瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 机器不定时弹出网页,www.99box.com,以及一些其他色情视频聊天网站

1   1  /  1  页   跳转

机器不定时弹出网页,www.99box.com,以及一些其他色情视频聊天网站

机器不定时弹出网页,www.99box.com,以及一些其他色情视频聊天网站

我用卡卡上网助手和HijackThis都扫描以后,把结果贴出来,希望各位高手能帮帮忙,已经骚扰我一个多星期了,我快疯了,各种方法都清除不掉
Logfile of Kaka v2. 0. 0. 8 Scan Module v2. 0. 0. 1
Scan saved at 12:21:57, on 2006-05-03
Platform: Microsoft Windows 2000 Professional Service Pack 4 (Build 2195)
MSIE: Internet Explorer v6.00 SP1;Q837009;Q832894;Q831167;Q823353;Q833989; (6.00.2800.1106)


Running processes:
[smss.exe]
CommandLine =

[csrss.exe]
CommandLine = D:\WINNT\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off MaxRequestThreads=16

[winlogon.exe]
CommandLine = winlogon.exe

[services.exe]
CommandLine = D:\WINNT\system32\services.exe

[lsass.exe]
CommandLine = D:\WINNT\system32\lsass.exe

[KWatch.EXE]
CommandLine = D:\KAV2005\KWatch.EXE

[svchost.exe]
CommandLine = D:\WINNT\system32\svchost -k rpcss

[spoolsv.exe]
CommandLine = D:\WINNT\system32\spoolsv.exe

[svchost.exe]
CommandLine = D:\WINNT\System32\svchost.exe -k netsvcs

[KPfwSvc.EXE]
CommandLine = "D:\KAV2005\KPfwSvc.EXE"

[nvsvc32.exe]
CommandLine = D:\WINNT\system32\nvsvc32.exe

[MSTask.exe]
CommandLine = D:\WINNT\system32\MSTask.exe

[WinMgmt.exe]
CommandLine = D:\WINNT\System32\WBEM\WinMgmt.exe

[WrOS.EXE]
CommandLine = "D:\Program Files\WinPoET\WrOS.EXE"

[Explorer.EXE]
CommandLine = D:\WINNT\Explorer.EXE

[svchost.exe]
CommandLine = D:\WINNT\system32\svchost.exe -k wugroup

[mmsk.exe]
CommandLine = "E:\木马杀客\mmsk.exe"

[conime.exe]
CommandLine = D:\WINNT\system32\conime.exe

[IEXPLORE.EXE]
CommandLine = "D:\Program Files\Internet Explorer\IEXPLORE.EXE"

[HijackThis.exe]
CommandLine = "D:\Documents and Settings\sds\My Documents\ha-hijackthis1991-xqb\HijackThis.exe"

[KkScan.exe]
CommandLine = "D:\Program Files\Rising\KakaToolBar\KkScan.exe"

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page=http://www.yahoo.com.cn
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page=http://www.yahoo.com.cn
R3 - Default URLSearchHook is missing
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - d:\program files\google\googletoolbar2.dll
O2 - BHO: 卡卡上网安全助手 - {AFF6E516-CBE5-4F8A-9C2F-38A68013E766} - D:\WINNT\system32\kakatool.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - d:\program files\google\googletoolbar2.dll
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - D:\WINNT\system32\kakatool.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE D:\WINNT\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [mmsk] E:\木马杀客\mmsk.exe
O4 - HKLM\..\RunServices: [mmsk] E:\木马杀客\mmsk.exe
O4 - Global Startup: desktop.ini =
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O8 - Extra context menu item: &使用迅雷下载 - D:\Program Files\Sandai Technologies Inc\Thunder\geturl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - D:\Program Files\Sandai Technologies Inc\Thunder\getAllurl.htm
O8 - Extra context menu item: 上传到QQ网络硬盘 - E:\Program Files\Tencent\qq\AddToNetDisk.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - E:\Program Files\Tencent\qq\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - E:\Program Files\Tencent\qq\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - E:\Program Files\Tencent\qq\SendMMS.htm
O9 - Extra Button: @shdoclc.dll,-866 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINNT\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: @shdoclc.dll,-864 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINNT\system32\shdocvw.dll
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/windows/ie_intl/cn/start/
O16 - DPF: DirectAnimation Java Classes - file://D:\WINNT\system32\dajava.cab
O16 - DPF: Internet Explorer Classes for Java - file://D:\WINNT\system32\iejava.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{E732F341-9519-4A62-A163-441B254B6275}: NameServer = 202.96.209.134 202.96.209.6
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: cdl - {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: file - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: ftp - {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: gopher - {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: http - {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: https - {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: ipp - (no CLSID) - (no file)
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - D:\WINNT\System32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: local - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: mailto - {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11d0-85E3-00C04FD85AB4} - D:\WINNT\system32\inetcomm.dll
O18 - Protocol: mk - {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - D:\WINNT\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - D:\WINNT\System32\itss.dll
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - D:\WINNT\system32\mshtml.dll
O18 - Protocol: vnd.ms.radio - {3DA2AA3B-3D96-11D2-9BD2-204C4F4F5020} - D:\WINNT\System32\msdxm.ocx
O20 - Winlogon Notify: wzcnotif
O23 - Service: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - D:\WINNT\system32\dmadmin.exe /com
O23 - Service: Kingsoft Personal Firewall Service (KPfwSvc) - Kingsoft Corporation - "D:\KAV2005\KPfwSvc.EXE"
O23 - Service: Kingsoft Antivirus KWatch Service (KWatchSvc) - Kingsoft Corporation - D:\KAV2005\KWatch.EXE
O23 - Service: Macromedia Licensing Service (Macromedia Licensing Service) -  - "D:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe"
O23 - Service: Microsoft (Microsoft) -  - D:\WINNT\Hackercn.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - D:\WINNT\system32\nvsvc32.exe
O23 - Service: User Privilege Service (usprserv) - Microsoft Corporation - D:\WINNT\system32\svchost.exe -k netsvcs
O23 - Service: WinPPPoverEthernet (WinPPPoverEthernet) - iVasion, a Routerware Company - D:\Program Files\WinPoET\WrOS.EXE

Logfile of HijackThis v1.99.1
Scan saved at 12:33:34, on 2006-5-3
Platform: Windows 2000 SP4 (WinNT 5.00.2195)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

运行进程:           
D:\WINNT\System32\smss.exe
D:\WINNT\system32\csrss.exe
D:\WINNT\system32\winlogon.exe
D:\WINNT\system32\services.exe
D:\WINNT\system32\lsass.exe
D:\KAV2005\KWatch.EXE
D:\WINNT\system32\svchost.exe
D:\WINNT\system32\spoolsv.exe
D:\WINNT\System32\svchost.exe
D:\KAV2005\KPfwSvc.EXE
D:\WINNT\system32\nvsvc32.exe
D:\WINNT\system32\MSTask.exe
D:\WINNT\System32\WBEM\WinMgmt.exe
D:\Program Files\WinPoET\WrOS.EXE
D:\WINNT\Explorer.EXE
D:\WINNT\system32\svchost.exe
E:\木马杀客\mmsk.exe
D:\WINNT\system32\conime.exe
D:\Program Files\Internet Explorer\IEXPLORE.EXE
D:\Documents and Settings\sds\My Documents\ha-hijackthis1991-xqb\HijackThis.exe
D:\Program Files\Rising\KakaToolBar\KkScan.exe

F2 - REG:system.ini: UserInit=userinit.exe,
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - d:\program files\google\googletoolbar2.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - d:\program files\google\googletoolbar2.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE D:\WINNT\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [Synchronization Manager] mobsync.exe /logon
O4 - HKLM\..\Run: [mmsk] E:\木马杀客\mmsk.exe
O4 - HKLM\..\RunServices: [mmsk] E:\木马杀客\mmsk.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O8 - Extra context menu item: &使用迅雷下载 - D:\Program Files\Sandai Technologies Inc\Thunder\geturl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - D:\Program Files\Sandai Technologies Inc\Thunder\getAllurl.htm
O8 - Extra context menu item: 上传到QQ网络硬盘 - E:\Program Files\Tencent\qq\AddToNetDisk.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - E:\Program Files\Tencent\qq\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - E:\Program Files\Tencent\qq\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - E:\Program Files\Tencent\qq\SendMMS.htm
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINNT\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - D:\WINNT\web\related.htm
O14 - IERESET.INF: SEARCH_PAGE_URL=
O14 - IERESET.INF: START_PAGE_URL=
O17 - HKLM\System\CCS\Services\Tcpip\..\{E732F341-9519-4A62-A163-441B254B6275}: NameServer = 202.96.209.134 202.96.209.6

最后编辑2006-05-05 16:54:21
分享到:
gototop
 

开始→运行→services.msc→确定→查找Microsoft→双击→启动类型→禁止→停止→应用→确定。终止Microsoft这个服务。
重启。
双击我的电脑--工具---文件夹选项--查看选项卡--单击选取"显示隐藏文件或文件夹"--清除"隐藏受保护的操作系统文件(推荐)"复选框。在提示您确定更改时,单击“是”
然后找到如下文件并删除
D:\WINNT\Hackercn.exe
如果还没有解决问题
请下载使用 System Repair Engineer,使用“智能扫描”,按下“扫描”按钮进行扫描,扫描完成后按下“保存报告”按钮保存报告日志文件(SREng.LOG),把保存的报告日志文件内容复制-粘贴上来
http://forum.ikaka.com/topic.asp?board=67&artid=5188931
www.27814939.ys168.com
如果日志无法一次导完,请一段段粘来。
gototop
 

看花了眼,等会再来
gototop
 

引用:
【我无邪的贴子】开始→运行→services.msc→确定→查找Microsoft→双击→启动类型→禁止→停止→应用→确定。终止Microsoft这个服务。
重启。
双击我的电脑--工具---文件夹选项--查看选项卡--单击选取"显示隐藏文件或文件夹"--清除"隐藏受保护的操作系统文件(推荐)"复选框。在提示您确定更改时,单击“是”
然后找到如下文件并删除
D:\WINNT\Hackercn.exe
如果还没有解决问题
请下载使用 System Repair Engineer,使用“智能扫描”,按下“扫描”按钮进行扫描,扫描完成后按下“保存报告”按钮保存报告日志文件(SREng.LOG),把保存的报告日志文件内容复制-粘贴上来
http://forum.ikaka.com/topic.asp?board=67&artid=5188931
www.27814939.ys168.com
如果日志无法一次导完,请一段段粘来。

...........................

问题已解决,万分感谢!!!这是什么病毒?冰河?
gototop
 

【回复“红色伴侣”的帖子】
你中的灰鸽子!
gototop
 

修复:

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT