瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 对于新病毒——C:\WINDOWS\system32\wbem\lsass.exe的测试

12   1  /  2  页   跳转

对于新病毒——C:\WINDOWS\system32\wbem\lsass.exe的测试

对于新病毒——C:\WINDOWS\system32\wbem\lsass.exe的测试

题目我不知道如何去说,因为此病毒太复杂,具体做什么的我也不清楚,现象就是在进程中出现[PID: 724][C:\WINDOWS\system32\wbem\lsass.exe]  [Microsoft, 1.0.0.0]进程
怎么也无法删除,删除后重新建立。
看看他修改什么吧

以下是对注册表的添加和修改,添加服务项目
----------------------------------
添加主键:40
----------------------------------
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\LocalServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\ProxyStubClsid
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\0
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\0\win32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\FLAGS
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\HELPDIR
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VCFIWZDY32.NTSockSrv
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VCFIWZDY32.NTSockSrv\Clsid
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DownloadManager
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Security
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Enum
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History



最后编辑2007-02-22 13:05:47
分享到:
gototop
 

----------------------------------
添加键值:67
----------------------------------
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\Version\: "1.0"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\TypeLib\: "{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\ProgID\: "VCFIWZDY32.NTSockSrv"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\LocalServer32\: "c:\WINDOWS\system32\wbem\lsass.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C574040B-C11C-41EF-8401-E2AF6F5F6841}\: "SysBackHelper Object"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\TypeLib\: "{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\TypeLib\Version: "1.0"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\ProxyStubClsid32\: "{00020424-0000-0000-C000-000000000046}"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\ProxyStubClsid\: "{00020424-0000-0000-C000-000000000046}"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F8F1D406-1CCA-402A-8D02-12F5B4DEBA30}\: "INTSockInt"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\0\win32\: "c:\WINDOWS\system32\wbem\lsass.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\HELPDIR\: "c:\WINDOWS\system32\wbem\"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\FLAGS\: "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{8B5396EC-B2EF-4B66-85C7-3AF65E3B82B0}\1.0\: "NTSockSrv32  Library"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VCFIWZDY32.NTSockSrv\Clsid\: "{C574040B-C11C-41EF-8401-E2AF6F5F6841}"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VCFIWZDY32.NTSockSrv\: "SysBackHelper Object"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\NTWorkStan: 'NTWorkStan'
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Control\*NewlyCreated*: 0x00000000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Control\ActiveService: "NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Service: "NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Legacy: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\ConfigFlags: 0x00000000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\Class: "LegacyDriver"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\0000\DeviceDesc: "WindowsNt Workstation"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_NTWORKSTAN\NextInstance: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\system32\wbem\lsass.exe: "C:\WINDOWS\system32\wbem\lsass.exe:*:Enabled:Generic Hosts for WinService"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\6100:UDP: "6100:UDP:*:Enabled:winsocksv"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Enum\0: "Root\LEGACY_NTWORKSTAN\0000"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Enum\Count: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Enum\NextInstance: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Parameters\ServiceDll: "c:\windows\system32\ntworkstan.dll"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Start: 0x00000002
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Type: 0x00000120
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\ErrorControl: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\DisplayName: "WindowsNt Workstation"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\ImagePath: "%SystemRoot%\System32\svchost.exe -k NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\Description: "创建和维护到NT环境下远程服务的客户端网络连接。如果服务停止,这些连接将不可用。如果服务被禁用,任何直接依赖于此服务的服务将无法启动。"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NTWorkStan\ObjectName: "LocalSystem"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Control\*NewlyCreated*: 0x00000000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Control\ActiveService: "NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Service: "NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Legacy: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\ConfigFlags: 0x00000000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\Class: "LegacyDriver"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\0000\DeviceDesc: "WindowsNt Workstation"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_NTWORKSTAN\NextInstance: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\system32\wbem\lsass.exe: "C:\WINDOWS\system32\wbem\lsass.exe:*:Enabled:Generic Hosts for WinService"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\6100:UDP: "6100:UDP:*:Enabled:winsocksv"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Enum\0: "Root\LEGACY_NTWORKSTAN\0000"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Enum\Count: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Enum\NextInstance: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Parameters\ServiceDll: "c:\windows\system32\ntworkstan.dll"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Start: 0x00000002
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Type: 0x00000120
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\ErrorControl: 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\DisplayName: "WindowsNt Workstation"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\ImagePath: "%SystemRoot%\System32\svchost.exe -k NTWorkStan"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\Description: "创建和维护到NT环境下远程服务的客户端网络连接。如果服务停止,这些连接将不可用。如果服务被禁用,任何直接依赖于此服务的服务将无法启动。"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTWorkStan\ObjectName: "LocalSystem"
gototop
 

----------------------------------
修改键值:24
----------------------------------
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\Directory: "C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\Directory: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1\CachePath: "C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1\CachePath: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2\CachePath: "C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2\CachePath: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3\CachePath: "C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3\CachePath: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4\CachePath: "C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4\CachePath: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ServiceCurrent\: 0x00000009
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\ServiceCurrent\: 0x0000000A
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dhcp\Parameters\{D9D524A1-2668-415E-8744-D35C2222D513}: 0F 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 7F AB DD 45 74 65 6E 64 61 00 00 00 06 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 7F AB DD 45 CA 6A 2E 97 CA 6A 00 14 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 FF FF FF 00 33 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 00 01 51 80 36 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 35 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 7F AB DD 45 05 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dhcp\Parameters\{D9D524A1-2668-415E-8744-D35C2222D513}: 0F 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 7F AB DD 45 74 65 6E 64 61 00 00 00 06 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 7F AB DD 45 CA 6A 2E 97 CA 6A 00 14 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 FF FF FF 00 36 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 35 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 7F AB DD 45 05 00 00 00 0C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 5D DC 45 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 5D DC 45 33 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 00 01 51 80
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch\Epoch: 0x0000000F
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Epoch\Epoch: 0x00000011
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent\: 0x00000009
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ServiceCurrent\: 0x0000000A
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dhcp\Parameters\{D9D524A1-2668-415E-8744-D35C2222D513}: 0F 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 7F AB DD 45 74 65 6E 64 61 00 00 00 06 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 7F AB DD 45 CA 6A 2E 97 CA 6A 00 14 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 FF FF FF 00 33 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 00 01 51 80 36 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 35 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 7F AB DD 45 05 00 00 00
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dhcp\Parameters\{D9D524A1-2668-415E-8744-D35C2222D513}: 0F 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 7F AB DD 45 74 65 6E 64 61 00 00 00 06 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 7F AB DD 45 CA 6A 2E 97 CA 6A 00 14 03 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 FF FF FF 00 36 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 C0 A8 00 01 35 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 7F AB DD 45 05 00 00 00 0C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 5D DC 45 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 5D DC 45 33 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 7F AB DD 45 00 01 51 80
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch\Epoch: 0x0000000F
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Epoch\Epoch: 0x00000011
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies: "C:\Documents and Settings\NetworkService\Cookies"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies: "C:\Documents and Settings\LocalService\Cookies"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache: "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History: "C:\Documents and Settings\NetworkService\Local Settings\History"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History: "C:\Documents and Settings\LocalService\Local Settings\History"
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 02 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 03 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-21-1606980848-2049760794-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings: 3C 00 00 00 01 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-21-1606980848-2049760794-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings: 3C 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 90 37 BC 30 C8 55 C7 01 01 00 00 00 C0 A8 00 03 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-21-1606980848-2049760794-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 03 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-21-1606980848-2049760794-839522115-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 04 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies: "C:\Documents and Settings\NetworkService\Cookies"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies: "C:\Documents and Settings\LocalService\Cookies"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache: "C:\Documents and Settings\NetworkService\Local Settings\Temporary Internet Files"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache: "C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History: "C:\Documents and Settings\NetworkService\Local Settings\History"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History: "C:\Documents and Settings\LocalService\Local Settings\History"
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 02 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 03 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
gototop
 

具体都修改了什么,我不清楚,对注册表不是非常了解。请高人指点,我知道,添加里面,主要添加了一项服务,服务对应路径是c:\windows\system32\ntworkstan.dll,通过c:\windows\System32\svchost.exe启动

病毒对文件的添加,修改为
----------------------------------
添加文件:25
----------------------------------
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\299TRATH\plugbag[1].htm
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\3D4SHHC8\NewUpcfg[1].txt
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\A5PTRYUT\NTWorkStan[1].txt
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\FANFJQR1\COMEvent[1].txt
C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\2LVP5Z42\Newdownurl[1].txt
C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\RP3GL7K3\NTWorkStan[1].txt
C:\WINDOWS\Prefetch\LSASS.EXE-0C7DDCD2.pf
C:\WINDOWS\Prefetch\LSASS.EXE-31A1B60F.pf
C:\WINDOWS\system32\wbem\dReposxml\NTWorkStan.dll
C:\WINDOWS\system32\wbem\lsass.exe
C:\WINDOWS\system32\wbem\sholl32.dll
C:\WINDOWS\system32\wbem\winkbd32.dll
C:\WINDOWS\system32\MicShExts\Setup\d3dref9.dat
C:\WINDOWS\system32\MicShExts\Setup\d3dref9.idx
C:\WINDOWS\system32\MicShExts\Setup\dbisam.lck
C:\WINDOWS\system32\MicShExts\Setup\SCIntruder.blb
C:\WINDOWS\system32\MicShExts\Setup\SCIntruder.dat
C:\WINDOWS\system32\MicShExts\Setup\SCIntruder.idx
C:\WINDOWS\system32\MicShExts\Setup\wmsnds32.dat
C:\WINDOWS\system32\MicShExts\Setup\wmsnds32.idx
C:\WINDOWS\system32\nrssvd32.dll
C:\WINDOWS\system32\NTWorkStan.dll
C:\WINDOWS\system32\rgswin32.msc
C:\WINDOWS\system32\vdmop.dll
C:\WINDOWS\system32\winAddst.dat

----------------------------------
修改文件:14
----------------------------------
C:\Documents and Settings\LocalService\Cookies\index.dat
C:\Documents and Settings\LocalService\Local Settings\History\History.IE5\index.dat
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat
C:\Documents and Settings\ufo\Cookies\index.dat
C:\Documents and Settings\ufo\Local Settings\History\History.IE5\index.dat
C:\Documents and Settings\ufo\Local Settings\Temporary Internet Files\Content.IE5\index.dat
C:\Documents and Settings\ufo\NTUSER.DAT.LOG
C:\WINDOWS\Prefetch\REGSVR32.EXE-25EEFE2F.pf
C:\WINDOWS\Prefetch\SVCHOST.EXE-3530F672.pf
C:\WINDOWS\system32\config\default.LOG(注册表原文件)
C:\WINDOWS\system32\config\software(注册表原文件)
C:\WINDOWS\system32\config\software.LOG(注册表原文件)
C:\WINDOWS\system32\config\system.LOG(注册表原文件)
C:\WINDOWS\system32\wbem\Logs\wbemess.log
gototop
 

----------------------------------
添加目录:5
----------------------------------
C:\WINDOWS\system32\drivers\etcdr
C:\WINDOWS\system32\wbem\dReposxml
C:\WINDOWS\system32\MicShExts
C:\WINDOWS\system32\MicShExts\Setup
C:\Downloads
gototop
 

病毒具体再干什么我不清楚,请高手分析,不知道说的对不对,是不是病毒
gototop
 

附带病毒试验的时候得SRE日志




2007-02-21,22:57:32

System Repair Engineer 2.3.13.690
Smallfrogs (http://www.KZTechs.com)

Windows XP Professional Service Pack 2 (Build 2600)
- 管理权限用户 - 完整功能

以下内容被选中:
    所有的启动项目(包括注册表、启动文件夹、服务等)
    浏览器加载项
    正在运行的进程(包括进程模块信息)
    文件关联
    Winsock 提供者
    Autorun.inf
    HOSTS 文件


启动项目
注册表
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
    <ctfmon.exe><C:\WINDOWS\system32\ctfmon.exe>  [(Verified)Microsoft Corporation]
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
    <load><>  [N/A]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
    <IMJPMIG8.1><"C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32>  [(Verified)Microsoft Corporation]
    <PHIME2002ASync><C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC>  [(Verified)Microsoft Corporation]
    <PHIME2002A><C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName>  [(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    <shell><Explorer.exe>  [(Verified)Microsoft Corporation]
    <Userinit><C:\WINDOWS\system32\userinit.exe,>  [(Verified)Microsoft Corporation]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows]
    <AppInit_DLLs><>  [N/A]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
    <UIHost><logonui.exe>  [(Verified)Microsoft Corporation]

==================================
启动文件夹
N/A

==================================
服务
[Human Interface Device Access / HidServ][Stopped/Disabled]
  <C:\WINDOWS\System32\svchost.exe -k netsvcs-->%SystemRoot%\System32\hidserv.dll><N/A>
[WindowsNt Workstation / NTWorkStan][Running/Auto Start]
  <C:\WINDOWS\System32\svchost.exe -k NTWorkStan-->c:\windows\system32\ntworkstan.dll><Microsoft Corporation>

==================================
驱动程序
[Creative AudioPCI (ES1371,ES1373) (WDM) / es1371][Running/Manual Start]
  <system32\drivers\es1371mp.sys><Creative Technology Ltd.>
[AMD PCNET Compatable Adapter Driver / PCnet][Running/Manual Start]
  <system32\DRIVERS\pcntpci5.sys><AMD Inc.>
[Direct Parallel Link Driver / Ptilink][Running/Manual Start]
  <system32\DRIVERS\ptilink.sys><Parallel Technologies, Inc.>
[Secdrv / Secdrv][Stopped/Manual Start]
  <system32\DRIVERS\secdrv.sys><N/A>

==================================
浏览器加载项
[Messenger]
  {FB5F1910-F110-11d2-BB9E-00C04F795683} <C:\Program Files\Messenger\msmsgs.exe, Microsoft Corporation>

==================================
正在运行的进程
[PID: 540][\SystemRoot\System32\smss.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 588][\??\C:\WINDOWS\system32\csrss.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 612][\??\C:\WINDOWS\system32\winlogon.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 656][C:\WINDOWS\system32\services.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 668][C:\WINDOWS\system32\lsass.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 824][C:\WINDOWS\system32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 892][C:\WINDOWS\system32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 984][C:\WINDOWS\System32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1044][C:\WINDOWS\system32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1104][C:\WINDOWS\system32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1440][C:\WINDOWS\Explorer.EXE]  [Microsoft Corporation, 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1508][C:\WINDOWS\system32\spoolsv.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1596][C:\WINDOWS\system32\CTFMON.EXE]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1012][C:\WINDOWS\System32\alg.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1288][C:\WINDOWS\system32\wscntfy.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1968][E:\RegShot V1.61e5汉化版\RegShot V1.61e5 汉化版.exe]  [N/A, N/A]
[PID: 724][C:\WINDOWS\system32\wbem\lsass.exe]  [Microsoft, 1.0.0.0]
[PID: 448][C:\WINDOWS\System32\svchost.exe]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1620][C:\WINDOWS\system32\NOTEPAD.EXE]  [Microsoft Corporation, 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)]
[PID: 1592][C:\Program Files\Internet Explorer\iexplore.exe]  [Microsoft Corporation, 6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)]
    [C:\WINDOWS\system32\macromed\flash\flash.ocx]  [Macromedia, Inc., 6,0,79,0]
[PID: 1748][E:\System Repair Engineer V2.3.13.690.exe]  [N/A, N/A]
[PID: 1368][C:\DOCUME~1\ufo\LOCALS~1\Temp\RarSFX0\SREng.EXE]  [Smallfrogs Studio, 2.3.13.690]

==================================
文件关联
.TXT  OK. [%SystemRoot%\system32\NOTEPAD.EXE %1]
.EXE  OK. ["%1" %*]
.COM  OK. ["%1" %*]
.PIF  OK. ["%1" %*]
.REG  OK. [regedit.exe "%1"]
.BAT  OK. ["%1" %*]
.SCR  OK. ["%1" /S]
.CHM  OK. ["C:\WINDOWS\hh.exe" %1]
.HLP  OK. [%SystemRoot%\System32\winhlp32.exe %1]
.INI  OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.INF  OK. [%SystemRoot%\System32\NOTEPAD.EXE %1]
.VBS  OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.JS  OK. [%SystemRoot%\System32\WScript.exe "%1" %*]
.LNK  OK. [{00021401-0000-0000-C000-000000000046}]

==================================
Winsock 提供者
N/A

==================================
Autorun.inf
N/A

==================================
HOSTS 文件
127.0.0.1      localhost

==================================
API HOOK
N/A

==================================




gototop
 

有些注册表键值与这个病毒无关 是你日常操作时候产生的 测时后的结果中应排除那些与病毒无关的东西
gototop
 

你那上面说的添加的文件和注册表值都能删吗?
gototop
 

引用:
【newcenturymoon的贴子】有些注册表键值与这个病毒无关 是你日常操作时候产生的 测时后的结果中应排除那些与病毒无关的东西
………………

谢谢提醒,注册表有些乱,所以没有排除
gototop
 
12   1  /  2  页   跳转
页面顶部
Powered by Discuz!NT