1   1  /  1  页   跳转

想练手工杀毒的进来看看

想练手工杀毒的进来看看

一份练习手工杀毒操作的典型日志(http://forum.ikaka.com/topic.asp?board=28&artid=8242706)

手工杀毒工具(推荐):IceSword

使用IceSword的基本操作:http://forum.ikaka.com/topic.asp?board=28&artid=7168178

手工杀毒基本思路:http://forum.ikaka.com/topic.asp?board=28&artid=8240356


以下是那份日志中有问题的内容:
——————————————
1、注册表中须删除的加载项:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
<svc><C:\DOCUME~1\gy\LOCALS~1\Temp\wmbose.exe> [Microsoft Corporation]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
<mhs2><C:\DOCUME~1\gy\LOCALS~1\Temp\mhs2.exe> [N/A]
<zts2><C:\DOCUME~1\gy\LOCALS~1\Temp\zts2.exe> [N/A]
<ntaskldr><C:\WINNT\system\logo_1.exe> [N/A]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run]
<ntaskldr><C:\WINNT\system\logo_1.exe> [N/A]

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows]
<AppInit_DLLs><578685M.BMP> [N/A]

2、注册表中须删除的服务:
[Windows DHCP Service / WinDHCPsvc][Stopped/Auto Start]
<C:\WINNT\system32\rundll32.exe windhcp.ocx,start><N/A>

3、注册表中须删除的驱动:
[Netgroup Packet Filter / NPF][Running/Manual Start]
<system32\DRIVERS\npf.sys><CACE Technologies>

4、须删除的浏览器加载项:
[@shdoclc.dll,-866]
{c95fe080-8f5d-11d2-a20b-00aa003c157a} <, N/A>

5、被病毒插入的进程(须用IceSword强制卸除插入系统核心进程中的病毒模块;非核心进程——可直接结束之):

[PID: 160][\??\C:\WINNT\system32\winlogon.exe] [Microsoft Corporation, 5.00.2195.6714]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 220][C:\WINNT\system32\services.exe] [Microsoft Corporation, 5.00.2195.6700]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\WINNT\system32\dmserver.dll] [VERITAS Software Corp., 2195.6605.297.3]
[PID: 232][C:\WINNT\system32\lsass.exe] [Microsoft Corporation, 5.00.2195.6695]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 424][C:\WINNT\system32\svchost.exe] [Microsoft Corporation, 5.00.2134.1]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 456][C:\WINNT\system32\spoolsv.exe] [Microsoft Corporation, 5.00.2195.6659]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 496][C:\WINNT\System32\svchost.exe] [Microsoft Corporation, 5.00.2134.1]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 532][C:\WINNT\System32\nvsvc32.exe] [NVIDIA Corporation, 6.14.10.7184]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 584][C:\WINNT\system32\regsvc.exe] [Microsoft Corporation, 5.00.2195.6701]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 632][C:\WINNT\system32\stisvc.exe] [Microsoft Corporation, 5.00.2195.6656]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 704][C:\WINNT\System32\WBEM\WinMgmt.exe] [Microsoft Corporation, 1.50.1085.0100]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 732][C:\WINNT\system32\svchost.exe] [Microsoft Corporation, 5.00.2134.1]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 904][C:\WINNT\Explorer.EXE] [Microsoft Corporation, 5.00.3700.6690]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\WINNT\system32\windhcp.ocx] [N/A, N/A]
[PID: 972][C:\WINNT\system\logo_1.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1008][C:\Program Files\Common Files\Real\Update_OB\realsched.exe] [RealNetworks, Inc., 0.1.0.3536]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1064][C:\WINNT\system32\internat.exe] [Microsoft Corporation, 5.00.2920.0000]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1096][C:\DOCUME~1\gy\LOCALS~1\Temp\wmbose.exe] [Microsoft Corporation, 5.1.2600.0 (xpclient.010817-1148)]
[C:\DOCUME~1\gy\LOCALS~1\Temp\xc7.dll] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\DOCUME~1\gy\LOCALS~1\Temp\packet.dll] [CACE Technologies, 3, 1, 0, 27]
[C:\DOCUME~1\gy\LOCALS~1\Temp\WanPacket.dll] [CACE Technologies, 3, 1, 0, 27]
[PID: 1232][C:\WINNT\system32\conime.exe] [Microsoft Corporation, 5.00.2195.6655]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1512][C:\WINNT\system\conime.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1060][C:\DOCUME~1\gy\LOCALS~1\Temp\mhs2.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\DOCUME~1\gy\LOCALS~1\Temp\mhs2.dll] [N/A, N/A]
[PID: 1088][C:\DOCUME~1\gy\LOCALS~1\Temp\zts2.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\DOCUME~1\gy\LOCALS~1\Temp\zts2.dll] [N/A, N/A]
[PID: 1188][C:\WINNT\system32\conime.exe] [Microsoft Corporation, 5.00.2195.6655]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 312][C:\WINNT\system\wo3.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 1288][C:\WINNT\system\internet.exe] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\WINNT\system32\windhcp.ocx] [N/A, N/A]
[PID: 716][C:\DOCUME~1\gy\LOCALS~1\Temp\wincabb.exe] [N/A, N/A]
[C:\WINNT\system32\windhcp.ocx] [N/A, N/A]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[PID: 664][C:\Program Files\Internet Explorer\iexplore.exe] [Microsoft Corporation, 6.00.2800.1106]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\WINNT\system32\windhcp.ocx] [N/A, N/A]
[PID: 1632][D:\软件\sreng2\SREng.EXE] [Smallfrogs Studio, 2.3.13.690]
[C:\WINNT\578685M.BMP] [N/A, N/A]
[C:\WINNT\system32\windhcp.ocx] [N/A, N/A]


6、C、D、E分区根目录下要删除的文件
Autorun.inf
ghost.exe

7、HOSTS 文件中须删除的内容:
127.0.0.1 about-blank.cc
127.0.0.1 hao.allxun.com
127.0.0.1 kzxf.com
127.0.0.1 vod.mmdy.org
127.0.0.1 www.123wa.com
127.0.0.1 www.4199.com
127.0.0.1 www.71791.com
127.0.0.1 www.7939.com
127.0.0.1 www.9505.com
127.0.0.1 www.feixue.net
127.0.0.1 www.kzxf.com
127.0.0.1 www.my123.com
127.0.0.1 www.piaoxue.com
127.0.0.1 www.xfkz.com
127.0.0.1 xfkz.com
最后编辑2007-01-12 20:18:28
分享到:
gototop
 

学习下
gototop
 

gototop
 

挺全的
gototop
 

真是够“毒”!
gototop
 

顶起来,学习了
gototop
 

呵呵,这个毒的~~
gototop
 

中成这样,无语了!
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT