U盘之家 > U盘安全 > 病毒防范 > CMD32.exe U盘病毒详细介绍

CMD32.exe U盘病毒详细介绍

2009-04-21 10:36来源:不详编辑:ZXC 浏览量:
  • U盘问题,请到问答平台:http://www.upan.cc/
  •   核心提示:
    CMD32.exe U盘病毒详细介绍 中毒表现: 释放文件 %Windows%CMD32.exe %System%voice.cpl %System%timedate.cpl 各分区根目录释放 X:autorun.inf autorun.inf 内容 [autorun] Open=EvilDay.exe shellexecute=EvilDay.exe shell打开

      

    CMD32.exe U盘病毒详细介绍
      中毒表现:
      释放文件
      %Windows%CMD32.exe
      %System%voice.cpl
      %System%timedate.cpl
      
      各分区根目录释放
      X:autorun.inf
      autorun.inf 内容
      [autorun]
      Open=EvilDay.exe
      shellexecute=EvilDay.exe
      shell打开(&O)command=EvilDay.exe
      shell=打开(&O)
      shell2=浏览(&B)
      shell2Command=EvilDay.exe
      shell3=资源管理器(&X)
      shell3Command=EvilDay.exe
      修改注册表:
      病毒创建启动项
      [HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun]
      "NOTEPAD"="%Windows%CMD32.exe"
      修改自动播放禁用设置
      [HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer] 优盘之家
      "NoDriveTypeAutoRun"=dword:0000005b
      禁用“显示所有文件和文件夹”
      [HKCUSOFTWAREMicrosoftWindowsCurrentVersionexplorerAdvancedFolderHiddenSHOWALL]
      "CheckedValue"=dword:00000000
      禁用“注册表编辑器”
      [HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
      "DisableRegistryTools"=dword:00000001 U盘之家

      其他行为:
      使用命令启动自动播放服务
      net start ShellHWDetection
      删除hips软件 GhostSecuritySuite 主程序
      %ProgramFiles%GhostSecuritySuitegss.exe
      修改系统时间
      1937-07-07 12:00
      创建 Image File Execution Options 劫持安全相关程序,当被劫持程序运行,实际运行的是病毒主程序。
      包括:
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsIceSword.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsTwister.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSNATask.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSysWarn.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionssloemnit.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsFilMsg.exe]


      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsgss.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKAVStart.EXE][HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKWatch.EXE]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRvaMon.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsrva.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPMain.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPMon.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC1.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC2.exe]
      结束安全软件相关进程,以及VMware tools
      SysWarn.exe
      snatry.exe
      sloemnit.exe
      SNATask.exe
      VMwareUser.exe
      snaregmn.exe
      vmsrvc.exe
      vmusrvc.exe
      FilMsg.exe
      Twister.exe
      gss.exe
      KAVStart.EXE
      KWatch.EXE
    清除方法:
      1.结束进程
      %Windows%CMD32.exe
      
      2.删除病毒文件
      %Windows%CMD32.exe
      %System%voice.cpl
      %System%timedate.cpl
      X:autorun.inf
      3.修改回系统时间
      4.重启计算机
      下载SREng
      打开sreng-系统修复-windows shell/ie-全选-修复-
      
      5.删除病毒创建的注册表
      [HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun]
      "NOTEPAD"
      [HKCUSOFTWAREMicrosoftWindowsCurrentVersionexplorerAdvancedFolderHiddenSHOWALL]
      "CheckedValue"
      6.修改注册表,修复被禁用的“自动播放”
      [HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer]
      "NoDriveTypeAutoRun"=dword:00000091
      
      7.删除 Image File Execution Options 映像劫持项
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsIceSword.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsTwister.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSNATask.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsSysWarn.exe][HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionssloemnit.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsFilMsg.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsgss.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKAVStart.EXE]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsKWatch.EXE]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsRvaMon.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Optionsrva.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPMain.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPMon.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC1.exe]
      [HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution OptionsMPSVC2.exe]
      清除完成! www.upan.cc

    CMD32.exe U盘病毒详细介绍:https://www.upan.cc/security/prevent/2009/youpan_155.html

     

    将选中内容分享到新浪微博 将选中内容分享到腾讯微博
    (U)优盘之家,是一个集U盘量产工具U盘启动盘制作工具内存卡修复工具U盘检测工具于一体的专业指导性网站,请牢记我们的域名:www.upan.cc
    评论(请自觉遵守互联网相关政策法规,管理可以直接删除恶意评论、广告或违禁词语):
    表情:
     
    网友评论
    回顶部
    关于我们 | 免责声明 | 广告服务 | 联系我们 | 合作联系 | 网站地图 | 友情链接 | 关于淘宝直营店
    copyright © 2002-2005 upan.cc. all rights reserved .
    蜀ICP备09012900号