>
[上传到QQ网络硬盘]
<D:\Tencent\QQ\AddToNetDisk.htm, N/A>
[使用网际快车下载]
<C:\PROGRA~1\FLASHGET\jc_link.htm, N/A>
[使用网际快车下载全部链接]
<C:\PROGRA~1\FLASHGET\jc_all.htm, N/A>
[导出到 Microsoft Office Excel(&X)]
<res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000, N/A>
[添加到QQ自定义面板]
<D:\Tencent\QQ\AddPanel.htm, N/A>
[添加到QQ表情]
<D:\Tencent\QQ\AddEmotion.htm, N/A>
[用QQ彩信发送该图片]
<D:\Tencent\QQ\SendMMS.htm, N/A>
baohe - 2006-8-3 11:21:00
【回复“随风的蒲公英”的帖子】
[Windows XP Vista / Windows XP Vista ]
<C:\WINDOWS\Hacker.com.cn.ini><N/A>
关闭IE。
删除这个灰鸽子服务项。
重启。
显示隐藏文件。
删除C:\WINDOWS\Hacker.com.cn.ini。
随风的蒲公英 - 2006-8-3 21:24:00
谢谢,我在安全模式下regedit里找到了hacker.com.cn.ini删除就好了
© 2000 - 2026 Rising Corp. Ltd.