1   1  /  1  页   跳转

【求助】

【求助】

楼主,您好!我的是win2000的系统,中了backdoor.gpigeon.thj病毒。现用HijackThis_815扫描结果以下,请帮分析该如何查杀。
    操作系统:  Windows 2000 SP3 (WinNT 5.00.2195)
浏览器:    Internet Explorer v5.00 SP3 (5.00.2920.0000)

当前运行的进程:         
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\Program Files\Rising\Rav\CCenter.exe
C:\Program Files\Rising\Rav\Ravmond.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINNT\System32\NMSSvc.exe
C:\Program Files\Rising\Rav\RavStub.exe
C:\WINNT\System32\nvsvc32.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\Explorer.EXE
C:\PROGRA~1\3721\assistse.exe
C:\WINNT\system32\rundll32.exe
C:\Program Files\Rising\Rav\RavTask.exe
C:\Program Files\Rising\Rav\Ravmon.exe
C:\PROGRA~1\Yahoo!\ASSIST~1\YLive.exe
C:\WINNT\System32\internat.exe
C:\Program Files\Rising\Rav\RsAgent.exe
C:\WINNT\msagent\AgentSvr.exe
C:\Program Files\Internet Explorer\iexplore.exe
F:\tools\HijackThis1991汉化版\HijackThis1991zww.exe

R3 - URLSearchHook: 上网助手 - {BB936323-19FA-4521-BA29-ECA6A121BC78} - C:\PROGRA~1\3721\Assist\asbar.dll
O1 - Hosts: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
O1 - Hosts: <html dir=ltr>
O1 - Hosts: <head>
O1 - Hosts: <style> a:link {font:9pt/11pt 宋体; color:FF0000} a:visited {font:9pt/11pt 宋体; color:#4e4e4e}
O1 - Hosts: </style>
O1 - Hosts: <META NAME="ROBOTS" CONTENT="NOINDEX">
O1 - Hosts: <title>无法找到网页</title>
O1 - Hosts: <META HTTP-EQUIV="Content-Type" Content="text-html; charset=gb2312">
O1 - Hosts: <META NAME="MS.LOCALE" CONTENT="ZH-CN">
O1 - Hosts: </head>
O1 - Hosts: <script>
O1 - Hosts: function Homepage(){
O1 - Hosts: <!--
O1 - Hosts: // in real bits, urls get returned to our script like this:
O1 - Hosts: // res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm
O1 - Hosts: //For testing use DocURL = "res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm"
O1 - Hosts: DocURL = document.URL;
O1 - Hosts: //this is where the http or https will be, as found by searching for :// but skipping the res://
O1 - Hosts: protocolIndex=DocURL.indexOf("://",4);
O1 - Hosts: //this finds the ending slash for the domain server
O1 - Hosts: serverIndex=DocURL.indexOf("/",protocolIndex + 3);
O1 - Hosts: //for the href, we need a valid URL to the domain. We search for the # symbol to find the begining
O1 - Hosts: //of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end marker.
O1 - Hosts: //urlresult=DocURL.substring(protocolIndex - 4,serverIndex);
O1 - Hosts: BeginURL=DocURL.indexOf("#",1) + 1;
O1 - Hosts: urlresult=DocURL.substring(BeginURL,serverIndex);
O1 - Hosts: //for display, we need to skip after http://, and go to the next slash
O1 - Hosts: displayresult=DocURL.substring(protocolIndex + 3 ,serverIndex);
O1 - Hosts: InsertElementAnchor(urlresult, displayresult);
O1 - Hosts: }
O1 - Hosts: function HtmlEncode(text)
O1 - Hosts: {
O1 - Hosts: return text.replace(/&/g, '&').replace(/'/g, '"').replace(/</g, '<').replace(/>/g, '>');
O1 - Hosts: }
O1 - Hosts: function TagAttrib(name, value)
O1 - Hosts: {
O1 - Hosts: return ' '+name+'="'+HtmlEncode(value)+'"';
O1 - Hosts: }
O1 - Hosts: function PrintTag(tagName, needCloseTag, attrib, inner){
O1 - Hosts: document.write( '<' + tagName + attrib + '>' + HtmlEncode(inner) );
O1 - Hosts: if (needCloseTag) document.write( '</' + tagName +'>' );
O1 - Hosts: }
O1 - Hosts: function URI(href)
O1 - Hosts: {
O1 - Hosts: IEVer = window.navigator.appVersion;
O1 - Hosts: IEVer = IEVer.substr( IEVer.indexOf('MSIE') + 5, 3 );
O1 - Hosts: return (IEVer.charAt(1)=='.' && IEVer >= '5.5') ?
O1 - Hosts: encodeURI(href) :
O1 - Hosts: escape(href).replace(/%3A/g, ':').replace(/%3B/g, ';');
O1 - Hosts: }
O1 - Hosts: function InsertElementAnchor(href, text)
O1 - Hosts: {
O1 - Hosts: PrintTag('A', true, TagAttrib('HREF', URI(href)), text);
O1 - Hosts: }
O1 - Hosts: //-->
O1 - Hosts: </script>
O1 - Hosts: <body bgcolor="FFFFFF">
O1 - Hosts: <table width="410" cellpadding="3" cellspacing="5">
O1 - Hosts: <tr>
O1 - Hosts: <td align="left" valign="middle" width="360">
O1 - Hosts: <h1 style="COLOR:000000; FONT: 12pt/15pt 宋体"><!--Problem-->无法找到网页</h1>
O1 - Hosts: </td>
O1 - Hosts: </tr>
O1 - Hosts: <tr>
O1 - Hosts: <td width="400" colspan="2"> <font style="COLOR:000000; FONT: 9pt/11pt 宋体">您正在搜索的网页可能已经删除、更名或暂时不可用。</font></td>
O1 - Hosts: </tr>
O1 - Hosts: <tr>
O1 - Hosts: <td width="400" colspan="2"> <font style="COLOR:000000; FONT: 9pt/11pt 宋体">
O1 - Hosts: <hr color="#C0C0C0" noshade>
O1 - Hosts: <p>请尝试下列操作:</p>
O1 - Hosts: <ul>
O1 - Hosts: <li>如果您在“地址”栏中键入了网页地址,请检查其拼写是否正确。<br>
O1 - Hosts: </li>
O1 - Hosts: <li>打开 <script>
O1 - Hosts: <!--
O1 - Hosts: if (!((window.navigator.userAgent.indexOf("MSIE") > 0) && (window.navigator.appVersion.charAt(0) == "2")))
O1 - Hosts: {
O1 - Hosts: Homepage();
O1 - Hosts: }
O1 - Hosts: //-->
O1 - Hosts: </script> 主页,寻找指向所需信息的链接。</li>
O1 - Hosts: <li>单击<a href="javascript:history.back(1)">后退</a>按钮尝试其他链接。</li>
O1 - Hosts: </ul>
O1 - Hosts: <h2 style="font:9pt/11pt 宋体; color:000000">HTTP 404 - 无法找到文件<br> Internet 信息服务<BR></h2>
O1 - Hosts: <hr color="#C0C0C0" noshade>
O1 - Hosts: <p>技术信息(支持个人)</p>
O1 - Hosts: <ul>
O1 - Hosts: <li>详细信息:<br><a href="http://www.microsoft.com/ContentRedirect.asp?prd=iis&sbp=&pver=5.0&pid=&ID=404&cat=web&os=&over=&hrd=&Opt1=&Opt2=&Opt3=" target="_blank">Microsoft 支持</a>
O1 - Hosts: </li>
O1 - Hosts: </ul>
O1 - Hosts: </font></td>
O1 - Hosts: </tr>
O1 - Hosts: </table>
O1 - Hosts: </body>
O1 - Hosts: </html>
O2 - BHO: yPhtb - {33BBE430-0E42-4f12-B075-8D21ACB10DCB} - C:\PROGRA~1\Yahoo!\ASSIST~1\assist\yphtb.dll
O2 - BHO: Anti Fish - {38928D50-8A48-44C2-945F-D2F23F771410} - C:\Program Files\3721\Assist\Angling.dll
O2 - BHO: 360so BHOHelper - {472101C2-1109-43f4-9112-31F33E3F2127} - C:\PROGRA~1\360so\360so.dll
O2 - BHO: YDragSearch - {62EED7C6-9F02-42f9-B634-98E2899E147B} - C:\PROGRA~1\Yahoo!\ASSIST~1\assist\YDRAGS~1.DLL
O2 - BHO: IE - {D157330A-9EF3-49F8-9A67-4141AC41ADD4} - C:\WINNT\downlo~1\CnsHook.dll
O3 - IE工具栏增项: @msdxmLC.dll,-1@2052,电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O4 - 启动项HKLM\\Run: [assistse] "C:\PROGRA~1\3721\assistse.exe"
O4 - 启动项HKLM\\Run: [CnsMin] Rundll32.exe C:\WINNT\downlo~1\CnsMin.dll,Rundll32
O4 - 启动项HKLM\\Run: [Synchronization Manager] mobsync.exe /logon
O4 - 启动项HKLM\\Run: [helper.dll] C:\WINNT\system32\rundll32.exe C:\PROGRA~1\3721\helper.dll,Rundll32
O4 - 启动项HKLM\\Run: [360Main.exe] C:\PROGRA~1\360so\360Main.exe
O4 - 启动项HKLM\\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - 启动项HKLM\\Run: [YLive.exe] C:\PROGRA~1\Yahoo!\ASSIST~1\YLive.exe
O4 - HKCU\..\Run: [internat.exe] internat.exe
O8 - IE右键菜单中的新增项目: !搜一搜 - res://C:\WINNT\downlo~1\CnsMinEx.dll/1003
O9 - 浏览器额外的按钮: 手机短信 - {00000000-0000-0001-0001-596BAEDD1289} - http://sms.3721.com/ie/index.htm (file missing)
O9 - 浏览器额外的按钮: Yahoo 1G电邮 - {507F9113-CD77-4866-BA92-0E86DA3D0B97} - http://cn.mail.yahoo.com/promo/rd1 (file missing)
O9 - 浏览器额外的按钮: 寻宝乐趣多 - {59BC54A2-56B3-44a0-93E5-432D58746E26} - http://hot.3721.com/rd/shop_btn.htm (file missing)
O9 - 浏览器额外的按钮: 上网助手 - {5D73EE86-05F1-49ed-B850-E423120EC338} - http://assistant.3721.com/index.htm?fb=Cns (file missing)
O9 - 浏览器额外的按钮: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - 浏览器额外的“工具”菜单项: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - 浏览器额外的按钮: 情景聊天 - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - http://cn.rd.yahoo.com/home/messenger/bjk/clientbtn/?http://cn.messenger.yahoo.com/ (file missing)
O9 - 浏览器额外的按钮: (no name) - {ECF2E268-F28C-48d2-9AB7-8F69C11CCB71} - http://assistant.3721.com/security1.htm?fb=Cns (file missing)
O9 - 浏览器额外的“工具”菜单项: 修复浏览器 - {ECF2E268-F28C-48d2-9AB7-8F69C11CCB71} - http://assistant.3721.com/security1.htm?fb=Cns (file missing)
O9 - 浏览器额外的按钮: (no name) - {FD00D911-7529-4084-9946-A29F1BDF4FE5} - http://assistant.3721.com/clean1.htm?fb=Cns (file missing)
O9 - 浏览器额外的“工具”菜单项: 清理上网记录 - {FD00D911-7529-4084-9946-A29F1BDF4FE5} - http://assistant.3721.com/clean1.htm?fb=Cns (file missing)
O11 - Options group: [!CNS]  网络实名
O14 - IERESET.INF: SEARCH_PAGE_URL=
O14 - IERESET.INF: START_PAGE_URL=
O17 - HKLM\System\CCS\Services\Tcpip\..\{8951180E-CB2B-4851-BA11-9BC420226B5D}: NameServer = 202.96.128.86,202.96.128.68
O17 - HKLM\System\CS1\Services\Tcpip\..\{8951180E-CB2B-4851-BA11-9BC420226B5D}: NameServer = 202.96.128.143,202.96.128.68
O17 - HKLM\System\CS2\Services\Tcpip\..\{8951180E-CB2B-4851-BA11-9BC420226B5D}: NameServer = 202.96.128.86,202.96.128.68
O17 - HKLM\System\CS3\Services\Tcpip\..\{8951180E-CB2B-4851-BA11-9BC420226B5D}: NameServer = 202.96.128.86,202.96.128.68
O23 - NT 服务: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - NT 服务: DNS Progesionabnl (DNS Progesionabnl Version) - Unknown owner - C:\WINNT\F_BLDview.exe
O23 - NT 服务: Intel(R) NMS (NMSSvc) - Intel Corporation - C:\WINNT\System32\NMSSvc.exe
O23 - NT 服务: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINNT\System32\nvsvc32.exe
O23 - NT 服务: Pml Driver HPZ12 - HP - C:\WINNT\System32\HPZipm12.exe
O23 - NT 服务: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\CCenter.exe
O23 - NT 服务: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\Ravmond.exe
最后编辑2005-11-28 15:18:37
分享到:
gototop
 

修改Host项

O23 - NT 服务: DNS Progesionabnl (DNS Progesionabnl Version) - Unknown owner - C:\WINNT\F_BLDview.exe

修复023
重启
删除C:\WINNT\F_BLDview.exe

主要操作步骤
gototop
 

多谢BlackStone的回复!
不过Host项很多,都要修改吗?
还有这些操作要不要在安全模式下进行?
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT