1.exe 进程信息
进程名称: 1.exe
详细名称: Trojan.W32.Tooso
具体描述: 1.EXE is a process which is registered as the TROJ_SUA.A worm. This virus is distributed via the Internet through e-mail and comes in the form of an e-mail message, in the hopes that you open it's hostile attachment. The worm has it's own SMTP engine which means it gathers E-mails from your local computer and re-distributes itself. In worst cases this worm can allow attackers to access your computer, stealing passwords and personal data.
能否关闭: 病毒进程,强烈建议关闭!
后台进程: 是
其他信息: 无
系统进程: 是
后台程序: 是
使用网络: 是
硬件相关: 否
常见错误: 未知
内存使用: 是(开机上网自动运行)
危险程度:低
病毒位置:win临时文件和系统文件夹(system_32)。
C:WINDOWSsystem32 C:Program FilesWindowsUpdate
之后册除1.exe-26.exe-a.exe程序 解决方法删除即可。
病毒1.exe 2.exe 3.exe 4.exe病毒解决办法
在安全模式下删除以下病毒文件.
1.exe 2.exe 3.exe 4.exe病毒,在C:Documents and Settings用户名Local SettingsTemp文件夹里
C:Program FilesMicrosoft 文件svhost32.exe
C:WINDOWScommand 文件rundll32.exe
c:windowsqq.exe
服务
windows 格式 hack*.com.cn.ini名字不清楚了
windows updata 格式 c:windowsqq.exe
两个服务用第三放软件删除
msconfig启动项svhost32 C:Program FilesMicrosoftsvhost32.exe
rundll32 C:WINDOWScommand
undll32.dll
可以的加载项HLMSOFTWAREmicrosoftwindows ntcurrentversionpoliciesexplorer
un
checkfaultkenel----c:windowssystem32mswdm.exe
然后用防火墙软件禁止c:windowsexplorer.exe防问网络.即可防止再次下载此木马.
以木马下载文件有:
C:Documents and SettingsadminstratorLocal SettingsTempdns.exe
C:Documents and SettingsadminstratorLocal SettingsTemp1.exe
C:Documents and SettingsadminstratorLocal SettingsTemp2.exe
C:Documents and SettingsadminstratorLocal SettingsTemp3.exe
C:Documents and SettingsadminstratorLocal SettingsTemp4.exe
C:Documents and SettingsadminstratorLocal SettingsTempjs.dll
C:Program FilesMicrosoftsvhost32.exe
C:Program Filescommandsvhost32.exe
C:windowscommand
undll32.exec:windowsqq.exe
C:Program Filessvhost32.exe
1.exe手动清除方法
主程序1.exe运行后释放%System%1.dLl,创建ShellExecuteHooks:
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks]
"{288BD9BD-F0DC-46B1-81B5-2B61DF8077CE}"=""
[HKEY_CLASSES_ROOTCLSID{288BD9BD-F0DC-46B1-81B5-2B61DF8077CE}InPrOcservEr32]
@="%System%1.dLl"
使用delxxzt.BaT删除自身:
:Try
dEl "1.exe"
if exist "1.exe" Goto try
Del %0
清除步骤
1. 删除病毒创建的ShellExecuteHooks:
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerShellExecuteHooks]
"{288BD9BD-F0DC-46B1-81B5-2B61DF8077CE}"=""
[HKEY_CLASSES_ROOTCLSID{288BD9BD-F0DC-46B1-81B5-2B61DF8077CE}InPrOcservEr32]
@="%System%1.dLl"
2. 重新启动计算机
3. 删除病毒文件:
%System%1.dll[1][2][3]