哪来高手帮小弟看看日志


感激不尽,最好告诉我怎么清除
007-1-29 8:41:07 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:41:50 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:42:34 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:43:17 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:44:01 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:44:45 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:45:28 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:46:11 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:46:54 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:47:38 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:48:21 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:49:04 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:49:48 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:50:31 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:51:14 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:51:57 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:52:41 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:53:24 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:54:07 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:54:50 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
对方IP:125.112.203.144 端口:8000拦截
2007-1-29 8:55:34 发送数据包 发现:远程控制-灰鸽子 [黑防专版]
进程:C:\Program Files\Internet Explorer\IEXPLORE.EXE
Logfile of HijackThis v1.99.1
Scan saved at 20:59:20, on 2007-1-29
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\RunDll32.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
D:\FengYun\FYFireWall.exe
C:\Program Files\360safe\safemon\360tray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\WINDOWS\System32\alg.exe
D:\万象网管2004 919免验证版\Server.exe
D:\万象网管2004 919免验证版\Store.exe
C:\Program Files\ChinaNet\VnetClient.exe
C:\WINDOWS\system32\conime.exe
D:\Tencent\QQ\QQ.exe
d:\Tencent\qq\TIMPlatform.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Real\RealPlayer\RealPlay.exe
E:\ha_hijackthis_1991\HijackThis.exe
O2 - BHO: VnetCookie Class - {4E83D567-4697-4F7B-B1F0-A513B01DB89A} - c:\PROGRA~1\chinanet\VNETTR~1.DLL
O2 - BHO: QQIEHelper - {54EBD53A-9BC1-480B-966A-843A333CA162} - d:\Tencent\qq\QQIEHelper.dll
O2 - BHO: ThunderBHO - {889D2FEB-5411-4565-8998-1DD2C5261283} - d:\Thunder Network\Thunder\ComDlls\XunLeiBHO_006.dll
O2 - BHO: NavigatMon Class - {B69F34DD-F0F9-42DC-9EDD-957187DA688D} - C:\Program Files\360safe\safemon\safemon.dll
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [FY_FireWall] D:\FengYun\FYFireWall.exe
O4 - HKLM\..\Run: [runeip] D:\Rising\AntiSpyware\runiep.exe
O4 - HKLM\..\Run: [094E1924CDB180FDC0596ABF0716B4E2] E:\gongju\TenyQQ\TenyQQ.exe
O4 - HKLM\..\Run: [360Safetray] C:\Program Files\360safe\safemon\360tray.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O8 - Extra context menu item: &使用迅雷下载 - d:\Thunder Network\Thunder\Program\GetUrl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - d:\Thunder Network\Thunder\Program\GetAllUrl.htm
O8 - Extra context menu item: 上传到QQ网络硬盘 - D:\Tencent\QQ\AddToNetDisk.htm
O8 - Extra context menu item: 使用ChinaCache P2SP 加速下载(&C) - C:\Program Files\p2spcd\\P2SPDown.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - D:\Tencent\QQ\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - D:\Tencent\QQ\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - D:\Tencent\QQ\SendMMS.htm
O9 - Extra button: 启动迅雷5 - {09BA8F6D-CB54-424B-839C-C2A6C8E6B436} - d:\Thunder Network\Thunder\Thunder.exe
O9 - Extra 'Tools' menuitem: 启动迅雷5 - {09BA8F6D-CB54-424B-839C-C2A6C8E6B436} - d:\Thunder Network\Thunder\Thunder.exe
O9 - Extra button: 浩方对战平台 - {0A155D3C-68E2-4215-A47A-E800A446447A} - G:\game\浩方对战平台\GameClient.exe
O9 - Extra button: (no name) - {1934091F-CD97-51E1-B1D4-D23794813092} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra button: FANS - {1934091F-CD97-51E1-B1D4-D96794013092} - http://bbs.fans.com.cn?1115 (file missing)
O9 - Extra 'Tools' menuitem: FANS - {1934091F-CD97-51E1-B1D4-D96794013092} - http://bbs.fans.com.cn?1115 (file missing)
O9 - Extra button: Web反病毒保护 - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - D:\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - D:\Tencent\QQ\QQ.EXE
O9 - Extra 'Tools' menuitem: 腾讯QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - D:\Tencent\QQ\QQ.EXE
O9 - Extra button: (no name) - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - d:\Tencent\qq\QQIEHelper.dll
O9 - Extra 'Tools' menuitem: QQ炫彩工具条设置 - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - d:\Tencent\qq\QQIEHelper.dll
O16 - DPF: {2354A44B-3CEB-4829-9940-545B03103538} (PowerPlr Control) - http://vnet.wuhan.net.cn/plugin/PowerPlr.ocx
O16 - DPF: {2E53EA68-6D4A-4307-9092-A2FC48EAFC56} - http://partner.paipai.com/web800.exe
O16 - DPF: {39B3428A-7441-40AF-8F5B-BC2F8D35DC64} (ClientLogin.LoginPassEncrypt) - http://www.yage1.com/Client/ClientLogin.cab
O16 - DPF: {488A4255-3236-44B3-8F27-FA1AECAA8844} (CEditCtrl
Object) - https://img.alipay.com/download/1007/aliedit.cab
O16 - DPF: {BAC112DD-C51E-4712-A622-77C1D8075072} (ChinaCache加速下载客户端) - http://p2spdownload.chinacache.com/p2spcp4ie.cab
O16 - DPF: {E4E2F180-CB8B-4DE9-ACBB-DA745D3BA153} (Rising Web Scan
Object) - http://download.rising.com.cn/register/pcver/autoupgradepad/pcver2006new/OL2006.cab
O16 - DPF: {EC0978ED-24E3-403C-AB7A-060E388553E6} (BoBo P2P多媒体网络点播/广播/直播系统 V3) - http://www.17bobo.com/Software/BoBo_ActiveX_V3.ocx
O17 - HKLM\System\CCS\Services\Tcpip\..\{1E0B6FD2-7224-40BC-8CC1-FB2950B2613A}: NameServer = 202.103.0.117,202.103.0.68
O17 - HKLM\System\CCS\Services\Tcpip\..\{7C76A17D-00C2-412D-9406-A18BDC8D7460}: NameServer = 202.103.44.150 202.103.24.68
O17 - HKLM\System\CS1\Services\Tcpip\..\{1E0B6FD2-7224-40BC-8CC1-FB2950B2613A}: NameServer = 202.103.0.117,202.103.0.68
O17 - HKLM\System\CS2\Services\Tcpip\..\{1E0B6FD2-7224-40BC-8CC1-FB2950B2613A}: NameServer = 202.103.0.117,202.103.0.68
O18 - Protocol: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - D:\KuGoo3\InExtend\KuGoo3DownXControl.ocx
O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
O23 - Service: 卡巴斯基反病毒6.0 (AVP) - Unknown owner - D:\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
O23 - Service: Windows System
Object (System
Object) - Unknown owner - C:\WINDOWS\seruers.exe