瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 【求助】IE主页被强行锁定为piaoxue.com

1   1  /  1  页   跳转

【求助】IE主页被强行锁定为piaoxue.com

【求助】IE主页被强行锁定为piaoxue.com

俺的IE主页被强行设置成piaoxue.com了,改不了了,请各位高手帮忙。
附日志:
Logfile of HijackThis v1.99.1
Scan saved at 7:21:21, on 2006-10-18
Platform: Windows 2003 SP1 (WinNT 5.02.3790)
MSIE: Internet Explorer v6.00 SP1 (6.00.3790.1830)

Running processes:
C:\WIN2003\System32\smss.exe
C:\WIN2003\system32\winlogon.exe
C:\WIN2003\system32\services.exe
C:\WIN2003\system32\lsass.exe
C:\WIN2003\system32\svchost.exe
C:\Program Files\Rising\Rav\CCenter.exe
C:\WIN2003\System32\svchost.exe
C:\WIN2003\system32\spoolsv.exe
C:\WIN2003\System32\svchost.exe
C:\WIN2003\system32\inetsrv\inetinfo.exe
C:\WIN2003\System32\svchost.exe
C:\WIN2003\System32\svchost.exe
C:\WIN2003\Explorer.EXE
C:\Program Files\Rising\Rav\RavTask.exe
C:\WIN2003\system32\ctfmon.exe
C:\Program Files\Rising\Rav\Ravmon.exe
C:\WIN2003\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WIN2003\system32\mmc.exe
C:\Program Files\Rising\Rav\RsAgent.exe
C:\WIN2003\msagent\AgentSvr.exe
C:\Program Files\Rising\Rav\Ravmond.exe
C:\Program Files\Rising\Rav\RavStub.exe
C:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\ADMINI~1.INF\LOCALS~1\Temp\Rar$EX00.326\HijackThis.exe
E:\Program Files\Rising\KakaToolBar\KillProc.exe

R3 - Default URLSearchHook is missing
O1 - Hosts: 127.255.255.255 mopgg.mop.com
O1 - Hosts: 127.255.255.255 gg.mop.com
O1 - Hosts: 127.255.255.255 gg.donews.com
O1 - Hosts: 127.255.255.255 imgu.21cn.com
O1 - Hosts: 127.255.255.255 pp.keyrun.com
O1 - Hosts: 127.255.255.255 a.keyrun.com
O1 - Hosts: 127.255.255.255 code.union.teein.com
O1 - Hosts: 127.255.255.255 b.todayisp.com
O1 - Hosts: 127.255.255.255 newweb.zcom.com
O1 - Hosts: 127.255.255.255 adfarm.mediaplex.com
O1 - Hosts: 127.255.255.255 view.aliunion.cn.yahoo.com
O1 - Hosts: 127.255.255.255 adclient.163.com
O1 - Hosts: 127.255.255.255 adgeo.163.com
O2 - BHO: MyIEHelper Class - {16B770A0-0E87-4278-B748-2460D64A8386} - C:\Documents and Settings\All Users.WIN2003\Application Data\Microsoft\UserData\IEHelper_5001.dll (file missing)
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - C:\WIN2003\system32\kakatool.dll
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [Windows木马防火墙] E:\Program Files\ftc\Trojanwall.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WIN2003\system32\ctfmon.exe
O4 - Global Startup: Microsoft Office.lnk = C:\WIN2003\Program Files\Microsoft Office\Office10\OSA.EXE
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O8 - Extra context menu item: 使用网络传送带下载 - F:\Program Files\NetXfer\NXAddLink.html
O8 - Extra context menu item: 使用网络传送带下载全部链接 - F:\Program Files\NetXfer\NXAddList.html
O8 - Extra context menu item: 导出到 Microsoft Excel(&x) - res://C:\win2003\PROGRA~1\MICROS~1\Office10\EXCEL.EXE/3000
O17 - HKLM\System\CCS\Services\Tcpip\..\{90BF5C09-1B5A-4224-963D-CDCC266C628C}: NameServer = 202.102.152.3,202.102.154.3
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: cdl - {3DD53D40-7B8B-11D0-B013-00AA0059CE02} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - C:\Program Files\Common Files\Microsoft Shared\Web Folders\PKMCDO.DLL
O18 - Protocol: dvd - {12D51199-0DB5-46FE-A120-47A3D7D937CC} - C:\WIN2003\system32\msvidctl.dll
O18 - Protocol: file - {79EAC9E7-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: ftp - {79EAC9E3-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: gopher - {79EAC9E4-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: http - {79EAC9E2-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: https - {79EAC9E5-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WIN2003\system32\itss.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: local - {79EAC9E7-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: mailto - {3050F3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: mhtml - {05300401-BCBC-11D0-85E3-00C04FD85AB4} - C:\WIN2003\system32\inetcomm.dll
O18 - Protocol: mk - {79EAC9E6-BAF9-11CE-8C82-00AA004BA90B} - C:\WIN2003\system32\urlmon.dll
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WIN2003\system32\itss.dll
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: mso-offdap - {3D9F03FA-7A94-11D3-BE81-0050048385D1} - C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: tv - {CBD30858-AF45-11D2-B6D6-00C04FBBDE6E} - C:\WIN2003\system32\msvidctl.dll
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WIN2003\system32\mshtml.dll
O18 - Protocol: wia - {13F3EA8B-91D7-4F0A-AD76-D2853AC8BECE} - C:\WIN2003\system32\wiascr.dll
O20 - Winlogon Notify: dimsntfy - C:\WIN2003\SYSTEM32\dimsntfy.dll
O23 - Service: NT Data Provider (DATEING) - Unknown owner - C:\WIN2003\SYSTEM32\RUNDLL.EXE (file missing)
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\CCenter.exe
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - C:\Program Files\Rising\Rav\Ravmond.exe

最后编辑2006-10-19 04:09:28
分享到:
gototop
 

R3 - Default URLSearchHook is missing
O1 - Hosts: 127.255.255.255 mopgg.mop.com
O1 - Hosts: 127.255.255.255 gg.mop.com
O1 - Hosts: 127.255.255.255 gg.donews.com
O1 - Hosts: 127.255.255.255 imgu.21cn.com
O1 - Hosts: 127.255.255.255 pp.keyrun.com
O1 - Hosts: 127.255.255.255 a.keyrun.com
O1 - Hosts: 127.255.255.255 code.union.teein.com
O1 - Hosts: 127.255.255.255 b.todayisp.com
O1 - Hosts: 127.255.255.255 newweb.zcom.com
O1 - Hosts: 127.255.255.255 adfarm.mediaplex.com
O1 - Hosts: 127.255.255.255 view.aliunion.cn.yahoo.com
O1 - Hosts: 127.255.255.255 adclient.163.com
O1 - Hosts: 127.255.255.255 adgeo.163.com
O2 - BHO: MyIEHelper Class - {16B770A0-0E87-4278-B748-2460D64A8386} - C:\Documents and Settings\All Users.WIN2003\Application Data\Microsoft\UserData\IEHelper_5001.dll (file missing)
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O23 - Service: NT Data Provider (DATEING) - Unknown owner - C:\WIN2003\SYSTEM32\RUNDLL.EXE (file missing)
修复上面各项
gototop
 

1楼的方法没用。

我昨天晚上也遇上这个问题彻夜未眠。翻了所有相关的帖和其他网友的建议,情况照样。

后在哪个该死的网站的右边发现一个叫“解除被锁定首页的点击这里”,没办法之下只有打开来看,发现是 火狐浏览器 。安装完毕后,起用新的浏览器已经解决这个问题。
gototop
 

已经证实应该为火狐浏览器故意发布病毒程序做市场,希望大家把www.piaoxue.com的IP地址给我,我要检查和查封服务器。
gototop
 

【回复“妖瞳闪闪”的帖子】
俺也看到火狐浏览器了,不过有一种被强迫的感觉,有没有好的解决办法(不用火狐)?高手帮忙啊。
gototop
 

经反复在搜索里查找"piaoxue",终于找到了解决方法,特分享如下:
1、http://www.ljack.com.cn/post/189.html上的解决方法:
zme个人的解决方法是(仅代表个人观点):
因为是典型的IE劫持,只不过这是一个新型、顽固的恶意劫持。我们可以删除注册表IE相关键值,让系统自动建立新的键值。
开始--运行--输入regedit,找到HKEY-CURRENT-USER\SOFTWARE\MICROSOFT\INTERNET EXPLORER.删除INTERNET EXPLORER,重启机器。系统会自动建立新的键值,重启后IE主页变为微软默认页面,动手改回任意网站。问题解决!
2006-10-18 12:23:39

2、http://zhidao.baidu.com/question/13147051.html提供的方法:
从http://www.arswp.com/下载ArSwp 运行它,然后重启,然后把注册表中的 start page(www.piaoxue.com)那一项直接删掉 就搞定啦

本人采用第二种方法,使用Arswp软件,先扫描,后清理,然后重启,就可以修改IE主页了。在此感谢Arswp软件的作者们。谢谢了。
gototop
 

【回复“csytiger”的帖子】
你说的不行,我试过了,重启后过一会还变成飘雪
gototop
 

我的用WINDOWS清理助手可以清理


http://www.arswp.com/download/arswp/arswp.rar    安装清理完后,重设IE首页为空白。
gototop
 

多谢5楼
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT