论坛: 病毒专区 标题: 中毒杀不死... 复制本贴地址    
作者: zch001 [zch001]    论坛用户   登录
http://www.20cn.net/cgi-bin/club/showpic.pl?u=zch001&f=123.jpg
中毒了..杀不死.
开IE关IE都会提示那个病毒!!!烦烦.....

[此贴被 三色阳光(zch001) 在 07月20日10时38分 编辑过]

地主 发表时间: 05-07-20 08:40

回复: QQQQQQQQ [syj]   论坛用户   登录
哦~
我想被感染的也许是系统文件吧?

B1层 发表时间: 05-07-20 18:40

回复: zch001 [zch001]   论坛用户   登录
是系统文件...不过我没有办法删.请求各位高手提示...

B2层 发表时间: 05-07-21 08:40

回复: lijingxi [lijingxi]   见习版主   登录
关闭相关进程 然后删除文件 或者清除病毒!~

或者到安全模式下删除病毒!~ 在不行就DOS 看看 呵呵~~

B3层 发表时间: 05-07-21 17:23

回复: zch001 [zch001]   论坛用户   登录
哈哈....
在安全模式下不能启动杀毒软件,在DOS下没有杀到病毒!!!
郁闷......

[此贴被 三色阳光(zch001) 在 07月22日09时13分 编辑过]

B4层 发表时间: 05-07-21 17:47

回复: lihuatan [lihuatan]   论坛用户   登录
安全模式是手动删除呀。你要翻一翻文件,看看有没有什么异常的文件,或没见过的。进msconfig看看有什么异常的启动文件。一般病毒都可以看得出来。

B5层 发表时间: 05-07-31 19:25

回复: AK47 [ht1023]   论坛用户   登录
没这么简单吧,其实不是我做广告,用用杀毒软件.例如木马克星等

B6层 发表时间: 05-07-31 20:50

回复: zch001 [zch001]   论坛用户   登录
那个病毒是怎么回事呀,我到现在还没有解决,现在打开或关掉IE都不会来那个毒,可是打开资源管理器.它就来劲了....我晕..知道这是谁生产的话,我一定拿刀去砍他...火

B7层 发表时间: 05-08-01 13:34

回复: xuruijun [xuruijun]   论坛用户   登录
建议进注册表里删除。。。。如果了解注册表的话,呵呵,

B8层 发表时间: 05-08-04 14:14

回复: zch001 [zch001]   论坛用户   登录
删完后,一会儿又自己回来了

B9层 发表时间: 05-08-05 17:48

回复: lez91 [lez91]   论坛用户   登录
可以在Dos下杀毒,用注册表对比软件对比中毒以前和中毒以后的注册表来判断那些键值被修改了。

B10层 发表时间: 05-08-07 22:38

回复: zch001 [zch001]   论坛用户   登录
HijackThis_zww汉化版扫描日志 V1.99.1
保存于      下午 2:52:15, 日期 2005-08-10
操作系统:  Windows 2000 SP4 (WinNT 5.00.2195)
浏览器:    Internet Explorer v6.00 SP1 (6.00.2800.1106)

当前运行的进程:         
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\System32\Ati2evxx.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\System32\DRIVERS\dcfssvc.exe
C:\Program Files\Common Files\EPSON\eEBAPI\SAgent2.exe
C:\WINNT\System32\svchost.exe
C:\WINNT\system32\regsvc.exe
C:\WINNT\system32\MSTask.exe
C:\WINNT\system32\CAP3RSK.EXE
C:\WINNT\System32\WBEM\WinMgmt.exe
C:\WINNT\SYSTEM32\SPOOL\DRIVERS\W32X86\3\CAP3SWK.EXE
C:\WINNT\system32\svchost.exe
C:\WINNT\system32\Ati2evxx.exe
C:\WINNT\Explorer.EXE
C:\WINNT\system32\BCUP.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINNT\SOUNDMAN.EXE
C:\Program Files\wsearch\Search.exe
C:\WINNT\system32\internat.exe
C:\DATA\killpro.exe
C:\Program Files\Tencent\QQ.exe
C:\Program Files\Tencent\TIMPlatform.exe
C:\Program Files\Tencent\QQ.exe
C:\Program Files\Tencent\QQ.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Maxthon\Maxthon.exe
C:\Program Files\HijackThis1991汉化版\HijackThis1991zww.exe

R3 - URLSearchHook: 虎翼DIY吧! - {0A00D11E-B1E7-44b5-AD88-C9190876AAC4} - (no file)
O1 - Hosts: 62.75.224.159 www.bns1.net
O1 - Hosts: 62.75.224.159 www.bns2.net
O1 - Hosts: 62.75.224.159 www.bns3.net
O1 - Hosts: 62.75.224.159 www.bns4.net
O1 - Hosts: 62.75.224.159 www.bns5.net
O1 - Hosts: 62.75.224.159 www.bns6.net
O1 - Hosts: 62.75.224.159 www.bns7.net
O1 - Hosts: 62.75.224.159 www.bns8.net
O1 - Hosts: 62.75.224.159 www.cms1.net
O1 - Hosts: 62.75.224.159 www.cms2.net
O1 - Hosts: 62.75.224.159 www.cms3.net
O1 - Hosts: 62.75.224.159 www.cms4.net
O1 - Hosts: 62.75.224.159 www.cms5.net
O1 - Hosts: 62.75.224.159 www.cms6.net
O1 - Hosts: 62.75.224.159 www.cms7.net
O1 - Hosts: 62.75.224.159 www.cms8.net
O1 - Hosts: 62.75.224.159 www.rg1.com
O1 - Hosts: 62.75.224.159 www.rg2.com
O1 - Hosts: 62.75.224.159 www.rg3.com
O1 - Hosts: 62.75.224.159 www.rg4.com
O1 - Hosts: 62.75.224.159 www.rg5.com
O1 - Hosts: 62.75.224.159 www.rg6.com
O1 - Hosts: 62.75.224.159 www.rg7.com
O1 - Hosts: 62.75.224.159 www.rg8.com
O1 - Hosts: 62.75.224.159 www.cjt1.net
O1 - Hosts: 62.75.224.159 www.rgs1.net
O1 - Hosts: 62.75.224.159 www.rgs2.net
O1 - Hosts: 62.75.224.159 www.bns1.net
O1 - Hosts: 62.75.224.159 www.bns2.net
O1 - Hosts: 62.75.224.159 www.cms1.net
O1 - Hosts: 62.75.224.159 www.cms2.net
O1 - Hosts: 62.75.224.159 bns1.net
O1 - Hosts: 62.75.224.159 bns2.net
O1 - Hosts: 62.75.224.159 bns3.net
O1 - Hosts: 62.75.224.159 bns4.net
O1 - Hosts: 62.75.224.159 bns5.net
O1 - Hosts: 62.75.224.159 bns6.net
O1 - Hosts: 62.75.224.159 bns7.net
O1 - Hosts: 62.75.224.159 bns8.net
O1 - Hosts: 62.75.224.159 cms1.net
O1 - Hosts: 62.75.224.159 cms2.net
O1 - Hosts: 62.75.224.159 cms3.net
O1 - Hosts: 62.75.224.159 cms4.net
O1 - Hosts: 62.75.224.159 cms5.net
O1 - Hosts: 62.75.224.159 cms6.net
O1 - Hosts: 62.75.224.159 cms7.net
O1 - Hosts: 62.75.224.159 cms8.net
O1 - Hosts: 62.75.224.159 rg1.com
O1 - Hosts: 62.75.224.159 rg2.com
O1 - Hosts: 62.75.224.159 rg3.com
O1 - Hosts: 62.75.224.159 rg4.com
O1 - Hosts: 62.75.224.159 rg5.com
O1 - Hosts: 62.75.224.159 rg6.com
O1 - Hosts: 62.75.224.159 rg7.com
O1 - Hosts: 62.75.224.159 rg8.com
O1 - Hosts: 62.75.224.159 cjt1.net
O1 - Hosts: 62.75.224.159 rgs1.net
O1 - Hosts: 62.75.224.159 rgs2.net
O1 - Hosts: 62.75.224.159 bns1.net
O1 - Hosts: 62.75.224.159 bns2.net
O1 - Hosts: 62.75.224.159 cms1.net
O1 - Hosts: 62.75.224.159 cms2.net
O1 - Hosts: 62.75.224.159 j800banners.cjt1.net
O1 - Hosts: 62.75.224.159 jadlogix.cjt1.net
O1 - Hosts: 62.75.224.159 jadtegrity.cjt1.net
O1 - Hosts: 62.75.224.159 jaimmedia.cjt1.net
O1 - Hosts: 62.75.224.159 javatar.cjt1.net
O1 - Hosts: 62.75.224.159 jbeet.cjt1.net
O1 - Hosts: 62.75.224.159 jbigpops.cjt1.net
O1 - Hosts: 62.75.224.159 jbouncetek.cjt1.net
O1 - Hosts: 62.75.224.159 jbravenet.cjt1.net
O1 - Hosts: 62.75.224.159 jcdcover.cjt1.net
O1 - Hosts: 62.75.224.159 jclickspring.cjt1.net
O1 - Hosts: 62.75.224.159 jcollegehumor.cjt1.net
O1 - Hosts: 62.75.224.159 jdownloadacc.cjt1.net
O1 - Hosts: 62.75.224.159 jedonkey.cjt1.net
O1 - Hosts: 62.75.224.159 jeuniverse.cjt1.net
O1 - Hosts: 62.75.224.159 jhot.cjt1.net
O1 - Hosts: 62.75.224.159 jicmedia.cjt1.net
O1 - Hosts: 62.75.224.159 jicq.cjt1.net
O1 - Hosts: 62.75.224.159 jieplugin.cjt1.net
O1 - Hosts: 62.75.224.159 jinternetoptimizer.cjt1.net
O1 - Hosts: 62.75.224.159 jmediabuy1.cjt1.net
O1 - Hosts: 62.75.224.159 jmediabuyad.cjt1.net
O1 - Hosts: 62.75.224.159 jmindset.cjt1.net
O1 - Hosts: 62.75.224.159 jmindsettest.cjt1.net
O1 - Hosts: 62.75.224.159 jnictech.cjt1.net
O1 - Hosts: 62.75.224.159 jnova.cjt1.net
O1 - Hosts: 62.75.224.159 jpiolet.cjt1.net
O1 - Hosts: 62.75.224.159 jsanboxer.cjt1.net
O1 - Hosts: 62.75.224.159 jsercee.cjt1.net
O1 - Hosts: 62.75.224.159 jthedelfin.cjt1.net
O1 - Hosts: 62.75.224.159 jwarezp2p.cjt1.net
O1 - Hosts: 62.75.224.159 jwildmedia.cjt1.net
O1 - Hosts: 62.75.224.159 mediabuy-nic.cjt1.net
O1 - Hosts: 62.75.224.159 www.m7z.net
O1 - Hosts: 62.75.224.159 m7z.net
O1 - Hosts: 62.75.224.159 jcms.cydoor.com
O1 - Hosts: 62.75.224.159 cydoor.com
O1 - Hosts: 62.75.224.159 www.cydoor.com
O1 - Hosts: 62.75.224.159 jnova.cjt1.net
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: Shareaza Web Download Hook - {0EEDB912-C5FA-486F-8334-57288578C627} - (no file)
O2 - BHO: Link Filter - {4022F902-ABC7-4C79-924F-BB26F1D355A2} - (no file)
O2 - BHO: QQIEHelper - {54EBD53A-9BC1-480B-966A-843A333CA162} - C:\Program Files\Tencent\QQIEHelper.dll
O2 - BHO: ltmenu Class - {78C21EFD-53BA-406C-AF1A-33A38ABD3958} - C:\Program Files\LtUcx\1002\c0.dll
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
O3 - IE工具栏增项: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\fgiebar.dll
O3 - IE工具栏增项: (no name) - {F60C7D81-8471-4D40-AAFE-56D318F34C2D} - (no file)
O3 - IE工具栏增项: 电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINNT\System32\msdxm.ocx
O3 - IE工具栏增项: 虎翼DIY吧! - {0A00D11E-B1E7-44b5-AD88-C9190876AAC4} - (no file)
O3 - IE工具栏增项: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - (no file)
O3 - IE工具栏增项: 博采 - {4DA2EE61-6399-4C39-AEB9-0D990E610D29} - C:\WINNT\system32\BoCaiToolbar.dll
O4 - 启动项HKLM\\Run: [Synchronization Manager] mobsync.exe /logon
O4 - 启动项HKLM\\Run: [ExFilter] Rundll32.exe "C:\PROGRA~1\CNNIC\Cdn\cdnspie.dll,ExecFilter solo"
O4 - 启动项HKLM\\Run: [BCUpdate] C:\WINNT\system32\BCUP.exe
O4 - 启动项HKLM\\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - 启动项HKLM\\Run: [SoundMan] SOUNDMAN.EXE
O4 - 启动项HKLM\\Run: [KAVPersonal50] C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\kav.exe /minimize
O4 - 启动项HKLM\\Run: [NeroFilterCheck] C:\WINNT\system32\NeroCheck.exe
O4 - 启动项HKLM\\Run: [MoveSearch] C:\Program Files\wsearch\Search.exe
O4 - 启动项HKLM\\RunOnce: [3721C:\PROGRA~1\3721\Assist\asbar.dll892812] regsvr32 /s C:\PROGRA~1\3721\Assist\asbar.dll
O4 - 启动项HKLM\\RunOnce: [3721C:\PROGRA~1\3721\autolive.dll901890] regsvr32 /s C:\PROGRA~1\3721\autolive.dll
O4 - 启动项HKLM\\RunOnce: [3721C:\PROGRA~1\3721\autolive.dll1005562] regsvr32 /s C:\PROGRA~1\3721\autolive.dll
O4 - 启动项HKLM\\RunOnce: [3721C:\PROGRA~1\3721\autolive.dll1125328] regsvr32 /s C:\PROGRA~1\3721\autolive.dll
O4 - HKCU\..\Run: [Internat.exe] internat.exe
O4 - Startup: 快捷方式 killpro.lnk = C:\DATA\killpro.exe
O8 - IE右键菜单中的新增项目: Download with &Shareaza - res://C:\Program Files\超级BT下载软件\Plugins\RazaWebHook.dll/3000
O8 - IE右键菜单中的新增项目: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - IE右键菜单中的新增项目: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - IE右键菜单中的新增项目: 收藏此页到ViVi - http://vivi.sina.com.cn/collect/click.php?agent=ddt
O8 - IE右键菜单中的新增项目: 新浪搜索 - http://cha.sina.com.cn/ddt.html
O8 - IE右键菜单中的新增项目: 添加到QQ自定义面板 - C:\Program Files\Tencent\AddPanel.htm
O8 - IE右键菜单中的新增项目: 添加到QQ表情 - C:\Program Files\Tencent\AddEmotion.htm
O8 - IE右键菜单中的新增项目: 用QQ彩信发送该图片 - C:\Program Files\Tencent\SendMMS.htm
O8 - IE右键菜单中的新增项目: 豪杰超级解霸V8实时播放 - C:\Herosoft\HeroV8\MPURLGET.HTM
O9 - 浏览器额外的按钮: 浩方对战平台 - {0A155D3C-68E2-4215-A47A-E800A446447A} - C:\WINNT\system32\shdocvw.dll
O9 - 浏览器额外的按钮: 豪杰超级解霸V8 - {367E0A21-8601-4986-9C9A-153BF5ACA118} - C:\Herosoft\HeroV8\STHSDVD.EXE
O9 - 浏览器额外的“工具”菜单项: 豪杰超级解霸V8 - {367E0A21-8601-4986-9C9A-153BF5ACA118} - C:\Herosoft\HeroV8\STHSDVD.EXE
O9 - 浏览器额外的按钮: (no name) - {3F686D91-4AFA-4ed1-B43F-F1DB46ED480C} - C:\WINNT\system32\shdocvw.dll
O9 - 浏览器额外的“工具”菜单项: Link Filter - {3F686D91-4AFA-4ed1-B43F-F1DB46ED480C} - C:\WINNT\system32\shdocvw.dll
O9 - 浏览器额外的按钮: 视频聊天 - {6924091F-CD97-41E1-B1D4-D9079409D413} - http://www.liantang.net (file missing)
O9 - 浏览器额外的“工具”菜单项: 视频聊天 - {6924091F-CD97-41E1-B1D4-D9079409D413} - http://www.liantang.net (file missing)
O9 - 浏览器额外的按钮: (no name) - {6924091F-CD97-41E1-B1D4-D9079409D423} - http://www.xunlun.com (file missing)
O9 - 浏览器额外的按钮: 卓越 - {8DE0FCD4-5EB5-11D3-AD25-00002100131B} - C:\PROGRA~1\Kingsoft\POWERW~1\IEPlugin.dll
O9 - 浏览器额外的按钮: 金山词霸 - {C8CE29C5-7589-11D3-B81B-0080C8DC5DC8} - C:\PROGRA~1\Kingsoft\POWERW~1\IEPlugin.dll
O9 - 浏览器额外的按钮: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - 浏览器额外的“工具”菜单项: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINNT\web\related.htm
O9 - 浏览器额外的按钮: QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - C:\Program Files\Tencent\QQ.EXE
O9 - 浏览器额外的“工具”菜单项: 腾讯QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - C:\Program Files\Tencent\QQ.EXE
O9 - 浏览器额外的按钮: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - 浏览器额外的“工具”菜单项: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - C:\PROGRA~1\FLASHGET\flashget.exe
O9 - 浏览器额外的按钮: (no name) - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - C:\Program Files\Tencent\QQIEHelper.dll
O9 - 浏览器额外的“工具”菜单项: QQ炫彩工具条设置 - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - C:\Program Files\Tencent\QQIEHelper.dll
O16 - DPF: {28E0FA88-ABA8-4937-A247-3031F1A11165} (Installer Class) -
O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/2744ada81aa5e04c5e04/netzip/RdxIE601_cn.cab
O16 - DPF: {6924091F-CD97-41E1-B1D4-D9079409D413} (IMCv1 Control) - http://202.96.95.44:1995/talk.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{EFAA9559-4B61-4A32-9669-09B31E393B6B}: NameServer = 107.103.101.249
O18 - 列举现有的协议: koboo - {7DEE9D05-FA0A-4416-A6F3-6537D0EAB6A6} - C:\WINNT\system32\mbprot.dll
O20 - Winlogon Notify: nwprovau - C:\WINNT\SYSTEM32\nwprovau.dll
O23 - NT 服务: Ati HotKey Poller - ATI Technologies Inc. - C:\WINNT\System32\Ati2evxx.exe
O23 - NT 服务: dcfssvc (Dcfssvc) - Eastman Kodak Company - C:\WINNT\System32\DRIVERS\dcfssvc.exe
O23 - NT 服务: Logical Disk Manager Administrative Service (dmadmin) - VERITAS Software Corp. - C:\WINNT\System32\dmadmin.exe
O23 - NT 服务: EPSON Printer Status Agent2 (EPSONStatusAgent2) - SEIKO EPSON CORPORATION - C:\Program Files\Common Files\EPSON\eEBAPI\SAgent2.exe
O23 - NT 服务: kavsvc - Kaspersky Labs - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal\kavsvc.exe



B11层 发表时间: 05-08-10 15:02

回复: zch001 [zch001]   论坛用户   登录
这么久了,都没有人来解决...哎,20CN我有点失望.....
具体的解决方法如下:(本人到别的网论得到的回复,非本人的个人见解)

O2 - BHO: Shareaza Web Download Hook - {0EEDB912-C5FA-486F-8334-57288578C627} - (no file)
修复,刚才网友winding 也提到,,

O2 - BHO: ltmenu Class - {78C21EFD-53BA-406C-AF1A-33A38ABD3958} - C:\Program Files\LtUcx\1002\c0.dll
间谍软件,想办法删除文件夹LtUcx,注册表中搜索c0.dll
,找到多少删除多少。

O3 - IE工具栏增项: 博采 - {4DA2EE61-6399-4C39-AEB9-0D990E610D29} - C:\WINNT\system32\BoCaiToolbar.dll
修复,反注册这dll,开始/运行输入regsvr32 -u C:\WINNT\system32\BoCaiToolbar.dll
,用汉化版killbox也可以达到目的,,网上一般介绍bcup.exe和bocaitoolbar.dll在一块,一起删除。
O3 - IE工具栏增项: 虎翼DIY吧! - {0A00D11E-B1E7-44b5-AD88-C9190876AAC4} - (no file)
修复,刚才网友winding 也提到,,

O4 - 启动项HKLM\\Run: [BCUpdate] C:\WINNT\system32\BCUP.exe
上面已经回复

O4 - 启动项HKLM\\Run: [MoveSearch] C:\Program Files\wsearch\Search.exe
网络猪,间谍软件,请网上搜索解决方法。

O20 - Winlogon Notify: nwprovau - C:\WINNT\SYSTEM32\nwprovau.dll
刚才网友winding 也提到,,

修复所有01,刚才网友winding 也提到,,
卸载3721,google bar
位置:
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar2.dll
耗油,
 





B12层 发表时间: 05-08-13 08:35

回复: zch001 [zch001]   论坛用户   登录
针对(bcsysnote)木马病毒:启动到安全模式,修改注册表后在用瑞星在安全模式里杀毒

针对(bcup.exe)木马病毒:
1.打开任务管理器进程管理,杀掉运行中的bcup.exe进程;
2.开始 -> 运行 -> 输入regsvr32 -u %Systemroot%\system32\BoCaiToolBar.dll,卸载bocaitoolbar.dll;
3.进入%systemroot%\system32目录,
找到并删除bcup.exe和bocaitoolbar.dll文件;
4.使用regedit打开注册表文件,
找到以下键值/项:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BCUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\BlogChina(此项为文件夹)

删除以上两项后重启计算机
  或者:
1.打开任务管理器进程管理,杀掉运行中的bcup.exe进程;
2.打开我的电脑->c盘->WINDOWS->system32->找到文件bcup.exe和 bocaitoobar.dll
把他们删除,再进行上述的第四个步骤!!!!!


B13层 发表时间: 05-08-13 11:40

论坛: 病毒专区

20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon

粤ICP备05087286号