公司电脑最近感染病毒了

解决方法如下:

打补丁MS04-11通报的那种KB835732

新冲击波?Lsass.exe出错然后自动重启 

来源: 点击数:  编辑:admin

 

 

    最近很多朋友说电脑无故的重启,nt authoritysystem,还有c:windowssystem32lsass.exe-10737什么的这样一个窗口,大概有40S左右的时间,自动关机后重新启动,

 

检查发现启动栏里有个dumprep O-u的启动项(有的是dumprep O-k),禁掉后又会有,症状跟以前的冲击波差不多。

 

今天好像很多人都中招了,重装系统也没用 [mood53]

 

估计是利用LSASS漏洞攻击

冲击波病毒的特征是显示:

 

NT Authouity/system 初始的”“Remoto Procedure Call(RPC)服务意外终止,必须重新启动电脑

 

然后倒计时重启,和这个病毒显示的内容不同,所以应该是一种新的病毒~~~

 

 

我的建议是大家赶快安装防火墙,然后关闭除8021以外所有端口~~~~[mood73]

 

还有尽快安装这个补丁:

http://www.microsoft.com/china/technet/security/bulletin/ms04-011.mspx

 

目前有90%以上的Windows2000/XP/2003用户没有给这个系统漏洞打上补丁程序,此前在MS04-011号安全公报中公布的这个漏洞被微软定为最高级

 

另:微软官方公告:http://www.microsoft.com/china/t ... ent/pctdisable.mspx

补丁下载地址:http://www.microsoft.com/china/t ... letin/ms04-011.mspx

 

建议所有 Win2000XP2003 用户安装补丁,或者启用防火墙。

 

染毒计算机的主要症状为:

1)进程中出现 avserve.exe *****_up.exe,占用大量资源;

其中*****为从065535之间的随机数字

2)出现LSA Shell错误;

3)导致系统进程lsass.exe错误,并进而导致计算机强迫重启;

4)有网友反馈计算机的管理员权限帐户口令被修改(未证实)。

 

病毒原理:

病毒首先生成 C:WINNTsystem32*****_up.exe (这个文件名是随即的 _up.exe一定 其中*****为从065535之间的随机数字)并执行。

然后建立文件:C:WINNTavserve.exe,并在注册表中建立/HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run/avserve.exe项。

病毒在本机启动3000tcp 端口对外扫描tcp 445。(原来如此,把socket全占光了)待毒计算机的网络应用可能无法正常打开。

 

清除方法

首先按 ctrl+shift+esc 调出任务管理器 在进程中关闭 averve.exe

然后打好补丁 3 个补丁:KB837001KB828741KB835732

删除注册表的相应键值 run 输入 regedit)

删除相应位置的的文件 avserve.exe (c:windows c:winnt 下)

*****_up.exe 文件 c:windows c:winnt system32

通过安装防火墙或者手动关闭计算机的445端口

XP补丁直接下载:

http://download.microsoft.com/download/f/a/4/fa45d805-82aa-4731-8619-40319436a26d/WindowsXP-KB835732-x86-CHS.EXE

2K补丁直接下载:

http://download.microsoft.com/download/1/0/4/104ab4fe-660d-4d6d-b50a-ea4491dd7fb2/Windows2000-KB835732-x86-CHS.EXE

<script type=text/javascript charset=utf-8 src="http://static.bshare.cn/b/buttonLite.js#style=-1&uuid=&pophcol=3&lang=zh"></script> <script type=text/javascript charset=utf-8 src="http://static.bshare.cn/b/bshareC0.js"></script>
阅读(797) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~
评论热议
  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Windows-KB841290-x86-ENU.exe MD5值:58dc4df814685a165f58037499c89e76 --------------------------------------------------------- Version: 1.0 File Name: Windows-KB841290-x86-ENU.exe Date Published: 8/22/2012 File Size: 117 KB ---------------------------------------------------------- Microsoft (R) File Checksum Integrity Verifier V2.05 README file ================================================================ 1.What is File Checksum Integrity Verifier (FCIV)? 2.Features. 3.Syntax. 4.Database storage format. 5.Verification. 6.History. 1.What is fciv? --------------- Fciv is a command line utility that computes and verifies hashes of files. It computes a MD5 or SHA1 cryptographic hash of the content of the file. If the file is modified, the hash is different. With fciv, you can compute hashes of all your sensitive files. When you suspect that your system has been compromised, you can run a verification to determine which files have been modified. You can also schedule verifications regularily. 2.Features: ----------- - Hash algorithm: MD5 , SHA1 or both ( default MD5). - Display to screen or store hash and filename in a xml file. - Can recursively browse a directory ( ex fciv.exe c:\ -r ). - Exception list to specify files or directories that should not be computed. - Database listing. - hashes and signature verifications. - store filename with or without full path. 3.Syntax: --------- Usage: fciv.exe [Commands] Commands: ( Default -add ) -add : Compute hash and send to output (default screen). dir options: -r : recursive. -type : ex: -type *.exe. -exc file: list of directories that should not be computed. -wp : Without full path name. ( Default store full path) -bp : base path. The base path is removed from the path name of each entry -list : List entries in the database. -v : Verify hashes. : Option: -bp basepath. -? -h -help : Extended Help. Options: -md5 | -sha1 | -both : Specify hashtype, default md5. -xml db : Specify database format and name. To display the MD5 hash of a file, type fciv.exe filename Compute hashes: fciv.exe c:\mydir\myfile.dll fciv.exe c:\ -r -exc exceptions.txt -sha1 -xml dbsha.xml fciv.exe c:\mydir -type *.exe fciv.exe c:\mydir -wp -both -xml db.xml List hashes stored in database: fciv.exe -list -sha1 -xml db.xml Verifications: fciv.exe -v -sha1 -xml db.xml fciv.exe -v -bp c:\mydir -sha1 -xml db.xml 4.Database storage format: -------------------------- xml file. The hash is stored in base 64. <?xml version="1.0" encoding="utf-8"?> 5.Verification: --------------- You can build a hash database of your sensitive files and verify them regularily or when you suspect that your system has been compromised. It checks each entry stored in the db and verify that the checksum was not modified. 6. History: ----------- Fciv 1.2 : Added event log. Fciv 1.21: Fixed bad keyset error on some computers. Fciv 1.22: Added -type option. Support up to 10 masks. *.exe *.dll ... Fciv 2.0: xml as unique storage. Added -both option. Fciv 2.01: Exit with error code to allow detections of problem in a script. Fciv 2.02: Improved perfs. When both alg are specified, it's now done in one pass. Fciv 2.03: Added -wp and -bp options. Fciv now stores full path or relatives paths. Fciv 2.04: Removed several options to simplify it. Fciv 2.05: Added success message if the verification did not detect any errors.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值