打印

[求助] uISGRLFile.dat无法删除 请高手帮忙

0

uISGRLFile.dat无法删除 请高手帮忙

最近遇到病毒了 uISGRLFile.dat文件一直出现在桌面 删了又出来 怎么办啊 高手谢谢了`!!!

TOP

0
引用:
原帖由 mizi16 于 2008-8-25 01:58 发表
最近遇到病毒了 uISGRLFile.dat文件一直出现在桌面 删了又出来 怎么办啊 高手谢谢了`!!!
转贴的。 希望有用。


Email-Worm.Win32.Bagle.gb分析
安天实验室    CERT组分析
一、病毒标签:
病毒名称: Email-Worm.Win32.Bagle.gb
病毒类型: 蠕虫类
文件 MD5: 702F26300BB856FC5A27DD47090237BB
公开范围: 完全公开
危害等级: 4 
文件长度: 185,912 字节
感染系统: windows 98以上版本
开发工具: Microsoft Visual C++ 6.0
加壳类型: 无

二、病毒描述:
该病毒为邮件蠕虫,可通过邮件自行传播。病毒运行后,复制衍生病毒文件系统目录下,并删除自身。修改注册表,添加启动项,以达到随机启动的目的。将IeBar1.dll插入到EXPLORER.EXE进程中,主动连接网络,下载其它病毒文件到本机运行。
   
三、行为分析:
   
1、病毒运行后释放文件:
%Program Files%\DeskAdTop\sInfo.ini
%System32%\eeeeee.ini
%System32%\eeeeee1.ini
%System32%\IeBar1.dll

2、添加启动项,以达到随机启动的目的:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEBarUp
键值:字符串:"RunDll32"C:\WINDOWS\system32\IeBar1.dll",Run%SystemRoot%\Driver Cache"

3、将IeBar1.dll插入到EXPLORER.EXE进程中

4、主动连接网络,下载相关病毒文件信息:
地址列表:
218.12.196.143
218.12.196.140.
222.35.73.17
202.108.32.181

下载及释放文件列表:
%Program Files%\DeskAdTop\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.1
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.tmp
%WINDIR%\Downloaded Program Files\865735\adrec.dat
%WINDIR%\Downloaded Program Files\865735\allverx.dat
%WINDIR%\Downloaded Program Files\865735\bk\skin1.GIF
%WINDIR%\Downloaded Program Files\865735\bk\skin2.GIF
%WINDIR%\Downloaded Program Files\865735\CodeConvert\regCodeMap.ini
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSB52UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGB2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGBK2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2B5.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GB.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GBK.TXT
%WINDIR%\Downloaded Program Files\865735\config\MidSegData0.idx
%WINDIR%\Downloaded Program Files\865735\config\MidSegData1.idx
%WINDIR%\Downloaded Program Files\865735\config\ZSDict_Word.dat
%WINDIR%\Downloaded Program Files\865735\hissys.dat
%WINDIR%\Downloaded Program Files\865735\IP.dat
%WINDIR%\Downloaded Program Files\865735\NTDLL32.dll
%WINDIR%\Downloaded Program Files\865735\SHLWAPI32.DLL
%WINDIR%\Downloaded Program Files\865735\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\uISGRLFile.dat
%WINDIR%\Downloaded Program Files\865735\wpp_entity.txt
%WINDIR%\Downloaded Program Files\865735\wpp_keyword.txt
%WINDIR%\Downloaded Program Files\865735\_uninstall
%System32%\CharSet.dll
%System32%\CreateDomTree.dll
%System32%\drivers\mspcidrv.sys
%System32%\IEHelper.dll
%System32%\internet.exe
%System32%\NTDLL32.dll
%System32%\WebPageParser.dll
%WINDIR%\Temp\FDC15X.tmp

    5、该病毒执行后开始搜索计算机中E-mail地址,搜索到后自动发送邮件,在邮件附件中包含病毒体
   
注释:
%Windir%                      WINDODWS所在目录
%DriveLetter%                逻辑驱动器根目录
%ProgramFiles%                系统程序默认安装目录
%HomeDrive%                  当前启动系统所在分区
%Documents and Settings%    当前用户文档根目录
%Temp%                        当前用户TEMP缓存变量;路径为:
%Documents and Settings%\当前用户\Local Settings\Temp
%System32%                    是一个可变路径;
病毒通过查询操作系统来决定当前System32文件夹的位置;
Windows2000/NT中默认的安装路径是 C:\Winnt\System32;
Windows95/98/Me中默认的安装路径是 C:\Windows\System;
WindowsXP中默认的安装路径是 C:\Windows\System32。
   
四、 清除方案:
1、使用安天木马防线可彻底清除此病毒(推荐),请到安天网站下载:www.antiy.com
2、手工清除请按照行为分析删除对应文件,恢复相关系统设置。推荐使用ATool(安天安全管理工具),ATool下载地址: www.antiy.comhttp://www.antiy.com/download/index.htm
(1) 使用安天木马防线或ATool中的“进程管理”关闭病毒进程
   
(2) 强行删除病毒释放与下载文件
%Program Files%\DeskAdTop\sInfo.ini
%System32%\eeeeee.ini
%System32%\eeeeee1.ini
%System32%\IeBar1.dll
%Program Files%\DeskAdTop\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.1
%WINDIR%\Downloaded Program Files\865735\adkwlib1.dat.tmp
%WINDIR%\Downloaded Program Files\865735\adrec.dat
%WINDIR%\Downloaded Program Files\865735\allverx.dat
%WINDIR%\Downloaded Program Files\865735\bk\skin1.GIF
%WINDIR%\Downloaded Program Files\865735\bk\skin2.GIF
%WINDIR%\Downloaded Program Files\865735\CodeConvert\regCodeMap.ini
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSB52UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGB2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSGBK2UC.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2B5.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GB.TXT
%WINDIR%\Downloaded Program Files\865735\CodeConvert\ZSUC2GBK.TXT
%WINDIR%\Downloaded Program Files\865735\config\MidSegData0.idx
%WINDIR%\Downloaded Program Files\865735\config\MidSegData1.idx
%WINDIR%\Downloaded Program Files\865735\config\ZSDict_Word.dat
%WINDIR%\Downloaded Program Files\865735\hissys.dat
%WINDIR%\Downloaded Program Files\865735\IP.dat
%WINDIR%\Downloaded Program Files\865735\NTDLL32.dll
%WINDIR%\Downloaded Program Files\865735\SHLWAPI32.DLL
%WINDIR%\Downloaded Program Files\865735\sInfo.ini
%WINDIR%\Downloaded Program Files\865735\uISGRLFile.dat
%WINDIR%\Downloaded Program Files\865735\wpp_entity.txt
%WINDIR%\Downloaded Program Files\865735\wpp_keyword.txt
%WINDIR%\Downloaded Program Files\865735\_uninstall
%System32%\CharSet.dll
%System32%\CreateDomTree.dll
%System32%\drivers\mspcidrv.sys
%System32%\IEHelper.dll
%System32%\internet.exe
%System32%\NTDLL32.dll
%System32%\WebPageParser.dll
%WINDIR%\Temp\FDC15X.tmp

(3) 恢复病毒修改的注册表项目,删除病毒添加的注册表项
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IEBarUp
键值:字符串:"RunDll32"C:\WINDOWS\system32\IeBar1.dll",Run%SystemRoot%\Driver Cache"
本贴来自ZDNetChina中文社区 http://bbs.zdnet.com.cn ,本贴地址:http://bbs.zdnet.com.cn/viewthread.php?tid=180936

TOP

0
用杀软杀毒啊,瑞星现在提供一年的免费使用,另外要及时给系统打补丁

TOP

0
建议用杀软,手动的话用unlocker软件把病毒一个个删除,然后删除相关注册表项

TOP

当前时区 GMT+8, 现在时间是 2025-3-20 05:03