瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 救命!!不断受到木马攻击(附日志和图),最新攻击描述在7楼和14楼

12   1  /  2  页   跳转

救命!!不断受到木马攻击(附日志和图),最新攻击描述在7楼和14楼

救命!!不断受到木马攻击(附日志和图),最新攻击描述在7楼和14楼

用瑞星和norton都出现同样问题,在安全模式下和正常模式下都已扫描全系统,无发现病毒。但是一连接internet就出现有人攻击的现象,如图

估计可能是厦门电信的猫腻。。当时来到厦门装宽带他非给我装一个“互联星空”的拨号程序,装了之后一扫描,大堆木马病毒!!!!把那玩意卸了之后,连整个系统都format重装了,结果现在就变成这样,现在用的是xp自带的拨号。

请高手替我解惑,十分感谢!!

附件附件:

下载次数:290
文件类型:image/pjpeg
文件大小:
上传时间:2006-7-7 12:34:39
描述:
预览信息:EXIF信息



最后编辑2006-07-10 20:15:23
分享到:
gototop
 

再来一张

附件附件:

下载次数:264
文件类型:image/pjpeg
文件大小:
上传时间:2006-7-7 12:35:13
描述:
预览信息:EXIF信息



gototop
 

Logfile of HijackThis v1.99.1
Scan saved at 12:36:52, on 2006-7-7
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Symantec Shared\ccApp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpotdd01.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpohmr08.exe
C:\Program Files\Common Files\Teleca Shared\CapabilityManager.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\bin\hpoevm08.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Bin\hpoSTS08.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\BERYL\LOCALS~1\Temp\Rar$EX00.875\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32
O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
O4 - HKLM\..\Run: [IMSCMig] C:\PROGRA~1\COMMON~1\MICROS~1\IME\IMSC40A\IMSCMIG.EXE /Preload
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /Minimized
O4 - Global Startup: hpoddt01.exe.lnk = ?
O4 - Global Startup: hp psc 1000 series.lnk = ?
O8 - Extra context menu item: 使用网际快车下载 - C:\PROGRA~1\FLASHGET\jc_link.htm
O8 - Extra context menu item: 使用网际快车下载全部链接 - C:\PROGRA~1\FLASHGET\jc_all.htm
O8 - Extra context menu item: 在Foxmail中添加该RSS频道/频道组 - res://C:\WINDOWS\system32\fmrsslink.dll/201
O8 - Extra context menu item: 导出到 Microsoft Office Excel(&X) - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_12\bin\npjpi142_12.dll
O9 - Extra 'Tools' menuitem: Sun Java 控制台 - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\j2re1.4.2_12\bin\npjpi142_12.dll
O9 - Extra button: 信息检索 - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O14 - IERESET.INF: START_PAGE_URL=about:blank
O16 - DPF: {0CA54D3F-CEAE-48AF-9A2B-31909CB9515D} (Edit Class) - https://www.sz1.cmbchina.com/download/CMBEdit.cab
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1150947496453
O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1151033654296
O17 - HKLM\System\CCS\Services\Tcpip\..\{42847D53-AF24-4F75-9F9F-CB8890813DD3}: NameServer = 218.85.157.99 202.101.103.55
O18 - Protocol: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O18 - Protocol: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\MSNMES~1\MSGRAP~1.DLL
O23 - Service: Symantec Event Manager (ccEvtMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
O23 - Service: Symantec Password Validation (ccPwdSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccPwdSvc.exe
O23 - Service: Symantec Settings Manager (ccSetMgr) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
O23 - Service: Norton AntiVirus Auto-Protect Service (navapsvc) - Symantec Corporation - C:\Program Files\Norton AntiVirus\navapsvc.exe
O23 - Service: Norton AntiVirus Firewall Monitor Service (NPFMntor) - Symantec Corporation - C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: SAVScan - Symantec Corporation - C:\Program Files\Norton AntiVirus\SAVScan.exe
O23 - Service: ScriptBlocking Service (SBService) - Symantec Corporation - C:\PROGRA~1\COMMON~1\SYMANT~1\SCRIPT~1\SBServ.exe
O23 - Service: Symantec Network Drivers Service (SNDSrvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
O23 - Service: Symantec SPBBCSvc (SPBBCSvc) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe

gototop
 

顶一下,麻烦大家帮帮忙好吗??
gototop
 

菜菜鸟我不是很明白。。我没有在用QQ哦。。而且开机加载的启动项只有打印机状态监测,我有用Emule不过没有设开机启动。。不过我发现很奇怪的就是我没有连接emule(有连接internet)也一直在上传。。这是个问题吗?我是真菜鸟。。。不过我说的那个bla 特洛伊提示是我一连接internet就有的,我还没有开其它程序。。。。
gototop
 

昨晚在用emule时还发现这个入侵,好担心。。。。

详细说明: 入侵: NMap Null Scan。
入侵者: 221.224.209.211。
风险级别: 中级。
源 IP 地址: 221.224.209.211。
目标 IP 地址: 59.57.172.116。
TCP 源端口: 4686。
TCP 目标端口: 1822。
TCP 头标志: 0x00000000。这些 TCP 标志无效,该包具有 NMap Null 扫描的特征。

单击该地址可跟踪攻击者。 
gototop
 

还试过用google提供的 Ad-Aware Se 扫描,每次都发现可疑目标,下面是范例:

Name:Tracking Cookie
Category:Data Miner
Object Type:IECache Entry
Size:214 Bytes
Location:C:\Documents and Settings\BERYL\Cookies\beryl@cgi-bin[2].txt
Last Activity:2006-7-6 下午 04:00:00
Relevance:Low
TAC index:3
Comment:Hits:4
Description:This cookie is known to collect information that may be used either for targeted advertising, or tracking users across a particular website, such as page views or ad click-thrus.


Name:Tracking Cookie
Category:Data Miner
Object Type:IECache Entry
Size:126 Bytes
Location:C:\Documents and Settings\BERYL\Cookies\beryl@2o7[2].txt
Last Activity:2006-7-6 下午 04:00:00
Relevance:Low
TAC index:3
Comment:Hits:2
Description:This cookie is known to collect information that may be used either for targeted advertising, or tracking users across a particular website, such as page views or ad click-thrus.

Name:Tracking Cookie
Category:Data Miner
Object Type:IECache Entry
Size:117 Bytes
Location:C:\...\BERYL\Cookies\beryl@bluestreak[1].txt
Last Activity:2006-7-5 下午 04:00:00
Relevance:Low
TAC index:3
Comment:Hits:1
Description:This cookie is known to collect information that may be used either for targeted advertising, or tracking users across a particular website, such as page views or ad click-thrus.


Name:Tracking Cookie
Category:Data Miner
Object Type:IECache Entry
Size:83 Bytes
Location:C:\...\BERYL\Cookies\beryl@doubleclick[1].txt
Last Activity:2006-7-7 下午 04:00:00
Relevance:Low
TAC index:3
Comment:Hits:14
Description:This cookie is known to collect information that may be used either for targeted advertising, or tracking users across a particular website, such as page views or ad click-thrus.

我不是很懂这样代表什么,只好每次都隔离删除了。。。。
gototop
 

那我要怎么关闭啊???
gototop
 

是不是把程序控制里全部设置成只允许tcp?
gototop
 

又来了一个。。。。

详细说明: 检测到并禁止了针对您计算机的入侵企图“HTTP MS IIS NTLM ASN1 BO”。
入侵者: 220.160.200.225(4474)。
风险级别: 高级。
协议: TCP。
攻击的 IP: 220.160.175.254。
攻击的端口: http(80)。
gototop
 
12   1  /  2  页   跳转
页面顶部
Powered by Discuz!NT