我的电脑中了病毒名字叫W32.HLLW.Gaobot.BT

各位老大帮帮忙,我的电脑中了病毒名字叫

W32.HLLW.Gaobot.BT 我怎么也杀不掉,希望各位来帮帮忙,我先谢谢了。

[ 编辑者 wah 于日期 10Nov03 ]

qing ge wei bang bang mang!

qing ge wei bang bang mang!

直接删掉也不行?

去安全模式和DOS下杀一下


于 2003-11-09 21:58, panning 写:

直接删掉也不行?



找不到这个文件,只是诺顿能检测到,但诺顿删除不了。


于 2003-11-10 00:28, stchong 写:

去安全模式和DOS下杀一下

这个我不会用

隔離了那個毒吧


于 2003-11-10 09:31, waterair527 写:



于 2003-11-10 00:28, stchong 写:

去安全模式和DOS下杀一下

这个我不会用




开机自检后按f8进入菜单模式,选safe mode进入就行

When W32.HLLW.Gaobot.BI is executed, it performs the following actions:





Copies itself as %System%Winupdgm.exe.





--------------------------------------------------------------------------------

Note: %System% is a variable. The worm locates the System folder and copies itself to that location. By default, this is C:WindowsSystem (Windows 95/98/Me), C:WinntSystem32 (Windows NT/2000), or C:WindowsSystem32 (Windows XP).



--------------------------------------------------------------------------------





Adds the value:



“Microsoft Windows Updater”="%System%winupdgm.exe"



to the registry keys:



HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion

RunServices



so that the worm runs when you start Windows.





Connects to a predefined IRC channel, using its own IRC client, and listens for the commands from a hacker.





Allows a hacker to remotely control a compromised computer, allowing him/her to perform any of the following actions:



Manage the installation of the worm

Dynamically update the installed worm

Download and execute files

Steal system information

Send the worm to other IRC users

Add new accounts





Remotely schedules a task to run the worm on a newly infected computer.





Generates a randomly calculated IP address and performs Distributed Denial of Service (DDoS) attack against it.





Acts as a proxy server to direct attacks to another machine.





Sends data to TCP port 135, which exploits the DCOM RPC vulnerability, or sends data to TCP port 445 to exploit the RPC locator vulnerability.





Probes the following shares:



admin$

c$

d$

e$

print$



using the following user names and passwords, as well as any user names found using NetUserEnum():



User names:

Administrator

Administrateur

Coordinatore

Administrador

Verwalter

Ospite

admin

administrator

Default

Convidado

mgmt

Standard

User

Administrador

Owner

Test

Guest

Gast

Inviter

a

aaa

abc

x

xyz

Dell

home

pc

test

temp

win

asdf

qwer

login



Passwords:



admin

Admin

password

Password

1

12

123

1234

12345

123456

1234567

12345678

12456789

654321

54321

111

000000

00000000

11111111

88888888

pass

passwd

database

abcd

oracle

sybase

123qwe

server

computer

Internet

super

123asd

ihavenopass

godblessyou

enable

xp

2002

2003

2600

110

111111

121212

123123

1234qwer

123abc

007

alpha

patrick

pat

administrator

root

sex

god

foobar

a

aaa

abc

test

temp

win

pc

asdf

secret

qwer

yxcv

zxcv

home

xxx

owner

login

Login

pwd

pass

love

mypc

mypass

pw





Copies itself to any systems it compromised using the aforementioned exploits.





Steals the CD keys of the following games:



Soldier of Fortune II - Double Helix

Neverwinter

WestwoodNox

Tiberian Sun

Red Alert 2

Red Alert

Project IGI 2

Command & Conquer Generals

Battlefield 1942 Secret Weapons of WWII

Battlefield 1942 The Road to Rome

Battlefield 1942

Rainbow Six III RavenShield

Nascar Racing 2003

Nascar Racing 2002

NHL 2003

NHL 2002

FIFA 2003

FIFA 2002

Need For Speed Hot Pursuit 2

The Gladiators

Unreal Tournament 2003

Legends of Might and Magic

Counter-Strike

Half-Life





Ends the following processes that are associated with antivirus and firewall software:



ZONEALARM.EXE

WFINDV32.EXE

WEBSCANX.EXE

VSSTAT.EXE

VSHWIN32.EXE

VSECOMR.EXE

VSCAN40.EXE

VETTRAY.EXE

VET95.EXE

TDS2-NT.EXE

TDS2-98.EXE

TCA.EXE

TBSCAN.EXE

SWEEP95.EXE

SPHINX.EXE

SMC.EXE

SERV95.EXE

SCRSCAN.EXE

SCANPM.EXE

SCAN95.EXE

SCAN32.EXE

SAFEWEB.EXE

RESCUE.EXE

RAV7WIN.EXE

RAV7.EXE

PERSFW.EXE

PCFWALLICON.EXE

PCCWIN98.EXE

PAVW.EXE

PAVSCHED.EXE

PAVCL.EXE

PADMIN.EXE

OUTPOST.EXE

NVC95.EXE

NUPGRADE.EXE

NORMIST.EXE

NMAIN.EXE

NISUM.EXE

NAVWNT.EXE

NAVW32.EXE

NAVNT.EXE

NAVLU32.EXE

NAVAPW32.EXE

N32SCANW.EXE

MPFTRAY.EXE

MOOLIVE.EXE

LUALL.EXE

LOOKOUT.EXE

LOCKDOWN2000.EX

JEDI.EXE

IOMON98.EXE

IFACE.EXE

ICSUPPNT.EXE

ICSUPP95.EXE

ICMON.EXE

ICLOADNT.EXE

ICLOAD95.EXE

IBMAVSP.EXE

IBMASN.EXE

IAMSERV.EXE

IAMAPP.EXE

FRW.EXE

FPROT.EXE

FP-WIN.EXE

FINDVIRU.EXE

F-STOPW.EXE

F-PROT95.EXE

F-PROT.EXE

F-AGNT95.EXE

ESPWATCH.EXE

ESAFE.EXE

ECENGINE.EXE

DVP95_0.EXE

DVP95.EXE

CLEANER3.EXE

CLEANER.EXE

CLAW95CF.EXE

CLAW95.EXE

CFINET32.EXE

CFINET.EXE

CFIAUDIT.EXE

CFIADMIN.EXE

BLACKICE.EXE

BLACKD.EXE

AVWUPD32.EXE

AVWIN95.EXE

AVSCHED32.EXE

AVPUPD.EXE

AVPTC32.EXE

AVPM.EXE

AVPDOS32.EXE

AVPCC.EXE

AVP32.EXE

AVP.EXE

AVNT.EXE

AVKSERV.EXE

AVGCTRL.EXE

AVE32.EXE

AVCONSOL.EXE

AUTODOWN.EXE

APVXDWIN.EXE

ANTI-TROJAN.EXE

ACKWIN32.EXE

_AVPM.EXE

_AVPCC.EXE

_AVP32.EXE





Attempts to kill some of the following processes associated with other worms:



dllhost.exe

msblast.exe

mspatch.exe

penis32.exe

scvhosl.exe

tftpd.exe

winhlpp32.exe

winppr32.exe





Listens on randomly calculated ports, ranging from 1000 to 3000 and one from above 10000, and waits for other computers to download the worm.













Symantec Security Response encourages all users and administrators to adhere to the following basic security “best practices”:



Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.

If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.

Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.

Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.

Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.





The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.





Disable System Restore (Windows Me/XP).

Update the virus definitions.

Do one of the following:

Windows 95/98/Me: Restart the computer in Safe mode.

Windows NT/2000/XP: End the Worm process.

Run a full system scan and delete all the files detected as W32.HLLW.Gaobot.BI.

Reverse the changes that the Trojan made to the registry.



For details on each of these steps, read the following instructions.



1. Disabling System Restore (Windows Me/XP)

If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.



Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.



Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.



For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:

“How to disable or enable Windows Me System Restore”

“How to turn off or turn on Windows XP System Restore”



--------------------------------------------------------------------------------

Note: When you are completely finished with the removal procedure, and you are satisfied that the threat has been removed, you should re-enable System Restore by following the instructions in the aforementioned documents.

--------------------------------------------------------------------------------



For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, “Antivirus Tools Cannot Clean Infected Files in the _Restore Folder,” Article ID: Q263455.



2. Updating the virus definitions

Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:



Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).

Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).



The Intelligent Updater virus definitions are available: Read “How to update virus definition files using the Intelligent Updater” for detailed instructions.



3. Restarting the computer in Safe mode or ending the Trojan process

Windows 95/98/Me

Restart the computer in Safe mode. All the Windows 32-bit operating systems, except for Windows NT, can be restarted in Safe mode. For instructions, read the document, “How to start the computer in Safe Mode.”



Windows NT/2000/XP

To end the Trojan process:

Press Ctrl+Alt+Delete once.

Click Task Manager.

Click the Processes tab.

Double-click the Image Name column header to alphabetically sort the processes.

Scroll through the list and look for Winupdgm.exe.

If you find the file, click it, and then click End Process.

Exit the Task Manager.



4. Scanning for and deleting the infected files

Start your Symantec antivirus program and make sure that it is configured to scan all the files.

For Norton AntiVirus consumer products: Read the document, “How to configure Norton AntiVirus to scan all files.”

For Symantec AntiVirus Enterprise products: Read the document, “How to verify that a Symantec Corporate antivirus product is set to scan all files.”

Run a full system scan.

If any files are detected as infected with W32.HLLW.Gaobot.BI, click Delete.



5. Reversing the changes made to the registry





--------------------------------------------------------------------------------

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, “How to make a backup of the Windows registry,” for instructions.

--------------------------------------------------------------------------------



Click Start, and then click Run. (The Run dialog box appears.)

Type regedit



Then click OK. (The Registry Editor opens.)





Navigate to the key:



HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun





In the right pane, delete the value:



“Microsoft Windows Updater”="%System%winupdgm.exe"





Navigate to the key:



HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion

RunServices





In the right pane, delete the value:



“Microsoft Windows Updater”="%System%winupdgm.exe"





Exit the Registry Editor.

The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.





Disable System Restore (Windows Me/XP).

Update the virus definitions.

Do one of the following:

Windows 95/98/Me: Restart the computer in Safe mode.

Windows NT/2000/XP: End the Worm process.

Run a full system scan and delete all the files detected as W32.HLLW.Gaobot.BI.

Reverse the changes that the Trojan made to the registry.



For details on each of these steps, read the following instructions.



1. Disabling System Restore (Windows Me/XP)

If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System Restore may back up the virus, worm, or Trojan on the computer.



Windows prevents outside programs, including antivirus programs, from modifying System Restore. Therefore, antivirus programs or tools cannot remove threats in the System Restore folder. As a result, System Restore has the potential of restoring an infected file on your computer, even after you have cleaned the infected files from all the other locations.



Also, a virus scan may detect a threat in the System Restore folder even though you have removed the threat.



For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles:

“How to disable or enable Windows Me System Restore”

“How to turn off or turn on Windows XP System Restore”



--------------------------------------------------------------------------------

Note: When you are completely finished with the removal procedure, and you are satisfied that the threat has been removed, you should re-enable System Restore by following the instructions in the aforementioned documents.

--------------------------------------------------------------------------------



For additional information, and an alternative to disabling Windows Me System Restore, see the Microsoft Knowledge Base article, “Antivirus Tools Cannot Clean Infected Files in the _Restore Folder,” Article ID: Q263455.



2. Updating the virus definitions

Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:



Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).

Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).



The Intelligent Updater virus definitions are available: Read “How to update virus definition files using the Intelligent Updater” for detailed instructions.



3. Restarting the computer in Safe mode or ending the Trojan process

Windows 95/98/Me

Restart the computer in Safe mode. All the Windows 32-bit operating systems, except for Windows NT, can be restarted in Safe mode. For instructions, read the document, “How to start the computer in Safe Mode.”



Windows NT/2000/XP

To end the Trojan process:

Press Ctrl+Alt+Delete once.

Click Task Manager.

Click the Processes tab.

Double-click the Image Name column header to alphabetically sort the processes.

Scroll through the list and look for Winupdgm.exe.

If you find the file, click it, and then click End Process.

Exit the Task Manager.



4. Scanning for and deleting the infected files

Start your Symantec antivirus program and make sure that it is configured to scan all the files.

For Norton AntiVirus consumer products: Read the document, “How to configure Norton AntiVirus to scan all files.”

For Symantec AntiVirus Enterprise products: Read the document, “How to verify that a Symantec Corporate antivirus product is set to scan all files.”

Run a full system scan.

If any files are detected as infected with W32.HLLW.Gaobot.BI, click Delete.



5. Reversing the changes made to the registry





--------------------------------------------------------------------------------

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, “How to make a backup of the Windows registry,” for instructions.

--------------------------------------------------------------------------------



Click Start, and then click Run. (The Run dialog box appears.)

Type regedit



Then click OK. (The Registry Editor opens.)





Navigate to the key:



HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun





In the right pane, delete the value:



“Microsoft Windows Updater”="%System%winupdgm.exe"





Navigate to the key:



HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion

RunServices





In the right pane, delete the value:



“Microsoft Windows Updater”="%System%winupdgm.exe"





Exit the Registry Editor

上面这部分是解决方案!

你自己看看吧

晕,你这种事情直接给我打个电话不就完了

你看看这边的noobs拉~~

帮倒忙的一堆~~

大哥 留个MSN 把!

我没有机会 聊聊 !

挺长的吗