瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 前几天发现删除不了的病毒!发个日志给你们看看!

1   1  /  1  页   跳转

前几天发现删除不了的病毒!发个日志给你们看看!

前几天发现删除不了的病毒!发个日志给你们看看!

Logfile of Kaka v2. 0. 0. 8 Scan Module v2. 0. 0. 1
Scan saved at 21:48:35, on 2006-05-30
Platform: Advanced Server  (Build 3790)
MSIE: Internet Explorer v6.00  (6.00.3790.0 (srv03_rtm.030324-2048))


Running processes:
[smss.exe]
CommandLine =

[csrss.exe]
CommandLine = C:\WINDOWS\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,3072,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ProfileControl=Off MaxRequestThreads=16

[winlogon.exe]
CommandLine = winlogon.exe

[services.exe]
CommandLine = C:\WINDOWS\system32\services.exe

[lsass.exe]
CommandLine = C:\WINDOWS\system32\lsass.exe

[ati2evxx.exe]
CommandLine = C:\WINDOWS\system32\Ati2evxx.exe

[svchost.exe]
CommandLine = C:\WINDOWS\system32\svchost -k rpcss

[CCenter.exe]
CommandLine = "C:\Program Files\Rising\Rav\CCenter.exe"

[RavMonD.exe]
CommandLine = "C:\Program Files\Rising\Rav\Ravmond.exe"

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k netsvcs

[rfwsrv.exe]
CommandLine = "c:\program files\rising\rfw\rfwsrv.exe"

[RavStub.exe]
CommandLine = "C:\Program Files\Rising\Rav\RavStub.exe" /RAVMOND

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k WinErr

[inetinfo.exe]
CommandLine = C:\WINDOWS\system32\inetsrv\inetinfo.exe

[Rtvscan.exe]
CommandLine = C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe

[dfssvc.exe]
CommandLine = C:\WINDOWS\system32\Dfssvc.exe

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k iissvcs

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k termsvcs

[svchost.exe]
CommandLine = C:\WINDOWS\System32\svchost.exe -k tapisrv

[wmiprvse.exe]
CommandLine = C:\WINDOWS\system32\wbem\wmiprvse.exe -Embedding

[ati2evxx.exe]
CommandLine = Ati2evxx.exe -Client

[explorer.exe]
CommandLine = C:\WINDOWS\Explorer.EXE

[rfwmain.exe]
CommandLine =  -StartUp

[conime.exe]
CommandLine = C:\WINDOWS\system32\conime.exe

[RavTask.exe]
CommandLine = "C:\PROGRAM FILES\RISING\RAV\RAVTASK.EXE" -SYSTEM

[ctfmon.exe]
CommandLine = "C:\WINDOWS\system32\ctfmon.exe"

[QzServer.exe]
CommandLine = "D:\qzserver\QzServer.exe"

[RavMon.exe]
CommandLine = "C:\Program Files\Rising\Rav\Ravmon.exe" -SYSTEM

[Rav.exe]
CommandLine = "C:\Program Files\Rising\Rav\Rav.exe" /SHELLEXT

[VPTray.exe]
CommandLine = "C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\VPTray.exe"

[msdtc.exe]
CommandLine = C:\WINDOWS\system32\msdtc.exe

[w3wp.exe]
CommandLine = c:\windows\system32\inetsrv\w3wp.exe -a \\.\pipe\iisipme09f371a-84d6-4fe5-a8e7-a335e526067d -t 20 -ap "DefaultAppPool"

[QQ.exe]
CommandLine = J:\qq\QQ.exe

[DubaTool_QQTail[1].EXE]
CommandLine = "C:\Documents and Settings\wangba\Local Settings\Temporary Internet Files\Content.IE5\309X9W5W\DubaTool_QQTail[1].EXE"

[IEXPLORE.EXE]
CommandLine = "C:\Program Files\Internet Explorer\iexplore.exe"

[RavQQMsender[1].exe]
CommandLine = "C:\Documents and Settings\wangba\Local Settings\Temporary Internet Files\Content.IE5\N1DM38NH\RavQQMsender[1].exe"

[KkScan.exe]
CommandLine = "C:\Program Files\Rising\KakaToolBar\KkScan.exe"

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page=http://www.jcwz.net
O1 - Hosts: 127.0.0.1      localhost
O1 - Hosts: 192.168.1.168      QZSER
O1 - Hosts: QZSER      192.168.1.168
O3 - Toolbar: @msdxmLC.dll,-1@2052,电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - C:\WINDOWS\system32\kakatool.dll
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKLM\..\Run: [delsharec$] net share c$ /del
O4 - HKLM\..\Run: [delshared$] net share d$ /del
O4 - HKLM\..\Run: [delsharee$] net share e$ /del
O4 - HKLM\..\Run: [delsharef$] net share f$ /del
O4 - HKLM\..\Run: [delshareg$] net share g$ /del
O4 - HKLM\..\Run: [RfwMain] "C:\Program Files\Rising\Rfw\rfwmain.exe" -Startup
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [ICDRemoteServer] C:\Program Files\ICDreamServer\RemoteServer.exe
O4 - Startup: desktop.ini =
O4 - Startup: ?强者3.0维护系统服务端.lnk =
O4 - Global Startup: desktop.ini =
O8 - Extra context menu item: 上传到QQ网络硬盘 - j:\qq\AddToNetDisk.htm
O8 - Extra context menu item: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - j:\qq\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - j:\qq\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - j:\qq\SendMMS.htm
O9 - Extra Button: @shdoclc.dll,-866 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra 'Tools' menuitem: @shdoclc.dll,-864 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra Button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (趋势科技在线扫毒程序) - http://www.trendmicro.com.cn/housecall/xscan53.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{F5B9C231-46EE-48AA-A9BB-03C4DDADE154}: NameServer = 202.96.128.86,202.96.128.166
O18 - Filter : application/octet-stream - {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\system32\mscoree.dll
O18 - Filter : application/x-complus - {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\system32\mscoree.dll
O18 - Filter : application/x-msdownload - {1E66F26B-79EE-11D2-8710-00C04F79ED0D} - C:\WINDOWS\system32\mscoree.dll
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: cdl - {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: dvd - {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: file - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ftp - {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: gopher - {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: http - {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: https - {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: local - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: mailto - {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\system32\inetcomm.dll
O18 - Protocol: mk - {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: tv - {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: vnd.ms.radio - {3DA2AA3B-3D96-11D2-9BD2-204C4F4F5020} - C:\WINDOWS\system32\msdxm.ocx
O18 - Protocol: wia - {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\system32\wiascr.dll
O20 - Winlogon Notify: AtiExtEvent
O20 - Winlogon Notify: NavLogon
O23 - Service: Ati HotKey Poller (Ati HotKey Poller) - ATI Technologies Inc. - C:\WINDOWS\system32\ati2evxx.exe
O23 - Service: ATI Smart (ATI Smart) -  - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: DefWatch (DefWatch) - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
O23 - Service: Human Interface Device Access (HidServ) -  - C:\WINDOWS\system32\svchost.exe -k netsvcs
O23 - Service: 网吧院线监控服务 (ICDreamCheckService) -  - C:\Program Files\ICDreamServer\ICDreamCheckService.exe
O23 - Service: 网吧院线更新服务 (ICDreamDCService) -  - C:\Program Files\ICDreamServer\ICDreamDCService.exe
O23 - Service: 网吧院线统计服务 (ICDreamServer) -  - C:\Program Files\ICDreamServer\ICDreamServer.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
O23 - Service: Rising Proxy  Service (RfwProxySrv) - Beijing Rising Technology Co., Ltd. - c:\program files\rising\rfw\rfwproxy.exe
O23 - Service: Rising Personal Firewall Service (RfwService) - Beijing Rising Technology Co., Ltd. - c:\program files\rising\rfw\rfwsrv.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) -  - "C:\Program Files\WinPcap\rpcapd.exe" -d -f "C:\Program Files\WinPcap\rpcapd.ini"
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - "C:\Program Files\Rising\Rav\CCenter.exe"
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - "C:\Program Files\Rising\Rav\Ravmond.exe"
O23 - Service: User Privilege Service (usprserv) - Microsoft Corporation - C:\WINDOWS\system32\svchost.exe -k netsvcs
最后编辑2006-05-30 22:26:17
分享到:
gototop
 

http://forum.ikaka.com/topic.asp?board=28&artid=6979213
一楼附件...下载HijackThis...把日志帖上来..
说出具体的病毒名路径..
gototop
 

【回复“梦河一怪”的帖子】

主业用安全助手恢复拉!可是还是不行`
http://www.jcwz.net 这个!
是什么病毒?
gototop
 

【回复“梦河一怪”的帖子】
http://forum.ikaka.com/topic.asp?board=28&artid=6979213
一楼附件...下载HijackThis...把日志帖上来..
gototop
 

上面的就是日志啊
gototop
 

用HijackThis 不用卡卡

有的没有的卡卡都能扫得到..
gototop
 

Logfile of HijackThis v1.99.1
Scan saved at 22:14:43, on 2006-5-30
Platform: Windows 2003  (WinNT 5.02.3790)
MSIE: Internet Explorer v6.00 (6.00.3790.0000)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Rising\Rav\CCenter.exe
C:\Program Files\Rising\Rav\Ravmond.exe
C:\WINDOWS\System32\svchost.exe
c:\program files\rising\rfw\rfwsrv.exe
C:\Program Files\Rising\Rav\RavStub.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\inetsrv\inetinfo.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
C:\WINDOWS\system32\Dfssvc.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\conime.exe
C:\Program Files\Rising\Rav\RavTask.exe
C:\WINDOWS\system32\ctfmon.exe
D:\qzserver\QzServer.exe
C:\Program Files\Rising\Rav\Ravmon.exe
C:\Program Files\Rising\Rav\Rav.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\VPTray.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Documents and Settings\wangba\桌面\HijackThis.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe
O1 - Hosts: QZSER 192.168.1.168
O3 - Toolbar: @msdxmLC.dll,-1@2052,电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\system32\msdxm.ocx
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\fgiebar.dll
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - C:\WINDOWS\system32\kakatool.dll
O4 - HKLM\..\Run: [delsharec$] net share c$ /del
O4 - HKLM\..\Run: [delshared$] net share d$ /del
O4 - HKLM\..\Run: [delsharee$] net share e$ /del
O4 - HKLM\..\Run: [delsharef$] net share f$ /del
O4 - HKLM\..\Run: [delshareg$] net share g$ /del
O4 - HKLM\..\Run: [RfwMain] "C:\Program Files\Rising\Rfw\rfwmain.exe" -Startup
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [ICDRemoteServer] C:\Program Files\ICDreamServer\RemoteServer.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: ?强者3.0维护系统服务端.lnk
O8 - Extra context menu item: 上传到QQ网络硬盘 - j:\qq\AddToNetDisk.htm
O8 - Extra context menu item: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - j:\qq\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - j:\qq\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - j:\qq\SendMMS.htm
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FlashGet\flashget.exe
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (趋势科技在线扫毒程序) - http://www.trendmicro.com.cn/housecall/xscan53.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{F5B9C231-46EE-48AA-A9BB-03C4DDADE154}: NameServer = 202.96.128.86,202.96.128.166
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\system32\NavLogon.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: DefWatch - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\DefWatch.exe
O23 - Service: 网吧院线监控服务 (ICDreamCheckService) - Unknown owner - C:\Program Files\ICDreamServer\ICDreamCheckService.exe
O23 - Service: 网吧院线更新服务 (ICDreamDCService) - Unknown owner - C:\Program Files\ICDreamServer\ICDreamDCService.exe
O23 - Service: 网吧院线统计服务 (ICDreamServer) - Unknown owner - C:\Program Files\ICDreamServer\ICDreamServer.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\PROGRA~1\SYMANT~1\SYMANT~1\Rtvscan.exe
O23 - Service: Rising Proxy  Service (RfwProxySrv) - Beijing Rising Technology Co., Ltd. - c:\program files\rising\rfw\rfwproxy.exe
O23 - Service: Rising Personal Firewall Service (RfwService) - Beijing Rising Technology Co., Ltd. - c:\program files\rising\rfw\rfwsrv.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\CCenter.exe
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\Ravmond.exe
gototop
 

病毒有几种啊!W32.Looked , Infostealer !!
今天有出来拉!在进程出现logo1.exe!
还有一个会自动发送QQ信息!现在改了我IE主业!\
网址是!"http://www.jcwz.net"
路径在C:\winnt\下!
gototop
 

修复
O1 - Hosts: QZSER 192.168.1.168
O4 - HKLM\..\Run: [delsharec$] net share c$ /del
O4 - HKLM\..\Run: [delshared$] net share d$ /del
O4 - HKLM\..\Run: [delsharee$] net share e$ /del
O4 - HKLM\..\Run: [delsharef$] net share f$ /del
O4 - HKLM\..\Run: [delshareg$] net share g$ /del

http://www.jcwz.net
上浏览器反劫持专区看看..
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT