瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 【求助】鼠标乱飞,是不是中病毒了啊!

1   1  /  1  页   跳转

【求助】鼠标乱飞,是不是中病毒了啊!

【求助】鼠标乱飞,是不是中病毒了啊!

各位大虾!!救命啊!请看↓
Logfile of Kaka v2. 0. 0. 9 Scan Module v2. 0. 0. 1
Scan saved at 13:50:09, on 2006-06-29
Platform: Microsoft Windows XP Professional Service Pack 1 (Build 2600)
MSIE: Internet Explorer v6.00 SP1;Q330994;Q828750; (6.00.2800.1106 (xpsp1.020828-1920))


Running processes:
[SMSS.EXE]
CommandLine =

[CSRSS.EXE]
CommandLine = C:\WINDOWS\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off MaxRequestThreads=16

[WINLOGON.EXE]
CommandLine = winlogon.exe

[SERVICES.EXE]
CommandLine = C:\WINDOWS\system32\services.exe

[LSASS.EXE]
CommandLine = C:\WINDOWS\system32\lsass.exe

[SVCHOST.EXE]
CommandLine = C:\WINDOWS\system32\svchost -k rpcss

[SVCHOST.EXE]
CommandLine = C:\WINDOWS\System32\svchost.exe -k netsvcs

[SVCHOST.EXE]
CommandLine = C:\WINDOWS\System32\svchost.exe -k NetworkService

[SVCHOST.EXE]
CommandLine = C:\WINDOWS\System32\svchost.exe -k LocalService

[SPOOLSV.EXE]
CommandLine = C:\WINDOWS\system32\spoolsv.exe

[EXPLORER.EXE]
CommandLine = C:\WINDOWS\Explorer.EXE

[SOUNDMAN.EXE]
CommandLine = "C:\WINDOWS\SOUNDMAN.EXE"

[VRVMON.EXE]
CommandLine = "C:\bxy_vrv\vrvmon.exe"

[CTFMON.EXE]
CommandLine = "C:\WINDOWS\System32\ctfmon.exe"

[QQ.exe]
CommandLine = "E:\QQ\QQ.exe"

[SMAgent.exe]
CommandLine = "C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe"

[WDFMGR.EXE]
CommandLine = C:\WINDOWS\System32\wdfmgr.exe

[TIMPlatform.exe]
CommandLine = E:\QQ\TIMPlatform.exe -Embedding

[QQGame.exe]
CommandLine = "E:\QQGame\QQGame.exe" /START QQUIN:396294281 PWDHASH:kQaecGH2FpyQupAd86LgRw==

[QQ.exe]
CommandLine = "E:\QQ\QQ.exe"

[QQ.exe]
CommandLine = "E:\QQ\QQ.exe"

[QQ.exe]
CommandLine = "E:\QQ\QQ.exe"

[QQPet.exe]
CommandLine = "E:\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C83898188040000009A080100040F00A0B5A4AFA09182919DAF9487A5999E040000004DA79C14061100BEABBAB1BE8F9C8F83B19D9A9CA0878D850A000000541F1EA61AB925255433061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FD878BFEFB89FDF987FCFD87FEFDF986878889FE8B87868FFE898688FAFA89868C888E88FB88FEFCFC86FC87FD88FBFD8BFD8E8A878AFAFBF9FA8C8EF98D8CFA040100AE04000000774EA344021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPet.exe]
CommandLine = "E:\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C838981880400000096080100040F00A0B5A4AFA09182919DAF9487A5999E04000000EBE9F30E061100BEABBAB1BE8F9C8F83B19D9A9CA0878D850A00000054014F73733B540F2718061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FA88FA8FFAFDFD89FC8A8C8CFA8D8E878F88F98F8C88898F8DFC8AFC8F86FE89FD8D8D87FC88FE8C87F9F9FEFA8FFCF9FA8B88FAFBFDFB868D8B8DFE88FE8E89040100AE04000000794EA344021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPet.exe]
CommandLine = "E:\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C83898188040000009A050E00040F00A0B5A4AFA09182919DAF9487A5999E04000000612F6612061100BEABBAB1BE8F9C8F83B19D9A9CA0878D850C000000D3D352005209622A2010E7F9061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FD8C8F8D8AFB8F8D8DF98E8D8789FDFE8EFB8787F98E8F8687FEFD8D8BFCFBF98DFA8F8D8DFD8FFB898CFB888F88FA8BFD8C8C8C8A8AF987888D8687FD8A89FC040100AE040000008E4EA344021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQPet.exe]
CommandLine = "E:\QQ\qqpet\qqpet.exe" 514401010600041200BDA8B9B2BD8C9F8C80B2899AA58C838981880400000076010300040F00A0B5A4AFA09182919DAF9487A5999E0400000089F89E17061100BEABBAB1BE8F9C8F83B19D9A9CA0878D850B000000D2465735533F1D3258551D061000BFAABBB0BF8E9D8E82B09C9B9DA48A9640000000FB88F98A87FA89888C8EFD8BFA8B8C86FA8D8EFC8EFCFDF9898FFB88FAFBFB8EFE8B868AF98AF9FD8AF988F98CFB89F98AFCFB8CFA8F868FFDFE8D8CFE8BFB8F040100AE040000000D4FA344021400BBAEBFB4BB8A998A86B488BB99849392BF929B8E0100000000

[QQexternal.exe]
CommandLine = "E:\QQ\QQexternal.exe"

[IEXPLORE.EXE]
CommandLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"

[KkScan.exe]
CommandLine = "E:\kaka\KkScan.exe"

[IEXPLORE.EXE]
CommandLine = "C:\Program Files\Internet Explorer\IEXPLORE.EXE"

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page=http://www.baidu.com/
R3 - Default URLSearchHook is missing
O1 - Hosts: 127.0.0.1      localhost
O2 - BHO: QQBrowserHelperObject Class - {54EBD53A-9BC1-480B-966A-843A333CA162} - E:\QQ\QQIEHelper.dll
O2 - BHO: Thunder Browser Helper - {889D2FEB-5411-4565-8998-1DD2C5261283} - E:\讯雷\ComDlls\XunLeiBHO_001.dll
O2 - BHO:  - {A9930D97-9CF0-42A0-A10D-4F28836579D5} - E:\kugoo\KuGoo3\KuGoo3DownXControl.ocx
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar:  (file missing)
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
O3 - Toolbar: 电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - C:\WINDOWS\System32\kakatool.dll
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\System32\ctfmon.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [xysecond] c:\bxy_vrv\vrvmon.exe
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [KuGoo3] E:\kugoo\KuGoo3\KuGoo.exe
O4 - Startup: desktop.ini =
O4 - Startup: 腾讯QQ.lnk = E:\QQ\QQ.exe
O4 - Global Startup: desktop.ini =
O8 - Extra context menu item: &使用迅雷下载 - E:\讯雷\Program\GetUrl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - E:\讯雷\Program\GetAllUrl.htm
O8 - Extra context menu item: Google 搜索(&G) - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
O8 - Extra context menu item: 上传到QQ网络硬盘 - E:\QQ\AddToNetDisk.htm
O8 - Extra context menu item: 使用KuGoo3下载(&K) - E:\kugoo\KuGoo3\KuGoo3DownX.htm
O8 - Extra context menu item: 反向链接 - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
O8 - Extra context menu item: 添加到QQ自定义面板 - E:\QQ\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - E:\QQ\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - E:\QQ\SendMMS.htm
O8 - Extra context menu item: 类似网页 - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
O8 - Extra context menu item: 缓存的网页快照 - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
O8 - Extra context menu item: 翻译英文字词(&T) - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
O9 - Extra Button: 卓越 - {8DE0FCD4-5EB5-11D3-AD25-00002100131B} - C:\POWERW~1\IEPlugin.dll
O9 - Extra Button: 词霸 - {9A687CA6-D585-4947-9ED9-BE96071F5CD9} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra Button: 金山词霸 - {C8CE29C5-7589-11D3-B81B-0080C8DC5DC8} - C:\POWERW~1\IEPlugin.dll
O9 - Extra Button: @shdoclc.dll,-866 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra 'Tools' menuitem: @shdoclc.dll,-864 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\System32\shdocvw.dll
O9 - Extra Button: QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - E:\QQ\QQ.EXE
O9 - Extra 'Tools' menuitem: 腾讯QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - E:\QQ\QQ.EXE
O9 - Extra Button: (no name) - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - E:\QQ\QQIEHelper.dll
O9 - Extra 'Tools' menuitem: QQ炫彩工具条设置 - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - E:\QQ\QQIEHelper.dll
O9 - Extra Button: 访问瑞星网站 - {FF2DE7A6-ECB1-4CBC-9C0E-D92A9E66E444} - http://www.rising.com.cn/?u=RSTB (file missing)
O9 - Extra Button: 访问卡卡社区 - {FF2DE7A6-ECB1-4CBC-9C0E-D92A9E66E445} - http://www.ikaka.com/?u=RSTB (file missing)
O14 - IERESET.INF: START_PAGE_URL=http://www.jumper.com.cn
O16 - DPF: DirectAnimation Java Classes - file://C:\WINDOWS\Java\classes\dajava.cab
O16 - DPF: {A96C48EA-AA88-4BBD-B58C-7B41146A6EAC} (Qzone Media Tools) - http://imgcache.qq.com/qzone/photo/QzoneMediaTools.cab
O16 - DPF: {C661F36D-DF85-4EF4-83C7-E107B83D04B1} (WebActivater Control) - http://dl_dir.qq.com/3dshow/3DShowVM.cab
O16 - DPF: {E4E2F180-CB8B-4DE9-ACBB-DA745D3BA153} (Rising Web Scan Object) - http://download.rising.com.cn/register/pcver/autoupgradepad/pcver2006new/OL2006.cab
O16 - DPF: {F138084D-84D7-48CD-BEA8-04772457516E} (VqqSpeedDlProxy Class) - http://59.36.97.38/jsxz/vqqsdl1009.cab
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: cdl - {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: dic - {C21F5C32-F57A-4A0D-8E0A-B672691C52D0} - C:\POWERW~1\XDictExB.dll
O18 - Protocol: dvd - {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\System32\msvidctl.dll
O18 - Protocol: file - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ftp - {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: gopher - {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: http - {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: https - {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ipp - (no CLSID) - (no file)
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\System32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: local - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: mailto - {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\System32\inetcomm.dll
O18 - Protocol: mk - {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\System32\itss.dll
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: tv - {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\System32\msvidctl.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\System32\mshtml.dll
O18 - Protocol: vnd.ms.radio - {3DA2AA3B-3D96-11D2-9BD2-204C4F4F5020} - C:\WINDOWS\System32\msdxm.ocx
O18 - Protocol: wia - {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\System32\wiascr.dll
O20 - Winlogon Notify: igfxcui
O23 - Service: Human Interface Device Access (HidServ) -  - C:\WINDOWS\System32\svchost.exe -k netsvcs
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
最后编辑2006-06-29 15:57:56
分享到:
gototop
 

顶,我的也一样,鼠标会乱串的!!
gototop
 

刚扫到这个病毒Hack.Exploit.VBS.Phel.e
与鼠标乱飞有关吗?????
gototop
 

我认为不是病毒的缘故,你有条件可以换一个鼠标试试。
gototop
 

引用:
【我无邪的贴子】我认为不是病毒的缘故,你有条件可以换一个鼠标试试。
...........................


对啊,有些东西不是病毒造成的,有时是鼠标垫子有问题,有时是鼠标内部问题,有时是光电鼠标下面有东西了……当然,自己想啦,我也说不清楚的。
gototop
 

可能是鼠标漏光吧...
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT