瑞星卡卡安全论坛技术交流区反病毒/反流氓软件论坛 http://www.sowdo.com/自己出现怎么处理啊

1   1  /  1  页   跳转

http://www.sowdo.com/自己出现怎么处理啊

http://www.sowdo.com/自己出现怎么处理啊

现在上网时候无故出现http://www.sowdo.com/的网页,桌面上还出现链接图标,是不是中流氓了,请问高手们,怎么处理啊。。。
最后编辑2006-10-15 15:25:52
分享到:
gototop
 

用超级兔子清理一下垃圾流氓软件,如果不行,就扫个日志上来让大家帮你看一下啊!
gototop
 

请下载SREng2 ,使用“智能扫描”,按下“扫描”按钮进行扫描,
扫描完成后按下“保存报告”按钮保存报告日志文件(SREng.LOG),把保存的报告
日志文件内容复制-粘贴上来,,日志一次粘不完,分次粘完,请不要修改。

下载地址
http://www.kztechs.com/sreng/sreng2.zip
http://free5.ys168.com/?ufwihgu168
gototop
 

Logfile of HijackThis v1.99.1
Scan saved at 15:13:36, on 2006-10-15
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
D:\Rising\Rav\CCenter.exe
C:\WINDOWS\System32\svchost.exe
D:\Rising\Rav\Ravmond.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\conime.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\Program Files\UPHClean\uphclean.exe
D:\Rising\Rav\RavTask.exe
D:\Rising\Rav\Ravmon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\explorer.exe
D:\HijackThis.exe

F2 - REG:system.ini: UserInit=C:\WINDOWS\system\Userinit.exe,,C:\Program Files\winrar\msn.com
O2 - BHO: WebThunderBHO - {00000AAA-A363-466E-BEF5-9BB68697AA7F} - D:\迅雷\WebThunderBHO_013.dll
O2 - BHO: QQIEHelper - {54EBD53A-9BC1-480B-966A-843A333CA162} - D:\tencent\QQIEHelper.dll
O2 - BHO: DuDu.com - {6BDE1669-B490-48E3-B668-456314F2D6C3} - (no file)
O4 - HKLM\..\Run: [Skype] E:\\skype\Phone\Skype.exe
O4 - HKLM\..\Run: [RavTask] "D:\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [gemstrmw] C:\WINDOWS\system32\gemstrmw.exe /r
O4 - HKLM\..\Run: [WebThunder] C:\Program Files\Thunder Network\WebThunder\WebThunder.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O8 - Extra context menu item: 上传到QQ网络硬盘 - D:\tencent\AddToNetDisk.htm
O8 - Extra context menu item: 使用Web迅雷下载 - D:\迅雷\GetUrl.htm
O8 - Extra context menu item: 使用Web迅雷下载全部链接 - D:\迅雷\GetAllUrl.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - D:\tencent\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - D:\tencent\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - D:\tencent\SendMMS.htm
O9 - Extra button: 启动Web迅雷 - {962EFB8E-2683-42d4-AC74-AAA4C759B9C6} - http://my.xunlei.com (file missing)
O9 - Extra 'Tools' menuitem: 启动Web迅雷 - {962EFB8E-2683-42d4-AC74-AAA4C759B9C6} - http://my.xunlei.com (file missing)
O9 - Extra button: QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - D:\tencent\QQ.EXE
O9 - Extra 'Tools' menuitem: 腾讯QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - D:\tencent\QQ.EXE
O9 - Extra button: (no name) - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - D:\tencent\QQIEHelper.dll
O9 - Extra 'Tools' menuitem: QQ炫彩工具条设置 - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - D:\tencent\QQIEHelper.dll
O13 - WWW Prefix:
O14 - IERESET.INF: SEARCH_PAGE_URL=
O14 - IERESET.INF: START_PAGE_URL=
O15 - Trusted Zone: http://www.icbc.com.cn
O16 - DPF: {DD713965-ECD7-407B-A886-FCF999BB6765} (SnSubmitControl Class) - http://jf.sdo.com/sndasec.cab
O18 - Protocol: koboo - {7DEE9D05-FA0A-4416-A6F3-6537D0EAB6A6} - C:\WINDOWS\system32\mbprot.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Technology Co., Ltd. - D:\Rising\Rav\CCenter.exe
O23 - Service: RsRavMon Service (RsRavMon) - Beijing Rising Technology Co., Ltd. - D:\Rising\Rav\Ravmond.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe

gototop
 

到控制面板--添加删除卸载掉:winrar

运行Hijackthis,把下面的选中打上钩,修复
F2 - REG:system.ini: UserInit=C:\WINDOWS\system\Userinit.exe,,C:\Program Files\winrar\msn.com

删除
C:\Program Files\winrar\文件夹


gototop
 

用你的扫描软件修复以下项
F2 - REG:system.ini: UserInit=C:\WINDOWS\system\Userinit.exe,,C:\Program Files\winrar\msn.com
O4 - HKLM\..\Run: [gemstrmw] C:\WINDOWS\system32\gemstrmw.exe /r
O18 - Protocol: koboo - {7DEE9D05-FA0A-4416-A6F3-6537D0EAB6A6} - C:\WINDOWS\system32\mbprot.dll
重启安全模式下删以下文件.
C:\WINDOWS\system32\mbprot.dll
C:\WINDOWS\system32\gemstrmw.exe
C:\Program Files\winrar\msn.com
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT