Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

How to remove Sirefef trojan


  • This topic is locked This topic is locked
33 replies to this topic

#1 strikerchen

strikerchen

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 10 June 2012 - 05:32 AM

Hey guys,

when I opened my laptop this moring, found out that the MSE was unable, and I m not able to enable it, and I heard random ads audios playing on the background. And then I re-install my MSE and that seems solve the ads problem, but however, im not able to open my firewall and MSE keep ditecting Trojan:Win64/Sirefef.W and Trojan:Wi 32/Sirefef. Even after I deleted those infected files, the MSE still keep dectecting them .

and when i do the GMER scan , i only able to scan few things like Services, registry and Files, which means im not able to scan things like system secions devices modules proesses threads and libraries.

Here is the DDS log

.
DDS (Ver_2011-08-26.01) - NTFSAMD64
Internet Explorer: 9.0.8112.16421
Run by peterchen at 17:15:35 on 2012-06-10
Microsoft Windows 7 Ultimate 6.1.7601.1.936.86.1033.18.1783.425 [GMT 8:00]
.
AV: 360杀毒 *Disabled/Updated* {A0FD413B-F662-C08C-7B21-F57CED225A55}
SP: Windows Defender *Enabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\WLANExt.exe
C:\Windows\system32\conhost.exe
C:\Program Files (x86)\alipay\alieditplus\AlipaySecSvc.exe
C:\Program Files (x86)\Common Files\alipay\AliveService\AliveService.exe
C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files (x86)\Launch Manager\dsiwmis.exe
C:\Program Files\eMachines\eMachines Power Management\ePowerSvc.exe
C:\Program Files (x86)\eMachines\Registration\GREGsvc.exe
C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\eMachines\eMachines Power Management\ePowerTray.exe
C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
C:\Windows\System32\hkcmd.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files (x86)\PPStream\PPSAP.exe
C:\Windows\system32\igfxext.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files (x86)\Launch Manager\LManager.exe
C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
E:\QvodPlayer\QvodTerminal.exe
C:\Program Files\eMachines\eMachines Power Management\ePowerEvent.exe
C:\Program Files (x86)\Launch Manager\MMDx64Fx.exe
C:\Program Files (x86)\Launch Manager\LMworker.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe
C:\Windows\system32\wuauclt.exe
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\Program Files\Microsoft Security Client\msseces.exe
E:\Program Files (x86)\Tencent\QQ\Bin\QQ.exe
E:\Program Files (x86)\Tencent\QQ\Bin\TXPlatform.exe
E:\Program Files (x86)\Tencent\QQ\Bin\QQExternal.exe
C:\Windows\SysWOW64\ping.exe
C:\Windows\system32\conhost.exe
E:\Users\peterchen\AppData\Roaming\360se\bin\360SE.exe
E:\Users\peterchen\AppData\Roaming\360se\bin\SafeCentral\urlproc.exe
C:\Users\peterchen\AppData\Roaming\360Notify\Bin\360seNotify.exe
E:\Program Files (x86)\KuGou7\KuGou.exe
E:\Users\peterchen\AppData\Roaming\360se\bin\360SE.exe
E:\Program Files (x86)\KuGou7\KgDaemon.exe
C:\Windows\SysWOW64\ping.exe
C:\Windows\system32\conhost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Program Files (x86)\alipay\SafeTransaction\AlipaySafeTran.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
c:\Program Files\Microsoft Security Client\MpCmdRun.exe
E:\Program Files (x86)\Tencent\QQPinyin\4.5.1206.400\QQPYCloud.exe
C:\Windows\system32\taskhost.exe
C:\Windows\SysWOW64\ping.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\conhost.exe
C:\Windows\SysWOW64\cscript.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com.au/
uDefault_Page_URL = hxxp://homepage.emachines.com/rdr.aspx?b=ACEW&l=0c09&m=eme732&r=27361210g216l04e3z1l5r4711t398
uWindow Title = Windows Internet Explorer
mDefault_Page_URL = hxxp://homepage.emachines.com/rdr.aspx?b=ACEW&l=0c09&m=eme732&r=27361210g216l04e3z1l5r4711t398
mStart Page = about:blank
uInternet Settings,ProxyOverride = local
mURLSearchHooks: H - No File
mWinlogon: Userinit=userinit.exe,
BHO: 迅雷FLV视频嗅探及下载支持: {0ea37b17-6b8b-4085-8257-f3a4aa69c27a} - e:\Program Files (x86)\Thunder Network\Thunder\BHO\XlBrowserAddin1.0.6.69.dll
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll
BHO: 迅雷下载支持: {889d2feb-5411-4565-8998-1dd2c5261283} - e:\Program Files (x86)\Thunder Network\Thunder\BHO\XunleiBHO7.2.5.3364.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
TB: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
uRun: [PPS Accelerator] C:\PROGRA~2\PPStream\ppsap.exe
mRun: [LManager] C:\Program Files (x86)\Launch Manager\LManager.exe
mRun: [IAStorIcon] C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
mRun: [QvodTerminal] "E:\QvodPlayer\QvodTerminal.exe" -autorun
mPolicies-explorer: NoActiveDesktop = 1 (0x1)
mPolicies-explorer: HideSCAHealth = 1 (0x1)
mPolicies-explorer: EnableShellExecuteHooks = 1 (0x1)
mPolicies-explorer: OldEnableShellExecuteHooks = 1 (0x1)
mPolicies-system: ConsentPromptBehaviorAdmin = 0 (0x0)
mPolicies-system: ConsentPromptBehaviorUser = 3 (0x3)
mPolicies-system: EnableLUA = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
mPolicies-system: PromptOnSecureDesktop = 0 (0x0)
mPolicies-system: EnableUIPI = 1 (0x1)
IE: &使用&迅雷下载 - e:\Program Files (x86)\Thunder Network\Thunder\BHO\geturl.htm
IE: &使用&迅雷下载全部链接 - e:\Program Files (x86)\Thunder Network\Thunder\BHO\GetAllUrl.htm
IE: &使用&迅雷离线下载 - e:\Program Files (x86)\Thunder Network\Thunder\BHO\OfflineDownload.htm
IE: 导出到 Microsoft Excel(&X) - C:\PROGRA~2\MICROS~2\Office12\EXCEL.EXE/3000
IE: {0A155D3C-68E2-4215-A47A-E800A446447A}
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - C:\PROGRA~2\MICROS~2\Office12\REFIEBAR.DLL
LSP: mswsock.dll
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {9FAFB576-6933-4CCC-AB3D-B988EC43D04E} - hxxp://rsdownload.rising.com.cn/rs2010/online/ravolctl.cab
DPF: {C377230F-0F21-4838-938D-CB95B65BF023} - hxxp://jingang.yto56.com.cn/expws/js/SecActiveX.cab
DPF: {CAFEEFAC-0014-0002-0019-ABCDEFFEDCBA} - hxxp://java.sun.com/products/plugin/autodl/jinstall-142-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {EA1B8527-E422-4909-825A-70BE0694F18E} - hxxps://online.westpac.com.au/wtpbs/wtBalanceSheet/portfoliomanagerwt.cab
DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} - hxxp://dl.pplive.com/PluginSetup.cab
TCP: DhcpNameServer = 10.1.1.1
TCP: Interfaces\{FAE6364B-2EEE-48CD-9479-3E2AE8299399} : DhcpNameServer = 10.0.0.138
TCP: Interfaces\{FFE84B19-21BA-4129-B491-80CA1A275FB7} : DhcpNameServer = 10.1.1.1
TCP: Interfaces\{FFE84B19-21BA-4129-B491-80CA1A275FB7}\24967605F6E646131453935413 : DhcpNameServer = 10.0.0.138
TCP: Interfaces\{FFE84B19-21BA-4129-B491-80CA1A275FB7}\24967605F6E646939333549313 : DhcpNameServer = 10.0.0.138
TCP: Interfaces\{FFE84B19-21BA-4129-B491-80CA1A275FB7}\960586F6E656 : DhcpNameServer = 10.143.147.147 10.143.147.148
Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\PROGRA~1\KuGou7\KUGOO3~1.OCX
Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\PROGRA~1\KuGou7\KUGOO3~1.OCX
BHO-X64: 迅雷FLV视频嗅探及下载支持: {0EA37B17-6B8B-4085-8257-F3A4AA69C27A} - e:\Program Files (x86)\Thunder Network\Thunder\BHO\XlBrowserAddin1.0.6.69.dll
BHO-X64: XlBrowserAddinBho.XlBrowserAddinBhoObject - No File
BHO-X64: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
BHO-X64: AcroIEHelperStub - No File
BHO-X64: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll
BHO-X64: 迅雷下载支持: {889D2FEB-5411-4565-8998-1DD2C5261283} - e:\Program Files (x86)\Thunder Network\Thunder\BHO\XunleiBHO7.2.5.3364.dll
BHO-X64: XunleiBHO - No File
BHO-X64: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll
TB-X64: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
mRun-x64: [LManager] C:\Program Files (x86)\Launch Manager\LManager.exe
mRun-x64: [IAStorIcon] C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
mRun-x64: [QvodTerminal] "E:\QvodPlayer\QvodTerminal.exe" -autorun
IE-X64: {0A155D3C-68E2-4215-A47A-E800A446447A}
.
============= SERVICES / DRIVERS ===============
.
R0 MpFilter;Microsoft Malware Protection Driver;C:\Windows\system32\DRIVERS\MpFilter.sys --> C:\Windows\system32\DRIVERS\MpFilter.sys [?]
R1 vwififlt;Virtual WiFi Filter Driver;C:\Windows\system32\DRIVERS\vwififlt.sys --> C:\Windows\system32\DRIVERS\vwififlt.sys [?]
R2 AlipaySecSvc;Alipay security service;C:\Program Files (x86)\alipay\alieditplus\AlipaySecSvc.exe [2012-5-21 303968]
R2 AliveSvc;Alipay alive service;C:\Program Files (x86)\Common Files\alipay\AliveService\AliveService.exe [2012-5-21 109408]
R2 DsiWMIService;Dritek WMI Service;C:\Program Files (x86)\Launch Manager\dsiwmis.exe [2010-7-26 321104]
R2 ePowerSvc;Acer ePower Service;C:\Program Files\eMachines\eMachines Power Management\ePowerSvc.exe [2010-9-19 868896]
R3 HECIx64;Intel® Management Engine Interface;C:\Windows\system32\DRIVERS\HECIx64.sys --> C:\Windows\system32\DRIVERS\HECIx64.sys [?]
R3 Impcd;Impcd;C:\Windows\system32\DRIVERS\Impcd.sys --> C:\Windows\system32\DRIVERS\Impcd.sys [?]
R3 IntcDAud;Intel® Display Audio;C:\Windows\system32\DRIVERS\IntcDAud.sys --> C:\Windows\system32\DRIVERS\IntcDAud.sys [?]
R3 k57nd60a;Broadcom NetLink ™ Gigabit Ethernet - NDIS 6.0;C:\Windows\system32\DRIVERS\k57nd60a.sys --> C:\Windows\system32\DRIVERS\k57nd60a.sys [?]
R3 TesSafe;TesSafe;\??\C:\Windows\system32\TesSafe.sys --> C:\Windows\system32\TesSafe.sys [?]
S3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-3-29 257224]
S3 AmUStor;AM USB Stroage Driver;C:\Windows\system32\drivers\AmUStor.SYS --> C:\Windows\system32\drivers\AmUStor.SYS [?]
S3 androidusb;ADB Interface Driver;C:\Windows\system32\Drivers\androidusb.sys --> C:\Windows\system32\Drivers\androidusb.sys [?]
S3 NisDrv;Microsoft Network Inspection System;C:\Windows\system32\DRIVERS\NisDrvWFP.sys --> C:\Windows\system32\DRIVERS\NisDrvWFP.sys [?]
S3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;C:\Windows\system32\drivers\rdpvideominiport.sys --> C:\Windows\system32\drivers\rdpvideominiport.sys [?]
S3 TsUsbFlt;TsUsbFlt;C:\Windows\system32\drivers\tsusbflt.sys --> C:\Windows\system32\drivers\tsusbflt.sys [?]
S3 USBAAPL64;Apple Mobile USB Driver;C:\Windows\system32\Drivers\usbaapl64.sys --> C:\Windows\system32\Drivers\usbaapl64.sys [?]
S3 zghsmdm;ZTE General Handset USB Modem Proprietary;C:\Windows\system32\DRIVERS\zghsmdm.sys --> C:\Windows\system32\DRIVERS\zghsmdm.sys [?]
.
=============== File Associations ===============
.
chm.file="hh.exe" %1
inifile=C:\Windows\SysWow64\NOTEPAD.EXE %1
txtfile=C:\Windows\notepad.exe %1
.
=============== Created Last 30 ================
.
2012-06-10 05:57:28 69000 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{0486293B-46CE-4C20-ADB8-6FDADBC72ACB}\offreg.dll
2012-06-10 05:56:02 8955792 ----a-w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{0486293B-46CE-4C20-ADB8-6FDADBC72ACB}\mpengine.dll
2012-06-10 05:31:13 927800 ------w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{5EC3C954-C82E-4D28-B6E5-835FB5603489}\gapaengine.dll
2012-06-10 05:28:53 8955792 ------w- C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-06-10 05:23:54 -------- d-----w- C:\Program Files (x86)\Microsoft Security Client
2012-06-10 05:23:47 -------- d-----w- C:\Program Files\Microsoft Security Client
2012-06-10 05:23:20 -------- d-----w- C:\f6dea0ff85264efa9ee0b4e2fa985b
2012-06-09 19:12:57 -------- d-sh--w- C:\Windows\SysWow64\%APPDATA%
2012-06-02 17:11:01 262144 ----a-w- C:\Windows\SysWow64\GameLink.dll
2012-06-01 08:37:01 -------- d-----w- C:\Program Files (x86)\Common Files\alipay
2012-05-31 16:41:08 -------- d-----w- C:\Users\peterchen\AppData\Roaming\LolClient2
2012-05-22 14:12:59 5173624 ----a-w- C:\Windows\System32\QQPinyin.ime
2012-05-19 09:44:58 -------- d-----w- C:\Download
2012-05-17 01:51:36 1918320 ----a-w- C:\Windows\System32\drivers\tcpip.sys
2012-05-17 01:51:23 1732096 ----a-w- C:\Program Files\Windows Journal\NBDoc.DLL
2012-05-17 01:51:22 936960 ----a-w- C:\Program Files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51:22 1367552 ----a-w- C:\Program Files\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51:19 1393664 ----a-w- C:\Program Files\Windows Journal\JNTFiltr.dll
2012-05-17 01:51:18 1402880 ----a-w- C:\Program Files\Windows Journal\JNWDRV.dll
2012-05-14 06:00:15 -------- d-----w- C:\Program Files (x86)\alipay
2012-05-12 16:19:15 5559664 ----a-w- C:\Windows\System32\ntoskrnl.exe
2012-05-12 16:19:13 3146240 ----a-w- C:\Windows\System32\win32k.sys
2012-05-12 16:19:11 3913072 ----a-w- C:\Windows\SysWow64\ntoskrnl.exe
2012-05-12 16:19:09 3968368 ----a-w- C:\Windows\SysWow64\ntkrnlpa.exe
2012-05-12 16:18:45 1544704 ----a-w- C:\Windows\System32\DWrite.dll
2012-05-12 16:18:45 1077248 ----a-w- C:\Windows\SysWow64\DWrite.dll
2012-05-12 16:18:37 75120 ----a-w- C:\Windows\System32\drivers\partmgr.sys
.
==================== Find3M ====================
.
2012-06-10 07:10:52 163920 ----a-w- C:\Windows\System32\TesSafe.sys
2012-06-10 04:51:55 70344 ----a-w- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
2012-06-10 04:51:55 426184 ----a-w- C:\Windows\SysWow64\FlashPlayerApp.exe
2012-05-10 13:17:55 0 --sha-w- C:\Windows\System32\dds_trash_log.cmd
2012-04-28 18:12:33 525544 ----a-w- C:\Windows\System32\deployJava1.dll
2012-04-23 14:45:34 126304 ----a-w- C:\Windows\SysWow64\gamelsp.dll
2012-04-23 03:54:34 3077496 ----a-w- C:\Windows\SysWow64\QQPinyin.ime
2012-04-07 09:46:00 120600 ----a-w- C:\Windows\SysWow64\xunyount.dll
2012-03-20 12:44:12 98688 ----a-w- C:\Windows\System32\drivers\NisDrvWFP.sys
2012-03-20 12:44:12 203888 ----a-w- C:\Windows\System32\drivers\MpFilter.sys
.
============= FINISH: 17:20:00.15 ===============

Attached Files



BC AdBot (Login to Remove)

 


#2 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 10 June 2012 - 11:28 AM

download Farbar Recovery Scan Tool and save it to a flash drive.
(you will need the 64bit version)
Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
On the System Recovery Options menu you will get the following options:
Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt
[*]Select Command Prompt
[*]In the command window type in notepad and press Enter.
[*]The notepad opens. Under File menu select Open.
[*]Select "Computer" and find your flash drive letter and close the notepad.
[*]In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
Note: Replace letter e with the drive letter of your flash drive.
[*]The tool will start to run.
[*]When the tool opens click Yes to the disclaimer.
[*]Place a check next to List Drivers MD5 as well as the default check marks that are already there
[*]Press Scan button.
[*]type exit and reboot the computer normally

[*]FRST will make a log (FRST.txt) on the flash drive, please copy and paste the log in your reply.[/list]

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#3 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 10 June 2012 - 10:37 PM

Here is the LOG

Scan result of Farbar Recovery Scan Tool Version: 10-06-2012 03
Ran by SYSTEM at 11-06-2012 11:31:25
Running from H:\
Windows 7 Ultimate (X64) OS Language: English(US)
The current controlset is ControlSet001

========================== Registry (Whitelisted) =============

HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2097960 2010-04-22] (Synaptics Incorporated)
HKLM\...\Run: [Acer ePower Management] C:\Program Files\eMachines\eMachines Power Management\ePowerTray.exe [861216 2010-06-11] (Acer Incorporated)
HKLM\...\Run: [AmIcoSinglun64] C:\Program Files (x86)\AmIcoSingLun\AmIcoSinglun64.exe [324608 2010-06-09] (Alcor Micro Corp.)
HKLM\...\Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe -s [11046504 2010-07-13] (Realtek Semiconductor)
HKLM\...\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe [168216 2011-05-08] (Intel Corporation)
HKLM\...\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe [392472 2011-05-08] (Intel Corporation)
HKLM\...\Run: [Persistence] C:\Windows\system32\igfxpers.exe [416024 2011-05-08] (Intel Corporation)
HKLM\...\Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey [1271168 2012-03-26] (Microsoft Corporation)
HKLM-x32\...\Run: [LManager] C:\Program Files (x86)\Launch Manager\LManager.exe [968272 2010-06-21] (Dritek System Inc.)
HKLM-x32\...\Run: [IAStorIcon] C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe [284696 2010-03-03] (Intel Corporation)
HKLM-x32\...\Run: [QvodTerminal] "E:\QvodPlayer\QvodTerminal.exe" -autorun [x]
HKU\peterchen\...\Run: [PPS Accelerator] C:\PROGRA~2\PPStream\ppsap.exe [214408 2010-02-23] (PPStream Inc)
Winlogon\Notify\igfxcui: igfxdev.dll (Intel Corporation)
Tcpip\Parameters: [DhcpNameServer] 10.1.1.1
HKLM\...\InprocServer32: [Default] \\.\globalroot\systemroot\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\n. ATTENTION! ====> ZeroAccess?

==================== Services (Whitelisted) ======

2 AlipaySecSvc; C:\Program Files (x86)\alipay\alieditplus\AlipaySecSvc.exe [303968 2012-05-20] (Alipay Inc. )
2 AliveSvc; C:\Program Files (x86)\Common Files\alipay\AliveService\AliveService.exe [109408 2012-05-20] (Alipay Inc. )
2 DsiWMIService; C:\Program Files (x86)\Launch Manager\dsiwmis.exe [321104 2010-06-21] (Dritek System Inc.)
2 ePowerSvc; C:\Program Files\eMachines\eMachines Power Management\ePowerSvc.exe [868896 2010-06-11] (Acer Incorporated)
2 GREGService; C:\Program Files (x86)\eMachines\Registration\GREGsvc.exe [23584 2010-01-08] (Acer Incorporated)
2 MsMpSvc; "C:\Program Files\Microsoft Security Client\MsMpEng.exe" [12600 2012-03-26] (Microsoft Corporation)
3 NisSrv; "C:\Program Files\Microsoft Security Client\NisSrv.exe" [291696 2012-03-26] (Microsoft Corporation)
2 UNS; "C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe" [2320920 2010-02-02] (Intel Corporation)
3 Updater Service; C:\Program Files\eMachines\eMachines Updater\UpdaterService.exe [243232 2010-01-28] (Acer Group)
3 XLServicePlatform; C:\Program Files (x86)\Common Files\Thunder Network\ServicePlatform\XLSP.dll [87728 2012-01-04] (ShenZhen Xunlei Networking Technologies,LTD)

========================== Drivers (Whitelisted) =============

3 androidusb; C:\Windows\System32\Drivers\androidusb.sys [38424 2010-10-17] (Google Inc)
0 BC; C:\Windows\SysWow64\Drivers\BC.sys [24984 2010-11-10] (Kingsoft Corporation)
3 NTIDrvr; C:\Windows\System32\Drivers\NTIDrvr.sys [18432 2010-04-19] (NTI Corporation)
3 tap0901; C:\Windows\System32\Drivers\tap0901.sys [31232 2011-03-20] (The OpenVPN Project)
3 TesSafe; \??\C:\Windows\system32\TesSafe.sys [163920 2012-06-09] (TENCENT)
3 UBHelper; C:\Windows\System32\Drivers\UBHelper.sys [17408 2010-07-08] (NTI Corporation)
3 UsbserFilt; C:\Windows\System32\DRIVERS\usbser_lowerfltjx64.sys [9216 2010-07-29] (Nokia)
3 zghsmdm; C:\Windows\System32\Drivers\zghsmdm.sys [122624 2011-01-12] (ZTE Incorporated)
3 ApolloProtect; \??\e:\Program Files (x86)\T2CN\????\Apollo\Apollo.sys [x]
3 ComputerZ_x64; \??\C:\Program Files (x86)\360\360HardwareMaster\ComputerZ_x64.sys [x]
3 cpuz135; \??\C:\Users\PETERC~1\AppData\Local\Temp\cpuz135\cpuz135_x64.sys [x]
3 EagleX64; \??\C:\Windows\system32\drivers\EagleX64.sys [x]
3 esgiguard; \??\C:\Program Files (x86)\Enigma Software Group\SpyHunter\esgiguard.sys [x]
3 GGSAFERDriver; \??\C:\Program Files (x86)\Garena Plus\Room\safedrv.sys [x]
3 ksfmonsys; \??\e:\Program Files (x86)\KSafe\ksfmonsys64.sys [x]
3 Synth3dVsc; C:\Windows\System32\drivers\synth3dvsc.sys [x]
3 TcHardWare; \??\e:\Program Files (x86)\Tencent\QQPCMgr\QQPCHW.sys [x]
3 tcphoc; \??\E:\Program Files (x86)\Thunder Network\Thunder\XLDoctor\7.1.3.2044_1\Program\tcphoc.sys [x]
3 tsusbhub; C:\Windows\System32\drivers\tsusbhub.sys [x]
3 VGPU; C:\Windows\System32\drivers\rdvgkmd.sys [x]

========================== NetSvcs (Whitelisted) ===========

NETSVC: r -> No ServiceDLL Path.

============ One Month Created Files and Folders ==============

2012-06-11 11:31 - 2012-06-11 11:31 - 00000000 ____D C:\FRST
2012-06-10 14:07 - 2012-06-10 14:07 - 01401619 ____A C:\Users\peterchen\Desktop\FRST64.exe
2012-06-10 02:31 - 2012-06-10 02:31 - 00002175 ____A C:\Users\peterchen\Desktop\ark.txt
2012-06-10 01:22 - 2011-07-16 06:21 - 00302592 ____A C:\Users\peterchen\Desktop\gmer.exe
2012-06-10 01:21 - 2012-06-10 01:21 - 00015589 ____A C:\Users\peterchen\Desktop\DDS.txt
2012-06-10 01:21 - 2012-06-10 01:21 - 00009126 ____A C:\Users\peterchen\Desktop\Attach.txt
2012-06-09 21:41 - 2012-06-09 21:41 - 00607260 ____R (Swearware) C:\Users\peterchen\Desktop\dds.scr
2012-06-09 21:23 - 2012-06-09 21:24 - 00000000 ____D C:\Program Files\Microsoft Security Client
2012-06-09 21:23 - 2012-06-09 21:23 - 00000000 ____D C:\Program Files (x86)\Microsoft Security Client
2012-06-09 20:51 - 2012-06-10 18:37 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2012-06-09 11:12 - 2012-06-09 11:12 - 00000000 __SHD C:\Windows\SysWOW64\%APPDATA%
2012-06-08 11:23 - 2012-06-10 14:08 - 1178238976 ____A C:\Users\peterchen\Desktop\[????www.dy2018.net]?????.720p.BD????.rmvb.td
2012-06-08 11:23 - 2012-06-10 14:08 - 00059153 ____A C:\Users\peterchen\Desktop\[????www.dy2018.net]?????.720p.BD????.rmvb.td.cfg
2012-06-07 10:03 - 2012-06-10 14:08 - 249532416 ____A C:\Users\peterchen\Desktop\[????www.dygod.cn]???-cd2.rmvb.td
2012-06-07 10:03 - 2012-06-10 14:08 - 00027908 ____A C:\Users\peterchen\Desktop\[????www.dygod.cn]???-cd2.rmvb.td.cfg
2012-06-02 09:35 - 2012-06-02 09:35 - 00000724 ____A C:\Users\Public\Desktop\??2012.lnk
2012-06-02 09:11 - 2011-10-31 23:05 - 00262144 ____A (zhanxun co.,ltd) C:\Windows\SysWOW64\GameLink.dll
2012-06-02 08:40 - 2012-06-02 08:55 - 00000600 ____A C:\Users\peterchen\AppData\Local\PUTTY.RND
2012-05-31 08:41 - 2012-05-31 08:41 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\LolClient2
2012-05-27 04:22 - 2012-05-27 04:22 - 00000000 ___AH C:\Windows\System32\Drivers\Msft_Kernel_WinUsb_01007.Wdf
2012-05-22 06:12 - 2012-04-22 19:54 - 05173624 ____A (Tencent) C:\Windows\System32\QQPinyin.ime
2012-05-21 08:40 - 2012-05-21 08:40 - 304565816 ____A C:\Windows\MEMORY.DMP
2012-05-19 01:44 - 2012-05-19 01:44 - 00000000 ____D C:\Download
2012-05-18 08:41 - 2012-05-18 08:41 - 03443449 ____A C:\Users\peterchen\Desktop\Ronaldo_Workout_zh_HK.pdf
2012-05-18 04:32 - 2012-06-10 05:12 - 00000432 ____A C:\Windows\Tasks\AliUpdater{5A14365A-634A-4D2F-BC28-71037CE728AB}.job
2012-05-17 06:00 - 2012-05-17 08:13 - 00017142 ____A C:\Users\peterchen\Documents\For Liqin XU.docx
2012-05-16 17:51 - 2012-03-30 03:35 - 01918320 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\tcpip.sys
2012-05-13 22:00 - 2012-06-01 00:36 - 00000000 ____D C:\Program Files (x86)\alipay
2012-05-12 08:19 - 2012-03-30 22:05 - 05559664 ____A (Microsoft Corporation) C:\Windows\System32\ntoskrnl.exe
2012-05-12 08:19 - 2012-03-30 20:39 - 03968368 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe
2012-05-12 08:19 - 2012-03-30 20:39 - 03913072 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe
2012-05-12 08:19 - 2012-03-30 19:10 - 03146240 ____A (Microsoft Corporation) C:\Windows\System32\win32k.sys
2012-05-12 08:18 - 2012-03-16 23:58 - 00075120 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\partmgr.sys
2012-05-12 08:18 - 2012-03-02 22:35 - 01544704 ____A (Microsoft Corporation) C:\Windows\System32\DWrite.dll
2012-05-12 08:18 - 2012-03-02 21:31 - 01077248 ____A (Microsoft Corporation) C:\Windows\SysWOW64\DWrite.dll

============ 3 Months Modified Files and Folders =============

2012-06-11 11:31 - 2012-06-11 11:31 - 00000000 ____D C:\FRST
2012-06-10 19:28 - 2011-04-19 15:52 - 01874992 ____A C:\Windows\WindowsUpdate.log
2012-06-10 18:37 - 2012-06-09 20:51 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2012-06-10 17:46 - 2011-10-02 04:51 - 00000000 ____D C:\Users\All Users\QvodPlayer
2012-06-10 16:22 - 2011-06-16 04:56 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\KuGou7
2012-06-10 16:22 - 2010-12-03 01:27 - 00000000 ____D C:\Users\peterchen\AppData\Local\CrashDumps
2012-06-10 15:54 - 2010-12-03 01:21 - 00000000 ____D C:\Users\peterchen\Documents\Tencent Files
2012-06-10 14:11 - 2009-07-13 20:45 - 00028928 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2012-06-10 14:11 - 2009-07-13 20:45 - 00028928 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2012-06-10 14:08 - 2012-06-08 11:23 - 1178238976 ____A C:\Users\peterchen\Desktop\[????www.dy2018.net]?????.720p.BD????.rmvb.td
2012-06-10 14:08 - 2012-06-08 11:23 - 00059153 ____A C:\Users\peterchen\Desktop\[????www.dy2018.net]?????.720p.BD????.rmvb.td.cfg
2012-06-10 14:08 - 2012-06-07 10:03 - 249532416 ____A C:\Users\peterchen\Desktop\[????www.dygod.cn]???-cd2.rmvb.td
2012-06-10 14:08 - 2012-06-07 10:03 - 00027908 ____A C:\Users\peterchen\Desktop\[????www.dygod.cn]???-cd2.rmvb.td.cfg
2012-06-10 14:07 - 2012-06-10 14:07 - 01401619 ____A C:\Users\peterchen\Desktop\FRST64.exe
2012-06-10 14:05 - 2010-12-03 03:20 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\360se
2012-06-10 14:03 - 2011-08-11 23:37 - 00071432 ____A C:\Windows\setupact.log
2012-06-10 14:03 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2012-06-10 08:06 - 2011-08-11 23:37 - 00854064 ____A C:\Windows\PFRO.log
2012-06-10 07:46 - 2010-12-03 02:41 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\PPStream
2012-06-10 05:23 - 2010-12-03 01:20 - 00000030 ____A C:\Windows\QQPlayer.INI
2012-06-10 05:12 - 2012-05-18 04:32 - 00000432 ____A C:\Windows\Tasks\AliUpdater{5A14365A-634A-4D2F-BC28-71037CE728AB}.job
2012-06-10 05:12 - 2011-12-20 02:56 - 00000000 ____D C:\Program Files (x86)\AliWangWang
2012-06-10 02:39 - 2012-04-12 05:50 - 00000000 ____D C:\Users\peterchen\Desktop\uni doc
2012-06-10 02:31 - 2012-06-10 02:31 - 00002175 ____A C:\Users\peterchen\Desktop\ark.txt
2012-06-10 01:21 - 2012-06-10 01:21 - 00015589 ____A C:\Users\peterchen\Desktop\DDS.txt
2012-06-10 01:21 - 2012-06-10 01:21 - 00009126 ____A C:\Users\peterchen\Desktop\Attach.txt
2012-06-09 23:10 - 2011-01-17 19:56 - 00163920 ____A (TENCENT) C:\Windows\System32\TesSafe.sys
2012-06-09 21:41 - 2012-06-09 21:41 - 00607260 ____R (Swearware) C:\Users\peterchen\Desktop\dds.scr
2012-06-09 21:26 - 2012-05-10 22:08 - 00001945 ____A C:\Windows\epplauncher.mif
2012-06-09 21:24 - 2012-06-09 21:23 - 00000000 ____D C:\Program Files\Microsoft Security Client
2012-06-09 21:23 - 2012-06-09 21:23 - 00000000 ____D C:\Program Files (x86)\Microsoft Security Client
2012-06-09 21:23 - 2011-06-18 01:37 - 00357428 ____A C:\Windows\System32\prfh0804.dat
2012-06-09 21:23 - 2011-06-18 01:37 - 00102428 ____A C:\Windows\System32\prfc0804.dat
2012-06-09 21:23 - 2010-12-28 23:38 - 01186942 ____A C:\Windows\SysWOW64\PerfStringBackup.INI
2012-06-09 20:51 - 2012-03-29 05:33 - 00426184 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2012-06-09 20:51 - 2011-05-16 16:18 - 00070344 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2012-06-09 11:12 - 2012-06-09 11:12 - 00000000 __SHD C:\Windows\SysWOW64\%APPDATA%
2012-06-09 04:40 - 2011-03-30 03:38 - 00001063 ____A C:\Users\peterchen\Desktop\YY??.lnk
2012-06-04 23:21 - 2011-12-28 20:08 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\360Login
2012-06-04 08:09 - 2009-07-13 21:08 - 00032636 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2012-06-02 09:35 - 2012-06-02 09:35 - 00000724 ____A C:\Users\Public\Desktop\??2012.lnk
2012-06-02 09:35 - 2010-12-03 01:44 - 00000000 ____D C:\Windows\SysWOW64\dialconfig
2012-06-02 08:55 - 2012-06-02 08:40 - 00000600 ____A C:\Users\peterchen\AppData\Local\PUTTY.RND
2012-06-02 08:48 - 2012-04-29 07:12 - 00000000 ____D C:\Users\peterchen\Desktop\LOLBox
2012-06-01 10:10 - 2009-07-13 21:13 - 01175824 ____A C:\Windows\System32\PerfStringBackup.INI
2012-06-01 00:36 - 2012-05-13 22:00 - 00000000 ____D C:\Program Files (x86)\alipay
2012-05-31 08:41 - 2012-05-31 08:41 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\LolClient2
2012-05-27 04:22 - 2012-05-27 04:22 - 00000000 ___AH C:\Windows\System32\Drivers\Msft_Kernel_WinUsb_01007.Wdf
2012-05-24 05:38 - 2012-03-27 09:10 - 00000000 ____D C:\Kugou
2012-05-21 08:40 - 2012-05-21 08:40 - 304565816 ____A C:\Windows\MEMORY.DMP
2012-05-21 08:40 - 2011-04-22 08:02 - 00000000 ____D C:\Windows\Minidump
2012-05-21 03:39 - 2011-03-24 00:27 - 00000000 ____D C:\Users\peterchen\AppData\Local\ElevatedDiagnostics
2012-05-20 00:31 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\Downloaded Program Files
2012-05-19 01:44 - 2012-05-19 01:44 - 00000000 ____D C:\Download
2012-05-18 08:41 - 2012-05-18 08:41 - 03443449 ____A C:\Users\peterchen\Desktop\Ronaldo_Workout_zh_HK.pdf
2012-05-17 08:13 - 2012-05-17 06:00 - 00017142 ____A C:\Users\peterchen\Documents\For Liqin XU.docx
2012-05-17 00:07 - 2009-07-13 20:45 - 00383896 ____A C:\Windows\System32\FNTCACHE.DAT
2012-05-16 17:59 - 2011-06-18 01:18 - 57848688 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe
2012-05-16 17:59 - 2011-04-12 00:51 - 00000000 ____D C:\Users\All Users\Microsoft Help
2012-05-16 17:54 - 2009-07-13 23:45 - 00000000 ____D C:\Program Files\Windows Journal
2012-05-13 22:00 - 2011-01-23 17:43 - 00000000 ____D C:\Windows\SysWOW64\aliedit
2012-05-12 21:03 - 2012-05-10 22:55 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Super Rabbit
2012-05-12 01:14 - 2011-06-20 01:43 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\360Notify
2012-05-10 22:54 - 2012-05-10 22:54 - 00000000 ____D C:\Program Files (x86)\Super Rabbit
2012-05-10 22:39 - 2011-11-20 20:54 - 00000000 ____D C:\Program Files (x86)\360
2012-05-10 22:16 - 2010-12-03 05:53 - 00000000 ____D C:\Users\All Users\360safe
2012-05-10 12:03 - 2012-04-08 17:32 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\360mobilemgr
2012-05-10 09:33 - 2011-01-22 20:05 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\QvodPlayer
2012-05-10 07:23 - 2012-02-18 04:32 - 00000000 ___HD C:\KuGouCache
2012-05-10 07:01 - 2012-05-10 07:01 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Malwarebytes
2012-05-10 07:01 - 2012-05-10 07:01 - 00000000 ____D C:\Users\All Users\Malwarebytes
2012-05-10 06:56 - 2011-03-04 18:54 - 00000000 ____D C:\Program Files (x86)\Nokia
2012-05-10 06:55 - 2012-05-10 06:55 - 00000063 ____A C:\Windows\itrushwPTA.log
2012-05-10 06:55 - 2012-05-10 06:55 - 00000000 ____D C:\Windows\SysWOW64\itruscert
2012-05-10 06:54 - 2011-03-04 19:07 - 00000000 ____D C:\Users\peterchen\AppData\Local\NokiaAccount
2012-05-10 05:17 - 2012-05-06 00:20 - 00000000 __ASH C:\Windows\System32\dds_trash_log.cmd
2012-05-09 20:03 - 2012-05-09 02:50 - 00000000 ____D C:\Program Files (x86)\AVG Secure Search
2012-05-09 20:02 - 2012-05-09 02:50 - 00000000 ____D C:\Windows\SysWOW64\Drivers\AVG
2012-05-09 20:02 - 2012-05-09 02:45 - 00000000 ____D C:\Users\All Users\AVG2012
2012-05-09 20:01 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2012-05-09 20:00 - 2012-05-09 02:32 - 00000000 ____D C:\Users\All Users\MFAData
2012-05-09 20:00 - 2011-10-10 20:27 - 00000000 ____D C:\Windows\System32\SPReview
2012-05-09 20:00 - 2011-10-10 20:27 - 00000000 ____D C:\Windows\System32\EventProviders
2012-05-09 20:00 - 2011-06-18 01:34 - 00000000 ____D C:\Windows\SysWOW64\XPSViewer
2012-05-09 20:00 - 2011-03-19 17:18 - 00000000 ____D C:\Windows\System32\Macromed
2012-05-09 20:00 - 2010-09-18 21:29 - 00000000 ____D C:\Windows\NAPP_Dism_Log
2012-05-09 20:00 - 2010-07-25 18:20 - 00000000 ____D C:\Windows\SysWOW64\Macromed
2012-05-09 20:00 - 2010-07-25 18:13 - 00000000 ____D C:\Windows\oem
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\SysWOW64\winrm
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\SysWOW64\WCN
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\SysWOW64\slmgr
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\SysWOW64\Printing_Admin_Scripts
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\System32\winrm
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\System32\WCN
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\System32\slmgr
2012-05-09 20:00 - 2009-07-13 21:37 - 00000000 ____D C:\Windows\System32\Printing_Admin_Scripts
2012-05-09 20:00 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\SysWOW64\WindowsPowerShell
2012-05-09 20:00 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\System32\WindowsPowerShell
2012-05-09 20:00 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\System32\WinBioPlugIns
2012-05-09 20:00 - 2009-07-13 21:32 - 00000000 ____D C:\Windows\Performance
2012-05-09 20:00 - 2009-07-13 20:45 - 00000000 ____D C:\Windows\Setup
2012-05-09 20:00 - 2009-07-13 20:45 - 00000000 ____D C:\Windows\ServiceProfiles
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 __RSD C:\Windows\Media
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Web
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Vss
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\zh-CN
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\spp
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\Speech
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\NetworkList
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\MUI
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\Msdtc
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\migwiz
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\InstallShield
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\IME
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\Dism
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\com
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\zh-CN
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\sysprep
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\spp
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\spool
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\Speech
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\SMI
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\oobe
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NetworkList
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\MUI
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\Msdtc
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\migwiz
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\IME
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\Dism
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\com
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Speech
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\servicing
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\security
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\schemas
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Resources
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\rescache
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\PolicyDefinitions
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\PLA
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\IME
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Help
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Globalization
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\Branding
2012-05-09 20:00 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\AppCompat
2012-05-09 19:59 - 2012-05-09 02:41 - 00000000 ____D C:\Program Files (x86)\AVG
2012-05-09 19:59 - 2012-05-06 21:15 - 00000000 ____D C:\Program Files (x86)\Avira
2012-05-09 19:59 - 2010-07-25 18:19 - 00000000 ____D C:\Program Files (x86)\Adobe
2012-05-09 05:31 - 2012-05-09 05:30 - 00607260 ____R (Swearware) C:\Users\peterchen\Downloads\dds.scr
2012-05-09 05:29 - 2012-05-09 05:29 - 00000000 ____A C:\Users\peterchen\defogger_reenable
2012-05-09 05:29 - 2010-12-03 00:56 - 00000000 ____D C:\users\peterchen
2012-05-09 04:48 - 2012-05-09 04:48 - 00000000 ____D C:\Users\peterchen\AppData\Local\360Chrome
2012-05-09 04:13 - 2012-04-21 04:56 - 00000000 ____D C:\Windows\41EBC322660F4D16A0DF53147210CBDB.TMP
2012-05-09 04:09 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\config\TxR
2012-05-09 02:51 - 2012-05-09 02:51 - 00000000 ____D C:\Users\peterchen\AppData\Local\AVG Secure Search
2012-05-09 02:51 - 2012-05-09 02:51 - 00000000 ____D C:\Users\All Users\AVG Secure Search
2012-05-09 02:45 - 2012-05-09 02:45 - 00000000 ___HD C:\$AVG
2012-05-09 02:12 - 2010-12-03 01:20 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Tencent
2012-05-09 02:09 - 2012-04-21 04:58 - 00000000 ____D C:\Program Files (x86)\Enigma Software Group
2012-05-08 23:40 - 2012-05-08 23:40 - 00000000 __SHD C:\KRECYCLE
2012-05-08 23:40 - 2011-10-05 01:07 - 00000000 ____D C:\Users\All Users\KRSHistory
2012-05-08 23:34 - 2012-05-08 23:34 - 00000000 ____D C:\Program Files (x86)\Rising
2012-05-08 23:32 - 2012-05-08 23:32 - 00000000 ____D C:\Program Files (x86)\kingsoft
2012-05-08 23:20 - 2012-05-08 23:20 - 00000000 ____A C:\Users\All Users\rebootpending.txt
2012-05-07 12:21 - 2012-05-05 20:28 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\GarenaPlus
2012-05-07 12:21 - 2012-05-05 20:18 - 00000000 ____D C:\Users\All Users\GarenaMessenger
2012-05-07 12:21 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\SysWOW64\GroupPolicy
2012-05-07 12:16 - 2010-07-25 17:59 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2012-05-07 01:58 - 2012-05-07 01:58 - 00000000 __SHD C:\found.001
2012-05-06 21:18 - 2012-04-21 01:33 - 00000000 ____D C:\sh4ldr
2012-05-06 21:02 - 2010-12-03 00:56 - 00000000 ____D C:\Users\peterchen\AppData\LocalLow
2012-05-06 12:10 - 2012-05-06 00:30 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Ylic
2012-05-06 11:36 - 2012-04-23 19:12 - 00000262 ____A C:\spyhunter.log
2012-05-06 11:02 - 2012-05-06 00:30 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Ukusa
2012-05-06 11:02 - 2012-05-06 00:30 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Ataslup
2012-05-06 09:35 - 2012-05-06 09:35 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\360SuperKiller
2012-05-06 08:15 - 2011-01-30 19:03 - 00000000 ____D C:\360Rec
2012-05-06 03:46 - 2012-05-06 03:46 - 00000000 ___AH C:\Windows\System32\Drivers\Msft_User_wpdcomp_01_09_00.Wdf
2012-05-06 03:38 - 2012-04-23 11:13 - 00010569 ____A C:\sh4_service.log
2012-05-06 02:33 - 2012-05-06 00:30 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\Ralonal
2012-05-05 12:44 - 2011-11-20 16:29 - 00000000 ____D C:\Users\peterchen\AppData\Local\PMB Files
2012-04-28 11:22 - 2012-01-06 22:55 - 00000000 ____D C:\Program Files (x86)\????????
2012-04-28 10:12 - 2012-04-28 10:13 - 00525544 ____A (Sun Microsystems, Inc.) C:\Windows\System32\deployJava1.dll
2012-04-28 10:12 - 2012-04-28 10:13 - 00191264 ____A (Sun Microsystems, Inc.) C:\Windows\System32\javaws.exe
2012-04-28 10:12 - 2012-04-28 10:13 - 00172320 ____A (Sun Microsystems, Inc.) C:\Windows\System32\javaw.exe
2012-04-28 10:12 - 2012-04-28 10:13 - 00172320 ____A (Sun Microsystems, Inc.) C:\Windows\System32\java.exe
2012-04-28 10:12 - 2012-04-28 10:12 - 00000000 ____D C:\Program Files\Java
2012-04-27 06:26 - 2011-10-24 22:44 - 00000000 ____D C:\Users\peterchen\riotsGamesLogs
2012-04-23 06:45 - 2011-12-30 04:13 - 00126304 ____A (Copyright © GameCap) C:\Windows\SysWOW64\gamelsp.dll
2012-04-22 19:54 - 2012-05-22 06:12 - 05173624 ____A (Tencent) C:\Windows\System32\QQPinyin.ime
2012-04-22 19:54 - 2012-04-22 19:54 - 03077496 ____A (Tencent) C:\Windows\SysWOW64\QQPinyin.ime
2012-04-22 00:33 - 2012-02-13 02:30 - 00000000 ____D C:\Users\peterchen\Desktop\??
2012-04-21 05:31 - 2012-04-21 02:04 - 00000000 ____D C:\Users\All Users\PC Tools
2012-04-21 04:58 - 2012-04-21 04:58 - 00000000 ____D C:\Windows\5B210B8AB66E4702B44D0D6F388D29EB.TMP
2012-04-21 04:58 - 2012-04-21 04:58 - 00000000 ____A C:\autoexec.bat
2012-04-21 02:32 - 2012-04-21 02:32 - 00000412 ____A C:\rkill.log
2012-04-21 02:28 - 2012-04-21 01:29 - 00073556 ____A C:\Windows\ntbtlog.txt
2012-04-21 01:33 - 2012-04-21 01:33 - 00000000 ____D C:\Program Files\Enigma Software Group
2012-04-19 03:17 - 2011-12-20 02:55 - 00000000 ____D C:\Program Files (x86)\Tudou
2012-04-19 03:11 - 2010-09-18 20:48 - 00000000 ____D C:\Program Files (x86)\Windows Live
2012-04-19 03:01 - 2010-12-08 15:56 - 00000000 ____D C:\Users\All Users\PPLive
2012-04-16 10:28 - 2012-01-02 02:22 - 00002356 ____A C:\Windows\SysWOW64\bdsecushr.dat
2012-04-07 18:32 - 2012-04-07 18:32 - 00000000 __SHD C:\found.000
2012-04-07 01:46 - 2012-04-21 00:16 - 00120600 ____A (????????????) C:\Windows\SysWOW64\xunyount.dll
2012-04-06 03:08 - 2012-01-02 02:23 - 00000138 ____A C:\Windows\vsfilter.INI
2012-04-05 18:56 - 2011-01-01 20:34 - 00000000 ____D C:\Users\peterchen\AppData\Local\Microsoft Games
2012-04-04 08:43 - 2011-12-20 02:43 - 00000000 ____D C:\Program Files (x86)\PPStream
2012-04-04 06:59 - 2012-03-27 17:55 - 00000000 ____D C:\Program Files (x86)\TENCENT
2012-04-04 06:59 - 2012-03-04 04:28 - 00000000 ____D C:\Program Files\TENCENT
2012-03-30 22:05 - 2012-05-12 08:19 - 05559664 ____A (Microsoft Corporation) C:\Windows\System32\ntoskrnl.exe
2012-03-30 20:39 - 2012-05-12 08:19 - 03968368 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe
2012-03-30 20:39 - 2012-05-12 08:19 - 03913072 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe
2012-03-30 19:10 - 2012-05-12 08:19 - 03146240 ____A (Microsoft Corporation) C:\Windows\System32\win32k.sys
2012-03-30 03:35 - 2012-05-16 17:51 - 01918320 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\tcpip.sys
2012-03-29 00:02 - 2012-03-29 00:02 - 00000000 ____D C:\Program Files\china-drm
2012-03-29 00:02 - 2012-03-29 00:02 - 00000000 ____D C:\china-drm
2012-03-25 10:12 - 2012-03-25 10:12 - 00000000 ____D C:\Users\peterchen\AppData\Roaming\alipay
2012-03-20 04:44 - 2012-03-20 04:44 - 00203888 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\MpFilter.sys
2012-03-20 04:44 - 2012-03-20 04:44 - 00098688 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\NisDrvWFP.sys
2012-03-16 23:58 - 2012-05-12 08:18 - 00075120 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\partmgr.sys
2012-03-14 09:16 - 2011-11-20 16:29 - 00000000 ____D C:\Users\All Users\PMB Files

ZeroAccess:
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\L
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\L\00000004.@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\L\1afb2d56
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\L\201d3dde
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U\00000004.@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U\00000008.@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U\000000cb.@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U\80000000.@
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U\80000064.@

ZeroAccess:
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070}
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\@
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\L
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\U

========================= Known DLLs (Whitelisted) ============

[2011-10-10 20:18] - [2010-11-20 05:25] - 0014336 ____A (Microsoft Corporation) C:\Windows\System32\browseui.dll
[2011-10-10 20:18] - [2010-11-20 04:18] - 0010752 ____A (Microsoft Corporation) C:\Windows\SysWOW64\browseui.dll
[2009-07-13 16:18] - [2009-07-13 17:41] - 0083456 ____A (Microsoft Corporation) C:\Windows\System32\msacm32.dll
[2009-07-13 16:03] - [2009-07-13 17:15] - 0072192 ____A (Microsoft Corporation) C:\Windows\SysWOW64\msacm32.dll
[2009-07-13 15:21] - [2009-07-13 17:41] - 0006656 ____A (Microsoft Corporation) C:\Windows\System32\shimeng.dll
[2009-07-13 15:12] - [2009-07-13 17:16] - 0005120 ____A (Microsoft Corporation) C:\Windows\SysWOW64\shimeng.dll
[2009-07-13 15:55] - [2009-07-13 17:41] - 0332288 ____A (Microsoft Corporation) C:\Windows\System32\uxtheme.dll
[2009-07-13 15:39] - [2009-07-13 17:11] - 0245760 ____A (Microsoft Corporation) C:\Windows\SysWOW64\uxtheme.dll
C:\Windows\System32\mfc40.dll IS MISSING <==== ATTENTION!
[2011-10-10 20:21] - [2010-11-20 04:19] - 0954752 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mfc40.dll
[2011-10-10 20:20] - [2010-11-20 05:26] - 2067456 ____A (Microsoft Corporation) C:\Windows\System32\d3d9.dll
[2011-10-10 20:20] - [2010-11-20 04:18] - 1828352 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d9.dll
[2009-07-13 15:59] - [2009-07-13 17:26] - 1297408 ____A (Microsoft Corporation) C:\Windows\System32\comres.dll
[2009-07-13 15:44] - [2009-07-13 17:04] - 1297408 ____A (Microsoft Corporation) C:\Windows\SysWOW64\comres.dll
[2009-07-13 15:41] - [2009-07-13 17:40] - 0569344 ____A (Microsoft Corporation) C:\Windows\System32\ddraw.dll
[2009-07-13 15:27] - [2009-07-13 17:15] - 0531968 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ddraw.dll
[2009-07-13 16:18] - [2009-07-13 17:40] - 0540672 ____A (Microsoft Corporation) C:\Windows\System32\dsound.dll
[2009-07-13 16:03] - [2009-07-13 17:15] - 0453632 ____A (Microsoft Corporation) C:\Windows\SysWOW64\dsound.dll

========================= Bamital & volsnap Check ============

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

========================= Memory info ======================

Percentage of memory in use: 34%
Total physical RAM: 1782.81 MB
Available physical RAM: 1162.01 MB
Total Pagefile: 1782.81 MB
Available Pagefile: 1148.31 MB
Total Virtual: 8192 MB
Available Virtual: 8191.9 MB

======================= Partitions =========================

1 Drive c: (eMachines) (Fixed) (Total:142.55 GB) (Free:89.3 GB) NTFS
2 Drive d: (New Volume) (Fixed) (Total:142.44 GB) (Free:8.67 GB) NTFS
3 Drive f: (PQSERVICE) (Fixed) (Total:13 GB) (Free:0.89 GB) NTFS
5 Drive h: (Expansion Drive) (Fixed) (Total:465.76 GB) (Free:187.13 GB) NTFS
6 Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
7 Drive y: (SYSTEM RESERVED) (Fixed) (Total:0.1 GB) (Free:0.06 GB) NTFS ==>[System with boot components (obtained from reading drive)]

Disk ### Status Size Free Dyn Gpt
-------- ------------- ------- ------- --- ---
Disk 0 Online 298 GB 2048 KB
Disk 1 Online 465 GB 1024 KB

Partitions of Disk 0:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Recovery 13 GB 1024 KB
Partition 2 Primary 100 MB 13 GB
Partition 3 Primary 142 GB 13 GB
Partition 0 Extended 142 GB 155 GB
Partition 4 Logical 142 GB 155 GB

======================================================================================================

Disk: 0
Partition 1
Type : 27
Hidden: Yes
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 4 F PQSERVICE NTFS Partition 13 GB Healthy Hidden

======================================================================================================

Disk: 0
Partition 2
Type : 07
Hidden: No
Active: Yes

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 1 Y SYSTEM RESE NTFS Partition 100 MB Healthy

======================================================================================================

Disk: 0
Partition 3
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 2 C eMachines NTFS Partition 142 GB Healthy

======================================================================================================

Disk: 0
Partition 4
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 3 D New Volume NTFS Partition 142 GB Healthy

======================================================================================================

Partitions of Disk 1:
===============

Partition ### Type Size Offset
------------- ---------------- ------- -------
Partition 1 Primary 465 GB 31 KB

======================================================================================================

Disk: 1
Partition 1
Type : 07
Hidden: No
Active: No

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 5 H Expansion D NTFS Partition 465 GB Healthy

======================================================================================================

==========================================================

Last Boot: 2012-06-08 11:40

======================= End Of Log ==========================

#4 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 10 June 2012 - 10:49 PM

Hi

Please do the following:


Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

start
SubSystems: [Windows] ==> ZeroAccess
C:\Windows\System32\consrv.dll
HKLM\...\InprocServer32: [Default] \\.\globalroot\systemroot\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}\n. 
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070}
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070}
end

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options then select Command Prompt

Run FRST64 and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

Now restart, let it boot normally and tell me how it went.


NEXT



Refer to the ComboFix User's Guide

  • Download ComboFix from one of these locations:

    Link 1
    Link 2

    * IMPORTANT !!! Place ComboFix.exe on your Desktop
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with ComboFix.
    You can get help on disabling your protection programs here
  • Double click on ComboFix.exe & follow the prompts.
  • Your desktop may go blank. This is normal. It will return when ComboFix is done. ComboFix may reboot your machine. This is normal.
  • When finished, it shall produce a log for you. Post that log in your next reply

    Note:
    Do not mouseclick combofix's window whilst it's running. That may cause it to stall.


    ---------------------------------------------------------------------------------------------
  • Ensure your AntiVirus and AntiSpyware applications are re-enabled.

    ---------------------------------------------------------------------------------------------

NOTE: If you encounter a message "illegal operation attempted on registry key that has been marked for deletion" and no programs will run - please just reboot and that will resolve that error.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#5 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 11 June 2012 - 01:18 AM

Well, everything seems ok during the reboot, except that the screen resolution resets everytime i start my laptop

Here is the fixlog

Fix result of Farbar Recovery Tool (FRST written by Farbar) Version: 10-06-2012 03
Ran by SYSTEM at 2012-06-11 12:14:32 Run:1
Running from H:\

==============================================

HKEY_LOCAL_MACHINE\System\ControlSet001\Control\Session Manager\SubSystems\\Windows Value was restored successfully .
C:\Windows\System32\consrv.dll not found.
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32\\Default value was restored successfully .
C:\Windows\Installer\{4b69eed7-f42e-2511-f52b-fe599ad8c070} moved successfully.
C:\Users\peterchen\AppData\Local\{4b69eed7-f42e-2511-f52b-fe599ad8c070} moved successfully.

==== End of Fixlog ====

and the combofix log is too big that I cant even attach it, so im just gonna to zip it

Attached Files

  • Attached File  log.zip   51.93KB   4 downloads


#6 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 11 June 2012 - 07:27 AM

Please run the following:

Open notepad and copy/paste the text in the quotebox below into it:

Regedit /a netsvclook.txt "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost"
notepad netsvclook.txt


Save this as look.bat Choose to "Save type as" - "All Files"

Double click on look.bat & allow it to run.
A notepad file will open.
Copy that information into your next reply.
Thank-you.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#7 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 11 June 2012 - 08:18 AM

REGEDIT4

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost]
"RPCSS"=hex(7):52,70,63,45,70,74,4d,61,70,70,65,72,00,52,70,63,53,73,00,00
"defragsvc"=hex(7):64,65,66,72,61,67,73,76,63,00,00
"LocalSystemNetworkRestricted"=hex(7):55,78,53,6d,73,00,57,64,69,53,79,73,74,\
65,6d,48,6f,73,74,00,4e,65,74,6d,61,6e,00,74,72,6b,77,6b,73,00,41,75,64,69,\
6f,45,6e,64,70,6f,69,6e,74,42,75,69,6c,64,65,72,00,57,55,44,46,53,76,63,00,\
49,50,42,75,73,45,6e,75,6d,00,68,69,64,73,65,72,76,00,64,6f,74,33,73,76,63,\
00,69,72,6d,6f,6e,00,73,79,73,6d,61,69,6e,00,50,63,61,53,76,63,00,68,6f,6d,\
65,67,72,6f,75,70,6c,69,73,74,65,6e,65,72,00,57,50,44,42,75,73,45,6e,75,6d,\
00,77,6c,61,6e,73,76,63,00,54,61,62,6c,65,74,49,6e,70,75,74,53,65,72,76,69,\
63,65,00,43,73,63,53,65,72,76,69,63,65,00,55,6d,52,64,70,53,65,72,76,69,63,\
65,00,00
"LocalService"=hex(7):6e,73,69,00,57,64,69,53,65,72,76,69,63,65,48,6f,73,74,00,\
77,33,32,74,69,6d,65,00,45,76,65,6e,74,53,79,73,74,65,6d,00,52,65,6d,6f,74,\
65,52,65,67,69,73,74,72,79,00,57,69,6e,48,74,74,70,41,75,74,6f,50,72,6f,78,\
79,53,76,63,00,73,70,70,75,69,6e,6f,74,69,66,79,00,54,48,52,45,41,44,4f,52,\
44,45,52,00,6e,65,74,70,72,6f,66,6d,00,6c,6c,74,64,73,76,63,00,66,64,70,68,\
6f,73,74,00,53,73,74,70,53,76,63,00,57,65,62,43,6c,69,65,6e,74,00,00
"netsvcs"=hex(7):41,65,4c,6f,6f,6b,75,70,53,76,63,00,43,65,72,74,50,72,6f,70,\
53,76,63,00,53,43,50,6f,6c,69,63,79,53,76,63,00,6c,61,6e,6d,61,6e,73,65,72,\
76,65,72,00,67,70,73,76,63,00,49,4b,45,45,58,54,00,41,75,64,69,6f,53,72,76,\
00,46,61,73,74,55,73,65,72,53,77,69,74,63,68,69,6e,67,43,6f,6d,70,61,74,69,\
62,69,6c,69,74,79,00,49,61,73,00,49,72,6d,6f,6e,00,4e,6c,61,00,4e,74,6d,73,\
73,76,63,00,4e,57,43,57,6f,72,6b,73,74,61,74,69,6f,6e,00,4e,77,73,61,70,61,\
67,65,6e,74,00,52,61,73,61,75,74,6f,00,52,61,73,6d,61,6e,00,52,65,6d,6f,74,\
65,61,63,63,65,73,73,00,53,45,4e,53,00,53,68,61,72,65,64,61,63,63,65,73,73,\
00,53,52,53,65,72,76,69,63,65,00,54,61,70,69,73,72,76,00,57,6d,69,00,57,6d,\
64,6d,50,6d,53,70,00,72,00,54,65,72,6d,53,65,72,76,69,63,65,00,77,75,61,75,\
73,65,72,76,00,42,49,54,53,00,53,68,65,6c,6c,48,57,44,65,74,65,63,74,69,6f,\
6e,00,4c,6f,67,6f,6e,48,6f,75,72,73,00,50,43,41,75,64,69,74,00,68,65,6c,70,\
73,76,63,00,75,70,6c,6f,61,64,6d,67,72,00,69,70,68,6c,70,73,76,63,00,73,65,\
63,6c,6f,67,6f,6e,00,41,70,70,49,6e,66,6f,00,6d,73,69,73,63,73,69,00,4d,4d,\
43,53,53,00,77,69,6e,6d,67,6d,74,00,53,65,73,73,69,6f,6e,45,6e,76,00,62,72,\
6f,77,73,65,72,00,45,61,70,48,6f,73,74,00,73,63,68,65,64,75,6c,65,00,68,6b,\
6d,73,76,63,00,77,65,72,63,70,6c,73,75,70,70,6f,72,74,00,50,72,6f,66,53,76,\
63,00,54,68,65,6d,65,73,00,42,44,45,53,56,43,00,41,70,70,4d,67,6d,74,00,00
"WerSvcGroup"=hex(7):77,65,72,73,76,63,00,00
"LocalServiceNoNetwork"=hex(7):44,50,53,00,50,4c,41,00,42,46,45,00,6d,70,73,73,\
76,63,00,57,77,61,6e,53,76,63,00,00
"termsvcs"=hex(7):54,65,72,6d,53,65,72,76,69,63,65,00,00
"swprv"=hex(7):73,77,70,72,76,00,00
"LocalServiceNetworkRestricted"=hex(7):44,48,43,50,00,65,76,65,6e,74,6c,6f,67,\
00,41,75,64,69,6f,53,72,76,00,42,74,68,48,46,53,72,76,00,4c,6d,48,6f,73,74,\
73,00,77,73,63,73,76,63,00,68,6f,6d,65,67,72,6f,75,70,70,72,6f,76,69,64,65,\
72,00,57,50,43,53,76,63,00,00
"LocalServicePeerNet"=hex(7):50,4e,52,50,53,76,63,00,70,32,70,69,6d,73,76,63,\
00,70,32,70,73,76,63,00,50,6e,72,70,41,75,74,6f,52,65,67,00,00
"NetworkServiceAndNoImpersonation"=hex(7):4b,74,6d,52,6d,00,00
"regsvc"=hex(7):52,65,6d,6f,74,65,52,65,67,69,73,74,72,79,00,00
"LocalServiceAndNoImpersonation"=hex(7):53,53,44,50,53,52,56,00,75,70,6e,70,68,\
6f,73,74,00,53,43,61,72,64,53,76,72,00,54,42,53,00,66,64,72,65,73,70,75,62,\
00,46,6f,6e,74,43,61,63,68,65,00,41,70,70,49,44,53,76,63,00,51,57,41,56,45,\
00,77,63,6e,63,73,76,63,00,4d,63,78,32,53,76,63,00,53,65,6e,73,72,53,76,63,\
00,00
"DcomLaunch"=hex(7):50,6f,77,65,72,00,50,6c,75,67,50,6c,61,79,00,44,63,6f,6d,\
4c,61,75,6e,63,68,00,00
"NetworkServiceNetworkRestricted"=hex(7):50,6f,6c,69,63,79,41,67,65,6e,74,00,\
00
"NetworkService"=hex(7):43,72,79,70,74,53,76,63,00,44,48,43,50,00,54,65,72,6d,\
53,65,72,76,69,63,65,00,44,4e,53,43,61,63,68,65,00,6c,61,6e,6d,61,6e,77,6f,\
72,6b,73,74,61,74,69,6f,6e,00,4e,61,70,41,67,65,6e,74,00,6e,6c,61,73,76,63,\
00,57,69,6e,52,4d,00,57,45,43,53,56,43,00,54,61,70,69,73,72,76,00,00
"sdrsvc"=hex(7):73,64,72,73,76,63,00,00
"WbioSvcGroup"=hex(7):57,62,69,6f,53,72,76,63,00,00
"imgsvc"=hex(7):53,74,69,53,76,63,00,00
"wcssvc"=hex(7):57,63,73,50,6c,75,67,49,6e,53,65,72,76,69,63,65,00,00
"AxInstSVGroup"=hex(7):41,78,49,6e,73,74,53,56,00,00
"secsvcs"=hex(7):57,69,6e,44,65,66,65,6e,64,00,00
"bthsvcs"=hex(7):62,74,68,73,65,72,76,00,00
"PeerDist"=hex(7):50,65,65,72,44,69,73,74,53,76,63,00,00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\AxInstSVGroup]
"ImpersonationLevel"=dword:00000003
"CoInitializeSecurityParam"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\defragsvc]
"CoInitializeSecurityParam"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\LocalService]
"AuthenticationCapabilities"=dword:00002000
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\LocalServiceAndNoImpersonation]
"AuthenticationCapabilities"=dword:00002000
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\LocalServiceNetworkRestricted]
"DefaultRpcStackSize"=dword:00000040
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\LocalServiceNoNetwork]
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\LocalSystemNetworkRestricted]
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\netsvcs]
"AuthenticationCapabilities"=dword:00003020
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\NetworkService]
"CoInitializeSecurityParam"=dword:00000001
"DefaultRpcStackSize"=dword:0000001c

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\NetworkServiceRemoteDesktopHyperVAgent]
"CoInitializeSecurityParam"=dword:00000001
"AuthenticationCapabilities"=dword:00002000
"AuthenticationLevel"=dword:00000006

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\NetworkServiceRemoteDesktopPublishing]
"CoInitializeSecurityParam"=dword:00000001
"AuthenticationCapabilities"=dword:00002000
"AuthenticationLevel"=dword:00000006

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\SDRSVC]
"CoInitializeSecurityParam"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\swprv]
"CoInitializeSecurityParam"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\termsvcs]
"CoInitializeSecurityParam"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\wcssvc]
"CoInitializeSecurityParam"=dword:00000001
"CoInitializeSecurityAppID"="{CD11FAB6-1C0E-45e1-BA31-5C6008EF2607}"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\wercplsupport]
"AuthenticationCapabilities"=dword:00003020
"CoInitializeSecurityParam"=dword:00000001

#8 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 11 June 2012 - 08:35 AM

Hi

Please run the following:


  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

NetSvc::
r

ClearJavaCache::

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

**Note**

When CF finishes running, the ComboFix log will open along with a message box--do not be alarmed. With the above script, ComboFix will capture files to submit for analysis.
  • Ensure you are connected to the internet and click OK on the message box.


NEXT


You have a missing file that we need to see if there is a replacement on your machine

please run the following:


Please download SystemLook from one of the links below and save it to your Desktop.
Link 1
Link 2

  • Double-click SystemLook.exe to run it.
  • Copy the content of the following codebox into the main textfield:

    :filefind
    *mfc40*
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#9 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 11 June 2012 - 10:27 AM

this is the combofix log

ComboFix 12-06-10.01 - peterchen 2/06/11 周一 22:56:54.2.4 - x64
Microsoft Windows 7 Ultimate 6.1.7601.1.936.86.1033.18.1783.543 [GMT 8:00]
执行位置: c:\users\peterchen\Desktop\ComboFix.exe
Command switches used :: c:\users\peterchen\Desktop\CFscript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {9765EA51-0D3C-7DFB-6091-10E4E1F341F6}
SP: Microsoft Security Essentials *Disabled/Updated* {2C040BB5-2B06-7275-5A21-2B969A740B4B}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( 被删除的档案 )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\peterchen\AppData\Roaming\360SE
c:\users\peterchen\AppData\Roaming\360SE\Apps\2049\2049.png
c:\users\peterchen\AppData\Roaming\360SE\Apps\2049\app.ico
c:\users\peterchen\AppData\Roaming\360SE\Apps\2049\app.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\2049\app24.ico
c:\users\peterchen\AppData\Roaming\360SE\Apps\AppRecomStat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\appsi.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\Appslocal.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\Appslocal.ver
c:\users\peterchen\AppData\Roaming\360SE\Apps\AppsServer.ver
c:\users\peterchen\AppData\Roaming\360SE\Apps\AppStat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\config.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\default.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\app.ico
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\app.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\app24.ico
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\ExtFeedWeibo.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\ExtFeedWeibo.png
c:\users\peterchen\AppData\Roaming\360SE\Apps\ExtFeedWeibo\sidelogo.png
c:\users\peterchen\AppData\Roaming\360SE\Apps\NotifyDown.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmd.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\Recmd2.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmdinfo.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmdinfo2.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\root2.ver
c:\users\peterchen\AppData\Roaming\360SE\Apps\SEWebAppPlat.exe
c:\users\peterchen\AppData\Roaming\360SE\Apps\Sidebar.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\stat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\updatestat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\UseAppStat.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\360account.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\360se.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\360sefav.db
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\360seR.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\DailyBackup\360sefav_2012_06_11.favdb
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\Blankdata.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\Exinclude.dat
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\history.dat
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\6f83c9cd9c7e1ffee373d209b9643812.svp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\aupeopleweb.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\aupeopleweb.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\baike.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\bl135w.blu135.mail.live.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\bl135w.blu135.mail.live.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\cfse.momondo.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\config.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\ebay.com.au.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\en.wikipedia.org.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\help.360.cn.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\hi.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\home.meishichina.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\home.meishichina.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\image.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\image.baidu.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\item.taobao.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\katanningshs.det.wa.edu.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\kxt.fm.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\kxt.fm.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\login.live.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\login.sina.com.cn.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\lol.duowan.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\lol.duowan.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\m134.mail.qq.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\m134.mail.qq.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\mail.qq.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\makeit.cc.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\makeit.cc.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\maps.google.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\men.yoka.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\men.yoka.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\msg.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\myuniversity.gov.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\originpc.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\originpc.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\ptlogin2.qq.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\securitycenter.alipay.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\solomid.net.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\sugoideas.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\sugoideas.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\tieba.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\tieba.baidu.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\tt.mop.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\tt.mop.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\ttmeiju.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\ttmeiju.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\twitch.tv.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\user.qzone.qq.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\weibo.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\wenwen.soso.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\westpac.com.au.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\wiki.answers.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.asos.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.aujob.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.austin.net.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.baidu.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.bgpa.wa.gov.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.bleepingcomputer.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.cheapflights.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.converse.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.danla.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.danla.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.dy2018.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.dy2018.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.ebay.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.facebook.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.google.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.google.com.au.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.gumtree.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.gumtree.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.lifeonperth.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.meishichina.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.meishichina.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.myactimes.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.own3d.tv.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.putclub.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.putclub.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.sexmmcc.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.softjie.cn.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.softjie.cn.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.soumumu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.soumumu.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.taobao.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.timeshighereducation.co.uk.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.treetopsadventure.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.visitscotland.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.weibo.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.westpac.com.au.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.win7china.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.youtube.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\www.youtube.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\youtube.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\yyets.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\yyets.com.ico.tmp
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\zh-cn.twitch.tv.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\zhidao.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\ico\zhidao.baidu.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\0b489fdcc81bac5fdfb7849ebfcab643.png
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\4bf88ac3cad6a7c72250b2a1ef689509.png
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\b6180b57b66e083b3a34d459cd8be414.png
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\c39a143ac9fcfdc353624ee48e8b1ea5.png
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\logo\1b02bb6784816c4d2008446d860186f8.png
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\snapcache\snap.ini
c:\users\peterchen\AppData\Roaming\360SE\cc078fdf0b10d86c288934cbe3d3cb61\data\user.dat
c:\users\peterchen\AppData\Roaming\360SE\data\360sefav.db
c:\users\peterchen\AppData\Roaming\360SE\data\adfilter.ini
c:\users\peterchen\AppData\Roaming\360SE\data\Blankdata.ini
c:\users\peterchen\AppData\Roaming\360SE\data\DailyBackup\360sefav_2012_06_11.favdb
c:\users\peterchen\AppData\Roaming\360SE\data\history.dat
c:\users\peterchen\AppData\Roaming\360SE\data\ico\bl135w.blu135.mail.live.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.baidu.com.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.bleepingcomputer.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.own3d.tv.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.own3d.tv.ico.koal
c:\users\peterchen\AppData\Roaming\360SE\data\IEXCompat.dat
c:\users\peterchen\AppData\Roaming\360SE\data\preset_j.dat
c:\users\peterchen\AppData\Roaming\360SE\data\secache.ini
c:\users\peterchen\AppData\Roaming\360SE\data\snapcache\snap.ini
c:\users\peterchen\AppData\Roaming\360SE\data\user.dat
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\360Doctor.exe
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\diagnosis.dll
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\diagnosis.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\ExtDoctor.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\HttpClientW.dll
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDownload\stat.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtYouxi\ver.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\download.png
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Favorites.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Favorites2.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Log\360log_2012_06_11.log
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Quick.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000002
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000007
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000008
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pushinfo.xml
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pushupdate.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\Quick.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\SafeCentral.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\sc.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\urllibauth.dat
c:\users\peterchen\AppData\Roaming\360SE\login.ini
c:\users\peterchen\AppData\Roaming\360SE\v3update\updatecfg.ini
.
.
((((((((((((((((((((((((( 2012-05-11 至 2012-06-11 的新的档案 )))))))))))))))))))))))))))))))
.
.
2012-06-11 19:31 . 2012-06-11 19:32 -------- d-----w- C:\FRST
2012-06-11 15:06 . 2012-06-11 15:06 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-06-11 05:08 . 2012-05-14 17:41 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{F400AF79-BB57-44EE-BF7F-AB680BD04BC7}\mpengine.dll
2012-06-10 05:31 . 2012-02-09 05:17 927800 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{5EC3C954-C82E-4D28-B6E5-835FB5603489}\gapaengine.dll
2012-06-10 05:28 . 2012-05-14 17:41 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-06-10 05:23 . 2012-06-10 05:23 -------- d-----w- c:\program files (x86)\Microsoft Security Client
2012-06-10 05:23 . 2012-06-10 05:24 -------- d-----w- c:\program files\Microsoft Security Client
2012-06-09 19:12 . 2012-06-09 19:12 -------- d-sh--w- c:\windows\SysWow64\%APPDATA%
2012-06-02 17:11 . 2011-11-01 07:05 262144 ----a-w- c:\windows\SysWow64\GameLink.dll
2012-06-01 08:37 . 2012-06-01 08:37 -------- d-----w- c:\program files (x86)\Common Files\alipay
2012-05-31 16:41 . 2012-05-31 16:41 -------- d-----w- c:\users\peterchen\AppData\Roaming\LolClient2
2012-05-22 14:12 . 2012-04-23 03:54 5173624 ----a-w- c:\windows\system32\QQPinyin.ime
2012-05-19 09:44 . 2012-05-19 09:44 -------- d-----w- C:\Download
2012-05-17 01:51 . 2012-03-30 11:35 1918320 ----a-w- c:\windows\system32\drivers\tcpip.sys
2012-05-17 01:51 . 2012-03-31 05:42 1732096 ----a-w- c:\program files\Windows Journal\NBDoc.DLL
2012-05-17 01:51 . 2012-03-31 05:40 1367552 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51 . 2012-03-31 04:29 936960 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51 . 2012-03-31 05:40 1393664 ----a-w- c:\program files\Windows Journal\JNTFiltr.dll
2012-05-17 01:51 . 2012-03-31 05:40 1402880 ----a-w- c:\program files\Windows Journal\JNWDRV.dll
2012-05-14 06:00 . 2012-06-01 08:36 -------- d-----w- c:\program files (x86)\alipay
2012-05-12 16:19 . 2012-03-31 06:05 5559664 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-05-12 16:19 . 2012-03-31 03:10 3146240 ----a-w- c:\windows\system32\win32k.sys
2012-05-12 16:19 . 2012-03-31 04:39 3913072 ----a-w- c:\windows\SysWow64\ntoskrnl.exe
2012-05-12 16:19 . 2012-03-31 04:39 3968368 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe
2012-05-12 16:18 . 2012-03-03 06:35 1544704 ----a-w- c:\windows\system32\DWrite.dll
2012-05-12 16:18 . 2012-03-03 05:31 1077248 ----a-w- c:\windows\SysWow64\DWrite.dll
2012-05-12 16:18 . 2012-03-17 07:58 75120 ----a-w- c:\windows\system32\drivers\partmgr.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( 在三个月内被修改的档案 ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-06-10 07:10 . 2011-01-18 03:56 163920 ----a-w- c:\windows\system32\TesSafe.sys
2012-06-10 04:51 . 2012-03-29 13:33 426184 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2012-06-10 04:51 . 2011-05-17 00:18 70344 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-05-01 21:46 . 2012-04-21 19:29 69000 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{582CF93F-42F8-4097-AF13-E8BB86DC54AC}\offreg.dll
2012-04-28 18:12 . 2012-04-28 18:13 525544 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-23 14:45 . 2011-12-30 12:13 126304 ----a-w- c:\windows\SysWow64\gamelsp.dll
2012-04-23 03:54 . 2012-04-23 03:54 3077496 ----a-w- c:\windows\SysWow64\QQPinyin.ime
2012-04-13 08:46 . 2012-04-21 10:54 8917360 ------w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{582CF93F-42F8-4097-AF13-E8BB86DC54AC}\mpengine.dll
2012-04-07 09:46 . 2012-04-21 08:16 120600 ----a-w- c:\windows\SysWow64\xunyount.dll
2012-03-20 12:44 . 2012-03-20 12:44 98688 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys
2012-03-20 12:44 . 2012-03-20 12:44 203888 ----a-w- c:\windows\system32\drivers\MpFilter.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2012-06-11_04.49.27 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-07-26 02:00 . 2012-06-11 15:11 94162 c:\windows\system32\wdi\ShutdownPerformanceDiagnostics_SystemData.bin
- 2009-07-14 05:10 . 2012-06-11 04:50 39626 c:\windows\system32\wdi\BootPerformanceDiagnostics_SystemData.bin
+ 2009-07-14 05:10 . 2012-06-11 15:11 39626 c:\windows\system32\wdi\BootPerformanceDiagnostics_SystemData.bin
+ 2010-12-03 08:58 . 2012-06-11 15:11 28034 c:\windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3946308027-4287415337-442169952-1001_UserData.bin
+ 2010-12-04 15:47 . 2012-06-11 15:08 6580 c:\windows\system32\wdi\ERCQueuedResolutions.dat
- 2010-12-04 15:47 . 2012-06-10 10:34 6580 c:\windows\system32\wdi\ERCQueuedResolutions.dat
+ 2012-06-11 15:09 . 2012-06-11 15:09 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2012-06-11 04:48 . 2012-06-11 04:48 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2012-06-11 04:48 . 2012-06-11 04:48 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2012-06-11 15:09 . 2012-06-11 15:09 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2009-07-14 05:01 . 2012-06-11 04:47 347208 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2009-07-14 05:01 . 2012-06-11 15:08 347208 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2011-07-28 11:13 . 2012-06-11 15:08 37526372 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-S-1-5-21-3946308027-4287415337-442169952-1001-12288.dat
.
((((((((((((((((((((((((((((((((((((( 重要登入点 ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*注意* 空白与合法缺省登录将不会被显示
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PPS Accelerator"="c:\progra~2\PPStream\ppsap.exe" [2010-02-24 214408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"LManager"="c:\program files (x86)\Launch Manager\LManager.exe" [2010-06-22 968272]
"IAStorIcon"="c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe" [2010-03-04 284696]
"QvodTerminal"="e:\qvodplayer\QvodTerminal.exe" [2012-02-13 1034128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
"EnableUIPI"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HideSCAHealth"= 1 (0x1)
"EnableShellExecuteHooks"= 1 (0x1)
"OldEnableShellExecuteHooks"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ \0
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\keyboard layouts\e0200804]
Ime File REG_SZ QQPINYIN.IME
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
R3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-10 257224]
R3 AmUStor;AM USB Stroage Driver;c:\windows\system32\drivers\AmUStor.SYS [x]
R3 androidusb;ADB Interface Driver;c:\windows\system32\Drivers\androidusb.sys [x]
R3 ApolloProtect;ApolloProtect;e:\program files (x86)\T2CN\街头篮球\Apollo\Apollo.sys [x]
R3 ComputerZ_x64;ComputerZ_x64;c:\program files (x86)\360\360HardwareMaster\ComputerZ_x64.sys [x]
R3 cpuz135;cpuz135;c:\users\PETERC~1\AppData\Local\Temp\cpuz135\cpuz135_x64.sys [x]
R3 EagleX64;EagleX64;c:\windows\system32\drivers\EagleX64.sys [x]
R3 esgiguard;esgiguard;c:\program files (x86)\Enigma Software Group\SpyHunter\esgiguard.sys [x]
R3 GGSAFERDriver;GGSAFER Driver;c:\program files (x86)\Garena Plus\Room\safedrv.sys [x]
R3 ksfmonsys;ksfmonsys;e:\program files (x86)\KSafe\ksfmonsys64.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2012-03-26 291696]
R3 Point64;Microsoft IntelliPoint Filter Driver;c:\windows\system32\DRIVERS\point64.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [x]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [x]
R3 TcHardWare;TcHardWare;e:\program files (x86)\Tencent\QQPCMgr\QQPCHW.sys [x]
R3 tcphoc;tcphoc;e:\program files (x86)\Thunder Network\Thunder\XLDoctor\7.1.3.2044_1\Program\tcphoc.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [x]
R3 Updater Service;Updater Service;c:\program files\eMachines\eMachines Updater\UpdaterService.exe [2010-01-28 243232]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [x]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R3 XLServicePlatform;XLServicePlatform;c:\windows\system32\svchost [x]
R3 zghsmdm;ZTE General Handset USB Modem Proprietary;c:\windows\system32\DRIVERS\zghsmdm.sys [x]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 AlipaySecSvc;Alipay security service;c:\program files (x86)\alipay\alieditplus\AlipaySecSvc.exe [2012-05-21 303968]
S2 AliveSvc;Alipay alive service;c:\program files (x86)\Common Files\alipay\AliveService\AliveService.exe [2012-05-21 109408]
S2 DsiWMIService;Dritek WMI Service;c:\program files (x86)\Launch Manager\dsiwmis.exe [2010-06-22 321104]
S2 ePowerSvc;Acer ePower Service;c:\program files\eMachines\eMachines Power Management\ePowerSvc.exe [2010-06-11 868896]
S2 GREGService;GREGService;c:\program files (x86)\eMachines\Registration\GREGsvc.exe [2010-01-08 23584]
S2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2010-03-04 13336]
S2 UNS;Intel® Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2010-02-03 2320920]
S3 HECIx64;Intel® Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [x]
S3 Impcd;Impcd;c:\windows\system32\DRIVERS\Impcd.sys [x]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\DRIVERS\IntcDAud.sys [x]
S3 k57nd60a;Broadcom NetLink ™ Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\k57nd60a.sys [x]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
XLServicePlatform REG_MULTI_SZ XLServicePlatform
.
计划任务 文件夹 里的内容
.
2012-06-11 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-29 04:51]
.
2012-06-11 c:\windows\Tasks\AliUpdater{5A14365A-634A-4D2F-BC28-71037CE728AB}.job
- c:\program files (x86)\AliWangWang\AliTask.exe [2011-11-22 13:57]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{004B0726-A010-4ABF-8556-FCDB7F1FCA1E}]
2012-01-04 09:29 627888 ----a-w- e:\program files (x86)\Thunder Network\Thunder\BHO\XunleiBHO647.2.5.3364.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"Acer ePower Management"="c:\program files\eMachines\eMachines Power Management\ePowerTray.exe" [2010-06-11 861216]
"AmIcoSinglun64"="c:\program files (x86)\AmIcoSingLun\AmIcoSinglun64.exe" [2010-06-10 324608]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-07-13 11046504]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2011-05-09 168216]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2011-05-09 392472]
"Persistence"="c:\windows\system32\igfxpers.exe" [2011-05-09 416024]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-03-26 1271168]
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
r
.
------- 而外的扫描 -------
.
uStart Page = hxxp://www.google.com.au/
uLocal Page = c:\windows\system32\blank.htm
mStart Page = about:blank
uInternet Settings,ProxyOverride = local
IE: &使用&迅雷下载 - e:\program files (x86)\Thunder Network\Thunder\BHO\geturl.htm
IE: &使用&迅雷下载全部链接 - e:\program files (x86)\Thunder Network\Thunder\BHO\GetAllUrl.htm
IE: &使用&迅雷离线下载 - e:\program files (x86)\Thunder Network\Thunder\BHO\OfflineDownload.htm
IE: 导出到 Microsoft Excel(&X) - c:\progra~2\MICROS~2\Office12\EXCEL.EXE/3000
IE: {{0A155D3C-68E2-4215-A47A-E800A446447A}
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
TCP: DhcpNameServer = 10.1.1.1
Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\progra~1\KuGou7\KUGOO3~1.OCX
Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\progra~1\KuGou7\KUGOO3~1.OCX
DPF: {9FAFB576-6933-4CCC-AB3D-B988EC43D04E} - hxxp://rsdownload.rising.com.cn/rs2010/online/ravolctl.cab
DPF: {C377230F-0F21-4838-938D-CB95B65BF023} - hxxp://jingang.yto56.com.cn/expws/js/SecActiveX.cab
DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} - hxxp://dl.pplive.com/PluginSetup.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀 N}廬
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\geturl.htm"
"Name"="xl_geturl"
"Contexts"=dword:00000022
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀 N}廻Q钀]
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\GetAllUrl.htm"
"Name"="xl_getallurl"
"Contexts"=dword:000000f3
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀粂縹 N}廬
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\OfflineDownload.htm"
"Name"="xl_offlinedownload"
"Contexts"=dword:00000022
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001_Classes\.*?柼扂e鷈6e剉颯憉噀鯪]
@Allowed: (Read) (RestrictedCode)
@="AliFileCheck.File"
.
[HKEY_LOCAL_MACHINE\software\Classes\.*?柼扂e鷈6e剉颯憉噀鯪]
@="AliFileCheck.File"
.
[HKEY_LOCAL_MACHINE\software\Classes\AudioCD\shell\O(uQ*Q*q_髼璬>e\command]
@="\"e:\\Program Files (x86)\\Tencent\\QQPlayer\\QQPlayer.exe\" /disk \"%1\""
.
[HKEY_LOCAL_MACHINE\software\Classes\DVD\shell\O(uQ*Q*q_髼璬>e\command]
@="\"e:\\Program Files (x86)\\Tencent\\QQPlayer\\QQPlayer.exe\" /disk \"%1\""
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_3_300_257_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_3_300_257_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Q*Q*黚髼搹eQ誰]
"DisplayName"="QQ拼音输入法4.5"
"UninstallString"="e:\\Program Files (x86)\\Tencent\\QQPinyin\\4.5.1206.400\\uninst.exe"
"DisplayIcon"="e:\\Program Files (x86)\\Tencent\\QQPinyin\\4.5.1206.400\\QQPinyin.ico"
"DisplayVersion"="4.5"
"Publisher"="腾讯公司"
.
[HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Q*Q*8nb]
"DisplayName"="QQ游戏"
"UninstallString"="e:\\Program Files\\腾讯游戏\\QQGame\\Uninstall.EXE"
"Publisher"="腾讯公司"
"DisplayIcon"="e:\\Program Files\\腾讯游戏\\QQGame\\QQGame.EXE"
"DisplayVersion"="3.0.104.50"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ 其他运行进程 ------------------------
.
c:\program files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
c:\program files (x86)\alipay\SafeTransaction\AlipaySafeTran.exe
c:\program files (x86)\PPStream\PPSAP.exe
.
**************************************************************************
.
完成时间: 2012-06-11 23:18:13 - 电脑已重新启动
ComboFix-quarantined-files.txt 2012-06-11 15:17
ComboFix2.txt 2012-06-11 04:57
.
Pre-Run: 99,781,906,432 bytes free
Post-Run: 99,802,755,072 bytes free
.
- - End Of File - - 0A2B72838C226445D2A9A1AC335BDF4C

and this is the systemlook log

SystemLook 30.07.11 by jpshortstuff
Log created at 23:21 on 11/06/2012 by peterchen
Administrator - Elevation successful

========== filefind ==========

Searching for "*mfc40*"
C:\Windows\ERDNT\cache86\mfc40u.dll --a---- 954288 bytes [04:54 11/06/2012] [12:19 20/11/2010] AB9EB3745B03AE67AB241A82338DEA7B
C:\Windows\SysWOW64\mfc40.dll --a---- 954752 bytes [04:21 11/10/2011] [12:19 20/11/2010] 2A6C1373D88B6D5933383B9F5C034CB9
C:\Windows\SysWOW64\mfc40u.dll --a---- 954288 bytes [04:21 11/10/2011] [12:19 20/11/2010] AB9EB3745B03AE67AB241A82338DEA7B
C:\Windows\SysWOW64\en-US\MFC40.dll.mui --a---- 29696 bytes [05:35 14/07/2009] [02:05 14/07/2009] 5AFE386A9F3479C6CBBACBDBBECE6F24
C:\Windows\SysWOW64\en-US\MFC40u.dll.mui --a---- 29696 bytes [05:35 14/07/2009] [02:09 14/07/2009] FB3B26477B46979948864E29A7A77FB5
C:\Windows\SysWOW64\zh-CN\MFC40.dll.mui --a---- 16384 bytes [09:02 18/06/2011] [12:00 13/07/2009] E889AA3A3335B23F352E33E4A7F0DD69
C:\Windows\SysWOW64\zh-CN\MFC40u.dll.mui --a---- 16384 bytes [09:02 18/06/2011] [11:53 13/07/2009] BBFDC70C74680A612736BABAB87821CE
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40.resources_31bf3856ad364e35_6.1.7600.16385_en-us_76fe0af11a705ffa.manifest --a---- 1870 bytes [05:35 14/07/2009] [02:29 14/07/2009] 72605C10307C59826018758C16734835
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_d684755f01923a0c.manifest ------- 1870 bytes [09:01 18/06/2011] [12:12 13/07/2009] 9DF1607C021DB198643B80A196641CFF
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u.resources_31bf3856ad364e35_6.1.7600.16385_en-us_2236ca5a331c6757.manifest --a---- 1873 bytes [05:35 14/07/2009] [02:29 14/07/2009] B89E96E800DA9A48F190E25F615A0EF9
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_81bd34c81a3e4169.manifest ------- 1873 bytes [09:01 18/06/2011] [12:12 13/07/2009] CB5908B2F679F75C47D63EBC800DC2F5
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.16385_none_f2e96828b6e3cefa.manifest --a---- 2313 bytes [02:33 14/07/2009] [01:51 14/07/2009] 1BF030985D8320132D1C8685C9F1A0DA
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.16666_none_f3000dfcb6d2a7e4.manifest ------- 2313 bytes [00:46 04/12/2010] [05:04 31/08/2010] 55DC49C8BF7E7BC9567B5223A503E9E1
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.20791_none_f3643991d00d1cce.manifest ------- 2313 bytes [00:46 04/12/2010] [04:55 31/08/2010] 6E4A6473DEC3AE3E0BEBE12BF2F62E16
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7601.17514_none_f51a7bf0b3d25294.manifest ------- 2313 bytes [14:35 10/07/2011] [21:05 19/11/2010] E439AC3F75E1548CB9DE3F777F9BFC52
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.16385_none_59d5443a431a8cad.manifest --a---- 2307 bytes [02:33 14/07/2009] [01:49 14/07/2009] 6AFA64728648DE06D67D36000E474A32
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.16666_none_59ebea0e43096597.manifest ------- 2307 bytes [00:46 04/12/2010] [05:02 31/08/2010] 8D5B1C6B309BFBFD428C3CD0352A9A04
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.20791_none_5a5015a35c43da81.manifest ------- 2307 bytes [00:46 04/12/2010] [04:53 31/08/2010] 1B839439F2E6B6CB6C1B78231B360E36
C:\Windows\winsxs\Manifests\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7601.17514_none_5c06580240091047.manifest ------- 2307 bytes [14:35 10/07/2011] [21:03 19/11/2010] 4BC64AEFDBA75286FD343F2ECE768CA9
C:\Windows\winsxs\x86_microsoft-windows-mfc40.resources_31bf3856ad364e35_6.1.7600.16385_en-us_76fe0af11a705ffa\MFC40.dll.mui --a---- 29696 bytes [05:35 14/07/2009] [02:05 14/07/2009] 5AFE386A9F3479C6CBBACBDBBECE6F24
C:\Windows\winsxs\x86_microsoft-windows-mfc40.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_d684755f01923a0c\MFC40.dll.mui --a---- 16384 bytes [09:02 18/06/2011] [12:00 13/07/2009] E889AA3A3335B23F352E33E4A7F0DD69
C:\Windows\winsxs\x86_microsoft-windows-mfc40u.resources_31bf3856ad364e35_6.1.7600.16385_en-us_2236ca5a331c6757\MFC40u.dll.mui --a---- 29696 bytes [05:35 14/07/2009] [02:09 14/07/2009] FB3B26477B46979948864E29A7A77FB5
C:\Windows\winsxs\x86_microsoft-windows-mfc40u.resources_31bf3856ad364e35_6.1.7600.16385_zh-cn_81bd34c81a3e4169\MFC40u.dll.mui --a---- 16384 bytes [09:02 18/06/2011] [11:53 13/07/2009] BBFDC70C74680A612736BABAB87821CE
C:\Windows\winsxs\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.16385_none_f2e96828b6e3cefa\mfc40u.dll --a---- 924944 bytes [21:07 13/07/2009] [01:15 14/07/2009] F8742FC618ECBDA92A406725197E93AE
C:\Windows\winsxs\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.16666_none_f3000dfcb6d2a7e4\mfc40u.dll --a---- 954288 bytes [01:16 04/12/2010] [04:32 31/08/2010] 1B3A500340AC40F08D03A2C45213A17D
C:\Windows\winsxs\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7600.20791_none_f3643991d00d1cce\mfc40u.dll --a---- 954288 bytes [01:16 04/12/2010] [04:25 31/08/2010] A716981A8BB41F4149203687EE2D1BE4
C:\Windows\winsxs\x86_microsoft-windows-mfc40u_31bf3856ad364e35_6.1.7601.17514_none_f51a7bf0b3d25294\mfc40u.dll --a---- 954288 bytes [04:21 11/10/2011] [12:19 20/11/2010] AB9EB3745B03AE67AB241A82338DEA7B
C:\Windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.16385_none_59d5443a431a8cad\mfc40.dll --a---- 924944 bytes [21:07 13/07/2009] [01:15 14/07/2009] ED27C26A453A631151B816A86FC85D6E
C:\Windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.16666_none_59ebea0e43096597\mfc40.dll --a---- 954752 bytes [01:16 04/12/2010] [04:32 31/08/2010] E2617B3C93FFE274CA199D51D0B84C1A
C:\Windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7600.20791_none_5a5015a35c43da81\mfc40.dll --a---- 954752 bytes [01:16 04/12/2010] [04:25 31/08/2010] F3845F1730BC13FED18AC7AD59217E20
C:\Windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7601.17514_none_5c06580240091047\mfc40.dll --a---- 954752 bytes [04:21 11/10/2011] [12:19 20/11/2010] 2A6C1373D88B6D5933383B9F5C034CB9

-= EOF =-

#10 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 11 June 2012 - 10:46 AM

Hi

Please run the following:

  • Very Important! Temporarily disable your anti-virus, script blocking and any anti-malware real-time protection before following the steps below.
  • They can interfere with ComboFix or remove some of its embedded files which may cause "unpredictable results".
Copy/paste the text inside the Codebox below into notepad:

Here's how to do that:
Click Start > Run type Notepad click OK.
This will open an empty notepad file:

Copy all the text inside of the code box - Press Ctrl+C (or right click on the highlighted section and choose 'copy')

FCopy::
C:\Windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7601.17514_none_5c06580240091047\mfc40.dll | C:\Windows\System32\mfc40.dll

Registry::
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost]
"netsvcs"=hex(7):41,65,4c,6f,6f,6b,75,70,53,76,63,00,43,65,72,74,50,72,6f,70,53,76,63,\
  00,53,43,50,6f,6c,69,63,79,53,76,63,00,6c,61,6e,6d,61,6e,73,65,72,76,65,72,\
  00,67,70,73,76,63,00,49,4b,45,45,58,54,00,41,75,64,69,6f,53,72,76,00,46,61,\
  73,74,55,73,65,72,53,77,69,74,63,68,69,6e,67,43,6f,6d,70,61,74,69,62,69,6c,\
  69,74,79,00,49,61,73,00,49,72,6d,6f,6e,00,4e,6c,61,00,4e,74,6d,73,73,76,63,\
  00,4e,57,43,57,6f,72,6b,73,74,61,74,69,6f,6e,00,4e,77,73,61,70,61,67,65,6e,\
  74,00,52,61,73,61,75,74,6f,00,52,61,73,6d,61,6e,00,52,65,6d,6f,74,65,61,63,\
  63,65,73,73,00,53,45,4e,53,00,53,68,61,72,65,64,61,63,63,65,73,73,00,53,52,\
  53,65,72,76,69,63,65,00,54,61,70,69,73,72,76,00,57,6d,69,00,57,6d,64,6d,50,\
  6d,53,70,00,54,65,72,6d,53,65,72,76,69,63,65,00,77,75,61,75,73,65,72,76,00,\
  42,49,54,53,00,53,68,65,6c,6c,48,57,44,65,74,65,63,74,69,6f,6e,00,4c,6f,67,\
  6f,6e,48,6f,75,72,73,00,50,43,41,75,64,69,74,00,68,65,6c,70,73,76,63,00,75,\
  70,6c,6f,61,64,6d,67,72,00,69,70,68,6c,70,73,76,63,00,73,65,63,6c,6f,67,6f,\
  6e,00,41,70,70,49,6e,66,6f,00,6d,73,69,73,63,73,69,00,4d,4d,43,53,53,00,77,\
  69,6e,6d,67,6d,74,00,53,65,73,73,69,6f,6e,45,6e,76,00,62,72,6f,77,73,65,72,\
  00,45,61,70,48,6f,73,74,00,73,63,68,65,64,75,6c,65,00,68,6b,6d,73,76,63,00,\
  77,65,72,63,70,6c,73,75,70,70,6f,72,74,00,50,72,6f,66,53,76,63,00,54,68,65,\
  6d,65,73,00,42,44,45,53,56,43,00,41,70,70,4d,67,6d,74,00,00

ClearJavaCache::

Now paste the copied text into the open notepad - press CTRL+V (or right click and choose 'paste')

Save this file to your desktop, Save this as "CFScript"


Here's how to do that:

1.Click File;
2.Click Save As... Change the directory to your desktop;
3.Change the Save as type to "All Files";
4.Type in the file name: CFScript
5.Click Save ...

Posted Image
  • Referring to the screenshot above, drag CFScript.txt into ComboFix.exe.
  • ComboFix may request an update; please allow it.
  • ComboFix will now run a scan on your system. It may reboot your system when it finishes. This is normal.
  • When finished, it shall produce a log for you.
  • Copy and paste the contents of the log in your next reply.

CAUTION: Do not mouse-click ComboFix's window while it is running. That may cause it to stall.

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#11 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 11 June 2012 - 11:14 AM

ComboFix 12-06-10.01 - peterchen 2/06/11 周一 23:54:15.3.4 - x64
Microsoft Windows 7 Ultimate 6.1.7601.1.936.86.1033.18.1783.512 [GMT 8:00]
执行位置: c:\users\peterchen\Desktop\ComboFix.exe
Command switches used :: c:\users\peterchen\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {9765EA51-0D3C-7DFB-6091-10E4E1F341F6}
SP: Microsoft Security Essentials *Disabled/Updated* {2C040BB5-2B06-7275-5A21-2B969A740B4B}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( 被删除的档案 )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\peterchen\AppData\Roaming\360SE
c:\users\peterchen\AppData\Roaming\360SE\Apps\appsi.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\Appslocal.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\AppsServer.ver
c:\users\peterchen\AppData\Roaming\360SE\Apps\AppStat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\config.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\default.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\NotifyDown.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmd.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\Recmd2.dll
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmdinfo.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\recmdinfo2.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\root2.ver
c:\users\peterchen\AppData\Roaming\360SE\Apps\SEWebAppPlat.exe
c:\users\peterchen\AppData\Roaming\360SE\Apps\Sidebar.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\stat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\updatestat.ini
c:\users\peterchen\AppData\Roaming\360SE\Apps\UseAppStat.ini
c:\users\peterchen\AppData\Roaming\360SE\data\360sefav.db
c:\users\peterchen\AppData\Roaming\360SE\data\adfilter.ini
c:\users\peterchen\AppData\Roaming\360SE\data\history.dat
c:\users\peterchen\AppData\Roaming\360SE\data\ico\bl135w.blu135.mail.live.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\jpshortstuff.247fixes.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.baidu.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\ico\www.bleepingcomputer.com.ico
c:\users\peterchen\AppData\Roaming\360SE\data\IEXCompat.dat
c:\users\peterchen\AppData\Roaming\360SE\data\snapcache\snap.ini
c:\users\peterchen\AppData\Roaming\360SE\data\user.dat
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\360Doctor.exe
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\ExtDoctor.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDoctor\HttpClientW.dll
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDownload\ExtDownload.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtDownload\stat.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\ExtYouxi\ver.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Favorites.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Favorites2.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Log\360log_2012_06_11.log
c:\users\peterchen\AppData\Roaming\360SE\extensions\Favorites\Quick.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000002
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000007
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pic\100000008
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pushinfo.xml
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\pushupdate.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\LoginEnrol\Quick.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\SafeCentral.ini
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\urllib.dat
c:\users\peterchen\AppData\Roaming\360SE\extensions\SafeCentral\urllibauth.dat
c:\users\peterchen\AppData\Roaming\360SE\login.ini
.
.
--------------- FCopy ---------------
.
c:\windows\winsxs\x86_microsoft-windows-mfc40_31bf3856ad364e35_6.1.7601.17514_none_5c06580240091047\mfc40.dll --> c:\windows\System32\mfc40.dll
.
((((((((((((((((((((((((( 2012-05-11 至 2012-06-11 的新的档案 )))))))))))))))))))))))))))))))
.
.
2012-06-11 19:31 . 2012-06-11 19:32 -------- d-----w- C:\FRST
2012-06-11 16:02 . 2012-06-11 16:02 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-06-11 15:54 . 2010-11-20 12:19 954752 ----a-w- c:\windows\system32\mfc40.dll
2012-06-11 15:31 . 2012-05-14 17:41 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{E6AA84CC-23EA-4558-9E32-1A7CC3B823E2}\mpengine.dll
2012-06-11 05:08 . 2012-05-14 17:41 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2012-06-10 05:31 . 2012-02-09 05:17 927800 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{5EC3C954-C82E-4D28-B6E5-835FB5603489}\gapaengine.dll
2012-06-10 05:23 . 2012-06-10 05:23 -------- d-----w- c:\program files (x86)\Microsoft Security Client
2012-06-10 05:23 . 2012-06-10 05:24 -------- d-----w- c:\program files\Microsoft Security Client
2012-06-09 19:12 . 2012-06-09 19:12 -------- d-sh--w- c:\windows\SysWow64\%APPDATA%
2012-06-02 17:11 . 2011-11-01 07:05 262144 ----a-w- c:\windows\SysWow64\GameLink.dll
2012-06-01 08:37 . 2012-06-01 08:37 -------- d-----w- c:\program files (x86)\Common Files\alipay
2012-05-31 16:41 . 2012-05-31 16:41 -------- d-----w- c:\users\peterchen\AppData\Roaming\LolClient2
2012-05-22 14:12 . 2012-04-23 03:54 5173624 ----a-w- c:\windows\system32\QQPinyin.ime
2012-05-19 09:44 . 2012-05-19 09:44 -------- d-----w- C:\Download
2012-05-17 01:51 . 2012-03-30 11:35 1918320 ----a-w- c:\windows\system32\drivers\tcpip.sys
2012-05-17 01:51 . 2012-03-31 05:42 1732096 ----a-w- c:\program files\Windows Journal\NBDoc.DLL
2012-05-17 01:51 . 2012-03-31 05:40 1367552 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51 . 2012-03-31 04:29 936960 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll
2012-05-17 01:51 . 2012-03-31 05:40 1393664 ----a-w- c:\program files\Windows Journal\JNTFiltr.dll
2012-05-17 01:51 . 2012-03-31 05:40 1402880 ----a-w- c:\program files\Windows Journal\JNWDRV.dll
2012-05-14 06:00 . 2012-06-01 08:36 -------- d-----w- c:\program files (x86)\alipay
2012-05-12 16:19 . 2012-03-31 06:05 5559664 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-05-12 16:19 . 2012-03-31 03:10 3146240 ----a-w- c:\windows\system32\win32k.sys
2012-05-12 16:19 . 2012-03-31 04:39 3913072 ----a-w- c:\windows\SysWow64\ntoskrnl.exe
2012-05-12 16:19 . 2012-03-31 04:39 3968368 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe
2012-05-12 16:18 . 2012-03-03 06:35 1544704 ----a-w- c:\windows\system32\DWrite.dll
2012-05-12 16:18 . 2012-03-03 05:31 1077248 ----a-w- c:\windows\SysWow64\DWrite.dll
2012-05-12 16:18 . 2012-03-17 07:58 75120 ----a-w- c:\windows\system32\drivers\partmgr.sys
.
.
.
(((((((((((((((((((((((((((((((((((((((( 在三个月内被修改的档案 ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-06-10 07:10 . 2011-01-18 03:56 163920 ----a-w- c:\windows\system32\TesSafe.sys
2012-06-10 04:51 . 2012-03-29 13:33 426184 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2012-06-10 04:51 . 2011-05-17 00:18 70344 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2012-05-01 21:46 . 2012-04-21 19:29 69000 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{582CF93F-42F8-4097-AF13-E8BB86DC54AC}\offreg.dll
2012-04-28 18:12 . 2012-04-28 18:13 525544 ----a-w- c:\windows\system32\deployJava1.dll
2012-04-23 14:45 . 2011-12-30 12:13 126304 ----a-w- c:\windows\SysWow64\gamelsp.dll
2012-04-23 03:54 . 2012-04-23 03:54 3077496 ----a-w- c:\windows\SysWow64\QQPinyin.ime
2012-04-13 08:46 . 2012-04-21 10:54 8917360 ------w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{582CF93F-42F8-4097-AF13-E8BB86DC54AC}\mpengine.dll
2012-04-07 09:46 . 2012-04-21 08:16 120600 ----a-w- c:\windows\SysWow64\xunyount.dll
2012-03-20 12:44 . 2012-03-20 12:44 98688 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys
2012-03-20 12:44 . 2012-03-20 12:44 203888 ----a-w- c:\windows\system32\drivers\MpFilter.sys
.
.
((((((((((((((((((((((((((((( SnapShot@2012-06-11_04.49.27 )))))))))))))))))))))))))))))))))))))))))
.
+ 2010-07-26 02:00 . 2012-06-11 16:05 94320 c:\windows\system32\wdi\ShutdownPerformanceDiagnostics_SystemData.bin
+ 2009-07-14 05:10 . 2012-06-11 16:05 39626 c:\windows\system32\wdi\BootPerformanceDiagnostics_SystemData.bin
- 2009-07-14 05:10 . 2012-06-11 04:50 39626 c:\windows\system32\wdi\BootPerformanceDiagnostics_SystemData.bin
+ 2010-12-03 08:58 . 2012-06-11 16:05 28082 c:\windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-3946308027-4287415337-442169952-1001_UserData.bin
+ 2010-12-04 15:47 . 2012-06-11 15:08 6580 c:\windows\system32\wdi\ERCQueuedResolutions.dat
- 2010-12-04 15:47 . 2012-06-10 10:34 6580 c:\windows\system32\wdi\ERCQueuedResolutions.dat
+ 2011-11-16 02:27 . 2012-06-11 16:05 1512 c:\windows\system32\wdi\{b171ab1c-60e9-4301-a338-beab1c70b3e9}.bin
- 2012-06-11 04:48 . 2012-06-11 04:48 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
+ 2012-06-11 16:03 . 2012-06-11 16:03 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
- 2012-06-11 04:48 . 2012-06-11 04:48 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
+ 2012-06-11 16:03 . 2012-06-11 16:03 2048 c:\windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
- 2009-07-14 05:01 . 2012-06-11 04:47 347208 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2009-07-14 05:01 . 2012-06-11 16:02 347208 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-System.dat
+ 2011-07-28 11:13 . 2012-06-11 16:02 37672440 c:\windows\ServiceProfiles\LocalService\AppData\Local\FontCache-S-1-5-21-3946308027-4287415337-442169952-1001-12288.dat
.
((((((((((((((((((((((((((((((((((((( 重要登入点 ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*注意* 空白与合法缺省登录将不会被显示
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PPS Accelerator"="c:\progra~2\PPStream\ppsap.exe" [2010-02-24 214408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"LManager"="c:\program files (x86)\Launch Manager\LManager.exe" [2010-06-22 968272]
"IAStorIcon"="c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe" [2010-03-04 284696]
"QvodTerminal"="e:\qvodplayer\QvodTerminal.exe" [2012-02-13 1034128]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
"EnableUIPI"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"HideSCAHealth"= 1 (0x1)
"EnableShellExecuteHooks"= 1 (0x1)
"OldEnableShellExecuteHooks"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ \0
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\keyboard layouts\e0200804]
Ime File REG_SZ QQPINYIN.IME
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
R3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-10 257224]
R3 AmUStor;AM USB Stroage Driver;c:\windows\system32\drivers\AmUStor.SYS [x]
R3 androidusb;ADB Interface Driver;c:\windows\system32\Drivers\androidusb.sys [x]
R3 ApolloProtect;ApolloProtect;e:\program files (x86)\T2CN\街头篮球\Apollo\Apollo.sys [x]
R3 ComputerZ_x64;ComputerZ_x64;c:\program files (x86)\360\360HardwareMaster\ComputerZ_x64.sys [x]
R3 cpuz135;cpuz135;c:\users\PETERC~1\AppData\Local\Temp\cpuz135\cpuz135_x64.sys [x]
R3 EagleX64;EagleX64;c:\windows\system32\drivers\EagleX64.sys [x]
R3 esgiguard;esgiguard;c:\program files (x86)\Enigma Software Group\SpyHunter\esgiguard.sys [x]
R3 GGSAFERDriver;GGSAFER Driver;c:\program files (x86)\Garena Plus\Room\safedrv.sys [x]
R3 ksfmonsys;ksfmonsys;e:\program files (x86)\KSafe\ksfmonsys64.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2012-03-26 291696]
R3 Point64;Microsoft IntelliPoint Filter Driver;c:\windows\system32\DRIVERS\point64.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [x]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [x]
R3 TcHardWare;TcHardWare;e:\program files (x86)\Tencent\QQPCMgr\QQPCHW.sys [x]
R3 tcphoc;tcphoc;e:\program files (x86)\Thunder Network\Thunder\XLDoctor\7.1.3.2044_1\Program\tcphoc.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [x]
R3 Updater Service;Updater Service;c:\program files\eMachines\eMachines Updater\UpdaterService.exe [2010-01-28 243232]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [x]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
R3 XLServicePlatform;XLServicePlatform;c:\windows\system32\svchost [x]
R3 zghsmdm;ZTE General Handset USB Modem Proprietary;c:\windows\system32\DRIVERS\zghsmdm.sys [x]
S1 vwififlt;Virtual WiFi Filter Driver;c:\windows\system32\DRIVERS\vwififlt.sys [x]
S2 AlipaySecSvc;Alipay security service;c:\program files (x86)\alipay\alieditplus\AlipaySecSvc.exe [2012-05-21 303968]
S2 AliveSvc;Alipay alive service;c:\program files (x86)\Common Files\alipay\AliveService\AliveService.exe [2012-05-21 109408]
S2 DsiWMIService;Dritek WMI Service;c:\program files (x86)\Launch Manager\dsiwmis.exe [2010-06-22 321104]
S2 ePowerSvc;Acer ePower Service;c:\program files\eMachines\eMachines Power Management\ePowerSvc.exe [2010-06-11 868896]
S2 GREGService;GREGService;c:\program files (x86)\eMachines\Registration\GREGsvc.exe [2010-01-08 23584]
S2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2010-03-04 13336]
S2 UNS;Intel® Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2010-02-03 2320920]
S3 HECIx64;Intel® Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [x]
S3 Impcd;Impcd;c:\windows\system32\DRIVERS\Impcd.sys [x]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\DRIVERS\IntcDAud.sys [x]
S3 k57nd60a;Broadcom NetLink ™ Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\k57nd60a.sys [x]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
XLServicePlatform REG_MULTI_SZ XLServicePlatform
.
计划任务 文件夹 里的内容
.
2012-06-11 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-29 04:51]
.
2012-06-11 c:\windows\Tasks\AliUpdater{5A14365A-634A-4D2F-BC28-71037CE728AB}.job
- c:\program files (x86)\AliWangWang\AliTask.exe [2011-11-22 13:57]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{004B0726-A010-4ABF-8556-FCDB7F1FCA1E}]
2012-01-04 09:29 627888 ----a-w- e:\program files (x86)\Thunder Network\Thunder\BHO\XunleiBHO647.2.5.3364.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"Acer ePower Management"="c:\program files\eMachines\eMachines Power Management\ePowerTray.exe" [2010-06-11 861216]
"AmIcoSinglun64"="c:\program files (x86)\AmIcoSingLun\AmIcoSinglun64.exe" [2010-06-10 324608]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2010-07-13 11046504]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2011-05-09 168216]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2011-05-09 392472]
"Persistence"="c:\windows\system32\igfxpers.exe" [2011-05-09 416024]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-03-26 1271168]
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
r
.
------- 而外的扫描 -------
.
uStart Page = hxxp://www.google.com.au/
uLocal Page = c:\windows\system32\blank.htm
mStart Page = about:blank
uInternet Settings,ProxyOverride = local
IE: &使用&迅雷下载 - e:\program files (x86)\Thunder Network\Thunder\BHO\geturl.htm
IE: &使用&迅雷下载全部链接 - e:\program files (x86)\Thunder Network\Thunder\BHO\GetAllUrl.htm
IE: &使用&迅雷离线下载 - e:\program files (x86)\Thunder Network\Thunder\BHO\OfflineDownload.htm
IE: 导出到 Microsoft Excel(&X) - c:\progra~2\MICROS~2\Office12\EXCEL.EXE/3000
IE: {{0A155D3C-68E2-4215-A47A-E800A446447A}
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
Trusted Zone: alipay.com
Trusted Zone: alisoft.com
Trusted Zone: taobao.com
TCP: DhcpNameServer = 10.1.1.1
Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\progra~1\KuGou7\KUGOO3~1.OCX
Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - e:\progra~1\KuGou7\KUGOO3~1.OCX
DPF: {9FAFB576-6933-4CCC-AB3D-B988EC43D04E} - hxxp://rsdownload.rising.com.cn/rs2010/online/ravolctl.cab
DPF: {C377230F-0F21-4838-938D-CB95B65BF023} - hxxp://jingang.yto56.com.cn/expws/js/SecActiveX.cab
DPF: {EF0D1A14-1033-41A2-A589-240C01EDC078} - hxxp://dl.pplive.com/PluginSetup.cab
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀 N}廬
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\geturl.htm"
"Name"="xl_geturl"
"Contexts"=dword:00000022
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀 N}廻Q钀]
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\GetAllUrl.htm"
"Name"="xl_getallurl"
"Contexts"=dword:000000f3
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001\Software\Microsoft\Internet Explorer\MenuExt\&*O(u&*艔鳀粂縹 N}廬
@Allowed: (Read) (RestrictedCode)
@="e:\\Program Files (x86)\\Thunder Network\\Thunder\\BHO\\OfflineDownload.htm"
"Name"="xl_offlinedownload"
"Contexts"=dword:00000022
.
[HKEY_USERS\S-1-5-21-3946308027-4287415337-442169952-1001_Classes\.*?柼扂e鷈6e剉颯憉噀鯪]
@Allowed: (Read) (RestrictedCode)
@="AliFileCheck.File"
.
[HKEY_LOCAL_MACHINE\software\Classes\.*?柼扂e鷈6e剉颯憉噀鯪]
@="AliFileCheck.File"
.
[HKEY_LOCAL_MACHINE\software\Classes\AudioCD\shell\O(uQ*Q*q_髼璬>e\command]
@="\"e:\\Program Files (x86)\\Tencent\\QQPlayer\\QQPlayer.exe\" /disk \"%1\""
.
[HKEY_LOCAL_MACHINE\software\Classes\DVD\shell\O(uQ*Q*q_髼璬>e\command]
@="\"e:\\Program Files (x86)\\Tencent\\QQPlayer\\QQPlayer.exe\" /disk \"%1\""
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_3_300_257_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_3_300_257_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_3_300_257.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Q*Q*黚髼搹eQ誰]
"DisplayName"="QQ拼音输入法4.5"
"UninstallString"="e:\\Program Files (x86)\\Tencent\\QQPinyin\\4.5.1206.400\\uninst.exe"
"DisplayIcon"="e:\\Program Files (x86)\\Tencent\\QQPinyin\\4.5.1206.400\\QQPinyin.ico"
"DisplayVersion"="4.5"
"Publisher"="腾讯公司"
.
[HKEY_LOCAL_MACHINE\software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Q*Q*8nb]
"DisplayName"="QQ游戏"
"UninstallString"="e:\\Program Files\\腾讯游戏\\QQGame\\Uninstall.EXE"
"Publisher"="腾讯公司"
"DisplayIcon"="e:\\Program Files\\腾讯游戏\\QQGame\\QQGame.EXE"
"DisplayVersion"="3.0.104.50"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
------------------------ 其他运行进程 ------------------------
.
c:\program files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
c:\program files (x86)\alipay\SafeTransaction\AlipaySafeTran.exe
c:\program files (x86)\PPStream\PPSAP.exe
.
**************************************************************************
.
完成时间: 2012-06-12 00:12:38 - 电脑已重新启动
ComboFix-quarantined-files.txt 2012-06-11 16:11
ComboFix2.txt 2012-06-11 15:18
ComboFix3.txt 2012-06-11 04:57
.
Pre-Run: 99,790,229,504 bytes free
Post-Run: 99,376,418,816 bytes free
.
- - End Of File - - BF392307D28FCCB07103EB3A602E1E44

#12 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 11 June 2012 - 11:54 AM

Please run the following

(there is a stubborn entry that is refusing a fix, so we'll try it this way


Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below. (To do this highlight the contents of the box, right click on it and select copy. Right-click in the open notepad and select Paste). Save it on the flashdrive as fixlist.txt

start
NETSVC: r -> No ServiceDLL Path.
end

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options then select Command Prompt

Run FRST64 and press the Fix button just once and wait.
The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

Now restart, let it boot normally and tell me how it went.


NEXT


  • Please open your MalwareBytes AntiMalware Program
  • Click the Update Tab and search for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish, so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected. <-- very important
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
  • Copy&Paste the entire report in your next reply.

Extra Note:If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts, click OK to either and let MBAM proceed with the disinfection process, if asked to restart the computer, please do so immediately.



NEXT


Go here to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activeX control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked and the Scan Archives option is ticked.
  • Click on Advanced Settings, ensure the options Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • Wait for the scan to finish
  • When the scan completes, press the LIST OF THREATS FOUND button
  • Press EXPORT TO TEXT FILE , name the file ESETSCAN and save it to your desktop
  • Include the contents of this report in your next reply.
  • Press the BACK button.
  • Press Finish

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#13 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 11 June 2012 - 11:58 PM

After I've done the process with FRST, when i rebooted my laptop, everything on my desktop disappeared and im not able to connect internet, so i have to restore to the restore point created by Combofix

#14 CatByte

CatByte

    bleepin' tiger


  • Malware Response Team
  • 14,664 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Canada
  • Local time:08:05 AM

Posted 12 June 2012 - 08:32 PM

ok, can you please re-run ComboFix and post a fresh log

Microsoft MVP - 2010, 2011, 2012, 2013, 2014, 2015


#15 strikerchen

strikerchen
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:08:05 PM

Posted 12 June 2012 - 10:36 PM

Ok, do i just run the Combofix or need do the CFscript thing? By the way, for some reason the CPU usage is kinda high after i restore.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users