1   1  /  1  页   跳转

帮看一下哪项是病毒【求助】

帮看一下哪项是病毒【求助】

Logfile of HijackThis v1.99.1
Scan saved at 14:00:44, on 2008-02-25
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Rising\Rav\CCenter.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRAM FILES\RISING\RAV\Ravmond.exe
C:\PROGRAM FILES\RISING\RAV\RavStub.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Rising\Rav\RavTask.exe
D:\360安全卫士\safemon\360tray.exe
C:\Program Files\Rising\Rav\Ravmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
E:\Weway\QFBJ2008\MEDSERVER\ScktSrvr.exe
C:\WINDOWS\system32\svchost.exe
e:\PROGRA~1\MICROS~1\MSSQL\binn\sqlservr.exe
C:\WINDOWS\system32\NetDogSrv.EXE
C:\WINDOWS\system32\nvsvc32.exe
C:\program files\internet explorer\IEXPLORE.EXE
C:\WINDOWS\system32\catroot\smss.exe
E:\Weway\QFBJ2008\MEDSERVER\userver.exe
D:\Downloads\HijackThis.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\system32\catroot\services.exe
C:\WINDOWS\system32\KK.exe
C:\Program Files\Rising\Rav\Rav.exe
C:\Program Files\Rising\Rav\RsLogVw.exe

R3 - URLSearchHook: SrchHook Class - {F08555B0-9CC3-11D2-AA8E-000000000000} - C:\WINDOWS\system32\IEBHO.dll (file missing)
O2 - BHO: Thunder AtOnce - {01443AEC-0FD1-40fd-9C87-E93D1494C233} - C:\Program Files\Thunder\ComDlls\TDAtOnce_Now.dll
O2 - BHO: ThunderBHO - {B69F34DC-F0F9-42DC-9EDD-957187DA688D} - C:\Program Files\Thunder\ComDlls\xunleiBHO_Now.dll
O2 - BHO: SafeMon Class - {B69F34DD-F0F9-42DC-9EDD-957187DA688D} - D:\360安全卫士\safemon\safemon.dll
O2 - BHO: SrchHook Class - {F08555B0-9CC3-11D2-AA8E-000000000000} - C:\WINDOWS\system32\IEBHO.dll (file missing)
O3 - Toolbar: 快捷工具条3.1.5 - {BE830FD4-E393-417F-9F4B-CC70ABB3384C} - C:\WINDOWS\system32\IETool.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [360Safetray] D:\360安全卫士\safemon\360tray.exe /start
O4 - HKLM\..\RunServices: [Windows Update] WinUDP.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Global Startup: 服务管理器.lnk = C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
O4 - Global Startup: 套接字服务器.lnk = E:\Weway\QFBJ2008\MEDSERVER\ScktSrvr.exe
O8 - Extra context menu item: 使用迅雷下载 - C:\Program Files\Thunder\Program\geturl.htm
O8 - Extra context menu item: 使用迅雷下载全部链接 - C:\Program Files\Thunder\Program\getallurl.htm
O17 - HKLM\System\CCS\Services\Tcpip\..\{16C2474E-5756-44E1-8AF9-DBD0233236B8}: NameServer = 202.103.224.68,202.103.225.68
O17 - HKLM\System\CCS\Services\Tcpip\..\{93B5A01A-D532-4263-AB13-98D352170747}: NameServer = 202.103.225.68 202.103.224.68
O17 - HKLM\System\CS1\Services\Tcpip\..\{16C2474E-5756-44E1-8AF9-DBD0233236B8}: NameServer = 202.103.224.68,202.103.225.68
O17 - HKLM\System\CS3\Services\Tcpip\..\{16C2474E-5756-44E1-8AF9-DBD0233236B8}: NameServer = 202.103.224.68,202.103.225.68
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: cdl - {3DD53D40-7B8B-11D0-B013-00AA0059CE02} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: dvd - {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: file - {79EAC9E7-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ftp - {79EAC9E3-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: gopher - {79EAC9E4-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: http - {79EAC9E2-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: https - {79EAC9E5-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ipp - (no CLSID) - (no file)
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: local - {79EAC9E7-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: mailto - {3050F3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11D0-85E3-00C04FD85AB4} - C:\WINDOWS\system32\inetcomm.dll
O18 - Protocol: mk - {79EAC9E6-BAF9-11CE-8C82-00AA004BA90B} - C:\WINDOWS\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\system32\itss.dll
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: tv - {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WINDOWS\system32\msvidctl.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\system32\mshtml.dll
O18 - Protocol: wia - {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WINDOWS\system32\wiascr.dll
O21 - SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - C:\WINDOWS\system32\WPDShServiceObj.dll
O23 - Service: NetDogService - Rainbow China - C:\WINDOWS\system32\NetDogSrv.EXE
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\CCenter.exe
O23 - Service: Rising RealTime Monitor (RsRavMon) - Beijing Rising Technology Co., Ltd. - C:\PROGRAM FILES\RISING\RAV\Ravmond.exe
O23 - Service: Winkowg (Winokwy) - Unknown owner - C:\WINDOWS\system32\Winok.exe
O23 - Service: Windows Driver Foundetion (wudfsvce) - Unknown owner - C:\WINDOWS\system32\catroot\sm

[用户系统信息]Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
最后编辑2008-02-25 14:58:32
分享到:
gototop
 

C:\program files\internet explorer\IEXPLORE.EXE这个是病毒正常的名字是iexplorer而你的是iexplore
E:\Weway\QFBJ2008\MEDSERVER\ScktSrvr.ex这个我叫不准那
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe这个是怎么个意思你问问高手吧
gototop
 

引用:
【蕾欧娜的贴子】C:\program files\internet explorer\IEXPLORE.EXE这个是病毒正常的名字是iexplorer而你的是iexplore
E:\Weway\QFBJ2008\MEDSERVER\ScktSrvr.ex这个我叫不准那
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe这个是怎么个意思你问问高手吧
………………

IE浏览器的文件名就是iexplore.exe
E:\Weway\QFBJ2008\MEDSERVER\ScktSrvr.exe    好像是叫千方百计数据恢复软件
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe    微软SQL Server数据库
gototop
 

lz的日志中可疑进程:
C:\WINDOWS\system32\catroot\services.exe
C:\WINDOWS\system32\KK.exe

这些可以修复:
O2 - BHO: SrchHook Class - {F08555B0-9CC3-11D2-AA8E-000000000000} - C:\WINDOWS\system32\IEBHO.dll (file missing)
O3 - Toolbar: 快捷工具条3.1.5 - {BE830FD4-E393-417F-9F4B-CC70ABB3384C} - C:\WINDOWS\system32\IETool.dll (file missing)

可疑启动项:
O4 - HKLM\..\RunServices: [Windows Update] WinUDP.exe

可疑服务项:
O23 - Service: Winkowg (Winokwy) - Unknown owner - C:\WINDOWS\system32\Winok.exe
O23 - Service: Windows Driver Foundetion (wudfsvce) - Unknown owner - C:\WINDOWS\system32\catroot\sm    ----    这项后面是不是还有,lz的日志是否贴全了?

另外确认一下你的DNS是不是以下两组:
202.103.224.68,202.103.225.68
202.103.225.68,202.103.224.68
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT