中毒严重,求高手解决 特级!!

[复制链接]
查看11 | 回复6 | 2007-6-9 10:43:59 | 显示全部楼层 |阅读模式
可以用装有杀毒软件的移动存储设备来启动计算机然后杀毒或者直接重装系统
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
这病毒有点凶悍,建议在dos下面启用杀毒软件,实在不知道怎么弄得话,就去买一张江民dos下杀毒软件的盘,把盘放在光驱里重启电脑光驱启动就会自动杀毒了(记着买版本新点的哈)
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
试试这个吧!这不是杀毒软件哦!可很清楚的看出进程的位置!
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
重装系统
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
你只要把下面的代码复制下来,另存为.bat为后缀的文件,也就是批处理文件,然后双击运行就可以了.,@echo offtitle 忆林子color 0aecho ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo.echo
该病毒资料echo.echo
该病毒建立的包括的源文件如下:(4E8F8D4C这个文件名是这个病毒随机生成的,echo
但是不管它的名字是怎样,大小都一样)echo.echo
病毒文件全路径
大小(字节)echo
c:\windows\4E8F8D4C.hlp
44(左右)echo
c:\WINDOWS\Help\4E8F8D4C.chm
36,659(左右)echo
c:\Documents and Settings\Admin\Local Settings\Temp\4E8F8D4C.exe
36,659(左右)echo
c:\Program Files\Common Files\Microsoft Shared\MSInfo\4E8F8D4C.dll 47,923(左右)echo
c:\Program Files\Common Files\Microsoft Shared\MSInfo\4E8F8D4C.dat 36,659(左右)echo
其它所有分区:\autorun.inf
172(左右)echo
其它所有分区:\4E8F8D4C.exe
36,659(左右)echo.echo
autorun.inf文件里的内容echo.echo
[AutoRun]echo
open=4e8f8d4c.exeecho
shell\open=打开(^&O)echo
shell\open\Command=4e8f8d4c.exeecho
shell\open\Default=1echo
shell\explore=资源管理器(^&X)echo
shell\explore\Command=4e8f8d4c.exeecho.echo
该病毒的后果:echo
你的杀毒软件会无法打开,另外只要你的文件名中如果是"病毒","杀毒","瑞星"等和病毒.echo
有关的字眼时,你这个文件打开之后会马上被关闭.网页中一搜索这些字眼也会马上关闭.echo
可能还有其它的情况,我这里就不详细说明了.echo.echo
注意:因为该病毒与exeplorer.exe关联,所以在杀毒时,你的桌面echo
会出现暂时只剩背景图片,那时请不要结束该程序,让它继续运行。echo
到该程序运行结束之后,会自然显示出桌面的。echo.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo.set /p tmp=以上是该病毒的信息,如果要清除该病毒,请回车键开始杀毒...del tmp.忆林子dir "C:\Program Files\Common Files\Microsoft Shared\MSInfo" /b /ah >>tmp.忆林子for /f "tokens=1" %%j in ('more tmp.忆林子') do call :getFileName %%j:killSpydel tmp.忆林子 /qtaskkill /fi "modules eq %fileName%.dll" /fATTRIB -S -H -R c:\windows\%fileName%.hlpATTRIB -S -H -R c:\windows\%fileName%.chmATTRIB -S -H -R c:\windows\help\%fileName%.chmATTRIB -S -H -R "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.dat"ATTRIB -S -H -R "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.dll"ATTRIB -S -H -R "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.exe"clsdel c:\windows\%fileName%.hlp /qdel c:\windows\%fileName%.chm /qdel c:\windows\help\%fileName%.chm /qdel "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.dat" /qdel "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.dll" /qdel "C:\Program Files\Common Files\Microsoft Shared\MSInfo\%fileName%.exe" /qclsset RegDeleteIFEO=reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options%RegDeleteIFEO%\360rpt.exe" /v Debugger /f%RegDeleteIFEO%\360Safe.exe" /v Debugger /f%RegDeleteIFEO%\360tray.exe" /v Debugger /f%RegDeleteIFEO%\adam.exe" /v Debugger /f%RegDeleteIFEO%\AgentSvr.exe" /v Debugger /f%RegDeleteIFEO%\AppSvc32.exe" /v Debugger /f%RegDeleteIFEO%\autoruns.exe" /v Debugger /f%RegDeleteIFEO%\avgrssvc.exe" /v Debugger /f%RegDeleteIFEO%\AvMonitor.exe" /v Debugger /fcls%RegDeleteIFEO%\avp.com" /v Debugger /f%RegDeleteIFEO%\avp.exe" /v Debugger /f%RegDeleteIFEO%\CCenter.exe" /v Debugger /f%RegDeleteIFEO%\ccSvcHst.exe" /v Debugger /f%RegDeleteIFEO%\FileDsty.exe" /v Debugger /f%RegDeleteIFEO%\FTCleanerShell.exe" /v Debugger /fcls%RegDeleteIFEO%\HijackThis.exe" /v Debugger /f%RegDeleteIFEO%\IceSword.exe" /v Debugger /f%RegDeleteIFEO%\iparmo.exe" /v Debugger /f%RegDeleteIFEO%\Iparmor.exe" /v Debugger /f%RegDeleteIFEO%\isPwdSvc.exe" /v Debugger /fcls%RegDeleteIFEO%\kabaload.exe" /v Debugger /f%RegDeleteIFEO%\KaScrScn.SCR" /v Debugger /f%RegDeleteIFEO%\KASMain.exe" /v Debugger /f%RegDeleteIFEO%\KASTask.exe" /v Debugger /f%RegDeleteIFEO%\KAV32.exe" /v Debugger /fcls%RegDeleteIFEO%\KAVDX.exe" /v Debugger /f%RegDeleteIFEO%\KAVPFW.exe" /v Debugger /f%RegDeleteIFEO%\KAVSetup.exe" /v Debugger /f%RegDeleteIFEO%\KAVStart.exe" /v Debugger /f%RegDeleteIFEO%\KISLnchr.exe" /v Debugger /fcls%RegDeleteIFEO%\KMailMon.exe" /v Debugger /f%RegDeleteIFEO%\KMFilter.exe" /v Debugger /f%RegDeleteIFEO%\KPFW32.exe" /v Debugger /f%RegDeleteIFEO%\KPFW32X.exe" /v Debugger /fcls%RegDeleteIFEO%\KPFWSvc.exe" /v Debugger /f%RegDeleteIFEO%\KRegEx.exe" /v Debugger /f%RegDeleteIFEO%\KRepair.COM" /v Debugger /f%RegDeleteIFEO%\KsLoader.exe" /v Debugger /f%RegDeleteIFEO%\KVCenter.kxp" /v Debugger /fcls%RegDeleteIFEO%\KvDetect.exe" /v Debugger /f%RegDeleteIFEO%\KvfwMcl.exe" /v Debugger /f%RegDeleteIFEO%\KVMonXP.kxp" /v Debugger /f%RegDeleteIFEO%\KVMonXP_1.kxp" /v Debugger /f%RegDeleteIFEO%\kvol.exe" /v Debugger /fcls%RegDeleteIFEO%\kvolself.exe" /v Debugger /f%RegDeleteIFEO%\KvReport.kxp" /v Debugger /f%RegDeleteIFEO%\KVScan.kxp" /v Debugger /f%RegDeleteIFEO%\KVSrvXP.exe" /v Debugger /f%RegDeleteIFEO%\KVStub.kxp" /v Debugger /fcls%RegDeleteIFEO%\kvupload.exe" /v Debugger /f%RegDeleteIFEO%\kvwsc.exe" /v Debugger /f%RegDeleteIFEO%\KvXP.kxp" /v Debugger /f%RegDeleteIFEO%\KvXP_1.kxp" /v Debugger /f%RegDeleteIFEO%\KWatch.exe" /v Debugger /fcls%RegDeleteIFEO%\KWatch9x.exe" /v Debugger /f%RegDeleteIFEO%\KWatchX.exe" /v Debugger /f%RegDeleteIFEO%\loaddll.exe" /v Debugger /f%RegDeleteIFEO%\MagicSet.exe" /v Debugger /fcls%RegDeleteIFEO%\mcconsol.exe" /v Debugger /f%RegDeleteIFEO%\mmqczj.exe" /v Debugger /f%RegDeleteIFEO%\mmsk.exe" /v Debugger /f%RegDeleteIFEO%\NAVSetup.exe" /v Debugger /f%RegDeleteIFEO%\nod32krn.exe" /v Debugger /fcls%RegDeleteIFEO%\nod32kui.exe" /v Debugger /f%RegDeleteIFEO%\PFW.exe" /v Debugger /f%RegDeleteIFEO%\PFWLiveUpdate.exe" /v Debugger /f%RegDeleteIFEO%\QHSET.exe" /v Debugger /f%RegDeleteIFEO%\Ras.exe" /v Debugger /f%RegDeleteIFEO%\Rav.exe" /v Debugger /fcls%RegDeleteIFEO%\RavMon.exe" /v Debugger /f%RegDeleteIFEO%\RavMonD.exe" /v Debugger /f%RegDeleteIFEO%\RavStub.exe" /v Debugger /f%RegDeleteIFEO%\RavTask.exe" /v Debugger /f%RegDeleteIFEO%\RegClean.exe" /v Debugger /fcls%RegDeleteIFEO%\rfwcfg.exe" /v Debugger /f%RegDeleteIFEO%\RfwMain.exe" /v Debugger /f%RegDeleteIFEO%\rfwProxy.exe" /v Debugger /f%RegDeleteIFEO%\rfwsrv.exe" /v Debugger /fcls%RegDeleteIFEO%\RsAgent.exe" /v Debugger /f%RegDeleteIFEO%\Rsaupd.exe" /v Debugger /f%RegDeleteIFEO%\runiep.exe" /v Debugger /f%RegDeleteIFEO%\safelive.exe" /v Debugger /fcls%RegDeleteIFEO%\scan32.exe" /v Debugger /f%RegDeleteIFEO%\shcfg32.exe" /v Debugger /f%RegDeleteIFEO%\SmartUp.exe" /v Debugger /f%RegDeleteIFEO%\SREng.exe" /v Debugger /fcls%RegDeleteIFEO%\symlcsvc.exe" /v Debugger /f%RegDeleteIFEO%\SysSafe.exe" /v Debugger /f%RegDeleteIFEO%\TrojanDetector.exe" /v Debugger /f%RegDeleteIFEO%\Trojanwall.exe" /v Debugger /f%RegDeleteIFEO%\TrojDie.kxp" /v Debugger /fcls%RegDeleteIFEO%\UIHost.exe" /v Debugger /f%RegDeleteIFEO%\UmxAgent.exe" /v Debugger /f%RegDeleteIFEO%\UmxAttachment.exe" /v Debugger /f%RegDeleteIFEO%\UmxCfg.exe" /v Debugger /f%RegDeleteIFEO%\UmxFwHlp.exe" /v Debugger /fcls%RegDeleteIFEO%\UmxPol.exe" /v Debugger /f%RegDeleteIFEO%\UpLive.EXE.exe" /v Debugger /f%RegDeleteIFEO%\WoptiClean.exe" /v Debugger /f%RegDeleteIFEO%\zxsweep.exe" /v Debugger /fclsreg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks" /v {F8D44E8F-4E8F-8D4C-8F8D-E8FD03884CB9} /freg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer" /v NoDriveTypeAutoRun /fclsreg add "HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /ve /d DiskDrive /freg add "HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /ve /d DiskDrive /freg add "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /ve /d DiskDrive /freg add "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /ve /d DiskDrive /ffor /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf ATTRIB -S -H -R %%d:\autorun.inffor /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\autorun.inf del %%d:\autorun.inf /qfor /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\%fileName%.exe ATTRIB -S -H -R %%d:\%fileName%.exefor /D %%d in (c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z) do if exist %%d:\%fileName%.exe del %%d:\%fileName%.exe /qclsecho ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo
病毒清除完毕,按回车键开始解决分区无法双击打开的问题.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓set /p test=cls@echo
offtitle 忆林子--解决分区无法打开color 0aecho ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo.echo
例如:D盘无法打开则输入 d,你也可以echo
输入d,e,f这样来同时对d,e,f等多个分区操作.echo.echo
注意:在这里先不要输入C盘,如果输入C盘,请重启之后再运行一次echo
本程序才能解决你其它分区无法双击打开的错误.echo.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓set /p input=[请输入无法打开的分区的盘符]if /i "%input%"=="c" goto :特殊for /d %%i in (%input%) do cacls %%i:\autorun.inf /c /e /p everyone:ffor /d %%i in (%input%) do ATTRIB -S -H -R %%i:\autorun.inffor /d %%i in (%input%) do del %%i:\autorun.inf /qreg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SVOHOST /fclsreg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /freg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 1 /fclsfor /d %%i in (%input%) do chkdsk %%i: /f /xclsecho.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo.
echo
恭喜你,你的这个病毒已经被清除,按回车键显示桌面,echo
然后请关闭该程序就可以了。echo.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓set /p tmp=c:\windows\explorer.exe:exitexit:特殊ATTRIB -S -H -R %input%:\autorun.infdel %input%:\autorun.inf /qecho ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓echo.echo
操作成功结束,请重启,然后就可以双击就可以打开了。echo
如果重启之后,还是无法双击打开的话,说明你的电脑echo
里还有病毒,请先杀毒。然后再运行该程序。echo.echo ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓set /p tmp=操作结束,按回车键显示桌面,然后请关闭该程序就可以了。c:\windows\explorer.exeexit:getFileNameset var=%1set fileName=%var:~0,8%goto :killSpy重装系统!格式化硬盘!
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
找台有新版本杀毒软件的机器 把有毒的邮盘插上 会杀毒看毒名去网上找转杀工具
回复

使用道具 举报

千问 | 2007-6-9 10:43:59 | 显示全部楼层
感觉只能重装了
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

主题

0

回帖

4882万

积分

论坛元老

Rank: 8Rank: 8

积分
48824836
热门排行