瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 打开浏览器就会跳出恶意网页~~~请高手帮忙~~~

1   1  /  1  页   跳转

打开浏览器就会跳出恶意网页~~~请高手帮忙~~~

打开浏览器就会跳出恶意网页~~~请高手帮忙~~~

打开浏览器就会跳出恶意网页:http://www.263.net/  http://www.baidu.com/ 
http://www.google.com/intl/zh-CN/
请高手帮忙~~~如何才能解决~~~~谢谢
最后编辑2006-03-14 20:30:56
分享到:
gototop
 

HijackThis信息如下:
Logfile of Kaka v2. 0. 0. 8 Scan Module v2. 0. 0. 1
Scan saved at 17:19:25, on 2006-03-13
Platform: Microsoft Windows XP Personal Service Pack 2 (Build 2600)
MSIE: Internet Explorer v6.00 SP2; (6.00.2900.2180 (xpsp_sp2_rtm.040803-2158))


Running processes:
[smss.exe]
CommandLine =

[csrss.exe]
CommandLine = C:\WINDOWS\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off MaxRequestThreads=16

[winlogon.exe]
CommandLine = winlogon.exe

[services.exe]
CommandLine = C:\WINDOWS\system32\services.exe

[lsass.exe]
CommandLine = C:\WINDOWS\system32\lsass.exe

[svchost.exe]
CommandLine = C:\WINDOWS\system32\svchost -k DcomLaunch

[svchost.exe]
CommandLine = C:\WINDOWS\system32\svchost -k rpcss

[CCenter.exe]
CommandLine = "d:\Program Files\Rising\Rav\CCenter.exe"

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k netsvcs

[svchost.exe]
CommandLine = C:\WINDOWS\system32\svchost.exe -k NetworkService

[svchost.exe]
CommandLine = C:\WINDOWS\system32\svchost.exe -k LocalService

[RavMonD.exe]
CommandLine = "d:\Program Files\Rising\Rav\Ravmond.exe"

[spoolsv.exe]
CommandLine = C:\WINDOWS\system32\spoolsv.exe

[RavStub.exe]
CommandLine = "d:\Program Files\Rising\Rav\RavStub.exe" /RAVMOND

[rundll32.exe]
CommandLine = C:\WINDOWS\SYSTEM32\RUNDLL32.EXE C:\WINDOWS\SYSTEM32\WBEM\IRJIT.DLL,Export 1087

[explorer.exe]
CommandLine = C:\WINDOWS\Explorer.EXE

[RavTask.exe]
CommandLine = "D:\PROGRAM FILES\RISING\RAV\RAVTASK.EXE" -SYSTEM

[RavMon.exe]
CommandLine = "D:\Program Files\Rising\Rav\Ravmon.exe" -SYSTEM

[svchost.exe]
CommandLine = "C:\WINDOWS\svchost.exe"

[alg.exe]
CommandLine = C:\WINDOWS\System32\alg.exe

[IEXPLORE.EXE]
CommandLine = "C:\Program Files\Internet Explorer\iexplore.exe"

[QQ.exe]
CommandLine = "D:\Program Files\Tencent\QQ\QQ.exe"

[QQ.exe]
CommandLine = "D:\Program Files\Tencent\QQ\QQ.exe"

[TIMPlatform.exe]
CommandLine = "d:\Program Files\Tencent\QQ\TIMPlatform.exe" -Embedding

[QQPet.exe]
CommandLine = "D:\Program Files\Tencent\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C83898188040000008A020A00040F00A0B5A4AFA09182919DAF9487A5999E04000000219B5909061100BEABBAB1BE8F9C8F83B19D9A9CA0878D85010000009F061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000F9FD8D888B8FFE86FCFE8D8FFAF9FCF986FE8BFA8D8DFD8A8DFEFB8B8D87FD898FFAF98EF98787FEFBFEF98EFC8F86F9FBF9878F88F9FCFC8A8B8D8F8789FBFA040100AE0400000002301544021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPet.exe]
CommandLine = "D:\Program Files\Tencent\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C83898188040000003A040600040F00A0B5A4AFA09182919DAF9487A5999E040000007EBA5809061100BEABBAB1BE8F9C8F83B19D9A9CA0878D85010000009F061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FCFA868A87FD8DFA898BFCFD8C8FFC8DFB87888BFE8E8C8A8A8BFEFA8A878EFBFCF9FB868B868BFC8EFBFC8E8688FA8E87868F8C8C8889888F8A868CFD8B8CFE040100AE0400000004301544021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPet.exe]
CommandLine = "D:\Program Files\Tencent\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C838981880400000002060800040F00A0B5A4AFA09182919DAF9487A5999E04000000EDED6E06061100BEABBAB1BE8F9C8F83B19D9A9CA0878D85010000009F061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FDFA8786FBFE88F98DFEFA8E8DFBF988FBFC8688FA8FFE8788FE8A8EFD8B8D8E89FBFB878B8E8EF98CFCF9FDF98E8F8D8CFE8BFE88FAFEFB8B8AFAF9FCFD88FC040100AE040000002F301544021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPetNurse.exe]
CommandLine = "F:\QQPetNursePro\QQPetNurse.exe"

[IEXPLORE.EXE]
CommandLine = "C:\Program Files\Internet Explorer\iexplore.exe"

[KkScan.exe]
CommandLine = "D:\Program Files\Rising\KakaToolBar\KkScan.exe"

R3 - Default URLSearchHook is missing
O2 - BHO: wmpdrm - {0E674588-66B7-4E19-9D0E-2053B800F69F} - C:\WINDOWS\system32\wmpdrm.dll
O4 - HKLM\..\Run: [RavTask] "d:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [Thunder] "d:\Program Files\Thunder Network\Thunder\ThunderShell.exe" /s
O4 - HKLM\..\Run: [spoolsv] C:\WINDOWS\system32\spoolsv\spoolsv.exe -printer
O4 - HKLM\..\Run: [System Manager] C:\WINDOWS\svchost.exe
O4 - Startup: desktop.ini =
O4 - Global Startup: desktop.ini =
O8 - Extra context menu item: 上传到QQ网络硬盘 - D:\Program Files\Tencent\QQ\AddToNetDisk.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - D:\Program Files\Tencent\QQ\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - D:\Program Files\Tencent\QQ\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - D:\Program Files\Tencent\QQ\SendMMS.htm
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1142236190609
O17 - HKLM\System\CCS\Services\Tcpip\..\{D5933E18-08ED-462B-9893-E2526BD27BF9}: NameServer = 220.187.24.6,220.187.24.2
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: cdl - {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: dvd - {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: file - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ftp - {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: gopher - {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: http - {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: https - {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ipp - (no CLSID) - (no file)
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: local - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: mailto - {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\system32\inetcomm.dll
O18 - Protocol: mk - {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: tv - {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: wia - {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\system32\wiascr.dll
O23 - Service: Application Management (AppMgmt) -  - C:\WINDOWS\system32\svchost.exe -k netsvcs
O23 - Service: Security Machine Manager (BNESS) -  - C:\WINDOWS\system32\rundll32.exe c:\windows\system32\wbem\irjit.dll,export 1087
O23 - Service: Human Interface Device Access (HidServ) -  - C:\WINDOWS\system32\svchost.exe -k netsvcs
O23 - Service: Macromedia Licensing Service (Macromedia Licensing Service) -  - "C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe"
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - "d:\Program Files\Rising\Rav\CCenter.exe"
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - "d:\Program Files\Rising\Rav\Ravmond.exe"
O23 - Service: Win.Driver.Sevice (Win.Driver.Sevice) -  - C:\WINDOWS\Win.Driver.Sevice
gototop
 

请您改用HijackThis1.99.1

http://www.spywareinfo.com/~merijn/files/hijackthis.zip
将它解压到一个非临时性的文件夹(比如C:\Program Files\HijackThis\HijackThis.exe)。然后双击HijackThis.exe图标,选择Do a system scan and save a logfile,将产生的文本文件中的日志贴上来。如果一个帖子贴不下,可以将剩余的部分另开一帖。
gototop
 

HijackThis信息如下:
Logfile of HijackThis v1.99.1
Scan saved at 8:41:43, on 2006-3-14
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
d:\Program Files\Rising\Rav\CCenter.exe
C:\WINDOWS\System32\svchost.exe
d:\Program Files\Rising\Rav\Ravmond.exe
C:\WINDOWS\system32\spoolsv.exe
d:\Program Files\Rising\Rav\RavStub.exe
C:\WINDOWS\SYSTEM32\RUNDLL32.EXE
C:\WINDOWS\Explorer.EXE
D:\Program Files\Rising\Rav\RavTask.exe
D:\Program Files\Rising\Rav\Ravmon.exe
C:\WINDOWS\svchost.exe
D:\Program Files\Tencent\QQ\QQ.exe
D:\Program Files\Tencent\QQ\QQ.exe
d:\Program Files\Tencent\QQ\TIMPlatform.exe
D:\Program Files\Tencent\QQ\QQexternal.exe
F:\QQPetNursePro\QQPetNurse.exe
C:\Program Files\Internet Explorer\iexplore.exe
d:\Program Files\Thunder Network\Thunder\Thunder.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\hijackthis\HijackThis.exe

R3 - Default URLSearchHook is missing
O2 - BHO: ThunderIEHelper - {0005A87D-D626-4B3A-84F9-1D9571695F55} - C:\WINDOWS\system32\xunleibho_v14.dll
O2 - BHO: wmpdrm - {0E674588-66B7-4E19-9D0E-2053B800F69F} - C:\WINDOWS\system32\wmpdrm.dll
O4 - HKLM\..\Run: [RavTask] "d:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [spoolsv] C:\WINDOWS\system32\spoolsv\spoolsv.exe -printer
O4 - HKLM\..\Run: [System Manager] C:\WINDOWS\svchost.exe
O4 - HKLM\..\Run: [Thunder] "D:\Program Files\Thunder Network\Thunder\ThunderShell.exe" /s
O8 - Extra context menu item: &使用迅雷下载 - d:\Program Files\Thunder Network\Thunder\geturl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - d:\Program Files\Thunder Network\Thunder\getallurl.htm
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1142236190609
O17 - HKLM\System\CCS\Services\Tcpip\..\{D5933E18-08ED-462B-9893-E2526BD27BF9}: NameServer = 220.187.24.6,220.187.24.2
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - d:\Program Files\Rising\Rav\CCenter.exe
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - d:\Program Files\Rising\Rav\Ravmond.exe
O23 - Service: Win.Driver.Sevice - Unknown owner - C:\WINDOWS\Win.Driver.Sevice

gototop
 

O23 - Service: Win.Driver.Sevice - Unknown owner - C:\WINDOWS\Win.Driver.Sevice

貌似灰鸽子
请参考
灰鸽子2005手工查杀方法总结
http://forum.ikaka.com/topic.asp?board=28&artid=5666824

安全模式下
修复
R3 - Default URLSearchHook is missing
O2 - BHO: wmpdrm - {0E674588-66B7-4E19-9D0E-2053B800F69F} - C:\WINDOWS\system32\wmpdrm.dll
O4 - HKLM\..\Run: [spoolsv] C:\WINDOWS\system32\spoolsv\spoolsv.exe -printer
O4 - HKLM\..\Run: [System Manager] C:\WINDOWS\svchost.exe

删除

C:\WINDOWS\system32\wmpdrm.dll
C:\WINDOWS\system32\spoolsv\spoolsv.exe
C:\WINDOWS\svchost.exe
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT