瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 各位大哥哥,大姐姐,救救小妹呀~~~~

1   1  /  1  页   跳转

各位大哥哥,大姐姐,救救小妹呀~~~~

各位大哥哥,大姐姐,救救小妹呀~~~~

刚才瑞星提示我SYSTEM2中的CSRSS文件是病毒(TROJAN.PSW.LMIR.JDR),叫我重启后删除该文件,但我删不掉,说正在运行的。。。这个是什么病毒呀,要怎么才能杀死,大哥大姐们帮帮我呀
最后编辑2006-02-02 09:49:53
分享到:
gototop
 

这是我的日志,麻烦帮我看一下呀
HijackThis_zww汉化版扫描日志 V1.99.1
保存于      8:59:34, 日期 2006-2-2
操作系统:  Windows 2000 SP4 (WinNT 5.00.2195)
浏览器:    Internet Explorer v6.00 SP1 (6.00.2800.1106)

当前运行的进程:         
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
D:\Program Files\Rising\Rav\CCenter.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\System32\nvsvc32.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\Explorer.EXE
C:\Program Files\VIAudioi\SBADeck\ADeck.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
D:\Program Files\Rising\Rav\RavTask.exe
D:\Program Files\Rising\Rav\Ravmon.exe
C:\WINNT\system32\internat.exe
C:\WINNT\system32\dll.exe
D:\Program Files\Rising\Rav\Ravmond.exe
D:\Program Files\Rising\Rav\RavStub.exe
C:\WINNT\system32\wuauclt.exe
D:\Program Files\Rising\Rav\Rav.exe
D:\Program Files\Rising\Rav\RsAgent.exe
C:\WINNT\msagent\AgentSvr.exe
C:\Program Files\Internet Explorer\iexplore.exe
D:\Program Files\Rising\Rav\RsLogVw.exe
D:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\lzy1\LOCALS~1\Temp\Rar$EX00.384\HijackThis1991zww.exe

O3 - IE工具栏增项: @msdxmLC.dll,-1@2052,电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - 启动项HKLM\\Run: [Synchronization Manager] mobsync.exe /logon
O4 - 启动项HKLM\\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINNT\System32\NvCpl.dll,NvStartup
O4 - 启动项HKLM\\Run: [nwiz] nwiz.exe /install
O4 - 启动项HKLM\\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINNT\System32\NvMcTray.dll,NvTaskbarInit
O4 - 启动项HKLM\\Run: [AudioDeck] C:\Program Files\VIAudioi\SBADeck\ADeck.exe 1
O4 - 启动项HKLM\\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - 启动项HKLM\\Run: [RavTask] "D:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKCU\..\Run: [Internat.exe] internat.exe
O8 - IE右键菜单中的新增项目: 添加到QQ自定义面板 - D:\Program Files\Tencent\QQ\AddPanel.htm
O8 - IE右键菜单中的新增项目: 添加到QQ表情 - D:\Program Files\Tencent\QQ\AddEmotion.htm
O8 - IE右键菜单中的新增项目: 用QQ彩信发送该图片 - D:\Program Files\Tencent\QQ\SendMMS.htm
O9 - 浏览器额外的按钮: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - 浏览器额外的“工具”菜单项: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O16 - DPF: {0CA54D3F-CEAE-48AF-9A2B-31909CB9515D} (Edit Class) - https://www.sz1.cmbchina.com/download/CMBEdit.cab
O16 - DPF: {488A4255-3236-44B3-8F27-FA1AECAA8844} (CEditCtrl Object) - https://img.alipay.com/download/aliedit.cab
O20 - AppInit_DLLs: KB759761.LOG
O23 - NT 服务: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - NT 服务: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINNT\System32\nvsvc32.exe
O23 - NT 服务: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - D:\Program Files\Rising\Rav\CCenter.exe
O23 - NT 服务: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - D:\Program Files\Rising\Rav\Ravmond.exe

gototop
 

你真倒霉,一个超变态的木马!
gototop
 

晕啊,真的啊,那快教我怎么杀啊。。。。。求求你们啦
gototop
 

CSRSS.exe病毒

病毒会在系统分区根目录下生成如下文件,其他分区中可能也会同时生成:
autorun.inf(达到双击分区“自动运行”病毒的目的)

病毒生成如下文件:
%windir%\1.com
%windir%\CSRSS.exe
%windir%\ExERoute.exe
%windir%\explorer1.com
%windir%\finder.com
%windir%\MSWINSCK.OCX
%windir%\Debug\DebugProgram.exe
%system%\command.pif
%system%\dxdiag.com
%system%\finder.com
%system%\MSCONFIG.com
%system%\regedit.com
%system%\rundll32.com
%Program Files%\Common Files\iexplore.pif
%Program Files%\Internet Explorer\iexplore.com

病毒增加了太多注册表键值,超过100个,呵呵真麻烦,我不一一列举了,直接告诉你删除哪些主键:
HKEY_CLASSES_ROOT\MSWinsock.Winsock
HKEY_CLASSES_ROOT\winfiles
HKEY_CLASSES_ROOT\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_CLASSES_ROOT\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_CLASSES_ROOT\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_CLASSES_ROOT\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_CLASSES_ROOT\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\MSWinsock.Winsock
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winfiles
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}
单独删除以下键:
HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache >> "Welcome to Windows NT"="D:\CSRSS.exe"(注意这里是D盘)
HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam\MUICache >> "Welcome to Windows NT"="C:\Program Files\common~1\iexplore.pif"
HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\iexplore.pif
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run >> "Trojan Program"="C:\windows\CSRSS.exe"
HKEY_USERS\S-1-5-21-2052111302-764733703-725345543-500\Software\Microsoft\Windows\ShellNoRoam\MUICache >> "Welcome to Windows NT"="D:\CSRSS.exe"(注意这里是D盘)
HKEY_USERS\S-1-5-21-2052111302-764733703-725345543-500\Software\Microsoft\Windows\ShellNoRoam\MUICache >> "Welcome to Windows NT"="C:\Program Files\common~1\iexplore.pif"


恢复以下病毒修改的注册表:
恢复HKEY_CLASSES_ROOT\.bfc\ShellNew >> Command的值为%SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\syncui.dll,Briefcase_Create %2!d! %1
恢复HKEY_CLASSES_ROOT\.exe >> (默认)的值为exefile
恢复HKEY_CLASSES_ROOT\.lnk\ShellNew >> Command的值为rundll32.exe appwiz.cpl,NewLinkHere %1
恢复HKEY_CLASSES_ROOT\Applications\iexplore.exe\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_CLASSES_ROOT\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe"
恢复HKEY_CLASSES_ROOT\cplfile\shell\cplopen\command >> (默认)的值为rundll32.exe shell32.dll,Control_RunDLL "%1",%*
恢复HKEY_CLASSES_ROOT\Drive\shell\find\command >> (默认)的值为%SystemRoot%\Explorer.exe
恢复HKEY_CLASSES_ROOT\dunfile\shell\open\command >> (默认)的值为%SystemRoot%\system32\RUNDLL32.EXE NETSHELL.DLL,InvokeDunFile %1
恢复HKEY_CLASSES_ROOT\ftp\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_CLASSES_ROOT\htmlfile\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_CLASSES_ROOT\htmlfile\shell\opennew\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_CLASSES_ROOT\htmlfile\shell\Print\command >> (默认)的值为"rundll32.exe %SystemRoot%\system32\mshtml.dll,PrintHTML "%1""
恢复HKEY_CLASSES_ROOT\HTTP\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_CLASSES_ROOT\inffile\shell\Install\command >> (默认)的值为%SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection DefaultInstall 132 %1
恢复HKEY_CLASSES_ROOT\InternetShortcut\shell\open\command >> (默认)的值为rundll32.exe shdocvw.dll,OpenURL %l
恢复HKEY_CLASSES_ROOT\scrfile\shell\install\command >> (默认)的值为rundll32.exe desk.cpl,InstallScreenSaver %l
恢复HKEY_CLASSES_ROOT\scriptletfile\Shell\Generate Typelib\command >> (默认)的值为"C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\scrobj.dll,GenerateTypeLib "%1"
恢复HKEY_CLASSES_ROOT\telnet\shell\open\command >> (默认)的值为rundll32.exe url.dll,TelnetProtocolHandler %l
恢复HKEY_CLASSES_ROOT\Unknown\shell\openas\command >> (默认)的值为%SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.bfc\ShellNew >> Command的值为 %SystemRoot%\system32\syncui.dll,Briefcase_Create %2!d! %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.exe >> (默认)的值为exefile
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.lnk\ShellNew >> Command的值为rundll32.exe appwiz.cpl,NewLinkHere %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe"
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\cplfile\shell\cplopen\command >> (默认)的值为rundll32.exe shell32.dll,Control_RunDLL "%1",%*
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Drive\shell\find\command >> (默认)的值为%SystemRoot%\Explorer.exe
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\dunfile\shell\open\command >> (默认)的值为%SystemRoot%\system32\RUNDLL32.EXE NETSHELL.DLL,InvokeDunFile %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ftp\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command >> (默认)的值为"rundll32.exe %SystemRoot%\system32\mshtml.dll,PrintHTML "%1""
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\HTTP\shell\open\command >> (默认)的值为"C:\Program Files\Internet Explorer\iexplore.exe" %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\inffile\shell\Install\command >> (默认)的值为%SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection DefaultInstall 132 %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command >> (默认)的值为rundll32.exe shdocvw.dll,OpenURL %l
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\scrfile\shell\install\command >> (默认)的值为rundll32.exe desk.cpl,InstallScreenSaver %l
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\scriptletfile\Shell\Generate Typelib\command >> (默认)的值为"C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\scrobj.dll,GenerateTypeLib "%1"
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\telnet\shell\open\command >> (默认)的值为rundll32.exe url.dll,TelnetProtocolHandler %l
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command >> (默认)的值为%SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet >> (默认)的值为IEXPLORE.EXE
恢复HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon >> Shell的值为Explorer.exe

删除如下快捷方式:
安全测试.lnk
系统信息管理器.lnk
计算机安全中心.lnk
gototop
 

病毒分类  WINDOWS下的PE病毒  病毒名称  Trojan.PSW.Lmir.jdr  
别    名      病毒长度     
依赖系统    传播途径     
行为类型  WINDOWS下的木马程序  感    染     
病毒发作  瑞 星 版 本 号
   18.11 
gototop
 

我刚又看了一下,是csrss.dll文件中毒,我删了又出为并且在临时文件夹里又多了一个,郁闷。开机提示我是不是要关闭瑞星监控。。。这是怎么啦,我都不敢玩游戏了!555555555555
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT