瑞星卡卡安全论坛

首页 » 技术交流区 » 反病毒/反流氓软件论坛 » IE好象有问题了,请帮我看看我的扫描日志,-问题解决,谢谢各位斑竹和朋友
fzzfzz - 2006-8-20 22:29:00
现象:
1. msconfig 不能运行,运行后,他的窗口不出来
2. 任务管理器多了3个可疑的进程:
  zt.exe      路径:  C:\WINDOWS\System32\zt.exe
  uprar.exe    路径:C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\uprar.exe
  smss.exe    路径:  C:\WINDOWS\smss.exe
3. Mcafee 不断报告有感染:
  路径名:  C:\Documents and Settings\Bluewater\Local Settings\Temp\1.exe
  检测结果:New Malware.u
4.机器有时回无缘故呆迟。

日志:

HijackThis_zww汉化版扫描日志 V1.99.1
保存于      21:39:08, 日期 2006-8-20
操作系统:  Windows XP SP1 (WinNT 5.01.2600)
浏览器:    Internet Explorer v6.00 SP1 (6.00.2800.1106)

当前运行的进程:         
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\WINDOWS\System32\ctfmon.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\System32\svchost.exe
C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\uprar.exe
C:\WINDOWS\System32\zt.exe
C:\WINDOWS\smss.exe
C:\WINDOWS\explorer.exe
C:\优选工具\病毒和恶意代码\HijackThis 1.99.1\HijackThis1991-HA\HijackThis1991zww.exe

F2 - REG:system.ini: Shell=explorer.exe 1
O2 - BHO: (no name) - {A5366673-E8CA-11D3-9CD9-0090271D075B} - (no file)
O3 - IE工具栏增项: 电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - 启动项HKLM\\Run: [IMJPMIG8.1] ; "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - 启动项HKLM\\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - 启动项HKLM\\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - 启动项HKLM\\Run: [TProgram] C:\WINDOWS\smss.exe
O4 - 启动项HKLM\\Run: [Systems32] C:\WINDOWS\System32\Server.exe
O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
O4 - 启动项HKLM\\RunServices: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O8 - IE右键菜单中的新增项目: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - IE右键菜单中的新增项目: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - IE右键菜单中的新增项目: 导出到 Microsoft Excel(&x) - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - 浏览器额外的按钮: 词霸 - {9A687CA6-D585-4947-9ED9-BE96071F5CD9} - C:\Program Files\Kingsoft\Powerword 2003\XDictExB.dll
O9 - 浏览器额外的按钮: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - 浏览器额外的“工具”菜单项: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O16 - DPF: {53AF6E02-F18F-4228-AC13-3E79773FBE50} (CMCBooter Object) - http://download.mysee.com/plugin/booter.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{0A35F636-BF73-4FA3-A625-CCF3C3B8E140}: NameServer = 211.167.97.200,211.167.97.67
O17 - HKLM\System\CCS\Services\Tcpip\..\{14C4942E-08CB-4960-8A4D-FAC13B0A5250}: NameServer = 219.233.241.166,211.167.97.67
O17 - HKLM\System\CCS\Services\Tcpip\..\{BCEA3C85-442E-4F98-9213-E1E9DC51E48A}: NameServer = 219.233.241.166,211.167.97.67
O17 - HKLM\System\CS1\Services\Tcpip\..\{0A35F636-BF73-4FA3-A625-CCF3C3B8E140}: NameServer = 211.167.97.200,211.167.97.67
O18 - 列举现有的协议: dic - {C21F5C32-F57A-4A0D-8E0A-B672691C52D0} - C:\Program Files\Kingsoft\Powerword 2003\XDictExB.dll
O18 - 列举现有的协议: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - 列举现有的协议: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O23 - NT 服务: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe
O23 - NT 服务: McAfee Framework 服务 (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - NT 服务: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - NT 服务: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - NT 服务: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - NT 服务: svchost.exe - Unknown owner - C:\WINDOWS\taskmir.exe


其中的04启动项好象可疑:
O4 - 启动项HKLM\\Run: [TProgram] C:\WINDOWS\smss.exe
O4 - 启动项HKLM\\Run: [Systems32] C:\WINDOWS\System32\Server.exe
O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
O4 - 启动项HKLM\\RunServices: [Torjan Program] C:\WINDOWS\WINLOGON.EXE

还有:
下面的开机启动进程也很可疑:
C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\uprar.exe
C:\WINDOWS\System32\zt.exe
C:\WINDOWS\smss.exe


请帮助判断一下,并请教如何处理。
非常谢谢了!
我无邪 - 2006-8-20 22:44:00
看以下的帖子
http://forum.ikaka.com/topic.asp?board=28&artid=8137314
下载幸福狮子的专杀,到安全模式下查杀。
完后
重启。
请下载 System Repair Engineer,使用“智能扫描”,按下“扫描”按钮进行扫描,扫描完成后按下“保存报告”按钮保存报告日志文件(SREng.LOG),把保存的报告日志文件内容复制-粘贴上来
下载网址
http://www.kztechs.com/sreng/sreng2.zip
http://forum.ikaka.com/topic.asp?board=67&artid=5188931
日志一次粘不完,分次粘完,请不要修改。
fzzfzz - 2006-8-20 22:54:00
对了,Mcafee还有感染报告:
路径名:  C:\Documents and Settings\Bluewater\Local Settings\Temp\2.exe
检测结果:PWS-Lineage.dll

发现是winlogon木马了,
现在就按 无邪 的指教去看资料。
谢谢 我无邪!!
fzzfzz - 2006-8-21 9:24:00
sreng2的报告如下,请无邪帮我看一下,谢谢了!

2006-08-21,08:58:07

System Repair Engineer 2.0.21.505 (2.0 RC 2)
Smallfrogs (http://www.KZTechs.com)

Windows XP Professional Service Pack 1 (Build 2600)
- 管理权限用户 - 完整功能

以下内容被选中:
    所有的启动项目(包括注册表、启动文件夹、服务等)
    浏览器加载项
    正在运行的进程(包括进程模块信息)
    文件关联


启动项目
注册表
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    <ctfmon.exe><C:\WINDOWS\System32\ctfmon.exe>  [Microsoft Corporation]
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
    <load><>  []
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
    <IMJPMIG8.1><; "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32>  [Microsoft Corporation]
    <ShStatEXE><"C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE>  [Network Associates, Inc.]
    <TkBellExe><"C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot>  [RealNetworks, Inc.]
    <TProgram><C:\WINDOWS\smss.exe>  [iSw78fh2kl3A]
    <Systems32><C:\WINDOWS\System32\Server.exe>  []
    <Torjan Program><C:\WINDOWS\WINLOGON.EXE>  [zJeuKZJHdgr43s]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices]
    <Torjan Program><C:\WINDOWS\WINLOGON.EXE>  [zJeuKZJHdgr43s]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run]
    <CheckFaultKernel><C:\WINDOWS\System32\mswdm.exe>  []
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    <shell><explorer.exe 1>  []
    <Userinit><C:\WINDOWS\system32\userinit.exe,>  [Microsoft Corporation]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows]
    <AppInit_DLLs><>  []
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    <UIHost><logonui.exe>  [Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks]
    <{EFAE7B4A-FA39-4818-ACAC-6B6D851CEFF4}><C:\Program Files\Internet Explorer\WinHook.sys>  []
    <{99F1D023-7CEB-4586-80F7-BB1A98DB7602}><C:\Program Files\Internet Explorer\IEXPLORE.Sys>  []
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    <!ewido><; "C:\优选工具\反木马-ewido_y-G\ewido anti-spyware 4.0\ewido.exe" /minimized>  []
    <Advanced Tools Check><; ; ; C:\PROGRA~1\NORTON~1\AdvTools\ADVCHK.EXE>  []
    <ccApp><; ; ; "C:\Program Files\Common Files\Symantec Shared\ccApp.exe">  []
    <ccRegVfy><; ; ; "C:\Program Files\Common Files\Symantec Shared\ccRegVfy.exe">  []
    <gcasServ><; ; ; "C:\Program Files\Microsoft AntiSpyware\gcasServ.exe">  []
    <McAfeeUpdaterUI><; ; ; "C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe" /StartedFromRunKey>  []
    <MSPY2002><; ; ; C:\WINDOWS\System32\IME\PINTLGNT\ImScInst.exe /SYNC>  []
    <NeroFilterCheck><; ; ; C:\WINDOWS\system32\NeroCheck.exe>  [Ahead Software Gmbh]
    <Network Associates Error Reporting Service><; ; ; "C:\Program Files\Common Files\Network Associates\TalkBack\TBMon.exe">  []
    <PHIME2002A><; ; ; C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /IMEName>  [Microsoft Corporation]
    <PHIME2002ASync><; ; ; C:\WINDOWS\System32\IME\TINTLGNT\TINTSETP.EXE /SYNC>  [Microsoft Corporation]
    <RealTray><; ; ; C:\Program Files\Real\RealPlayer\RealPlay.exe SYSTEMBOOTHIDEPLAYER>  []
    <res><; ; C:\WINDOWS\System32\res.exe>  []
    <SSC_UserPrompt><; ; ; C:\Program Files\Common Files\Symantec Shared\Security Center\UsrPrmpt.exe>  []
    <SysExplr><; ; ; C:\HEROSOFT\Hero3000\SYSEXPLR.EXE>  []
    <TkBellExe><; "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot>  [RealNetworks, Inc.]
fzzfzz - 2006-8-21 9:26:00
==================================
启动文件夹
服务
[Adobe LM Service / Adobe LM Service]
  <"C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe"><Adobe Systems>
[McAfee Framework 服务 / McAfeeFramework]
  <C:\Program Files\Network Associates\Common Framework\FrameworkService.exe /ServiceStart><Network Associates, Inc.>
[Network Associates McShield / McShield]
  <"C:\Program Files\Network Associates\VirusScan\Mcshield.exe"><Network Associates, Inc.>
[Network Associates Task Manager / McTaskManager]
  <"C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe"><Network Associates, Inc.>
[Intranet Messenger / NHLscA]
  <><N/A>
[SoundMAX Agent Service / SoundMAX Agent Service (default)]
  <C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe><Analog Devices, Inc.>
[svchost.exe / svchost.exe]
  <C:\WINDOWS\taskmir.exe><N/A>

==================================
浏览器加载项
[金山词霸]
  {9A687CA6-D585-4947-9ED9-BE96071F5CD9} <C:\Program Files\Kingsoft\Powerword 2003\XDictExB.dll, 金山软件股份有限公司>
[FlashGet]
  {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} <C:\PROGRA~1\FLASHGET\flashget.exe, Amaze Soft>
[电台(&R)]
  {8E718888-423F-11D2-876E-00A0C9082467} <C:\WINDOWS\System32\msdxm.ocx, Microsoft Corporation>
[CMCBooter Object]
  {53AF6E02-F18F-4228-AC13-3E79773FBE50} <C:\WINDOWS\System32\Booter.ocx, 北京高维视讯科技有限公司>
[Shockwave Flash Object]
  {D27CDB6E-AE6D-11CF-96B8-444553540000} <C:\WINDOWS\System32\Macromed\Flash\Flash8b.ocx, Macromedia, Inc.>
[使用网际快车下载]
  <C:\Program Files\FlashGet\jc_link.htm, N/A>
[使用网际快车下载全部链接]
  <C:\Program Files\FlashGet\jc_all.htm, N/A>
[导出到 Microsoft Excel(&x)]
  <res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000, N/A>
fzzfzz - 2006-8-21 9:32:00
==================================
正在运行的进程
[PID: 444][\SystemRoot\System32\smss.exe]  <Microsoft Corporation><5.1.2600.1106 (xpsp1.020828-1920)>
[PID: 500][\??\C:\WINDOWS\system32\csrss.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
[PID: 524][\??\C:\WINDOWS\system32\winlogon.exe]  <Microsoft Corporation><5.1.2600.1106 (xpsp1.020828-1920)>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
[PID: 568][C:\WINDOWS\system32\services.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\system32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
[PID: 580][C:\WINDOWS\system32\lsass.exe]  <Microsoft Corporation><5.1.2600.1106 (xpsp1.020828-1920)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 740][C:\WINDOWS\system32\svchost.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 788][C:\WINDOWS\System32\svchost.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 856][C:\WINDOWS\System32\svchost.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 872][C:\WINDOWS\System32\svchost.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 1460][C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\SHUTIL.dll]  <Network Associates, Inc.><8.0.0.989>
    [C:\Program Files\Network Associates\VirusScan\naiwmain.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\RES04\shstat.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\RES04\Product.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\RES04\McShield.dll]  <Network Associates, Inc.><8.0.0.251>
    [C:\Program Files\Network Associates\VirusScan\RES04\Shutilrc.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\Graphics.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
[PID: 1468][C:\Program Files\Common Files\Real\Update_OB\realsched.exe]  <RealNetworks, Inc.><0.1.0.3018>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
[PID: 1484][C:\WINDOWS\System32\ctfmon.exe]  <Microsoft Corporation><5.1.2600.1106 (xpsp1.020828-1920)>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
[PID: 1560][C:\Program Files\Network Associates\Common Framework\FrameworkService.exe]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\nailog.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\Program Files\Network Associates\Common Framework\naXML.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\Program Files\Network Associates\Common Framework\naCmnLib.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\Program Files\Network Associates\Common Framework\applib.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\0804\AgentRes.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\Logging.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\InternetManager.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\naInet.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\Program Files\Network Associates\Common Framework\UserSpace.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\SecureFrameworkFactory.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\Management.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\cmalib.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\naPolicyManager.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\ScriptSubSys.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\UpdateSubSys.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\Scheduler.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\Common Framework\TCSubSys.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
fzzfzz - 2006-8-21 9:33:00
[PID: 1644][C:\Program Files\Network Associates\VirusScan\Mcshield.exe]  <Network Associates, Inc.><8.0.0.309>
    [C:\Program Files\Network Associates\VirusScan\Res04\McShield.DLL]  <Network Associates, Inc.><8.0.0.251>
    [C:\Program Files\Network Associates\VirusScan\FTL.Dll]  <Network Associates, Inc.><8.0.0.135>
    [C:\Program Files\Network Associates\VirusScan\naiann.dll]  <Network Associates, Inc.><8.0.0.308>
    [C:\Program Files\Network Associates\VirusScan\mytilus.dll]  <Network Associates, Inc.><8.0.0.316>
    [C:\Program Files\Network Associates\Common Framework\GenEvtInf.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\VirusScan\NaEventU.DLL]  <Network Associates, Inc.><8.0.0.342>
    [C:\Program Files\Network Associates\VirusScan\Res04\naEvtRes.dll]  <Network Associates, Inc.><8.0.0.342>
    [C:\Program Files\Network Associates\VirusScan\VSIDSvr.dll]  <Network Associates, Inc.><8.0.0.291>
    [C:\Program Files\Common Files\Network Associates\Engine\MCSCAN32.DLL]  <McAfee, Inc.><4.4.00>
    [C:\Program Files\Network Associates\Common Framework\SecureFrameworkFactory.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\VirusScan\EntSrv.Dll]  <Network Associates, Inc><8.0.0.448>
[PID: 1648][C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe]  <Network Associates, Inc.><3.5.0.412>
    [C:\PROGRA~1\NETWOR~1\COMMON~1\nailog.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\PROGRA~1\NETWOR~1\COMMON~1\naCmnLib.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\PROGRA~1\NETWOR~1\COMMON~1\naXML.dll]  <Network Associates, Inc.><3.5.0.474>
    [C:\PROGRA~1\NETWOR~1\COMMON~1\0804\AgentRes.dll]  <Network Associates, Inc.><3.5.0.412>
    [C:\Program Files\Network Associates\VirusScan\VsPlugin.dll]  <Network Associates, Inc.><8.0.0.989>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 1748][C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe]  <Network Associates, Inc.><8.0.0.1002>
    [C:\Program Files\Network Associates\VirusScan\SHUTIL.dll]  <Network Associates, Inc.><8.0.0.989>
    [C:\Program Files\Network Associates\VirusScan\naiwmain.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\naicondl.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\RES04\VsTskMgr.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\MIDUtil.Dll]  <McAfee, Inc.><8.0.0.152>
[PID: 1832][C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe]  <Analog Devices, Inc.><3, 2, 6, 0>
[PID: 1864][C:\WINDOWS\System32\svchost.exe]  <Microsoft Corporation><5.1.2600.0 (xpclient.010817-1148)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
[PID: 1084][C:\Program Files\Internet Explorer\IEXPLORE.EXE]  <Microsoft Corporation><6.00.2800.1106 (xpsp1.020828-1920)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
    [C:\Program Files\Network Associates\VirusScan\scriptproxy.dll]  <Network Associates, Inc.><8.0.0.992>
    [C:\Program Files\Network Associates\VirusScan\mytilus.dll]  <Network Associates, Inc.><8.0.0.316>
    [C:\Program Files\Network Associates\VirusScan\Res04\McShield.dll]  <Network Associates, Inc.><8.0.0.251>
    [C:\Program Files\Common Files\Network Associates\Engine\mcscan32.dll]  <McAfee, Inc.><4.4.00>
    [C:\WINDOWS\System32\Macromed\Flash\Flash8b.ocx]  <Macromedia, Inc.><8,0,24,0>
[PID: 1668][C:\WINDOWS\explorer.exe]  <Microsoft Corporation><6.00.2800.1106 (xpsp1.020828-1920)>
    [C:\WINDOWS\System32\EntApi.dll]  <Network Associates, Inc><8.0.0.448>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
    [C:\Program Files\WinRAR\rarext.dll]  <N/A><N/A>
    [C:\Program Files\Network Associates\VirusScan\shext.dll]  <Network Associates, Inc.><8.0.0.912>
    [C:\Program Files\Network Associates\VirusScan\RES04\ShExtRes.dll]  <Network Associates, Inc.><8.0.0.912>
[PID: 2108][C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\oprar.exe]  <WHITEHOUSE><1.0.3.1>
    [C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\d5s.dll]  <Microsoft Corporation><5.00.1764.1>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\packet.dll]  <CACE Technologies><3, 1, 0, 27>
    [C:\DOCUME~1\BLUEWA~1\LOCALS~1\Temp\WanPacket.dll]  <CACE Technologies><3, 1, 0, 27>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
[PID: 2244][C:\WINDOWS\System32\conime.exe]  <Microsoft Corporation><5.1.2600.1106 (xpsp1.020828-1920)>
[PID: 2296][C:\WINDOWS\WINLOGON.EXE]  <zJeuKZJHdgr43s><0.00.0087>
[PID: 2328][C:\WINDOWS\smss.exe]  <iSw78fh2kl3A><0.00.0091>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\Program Files\Network Associates\VirusScan\scriptproxy.dll]  <Network Associates, Inc.><8.0.0.992>
    [C:\Program Files\Network Associates\VirusScan\mytilus.dll]  <Network Associates, Inc.><8.0.0.316>
    [C:\Program Files\Network Associates\VirusScan\Res04\McShield.dll]  <Network Associates, Inc.><8.0.0.251>
    [C:\Program Files\Common Files\Network Associates\Engine\mcscan32.dll]  <McAfee, Inc.><4.4.00>
[PID: 2420][C:\Program Files\Internet Explorer\iexplore.exe]  <Microsoft Corporation><6.00.2800.1106 (xpsp1.020828-1920)>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
    [C:\Program Files\Network Associates\VirusScan\scriptproxy.dll]  <Network Associates, Inc.><8.0.0.992>
    [C:\Program Files\Network Associates\VirusScan\mytilus.dll]  <Network Associates, Inc.><8.0.0.316>
    [C:\Program Files\Network Associates\VirusScan\Res04\McShield.dll]  <Network Associates, Inc.><8.0.0.251>
    [C:\Program Files\Common Files\Network Associates\Engine\mcscan32.dll]  <McAfee, Inc.><4.4.00>
    [C:\WINDOWS\System32\Macromed\Flash\Flash8b.ocx]  <Macromedia, Inc.><8,0,24,0>
[PID: 2392][C:\优选工具1\sreng2\SREng2\SREng.exe]  <Smallfrogs Studio><2.0.21.505>
    [C:\Program Files\Internet Explorer\WinHook.sys]  <N/A><N/A>
    [C:\Program Files\Internet Explorer\IEXPLORE.Sys]  <N/A><N/A>
    [C:\WINDOWS\System32\SYNCOR11.DLL]  <SoundMAX><1.2.3>
fzzfzz - 2006-8-21 9:33:00
==================================
文件关联
.TXT  Error. [NOTEPAD.EXE %1]
.EXE  Error. [WindowFiles]
.COM  OK. ["%1" %*]
.PIF  OK. ["%1" %*]
.REG  OK. [regedit.exe "%1"]
.BAT  OK. ["%1" %*]
.SCR  OK. ["%1" /S]
.CHM  OK. ["C:\WINDOWS\hh.exe" %1]
.HLP  OK. [%SystemRoot%\System32\winhlp32.exe %1]
.INI  OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.INF  OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.VBS  OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.JS  OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.LNK  OK. [{00021401-0000-0000-C000-000000000046}]

==================================
Winsock 提供者

==================================
我无邪 - 2006-8-21 12:32:00
问题还在,如果这个专杀不行,你可以下载其它的专杀。
你再试一次吧。
fzzfzz - 2006-8-21 16:29:00
机器急着要用, 实在头疼了,没有很多时间可以研究, 只好把系统用ghost做了恢复(有做好*.gho的备份),启动后,其他的可疑进程已经没有了.但\windows|winlogon.exe这个进程还在.
不知道为什么还会有?

用删除PID的命令行,删除了\windows|winlogon.exe进程后,删除了\windows|winlogon.exe文件,还删了注册表里RUN键里的这个项.
但是一会上述的被删除的各个就自动恢复,连注册表里RUN键里的启动项也恢复了!

是不是winlogon.exe 是由别的文件生成的?
请帮忙哦~~~~~~~~

晕.....
fzzfzz - 2006-8-21 16:31:00
现在,msconfig 不能运行
双击D:盘,也不能打开,一定要从别的途径才能打开D盘.
秋日里的蓝天 - 2006-8-21 16:55:00
O4 - 启动项HKLM\\Run: [TProgram] C:\WINDOWS\smss.exe
O4 - 启动项HKLM\\Run: [Systems32] C:\WINDOWS\System32\Server.exe
在任务管理器中结束进程smss.exe和Server.exe

到安全模式下删除
C:\WINDOWS\smss.exe
C:\WINDOWS\System32\Server.exe

O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
O4 - 启动项HKLM\\RunServices: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
1.终止进程WINLOGON.EXE
终止进程,注意别把小写的winlogon给禁止了
再进入注册表,删除如下
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Torjan pragramme


2.逐一删除染毒文件,清理或恢复注册表信息
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"Shell"="Explorer.exe 1"
更改为
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]"Shell"="Explorer.exe "
把上面被列出后缀为com的文件在注册表里搜索,找到后,在注册表里的文件后缀由.com改为.exe
秋日里的蓝天 - 2006-8-21 16:57:00
C:\WINDOWS\System32\zt.exe
在任务管理器中结束进程zt.exe

到安全模式下删除
C:\WINDOWS\zt.exe
C:\WINDOWS\taskmir.exe

以上都修复后,请使用HIJACKTHIS重新启动后扫描上来
fzzfzz - 2006-8-21 17:21:00
仔细看了你介绍的帖子:
http://forum.ikaka.com/topic.asp?board=28&artid=7495863&page=1

在注册表里找到很多项被改成iexplore.com和finder.com.等东西

想听听  我无邪 的意见,是不是需要按照那文章说的20条,改我的注册表?
等你的意见.
fzzfzz - 2006-8-21 17:23:00
谢谢关注
我恢复过了,我先重新发个新的hijack的日志上来,你们看看
fzzfzz - 2006-8-21 17:27:00
HijackThis_zww汉化版扫描日志 V1.99.1
保存于      17:17:33, 日期 2006-8-21
操作系统:  Windows XP SP1 (WinNT 5.01.2600)
浏览器:    Internet Explorer v6.00 SP1 (6.00.2800.1106)

当前运行的进程:         
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.exe
C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
C:\Program Files\Network Associates\VirusScan\Mcshield.exe
C:\PROGRA~1\NETWOR~1\COMMON~1\naPrdMgr.exe
C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
D:\悲愤\优选工具1\Ava find pro-G\AvaFind Pro\AvaFind Pro\AvaFind.exe
C:\WINDOWS\System32\conime.exe
C:\WINDOWS\WINLOGON.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\System32\ctfmon.exe
D:\悲愤\优选工具\病毒和恶意代码\HijackThis 1.99.1\HijackThis1991-HA\HijackThis1991zww.exe

F2 - REG:system.ini: Shell=Explorer.exe 1
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O3 - IE工具栏增项: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
O3 - IE工具栏增项: 电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - 启动项HKLM\\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - 启动项HKLM\\Run: [ShStatEXE] "C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE" /STANDALONE
O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O8 - IE右键菜单中的新增项目: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - IE右键菜单中的新增项目: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - IE右键菜单中的新增项目: 导出到 Microsoft Excel(&x) - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - 浏览器额外的按钮: 词霸 - {9A687CA6-D585-4947-9ED9-BE96071F5CD9} - C:\Program Files\Kingsoft\Powerword 2003\XDictExB.dll
O9 - 浏览器额外的按钮: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - 浏览器额外的“工具”菜单项: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - 浏览器额外的按钮: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - 浏览器额外的“工具”菜单项: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{0A35F636-BF73-4FA3-A625-CCF3C3B8E140}: NameServer = 211.167.97.200,211.167.97.67
O17 - HKLM\System\CCS\Services\Tcpip\..\{14C4942E-08CB-4960-8A4D-FAC13B0A5250}: NameServer = 211.167.97.200,211.167.97.67
O17 - HKLM\System\CCS\Services\Tcpip\..\{BCEA3C85-442E-4F98-9213-E1E9DC51E48A}: NameServer = 211.167.97.200,211.167.97.67
O17 - HKLM\System\CS1\Services\Tcpip\..\{0A35F636-BF73-4FA3-A625-CCF3C3B8E140}: NameServer = 211.167.97.200,211.167.97.67
O18 - 列举现有的协议: dic - {C21F5C32-F57A-4A0D-8E0A-B672691C52D0} - C:\Program Files\Kingsoft\Powerword 2003\XDictExB.dll
O23 - NT 服务: McAfee Framework 服务 (McAfeeFramework) - Network Associates, Inc. - C:\Program Files\Network Associates\Common Framework\FrameworkService.exe
O23 - NT 服务: Network Associates McShield (McShield) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\Mcshield.exe
O23 - NT 服务: Network Associates Task Manager (McTaskManager) - Network Associates, Inc. - C:\Program Files\Network Associates\VirusScan\VsTskMgr.exe
O23 - NT 服务: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe

秋日里的蓝天 - 2006-8-21 17:30:00
引用:
【fzzfzz的贴子】仔细看了你介绍的帖子:
http://forum.ikaka.com/topic.asp?board=28&artid=7495863&page=1

在注册表里找到很多项被改成iexplore.com和finder.com.等东西

想听听  我无邪 的意见,是不是需要按照那文章说的20条,改我的注册表?
等你的意见.
………………



完全可以参照那篇贴子,
fzzfzz - 2006-8-21 17:30:00
知道其中的
当前运行的进程:C:\WINDOWS\WINLOGON.EXE 是木马,
O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
有问题
但是没法找到源头
fzzfzz - 2006-8-21 17:32:00
秋日里的蓝天,谢了!

回头我去改注册表。
是不是需要先用regedit121 修复一下?
秋日里的蓝天 - 2006-8-21 17:33:00
引用:
【fzzfzz的贴子】知道其中的
当前运行的进程:C:\WINDOWS\WINLOGON.EXE 是木马,
O4 - 启动项HKLM\\Run: [Torjan Program] C:\WINDOWS\WINLOGON.EXE
有问题
但是没法找到源头
………………



按baohe版主一定可以解决你的问题,

那篇贴子我才看到,
fzzfzz - 2006-8-21 17:37:00
还有一个疑问想请教。
我是用ghost 恢复C盘的,原来C盘的内容完全被覆盖了,但新恢复的C盘怎么还是会出现 winlogon木马呢?
是不是 D盘的内容有问题才会这样?
fzzfzz - 2006-8-23 9:46:00
查到D:中有个可疑文件 pagefile, 是以DOS应用程序的图标出现的,46KB.细看扩展名为pif可以确认是winlogon 病毒.这个文件没法删除,删后,不能打开D盘,而且文件会自动恢复.

呵呵,果然和D:盘有关联.重装后还会出现这个病毒!

用 procexp 强行删除windows\winlogon.exe 进程,然后用winlogo1.bat处理相关可疑文件和注册表的有关项.重新开机,问题解决!

参考的帖子是:
baohe 斑竹的:http://forum.ikaka.com/topic.asp?board=28&artid=7495863&page=1

谢谢,baohe斑竹,他提供的信息很有效,
谢谢上面关注过我这个问题的 秋日里的蓝天,我无邪,帮助我分析问题.
西西,还要感谢我自己努力学习和坚持找问题的精神.
真的是花了很多时间哦,但是,也学了不少东西.
1
查看完整版本: IE好象有问题了,请帮我看看我的扫描日志,-问题解决,谢谢各位斑竹和朋友