渴望毒毒 - 2007-1-13 0:58:00
乱弹出垃圾网页的问题,刚在其它贴之有人提了建议,也照做了,可是只是正常不到十分钟,就又发作了,重新扫描了份日志,希望这次有能够根治...
日志:
[CODE]
2007-01-13,00:21:06
System Repair Engineer 2.3.13.690
Smallfrogs (http://www.KZTechs.com)
Windows XP Professional Service Pack 2 (Build 2600)
- 管理权限用户 - 完整功能
以下内容被选中:
所有的启动项目(包括注册表、启动文件夹、服务等)
浏览器加载项
正在运行的进程(包括进程模块信息)
文件关联
Winsock 提供者
Autorun.inf
HOSTS 文件
启动项目
注册表
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
<MSConfig><C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto> [(Verified)Microsoft Corporation]
<kav><"D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"> [Kaspersky Lab]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
<shell><Explorer.exe> [(Verified)Microsoft Corporation]
<Userinit><C:\WINDOWS\system32\userinit.exe,rundll32.exe C:\WINDOWS\system32\winsys16_070109.dll start> [N/A]
<UIHost><logonui.exe> [(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad]
<WPDShServiceObj><C:\WINDOWS\system32\WPDShServiceObj.dll> [(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\klogon]
<WinlogonNotify: klogon><C:\WINDOWS\system32\klogon.dll> [Kaspersky Lab]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
<360Safetray><; D:\Program Files\360safe\safemon\360tray.exe> [奇虎网]
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
<CTFMON.EXE><; C:\WINDOWS\system32\ctfmon.exe> [(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
<HotKeysCmds><; C:\WINDOWS\system32\hkcmd.exe> [(Verified)Intel Corporation]
<IgfxTray><; C:\WINDOWS\system32\igfxtray.exe> [(Verified)Intel Corporation]
<kav><; "D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"> [Kaspersky Lab]
<SoundMan><; SOUNDMAN.EXE> [(Verified)Avance Logic, Inc.]
==================================
启动文件夹
N/A
==================================
服务
[卡巴斯基反病毒6.0 / AVP][Running/Auto Start]
<"D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r><Kaspersky Lab>
[E6D1FA3C / E6D1FA3C][Stopped/Auto Start]
<C:\WINDOWS\system32\E6D1FA3C.EXE -service><Microsoft Corporation>
[Human Interface Device Access / HidServ][Stopped/Disabled]
<C:\WINDOWS\System32\svchost.exe -k netsvcs-->%SystemRoot%\System32\hidserv.dll><N/A>
[RestoreServices / RestoreServices][Stopped/Disabled]
<C:\WINDOWS\system32\Svchost.exe -k RestoreServices-->C:\WINDOWS\system32\drivers\restore.dll><Microsoft Corporation All rights reserved>
[Windows Media Connect Service / WmdmPmSp][Running/Auto Start]
<C:\WINDOWS\System32\svchost.exe -k netsvcs-->C:\WINDOWS\system32\WmdmPmSp.dll><LINKMEDIA Tech>
[786047CB / 786047CB][Stopped/Auto Start]
<C:\WINDOWS\system32\786047CB.EXE -service><Microsoft Corporation>
==================================
驱动程序
[Service for Avance AC97 Audio (WDM) / ALCXWDM][Running/Manual Start]
<system32\drivers\ALCXWDM.SYS><Avance Logic, Inc.>
[ialm / ialm][Running/Manual Start]
<system32\DRIVERS\ialmnt5.sys><Intel Corporation>
[kl1 / kl1][Running/Boot Start]
<\SystemRoot\system32\drivers\kl1.sys><Kaspersky Lab>
[klif / klif][Running/System Start]
<\??\C:\WINDOWS\system32\drivers\klif.sys><Kaspersky Lab>
[Direct Parallel Link Driver / Ptilink][Running/Manual Start]
<system32\DRIVERS\ptilink.sys><Parallel Technologies, Inc.>
[Realtek RTL8139(A/B/C)-based PCI Fast Ethernet Adapter NT Driver / rtl8139][Running/Manual Start]
<system32\DRIVERS\RTL8139.SYS><Realtek Semiconductor Corporation>
[Secdrv / Secdrv][Stopped/Manual Start]
<system32\DRIVERS\secdrv.sys><N/A>
==================================
浏览器加载项
[NavigatMon Class]
{B69F34DD-F0F9-42DC-9EDD-957187DA688D} <D:\Program Files\360safe\safemon\safemon.dll, N/A>
[]
{E5A7A15F-213F-4FCF-8DE7-D388F9FB09EB} <C:\WINDOWS\system32\cnwin.dll, 深圳市卓众网络有限公司>
[Web反病毒保护]
{1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} <D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll, Kaspersky Lab>
[番茄花园]
{6096E38F-5AC1-4391-8EC4-75DFA92FB32F} <http://www.tomatolei.com, N/A>
[]
{1F48640D-67C5-435F-9605-DD6135891AAC} <C:\WINDOWS\system32\obubvuwlvrskoai.dll, N/A>
[Shell Name Space]
{55136805-B2DE-11D1-B9F2-00A0C98BC547} <C:\WINDOWS\system32\ieframe.dll, Microsoft Corporation>
[Navigator Class]
{96FC3938-C6CA-475D-8D3B-45F323A6B62B} <C:\Documents and Settings\All Users.WINDOWS\Application Data\Microsoft\Office\NAVDATA\webnav_2018.dll, >
[NavigatMon Class]
{B69F34DD-F0F9-42DC-9EDD-957187DA688D} <D:\Program Files\360safe\safemon\safemon.dll, N/A>
[RDS.DataSpace]
{BD96C556-65A3-11D0-983A-00C04FC29E36} <C:\Program Files\Common Files\System\msadc\msadco.dll, Microsoft Corporation>
[Shockwave Flash Object]
{D27CDB6E-AE6D-11CF-96B8-444553540000} <C:\WINDOWS\system32\Macromed\Flash\Flash9b.ocx, Adobe Systems, Inc.>
[]
{E5A7A15F-213F-4FCF-8DE7-D388F9FB09EB} <C:\WINDOWS\system32\cnwin.dll, 深圳市卓众网络有限公司>
[]
{E9020D2E-DEC9-4EBE-B38D-E1E6AE13D13F} <C:\WINDOWS\system32\jedwmusuxmkkn.dll, N/A>
[上传到QQ网络硬盘]
<D:\Program Files\Tencent\QQ\AddToNetDisk.htm, N/A>
[添加到QQ自定义面板]
<D:\Program Files\Tencent\QQ\AddPanel.htm, N/A>
[添加到QQ表情]
<D:\Program Files\Tencent\QQ\AddEmotion.htm, N/A>
[用QQ彩信发送该图片]
<D:\Program Files\Tencent\QQ\SendMMS.htm, N/A>
渴望毒毒 - 2007-1-13 0:59:00
==================================
正在运行的进程
[PID: 460][\SystemRoot\System32\smss.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 532][\??\C:\WINDOWS\system32\csrss.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 556][\??\C:\WINDOWS\system32\winlogon.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[C:\WINDOWS\system32\klogon.dll] [Kaspersky Lab, 6.0.0.299]
[PID: 600][C:\WINDOWS\system32\services.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 612][C:\WINDOWS\system32\lsass.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 756][C:\WINDOWS\system32\svchost.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 816][C:\WINDOWS\system32\svchost.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 888][C:\WINDOWS\System32\svchost.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[c:\windows\system32\wmdmpmsp.dll] [LINKMEDIA Tech, 1, 5, 0, 4]
[PID: 972][C:\WINDOWS\system32\svchost.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1064][C:\WINDOWS\system32\svchost.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1216][C:\WINDOWS\system32\spoolsv.exe] [Microsoft Corporation, 5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)]
[PID: 1360][C:\WINDOWS\Explorer.EXE] [Microsoft Corporation, 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)]
[D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\shellex.dll] [Kaspersky Lab, 6.0.0.299]
[D:\Program Files\360safe\safemon\safemon.dll] [N/A, 1, 0, 0, 1001]
[PID: 1588][C:\WINDOWS\system32\CTFMON.EXE] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1496][C:\WINDOWS\system32\rundll32.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[C:\WINDOWS\system32\sdmAgent30.dll] [LINKMEDIA Tech, 1, 5, 0, 8]
[PID: 1492][C:\WINDOWS\System32\alg.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1084][C:\WINDOWS\system32\conime.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 2120][C:\WINDOWS\system32\wuauclt.exe] [Microsoft Corporation, 5.4.3790.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 2328][C:\WINDOWS\system32\NOTEPAD.EXE] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 2484][C:\program files\internet explorer\iexplore.exe] [Microsoft Corporation, 7.00.5730.11 (winmain(wmbla).061017-1135)]
[D:\Program Files\360safe\safemon\safemon.dll] [N/A, 1, 0, 0, 1001]
[C:\WINDOWS\system32\winsys32_070109.dll] [N/A, N/A]
[D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scr_ch_pg.dll] [Kaspersky Lab, 1.0.6.299]
[D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\klscav.dll] [Kaspersky Lab, 6.0.0.299]
[D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\prloader.dll] [Kaspersky Lab, 6.0.0.299]
[PID: 3504][C:\WINDOWS\system32786047CB.EXEA.exe] [N/A, N/A]
[PID: 4052][C:\WINDOWS\system32\rundll32.exe] [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 2044][F:\tools\sreng2\SREng.EXE] [Smallfrogs Studio, 2.3.13.690]
==================================
文件关联
.TXT OK. [%SystemRoot%\system32\NOTEPAD.EXE %1]
.EXE OK. ["%1" %*]
.COM OK. ["%1" %*]
.PIF OK. ["%1" %*]
.REG OK. [regedit.exe "%1"]
.BAT OK. ["%1" %*]
.SCR OK. ["%1" /S]
.CHM OK. ["C:\WINDOWS\hh.exe" %1]
.HLP OK. [%SystemRoot%\System32\winhlp32.exe %1]
.INI OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.INF OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.VBS OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.JS OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.LNK OK. [{00021401-0000-0000-C000-000000000046}]
==================================
Winsock 提供者
N/A
==================================
Autorun.inf
[D:\]
[autorun]
open=d:\mplay.com
==================================
HOSTS 文件
127.0.0.1 localhost
==================================
API HOOK
警告!System Repair Engineer 提醒
你下面的函数内容与预期值不符,他
们可能被一些恶意的软件所修改:
RVA 错误: LoadLibraryA
RVA 错误: LoadLibraryExA
RVA 错误: LoadLibraryExW
RVA 错误: LoadLibraryW
==================================
[/CODE]
渴望毒毒 - 2007-1-13 1:00:00
对了,还出现系统时间给改了的情况,希望大虾 尽快来帮忙,先谢啦~
鸟儿天上飞 - 2007-1-13 1:10:00
不是我回的吧?....
运行SREng2,使用“启动项目”--注册表--删除
<Userinit><C:\WINDOWS\system32\userinit.exe,rundll32.exe C:\WINDOWS\system32\winsys16_070109.dll start> [N/A]编辑--红色的删除
运行(双击)SRENG2,点“启动项目,服务,点“Win32服务应用程序”
勾选“隐藏微软服务”选中病毒服务
[E6D1FA3C / E6D1FA3C][Stopped/Auto Start]
<C:\WINDOWS\system32\E6D1FA3C.EXE -service><Microsoft Corporation
[RestoreServices / RestoreServices][Stopped/Disabled]
<C:\WINDOWS\system32\Svchost.exe -k RestoreServices-->C:\WINDOWS\system32\drivers\restore.dll>
[786047CB / 786047CB][Stopped/Auto Start]
<C:\WINDOWS\system32\786047CB.EXE -service><Microsoft Corporation>
,选择“删除服务”
点“设置”选择“否”
重启按F8进入安全模式下
显示隐藏文件
删除:
C:\WINDOWS\system32\winsys32_070109.dll
C:\WINDOWS\system32786047CB.EXEA.exe(在C:\WINDOWS下 看仔细)
C:\WINDOWS\system32\winsys16_070109.dll
C:\WINDOWS\system32\E6D1FA3C.EXE
C:\WINDOWS\system32\drivers\restore.dll
C:\WINDOWS\system32\786047CB.EXE
右键打开D盘删除:
Autorun.inf mplay.com
渴望毒毒 - 2007-1-13 1:23:00
高手,你先别走喔,我马上去试试,一会就来回你...
对,先谢谢你了~~~
渴望毒毒 - 2007-1-13 17:18:00
| 引用: |
【鸟儿天上飞的贴子】不是我回的吧?.... 运行SREng2,使用“启动项目”--注册表--删除 <Userinit><C:\WINDOWS\system32\userinit.exe,rundll32.exe C:\WINDOWS\system32\winsys16_070109.dll start> [N/A]编辑--红色的删除 运行(双击)SRENG2,点“启动项目,服务,点“Win32服务应用程序” 勾选“隐藏微软服务”选中病毒服务 [E6D1FA3C / E6D1FA3C][Stopped/Auto Start] <C:\WINDOWS\system32\E6D1FA3C.EXE -service><Microsoft Corporation [RestoreServices / RestoreServices][Stopped/Disabled] <C:\WINDOWS\system32\Svchost.exe -k RestoreServices-->C:\WINDOWS\system32\drivers\restore.dll> [786047CB / 786047CB][Stopped/Auto Start] <C:\WINDOWS\system32\786047CB.EXE -service><Microsoft Corporation> ,选择“删除服务” 点“设置”选择“否” 重启按F8进入安全模式下 显示隐藏文件 删除: C:\WINDOWS\system32\winsys32_070109.dll C:\WINDOWS\system32786047CB.EXEA.exe(在C:\WINDOWS下 看仔细) C:\WINDOWS\system32\winsys16_070109.dll C:\WINDOWS\system32\E6D1FA3C.EXE C:\WINDOWS\system32\drivers\restore.dll C:\WINDOWS\system32\786047CB.EXE
右键打开D盘删除: Autorun.inf mplay.com
……………… |
大虾,昨晚我死得好惨啊!!!我先照你上面说的做了,你说红色的那条,删了N久才删得掉,不过它老马上就生成了...然后到了到安全模式删的时候,我猛按F8,然后电脑就死循环的重启了~~~
555
还望大虾有空再研究下,究竟是咋回事,俺现在对俺的电脑有恐惧感呐~~~~
鸟儿天上飞 - 2007-1-13 17:54:00
参考:
http://forum.ikaka.com/topic.asp?board=28&artid=7168178
渴望毒毒 - 2007-1-13 19:14:00
好的,谢谢你还来关注这个贴子~~~感激!!!
可以的话,留个QQ来联系下,做个朋友,也好出问题时请教一下~~~
© 2000 - 2026 Rising Corp. Ltd.