1   1  /  1  页   跳转

[求助] APPInt_DLLs值被恶意修改

APPInt_DLLs值被恶意修改

我的注册表APPInt_DLLs值被修改为非正常值(默认为0),请检查计算机内的病毒


日志文件 Trend Micro HijackThis v 2.0.2
日志保存时间: 16:19:08,2008-10-21
操作系统: Windows XP SP2 (WinNT 5.01.2600)
IE版本: Internet Explorer v6.00 SP2 (6.00.2900.2180)
启动模式: 正常
正在运行的进程:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\360Safebox\safeboxTray.exe
D:\Program Files\360safe\safemon\360Tray.exe
D:\Program Files\360safe\antiarp\antiarp.exe
C:\Program Files\Rising\AntiSpyware\rstray.exe
E:\kugoo\KuGou2008\KuGoo.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\AVG Anti-Spyware\guard.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\AVG Anti-Spyware\软件帝国.exe
C:\Program Files\锐捷网络\Ruijie Supplicant\8021x.exe
C:\WINDOWS\system32\conime.exe
E:\浏览器\新建文件夹\Maxthon2\Maxthon.exe
D:\Program Files\360safe\360Safe.exe
D:\Program Files\Thunder Network\Thunder\Program\Thunder5.exe
C:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\www\LOCALS~1\Temp\Rar$EX00.438\SREngLdr.EXE
C:\DOCUME~1\www\LOCALS~1\Temp\Rar$EX00.438\SREc0db05d0.EXE
E:\瑞星\Rising\新建文件夹\hijackthis.exe
C:\DOCUME~1\www\LOCALS~1\Temp\nsj29.tmp\hijackthis.exe
O1 - Hosts: ------fs2you patch by vadera@pdahd.cn------
O1 - Hosts: 59.63.157.25 www.fs2you.com
O1 - Hosts: 222.169.230.101 dyn.www.fs2you.com
O1 - Hosts: 59.32.232.195 file1.fs2you.com
O1 - Hosts: 222.169.230.98 file2.fs2you.com
O1 - Hosts: 221.204.246.79 file3.fs2you.com
O1 - Hosts: 61.150.85.80 file4.fs2you.com
O1 - Hosts: 60.2.139.27 file5.fs2you.com
O1 - Hosts: 61.184.189.10 file6.fs2you.com
O1 - Hosts: 61.174.62.132 file7.fs2you.com
O1 - Hosts: 58.211.75.49 file8.fs2you.com
O1 - Hosts: 61.134.84.238 file9.fs2you.com
O1 - Hosts: 61.156.40.181 file10.fs2you.com
O1 - Hosts: 218.75.151.4 file11.fs2you.com
O1 - Hosts: 58.211.75.31 file12.fs2you.com
O1 - Hosts: 124.94.101.133 file13.fs2you.com
O1 - Hosts: 221.204.246.115 file14.fs2you.com
O1 - Hosts: 218.75.151.10 file15.fs2you.com
O1 - Hosts: 58.218.209.126 file16.fs2you.com
O1 - Hosts: 61.157.152.173 file17.fs2you.com
O1 - Hosts: 125.46.41.27 file18.fs2you.com
O1 - Hosts: 125.91.11.223 file19.fs2you.com
O1 - Hosts: 59.53.48.134 file20.fs2you.com
O1 - Hosts: 59.53.48.136 file21.fs2you.com
O1 - Hosts: 59.53.48.144 file22.fs2you.com
O1 - Hosts: 61.139.106.204 file23.fs2you.com
O1 - Hosts: 59.53.48.172 file24.fs2you.com
O1 - Hosts: 124.94.101.146 file25.fs2you.com
O1 - Hosts: 61.166.111.227 file26.fs2you.com
O1 - Hosts: ------fs2you patch end------
O1 - Hosts: ------fs2you patch by vadera@pdahd.cn------
O1 - Hosts: 59.63.157.25 www.fs2you.com
O1 - Hosts: 222.169.230.101 dyn.www.fs2you.com
O1 - Hosts: 59.32.232.195 file1.fs2you.com
O1 - Hosts: 222.169.230.98 file2.fs2you.com
O1 - Hosts: 221.204.246.79 file3.fs2you.com
O1 - Hosts: 61.150.85.80 file4.fs2you.com
O1 - Hosts: 60.2.139.27 file5.fs2you.com
O1 - Hosts: 61.184.189.10 file6.fs2you.com
O1 - Hosts: 61.174.62.132 file7.fs2you.com
O1 - Hosts: 58.211.75.49 file8.fs2you.com
O1 - Hosts: 61.134.84.238 file9.fs2you.com
O1 - Hosts: 61.156.40.181 file10.fs2you.com
O1 - Hosts: 218.75.151.4 file11.fs2you.com
O1 - Hosts: 58.211.75.31 file12.fs2you.com
O1 - Hosts: 124.94.101.133 file13.fs2you.com
O1 - Hosts: 221.204.246.115 file14.fs2you.com
O1 - Hosts: 218.75.151.10 file15.fs2you.com
O1 - Hosts: 58.218.209.126 file16.fs2you.com
O1 - Hosts: 61.157.152.173 file17.fs2you.com
O1 - Hosts: 125.46.41.27 file18.fs2you.com
O1 - Hosts: 125.91.11.223 file19.fs2you.com
O1 - Hosts: 59.53.48.134 file20.fs2you.com
O1 - Hosts: 59.53.48.136 file21.fs2you.com
O1 - Hosts: 59.53.48.144 file22.fs2you.com
O1 - Hosts: 61.139.106.204 file23.fs2you.com
O1 - Hosts: 59.53.48.172 file24.fs2you.com
O1 - Hosts: 124.94.101.146 file25.fs2you.com
O1 - Hosts: 61.166.111.227 file26.fs2you.com
O1 - Hosts: ------fs2you patch end------
O2 - BHO: Thunder AtOnce - {01443AEC-0FD1-40fd-9C87-E93D1494C233} -
d:\Program Files\Thunder Network\Thunder\ComDlls\TDAtOnce_Now.dll
O2 - BHO: ThunderBHO - {889D2FEB-5411-4565-8998-1DD2C5261283} - D:\Program
Files\Thunder Network\Thunder\ComDlls\xunleiBHO_Now.dll
O2 - BHO: SafeMon Class - {B69F34DD-F0F9-42DC-9EDD-957187DA688D} -
D:\Program Files\360safe\safemon\safemon.dll
O4 - HKLM\..\Run: [360Safebox] "C:\Program Files\360Safebox\safeboxTray.exe"
/r
O4 - HKLM\..\Run: [360Safetray] D:\Program Files\360safe\safemon\360Tray.exe
/start
O4 - HKLM\..\Run: [360Antiarp] D:\Program Files\360safe\antiarp\antiarp.exe
/start
O4 - HKLM\..\Run: [runeip] "C:\Program Files\Rising\AntiSpyware\rstray.exe"
/startup
O4 - HKLM\..\Run: [KuGou] E:\kugoo\KuGou2008\KuGoo.exe min
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -
system
O4 - HKLM\..\Run: [HotKeysCmds] ; C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [IgfxTray] ; C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [IMJPMIG8.1] ; "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil
/RemAdvDef /Migration32
O4 - HKLM\..\Run: [NeroFilterCheck] ; C:\Program Files\Common
Files\Nero\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [Persistence] ; C:\WINDOWS\system32\igfxpers.exe
O4 - HKLM\..\Run: [PHIME2002A] ; C:\WINDOWS\system32
\IME\TINTLGNT\TINTSETP.EXE /IMEName
O4 - HKLM\..\Run: [PHIME2002ASync] ; C:\WINDOWS\system32
\IME\TINTLGNT\TINTSETP.EXE /SYNC
O4 - HKLM\..\Run: [RTHDCPL] ; RTHDCPL.EXE
O4 - HKLM\..\Run: [TkBellExe] ;
O4 - HKLM\..\Run: [!AVG Anti-Spyware] "C:\Program Files\AVG Anti-Spyware\软
件帝国.exe" /minimized
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] ;
"C:\Program Files\Common Files\Nero\Lib\NMBgMonitor.exe"
O4 - HKUS\S-1-5-19\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User
'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User
'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User
'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [ctfmon.exe] C:\WINDOWS\system32\CTFMON.EXE (User
'Default user')
O8 - 扩展右键菜单项: 使用迅雷下载 - D:\Program Files\Thunder
Network\Thunder\Program\geturl.htm
O8 - 扩展右键菜单项: 使用迅雷下载全部链接 - D:\Program Files\Thunder
Network\Thunder\Program\getallurl.htm
O8 - 扩展右键菜单项: 使用迷你快车下载 - C:\Program Files\FlashGet
Network\FlashGet Mini\GetUrl.htm
O8 - 扩展右键菜单项: 使用迷你快车下载全部链接 - C:\Program Files\FlashGet
Network\FlashGet Mini\GetAllUrl.htm
O8 - 扩展右键菜单项: 使用迷你快车下载该网页FLV - C:\Program Files\FlashGet
Network\FlashGet Mini\FlashGetFlvdetector.htm
O8 - 扩展右键菜单项: 导出到 Microsoft Office Excel(&X) - res://D:\PROGRA~1
\MICROS~1\OFFICE11\EXCEL.EXE/3000
O8 - 扩展右键菜单项: 添加到QQ表情 - d:\Program
Files\Tencent\QQ\AddEmotion.htm
O9 - 额外的按钮: 启动迅雷5 - {09BA8F6D-CB54-424B-839C-C2A6C8E6B436} -
d:\Program Files\Thunder Network\Thunder\Thunder.exe
O9 - 额外的“工具”菜单项目: 启动迅雷5 - {09BA8F6D-CB54-424B-839C-
C2A6C8E6B436} - d:\Program Files\Thunder Network\Thunder\Thunder.exe
O9 - 额外的按钮: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} -
C:\Program Files\Messenger\msmsgs.exe
O9 - 额外的“工具”菜单项目: Windows Messenger - {FB5F1910-F110-11d2-BB9E-
00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/
O18 - Protocol: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} -
C:\WINDOWS\system32\KuGoo3DownXControl.ocx
O18 - Protocol: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} -
C:\WINDOWS\system32\KuGoo3DownXControl.ocx
O20 - AppInit_DLLs: kmon.dll
O23 - NT 服务:  AVG Anti-Spyware Guard - GRISOFT s.r.o. - C:\Program
Files\AVG Anti-Spyware\guard.exe
O23 - NT 服务:  Contrl Center of Storm Media (ccosm) - 北京暴风网际科技有限
公司 - E:\KMPLAYER\新建文件夹\stormliv.exe
O23 - NT 服务:  InstallDriver Table Manager (IDriverT) - Macrovision
Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel
32\IDriverT.exe
O23 - NT 服务:  iPodService - Apple Computer, Inc. -
F:\iPod\bin\iPodService.exe
O23 - NT 服务:  LightScribeService Direct Disc Labeling Service
(LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common
Files\LightScribe\LSSrvc.exe
O23 - NT 服务:  NMIndexingService - Nero AG - C:\Program Files\Common
Files\Nero\Lib\NMIndexingService.exe
O23 - NT 服务:  Rising Process Communication Center (RsCCenter) - Unknown
owner - C:\Program Files\Rising\Rav\CCenter.exe(文件不存在)
O23 - NT 服务:  Rising RealTime Monitor (RsRavMon) - Unknown owner -
C:\PROGRAM FILES\RISING\RAV\Ravmond.exe(文件不存在)
O23 - NT 服务:  ServiceLayer - Nokia. - C:\Program Files\PC Connectivity
Solution\ServiceLayer.exe
--
文件结束 - 8630 字节

用户系统信息:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; MAXTHON 2.0)
分享到:
gototop
 

回复:APPInt_DLLs值被恶意修改

使用System Repair Engineer扫描日志,将日志作为附件上传到反病毒/反流氓软件论坛上来。
下载页面:http://www.kztechs.com/sreng/download.html
操作方法:
1、下载后解压缩,运行SREngPS.EXE;
2、如果无法打开尝试把SREngPS.EXE改名为123.com,并复制到c:\windows目录下运行;
3、依次点击【智能扫描】-【扫描】,耐心等待,扫描结束后点击【保存报告】;
4、选择保存路径,文件名保持默认,直接点击【保存】;
5、打开保存的日志文件SREngLOG.log,完整复制全部内容,新建一个文本文档,将日志中的全部内容粘贴到“新建文本文档.txt”中;
6、将“新建文本文档.txt”作为附件上传,同时务必详细描述问题现象,如果有查杀不净的病毒务必提供病毒名和路径。
注意:扫描前请尽量关闭QQ、游戏、下载工具、媒体播放器等应用程序。
用这个扫下日志发上来看看吧
gototop
 

回复: APPInt_DLLs值被恶意修改

O20 - AppInit_DLLs: kmon.dll

卡卡助手6创建的注册表启动项,正常,不用修复……
打酱油的……
gototop
 

回复: APPInt_DLLs值被恶意修改

报告是在附件里面了~~谢谢2楼的~~
那3楼的朋友,你标出来的红色注册项目是否有问题啊?

附件附件:

文件名:SREngLOG.log
下载次数:283
文件类型:application/octet-stream
文件大小:
上传时间:2008-10-21 19:50:17
描述:log

gototop
 

回复:APPInt_DLLs值被恶意修改

那个项目是正常的
因为安全软件和病毒以及美化软件都可能更改该项,所以SRENG会提示

日志显示你的机器没有任何问题
汰丸,你妈妈六十大寿让你回家吃饭

http://hi.baidu.com/roxiel
gototop
 

回复: APPInt_DLLs值被恶意修改



引用:
原帖由 mqjzsu 于 2008-10-21 19:50:00 发表
报告是在附件里面了~~谢谢2楼的~~
那3楼的朋友,你标出来的红色注册项目是否有问题啊?




卡卡安全助手6.0靠Appinit-Dlls插入进程,修改Appinit-Dlls为kmon.dll,这是一个正常的动作!kmon.dll是正常的文件。而5.x会修改Appinit-Dlls值为ieprot.dll。放心吧!
gototop
 

回复:APPInt_DLLs值被恶意修改

哦,原来如此~~~明白了N多!!!超级感谢你们!!!!!!!!!!!!
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT