Computer Hope

Software => Computer viruses and spyware => Topic started by: sim619 on March 13, 2013, 07:34:21 PM

Title: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 13, 2013, 07:34:21 PM
Hi,

I got a serious issue with my system. Somehow some trojan/rogue has affected my system. It keeps flashing me virus alert whenever i try to run any program it says "Application cannot be executed. The file  **** is infected......." (not even a command prompt or notepad can be opened but with multiple try sometime i get the command prompt but it is ridiculous). Disk antivirus professional also been flash up to ask me to subscribe

Then I google'd and searched this forums and tried the instructions from the below link.
http://www.computerhope.com/forum/index.php?topic=95177.0

However, my first step already failed to do it. My PC not allowed me to install any software.
Vista and Win7 users need to right click Rkill and choose Run as Administrator. (Already do it but pc still show warning Application cannot be excuted. The file rkill.exe is infected.)

Please help me. :'(
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 14, 2013, 12:44:50 PM
Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*************************************************************************
Boot your computer in Safe Mode with NetWorking and run MBAM. Next, try running it in Normal Mode.

Safe Mode (http://www.computerhope.com/issues/chsafe.htm#03)

(http://i424.photobucket.com/albums/pp322/digistar/mbamicontw5.gif) Please download Malwarebytes Anti-Malware from here. (http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe)
Double Click mbam-setup.exe to install the application.
Extra Note:

If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 15, 2013, 09:55:48 AM
Thanks for your help. In the process now.
Sorry that I am busy and due to different time zone.
I am at Malaysia and now is 0:11 am.
Please be patient and thanks for your help again.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 15, 2013, 12:26:54 PM
Thanks for your help. In the process now.
Sorry that I am busy and due to different time zone.
I am at Malaysia and now is 0:11 am.
Please be patient and thanks for your help again.
No problem. Just do it at your own pace.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 16, 2013, 12:35:34 AM
Log that scan in safe mode
Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2012.12.14.11

Windows 7 Service Pack 1 x64 NTFS (Safe Mode)
Internet Explorer 9.0.8112.16421
Ting :: TING-PC [administrator]

16/3/2013 11:29:44 AM
mbam-log-2013-03-16 (11-29-44).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 648705
Time elapsed: 58 minute(s), 2 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 11
HKCR\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Quarantined and deleted successfully.
HKCR\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\thunder (Trojan.Agent) -> Delete on reboot.
HKCU\SOFTWARE\Funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.

Registry Values Detected: 5
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce|7C686D7BEA0D34B500007C67F11838F5 (Trojan.FakeAlert.SSGen) -> Data: C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 2
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.

Files Detected: 5
C:\Users\Ting\Documents\PERSONAL\QvodSetup3.exe (Spyware.Passwords) -> Quarantined and deleted successfully.
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum\Live Security Platinum.lnk (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata\defs.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata\config.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe (Trojan.FakeAlert.SSGen) -> Quarantined and deleted successfully.

(end)


Log that scan in normal window modeMalwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.03.16.03

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Ting :: TING-PC [administrator]

16/3/2013 12:43:49 PM
mbam-log-2013-03-16 (12-43-49).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 651884
Time elapsed: 1 hour(s), 57 minute(s), 49 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKLM\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 1
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional (Rogue.FakeAV) -> Quarantined and deleted successfully.

Files Detected: 2
C:\Users\Ting\AppData\Local\agqtwgbl.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional\Disk Antivirus Professional.lnk (Rogue.FakeAV) -> Quarantined and deleted successfully.

(end)

Now the application in PC can be use. Please advise for next step.
Thank you.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 16, 2013, 12:20:19 PM
Please download AdwCleaner  (http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner)by Xplode onto your Desktop.
*********************************************
Download Combofix from any of the links below, and save it to your DESKTOP
If your version of Windows defaults to you download folder you will need to copy it to your desktop.

Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)

To prevent your anti-virus application interfering with  ComboFix we need to disable it. See here  (http://www.pchelpforum.com/anti-virus/110194-how-disable-your-security-applications-4.html) for a tutorial regarding how to do so if you are unsure.
(http://i424.photobucket.com/albums/pp322/digistar/NSIS_disclaimer_ENG.png)

Click I Agree to start the program.

ComboFix will then extract the necessary files and you will see this:

(http://i424.photobucket.com/albums/pp322/digistar/NSIS_extraction.png)

As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to  have this pre-installed on your machine before doing any malware  removal. This will not occur in Windows Vista and 7

It will allow you to boot up into a special recovery/repair  mode that will allow us to more easily help you should your computer  have a problem after an attempted removal of malware.

If you did not have it installed, you will see the prompt below. Choose YES.

(http://i424.photobucket.com/albums/pp322/digistar/RcAuto1.gif)

Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:

(http://i424.photobucket.com/albums/pp322/digistar/whatnext.png)

Click on Yes, to continue scanning for malware.

When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).

Leave your computer alone while ComboFix is running. ComboFix will restart your computer if malware is found; allow it to do so.

Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 16, 2013, 01:12:40 PM
AdwCleaner Log
# AdwCleaner v2.114 - Logfile created 03/17/2013 at 02:58:16
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Ting - TING-PC
# Boot Mode : Normal
# Running from : C:\Users\Ting\Downloads\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****

Folder Found : C:\Program Files (x86)\TornTV.com
Folder Found : C:\ProgramData\InstallMate
Folder Found : C:\ProgramData\Premium
Folder Found : C:\ProgramData\Tarma Installer
Folder Found : C:\Users\Ting\AppData\Local\APN
Folder Found : C:\Users\Ting\AppData\Roaming\Funmoods

***** [Registry] *****

Key Found : HKCU\Software\1ClickDownload
Key Found : HKCU\Software\AppDataLow\TENCENT
Key Found : HKCU\Software\InstallCore
Key Found : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Found : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
Key Found : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Found : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband
Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions
Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions.1
Key Found : HKLM\Software\InstallCore
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Found : HKLM\Software\TENCENT
Key Found : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Found : HKLM\SOFTWARE\Tarma Installer
Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16470

[OK] Registry is clean.

-\\ Google Chrome v25.0.1364.172

File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences

Found [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
Found [l.46] : keyword = "ask.com",
Found [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=en_MY&apn_uid=3eabd1c9-be10-4c24-b141-d177d22c78bd&apn_ptnrs=%5EAC1&apn_sauid=9D1790AF-6B12-4CDB-A172-00B035CD35BC&apn_dtid=%5EYYYYYY%5EYY%5EMY&q={searchTerms}",
Found [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms}",

*************************

AdwCleaner[R1].txt - [3899 octets] - [17/03/2013 02:58:16]

########## EOF - C:\AdwCleaner[R1].txt - [3959 octets] ##########


Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 16, 2013, 01:18:25 PM
ComboFix log


ComboFix 13-03-16.02 - Ting 3/2013 Sun   3:04:41.1.4 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.936.86.1033.18.3958.2302 [GMT 8:00]
执行位置: C:\TDDOWNLOAD\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * 成功创造新还原点


(((((((((((((((((((((((((((((((((((((((   被删除的档案   )))))))))))))))))))))))))))))))))))))))))))))))))


C:\FavoriteVideo\InvisibleFolder
C:\FavoriteVideo\InvisibleFolder\20101112103740_taobao101112cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110128170117_wopaiwang110128zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110530180926_zhongguoliantong110601zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110628183241_ipad110628zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110628183325_ipad110628zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110630212109_dongfengrichan110701zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110630212351_dongfengrichan110701cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110705145932_pinganchexian110705zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110706153126_zhenai110706zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110708110551_alibaba110711zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713175807_tankeshijie110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713181503_wushen110714qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110713181704_wushen110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110713185538_shenxiandao110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713185716_shenxiandao110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713185939_shenxiandao110714cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713213045_luoqi110714qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110713213211_luoqi110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110713214454_nuoya110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713222751_nuoya110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714132605_bishengyuanjianfei110715shengzhengzhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714133021_pinganchexian110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714141030_banggouwang110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714143308_zhengtuhuaijiu110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714143438_zhengtuhuaijiu110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714160257_maibaobao110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714160414_maibaobao110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714161212_zhengtu2110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714161448_zhengtu2110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714164056_ludingji110715qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110714164314_ludingji110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714180738_wushen110715qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110714182346_guomei110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714182938_guomei110715zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714183142_rujia110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714183338_rujia110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715100656_shangyou110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715105349_shenghuojia110715zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715105538_shenghuojia110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715134723_yingxiong110718zhu.swf
C:\FavoriteVideo\InvisibleFolder\20110715135043_yingxiong110718zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715152228_tanke110716zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715174043_jushangwang110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715174613_wushen110716zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715174738_wushen110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715181022_kelingkeli110716zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184351_paipaiwang110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184458_paipaiwang110716zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184916_ludingji110716cha1.swf
C:\FavoriteVideo\InvisibleFolder\20110715185033_ludingji110716zanting1.swf
C:\FavoriteVideo\InvisibleFolder\20110715185147_ludingji110716qipao1.swf
C:\FavoriteVideo\InvisibleFolder\20110716005918_qiangshengkelingkeli110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110716011843_kelingkeli110716zanting15s1.swf
C:\FavoriteVideo\InvisibleFolder\20110716011952_kelingkeli110716qipao15s1.swf
C:\FavoriteVideo\InvisibleFolder\20110716012338_kelingkeli110716zhu5s.swf
C:\FavoriteVideo\InvisibleFolder\20110718094827_jiutianxianmeng110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718094942_jiutianxianmeng110718zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095132_jiutianxianmeng110718cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095649_haizeiwang110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095757_haizeiwang110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718101908_kelingkeli110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718102029_kelingkeli110718zhu5s.swf
C:\FavoriteVideo\InvisibleFolder\20110718112955_tanke110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718115546_xinhuanzhugege110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718120626_xinhuanzhugege110718zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110718140512_xialv110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718140826_xialv110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718174321_haizeiwang110718zhu1.swf
C:\FavoriteVideo\InvisibleFolder\20110718175209_banggo110718zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110718183419_zhengtu110719qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110718183609_zhengtu110719zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110719112648_kelingkeli110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719144001_baiduwenku110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719144155_baidu110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719153053_guaguashiping110720zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110719173527_maibaobao110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719173728_maibaobao110720cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719173957_maibaobao110720zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110719175813_tanke110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719180241_zhengtu110720zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719180409_zhengtu110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719212343_ludingji110720qipao15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719212446_ludingji110720zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110720113704_zhengtumianfei110720zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110721111842_kangshifu110721zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721112023_kangshifu110721cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721145327_hushubao110701zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110721145938_hushubao110701cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721160044_maibaobao110722zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721160244_maibaobao110722zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110721160516_maibaobao110722cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721221433_cntv110721zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110722102007_ludingji110722zanting1a.swf
C:\FavoriteVideo\InvisibleFolder\20110722162559_yingxiongwudi110725qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110722215436_dongpeng110723jiaobiao.swf
C:\FavoriteVideo\InvisibleFolder\20110725112028_yingxionglianmeng110725zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110725112503_yingxiongwudi110725zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110725190314_shenmozhetian110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110725190449_shenmozhetian110726zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110725190637_shenmozhetian110726cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726144544_modengxinrenlei110726zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110726144832_modengxinrenlei110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726145145_modengxinrenlei110726cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110726145412_xinhuanzhugege110726cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110726153626_guomei110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726165253_csol110727zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110726165531_csol110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110726173321_paopaokaiding110728zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110726173525_paopaokading110728qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110727212138_ludingji10728zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110727212448_5Bludingji110728zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728145048_diaoyan110728zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110728155238_wushen110729zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728161201_shenxiandao110729zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728161423_shenxiandao110729zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110728162107_shenxiandao110729cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729101956_yiqizaixian110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729164352_maibaobao110801cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729170341_yingfu110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729180242_taobao110801cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110730102313_nala110730cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801123635_guangqichuanqi110801zhu15s3.swf
C:\FavoriteVideo\InvisibleFolder\20110801123818_guangqichuanqi110801zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801124028_guangqichuanqi11081cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801185425_newbalance110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801221916_tiandiyingxiong110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801222113_tiandiyingxiong110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110801222630_tiandiyingxiong110802cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801222825_tiandiyingxiong110802qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110802115704_wenjuan110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110802160122_cangsheng110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110802160529_cangsheng110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802163157_shenmodalu110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110802163323_shenmodalu110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802175327_maibaobao110803zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802175519_maibaobao110803zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803132011_taobao110803cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803132200_taobao110803zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803132715_taobao110803qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110803171724_qishan110804qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110803171845_qishan110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803172239_xinshuihu110803zhu15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803172440_xinshuihu110803zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803172633_xinshuihu110803cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803174807_ludingji110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803174935_ludingji110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803182133_hrs110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803191842_qiya110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804143802_shasha110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804143934_shasha110804cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804144043_shasha110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804154339_maibaobao110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804160411_maibaobao110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804162251_qishan110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804172948_zhengtu2110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110804173211_zhengtu2110805zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805093234_shenmozhetian110805zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805093427_shenmozhetian110805zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805093623_shenmozhetian110805cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805154002_zhengtu2110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110805154720_zhengtu2110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805161039_taobao110808qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110805161238_taobao110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805161415_taobao110808cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805164138_shandongliantong110805zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805164252_nala110805cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805184741_ludingji110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805194116_tata110806zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110806195204_tianzi110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110806195426_tianzi110808zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110807215934_mingchaochuanqi110808zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110807220106_mingchaochuanqi110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110807220242_mingchaochuanqi110808cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809092552_tianzi110809zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809092713_tianzi110809zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110809113834_yougouwang110809cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809122112_yougouwang110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110811142508_qijishijie110811zanting.swf.tpp
C:\FavoriteVideo\InvisibleFolder\peer.dll
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig.xml
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask.xml
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\commondc_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\comptip_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dictrule_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dsicon_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\gcollecttask.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediadc_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatag_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatip_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\setdrvflag_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tip_v1.4.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp101C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1070.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp10F9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1119.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp112A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11A9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP11EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP120.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1200.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1201.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1212.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1213.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1220.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1221.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1232.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1242.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP126B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp127C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP127D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP129A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp12AA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12E6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP130.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1301.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP132D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1345.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1366.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1399.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP13F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP140.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP141.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1415.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1420.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1425.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1426.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1427.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1428.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1429.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1430.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP144.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp144B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP145.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1451.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP146.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1471.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP14EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp14FB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp150C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP152.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp152C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp153B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1548.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp154B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1559.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp156.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1579.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp158A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP15F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1604.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1605.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1616.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1651.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1652.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1653.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1662.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1663.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1664.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1665.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1666.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1667.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1668.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1669.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp167A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1682.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1690.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1693.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16A0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16BF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16D1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16DE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16E0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16E3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16F0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1700.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1710.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1721.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1722.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP172C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp172F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1742.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp174C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp175E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp176C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp177D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17D7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp17E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1808.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1819.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1825.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1835.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1846.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1855.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1864.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1884.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18A4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP18D1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18D4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18E2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1900.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1901.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1902.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP191F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1921.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1930.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1931.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1932.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1939.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1941.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1942.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1943.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1949.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1953.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp195F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1970.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19BD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19CD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19CE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19FA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A01.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A1A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A1B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A3E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A40.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A41.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A47.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A60.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A67.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A76.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A77.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A78.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A86.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A87.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A88.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A89.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A8D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A96.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A97.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A98.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A99.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AA7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AAA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AB6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AB8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AC7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AC8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AD6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AD9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AE6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B22.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B35.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B36.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B42.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B77.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BA5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BA7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BC4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BC5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BE4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C04.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C0C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C12.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C1C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C22.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C3D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C43.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C51.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C71.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C7B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1CA8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CD9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CE9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D15.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D16.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D17.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D35.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D3D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D55.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D63.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D76.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D93.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1DC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1DD2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E02.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E12.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E1E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E2F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E4F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E5D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E7C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E7D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E8C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E9E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EAC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EBC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EDC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1F29.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1F9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FC9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1FEA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2002.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2012.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2013.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2018.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2024.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2025.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2036.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2039.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP205F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2070.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2080.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20B5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2111.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP211B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp213B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2160.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2180.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2226.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2320.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP233D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP236A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp239C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23BE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23D8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23E9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23F8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23FF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2408.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp240F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2429.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2439.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2445.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2475.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2485.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2489.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24A5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24A9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24B2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24D3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24F2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2511.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2513.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP251F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2523.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2531.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2532.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp253F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2540.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2542.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2543.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2551.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2554.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp259E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25BB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25CE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25DA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25EA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp261B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp262B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP262D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp263B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2648.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2668.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2686.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2697.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26B7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26BE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26C7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26D4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26F5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2706.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2707.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2712.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2717.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2722.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2723.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2733.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2734.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2735.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2742.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2743.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2751.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2753.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2754.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2761.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2762.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2763.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2764.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2765.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2766.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2767.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2768.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2769.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2770.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2772.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2773.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2774.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2775.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2776.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2787.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2788.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2789.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP278F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2792.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27A0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27C5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27DF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27F0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27FD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2800.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2811.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2812.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2814.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2823.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP283B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp284D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp285C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2898.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28A8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28B9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28F9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2908.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2909.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2915.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP291D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2928.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp292E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2934.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2935.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2945.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2956.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp295D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2963.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2965.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2966.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2967.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2973.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2974.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2982.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2983.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2984.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2985.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2986.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2993.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29B1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29C2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29E0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A02.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A03.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A04.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A11.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A21.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A2E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A41.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A49.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A4E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A51.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A71.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A7C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A9C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AC4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AE5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AF9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AFB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B08.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B09.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B18.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B19.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B1C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B38.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B39.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Tempor
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 16, 2013, 05:35:54 PM
Remove the Adware:
*********************************************
That is not the complete ComboFix log. ComboFix was run from the incorrect location. Please copy ComboFix from C:\TDDOWNLOAD to your desktop and run it from there. Please post all the log even if you need to break it up into two or more posts.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 16, 2013, 08:14:55 PM
AdwCleaner Log

# AdwCleaner v2.114 - Logfile created 03/17/2013 at 10:00:53
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Ting - TING-PC
# Boot Mode : Normal
# Running from : C:\Users\Ting\Desktop\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****

Folder Deleted : C:\Program Files (x86)\TornTV.com
Folder Deleted : C:\ProgramData\InstallMate
Folder Deleted : C:\ProgramData\Premium
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\Users\Ting\AppData\Local\APN
Folder Deleted : C:\Users\Ting\AppData\Roaming\Funmoods

***** [Registry] *****

Key Deleted : HKCU\Software\1ClickDownload
Key Deleted : HKCU\Software\AppDataLow\TENCENT
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband
Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions
Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions.1
Key Deleted : HKLM\Software\InstallCore
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Deleted : HKLM\Software\TENCENT
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16470

[OK] Registry is clean.

-\\ Google Chrome v25.0.1364.172

File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
Deleted [l.46] : keyword = "ask.com",
Deleted [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=e[...]
Deleted [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms[...]

*************************

AdwCleaner[R1].txt - [4024 octets] - [17/03/2013 02:58:16]
AdwCleaner[S1].txt - [3734 octets] - [17/03/2013 10:00:53]

########## EOF - C:\AdwCleaner[S1].txt - [3794 octets] ##########
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 16, 2013, 08:16:19 PM
ComboFix Log

ComboFix 13-03-16.02 - Ting 3/2013 Sun  10:07:34.3.4 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.936.86.1033.18.3958.2713 [GMT 8:00]
执行位置: c:\users\Ting\Desktop\ComboFix.exe
AV: Avira Desktop *Enabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Enabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((  2013-02-17 至 2013-03-17 的新的档案  )))))))))))))))))))))))))))))))
.
.
2013-03-17 02:25 . 2013-03-17 02:25   --------   d-----w-   c:\users\Default\AppData\Local\temp
2013-03-15 15:22 . 2013-03-15 15:22   --------   d-----w-   c:\users\Ting\AppData\Local\ElevatedDiagnostics
2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\users\Ting\AppData\Roaming\Malwarebytes
2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\programdata\Malwarebytes
2013-03-15 15:18 . 2012-12-14 08:49   24176   ----a-w-   c:\windows\system32\drivers\mbam.sys
2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\program files (x86)\Malwarebytes' Anti-Malware
2013-03-15 15:17 . 2013-03-15 15:17   --------   d-----w-   c:\users\Ting\AppData\Local\Programs
2013-03-13 02:05 . 2013-03-13 02:11   --------   d-----w-   c:\programdata\7C686D7BEA0D34B500007C67F11838F5
2013-03-02 00:10 . 2013-03-02 00:10   --------   d-----w-   c:\users\Ting\AppData\Roaming\Avira
2013-03-02 00:08 . 2013-03-01 23:58   27800   ----a-w-   c:\windows\system32\drivers\avkmgr.sys
2013-03-02 00:08 . 2013-03-01 23:58   129216   ----a-w-   c:\windows\system32\drivers\avipbb.sys
2013-03-02 00:08 . 2013-03-01 23:58   99912   ----a-w-   c:\windows\system32\drivers\avgntflt.sys
2013-03-02 00:08 . 2013-03-02 00:08   --------   d-----w-   c:\programdata\Avira
2013-03-02 00:08 . 2013-03-02 00:08   --------   d-----w-   c:\program files (x86)\Avira
2013-03-02 00:00 . 2013-02-08 00:28   9162192   ----a-w-   c:\programdata\Microsoft\Windows Defender\Definition Updates\{587E5F77-185E-4D31-8F7E-5B721B93FB96}\mpengine.dll
2013-02-27 11:21 . 2013-02-27 11:21   --------   d-----w-   c:\program files (x86)\Gophoto.it
2013-02-23 05:59 . 2013-02-23 05:59   --------   d-----w-   c:\users\Ting\AppData\Local\Windows Live Writer
2013-02-23 05:59 . 2013-02-23 05:59   --------   d-----w-   c:\users\Ting\AppData\Roaming\Windows Live Writer
2013-02-21 12:10 . 2013-02-22 06:10   --------   d-sh--w-   c:\users\Ting\AppData\Roaming\WT082439
.
.
.
((((((((((((((((((((((((((((((((((((((((   在三个月内被修改的档案   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 23:46 . 2012-08-26 00:50   72013344   ----a-w-   c:\windows\system32\MRT.exe
2013-03-13 01:24 . 2012-11-16 17:17   693976   ----a-w-   c:\windows\SysWow64\FlashPlayerApp.exe
2013-03-13 01:24 . 2012-03-07 11:58   73432   ----a-w-   c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-02-12 05:45 . 2013-03-13 23:45   135168   ----a-w-   c:\windows\apppatch\AppPatch64\AcXtrnal.dll
2013-02-12 05:45 . 2013-03-13 23:45   350208   ----a-w-   c:\windows\apppatch\AppPatch64\AcLayers.dll
2013-02-12 05:45 . 2013-03-13 23:45   308736   ----a-w-   c:\windows\apppatch\AppPatch64\AcGenral.dll
2013-02-12 05:45 . 2013-03-13 23:45   111104   ----a-w-   c:\windows\apppatch\AppPatch64\acspecfc.dll
2013-02-12 04:48 . 2013-03-13 23:45   474112   ----a-w-   c:\windows\apppatch\AcSpecfc.dll
2013-02-12 04:48 . 2013-03-13 23:45   2176512   ----a-w-   c:\windows\apppatch\AcGenral.dll
2013-01-16 17:28 . 2012-03-07 10:53   273840   ------w-   c:\windows\system32\MpSigStub.exe
2013-01-05 05:53 . 2013-02-13 04:30   5553512   ----a-w-   c:\windows\system32\ntoskrnl.exe
2013-01-05 05:00 . 2013-02-13 04:30   3967848   ----a-w-   c:\windows\SysWow64\ntkrnlpa.exe
2013-01-05 05:00 . 2013-02-13 04:30   3913064   ----a-w-   c:\windows\SysWow64\ntoskrnl.exe
2013-01-04 05:46 . 2013-02-13 04:30   215040   ----a-w-   c:\windows\system32\winsrv.dll
2013-01-04 04:51 . 2013-02-13 04:30   5120   ----a-w-   c:\windows\SysWow64\wow32.dll
2013-01-04 04:43 . 2013-02-13 04:30   44032   ----a-w-   c:\windows\apppatch\acwow64.dll
2013-01-04 03:26 . 2013-02-13 04:30   3153408   ----a-w-   c:\windows\system32\win32k.sys
2013-01-04 02:47 . 2013-02-13 04:30   25600   ----a-w-   c:\windows\SysWow64\setup16.exe
2013-01-04 02:47 . 2013-02-13 04:30   7680   ----a-w-   c:\windows\SysWow64\instnm.exe
2013-01-04 02:47 . 2013-02-13 04:30   2048   ----a-w-   c:\windows\SysWow64\user.exe
2013-01-04 02:47 . 2013-02-13 04:30   14336   ----a-w-   c:\windows\SysWow64\ntvdm64.dll
2013-01-03 06:00 . 2013-02-13 04:30   1913192   ----a-w-   c:\windows\system32\drivers\tcpip.sys
2013-01-03 06:00 . 2013-02-13 04:30   288088   ----a-w-   c:\windows\system32\drivers\FWPKCLNT.SYS
2012-08-14 11:24 . 2012-08-14 11:24   189404   ----a-w-   c:\program files\uninstall_xl7.exe
.
.
(((((((((((((((((((((((((((((((((((((   重要登入点   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*注意* 空白与合法缺省登录将不会被显示
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{00000ADA-7E0D-47C1-986C-F017D09C4304}]
2012-11-20 08:30   518096   ----a-w-   c:\users\Public\Thunder Network\XMP4\Core\Program\VideoUrlSniffer.2.0.3.100.(175).dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{0EA37B17-6B8B-4085-8257-F3A4AA69C27A}]
2012-07-30 10:08   88080   ----a-w-   c:\program files\BHO\XlBrowserAddin1.0.8.71.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{24F7D5E7-84A5-E238-543A-F69079E30962}]
2012-02-28 11:02   516472   ----a-w-   c:\program files (x86)\TENCENT\SOSOAddr\ieaddr.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{A8502600-B272-4F68-A67B-A0305D46D297}]
2012-04-21 03:11   173968   ----a-w-   c:\program files (x86)\QvodPlayer\QvodExtend.dll
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\AAADesktopTips]
@="{4562B511-62E9-4533-B7B2-56A8BB10B482}"
[HKEY_CLASSES_ROOT\CLSID\{4562B511-62E9-4533-B7B2-56A8BB10B482}]
2012-11-14 11:32   251856   ----a-w-   c:\program files (x86)\Common Files\Thunder Network\Kankan\xappex.1.1.1.62.(176).dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LightScribe Control Panel"="c:\program files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe" [2010-02-22 2363392]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-26 98304]
"Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-28 35696]
"HP Software Update"="c:\program files (x86)\Hp\HP Software Update\HPWuSchd2.exe" [2008-12-08 54576]
"WirelessAssistant"="c:\program files (x86)\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2009-07-23 498744]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]
"QvodTerminal"="c:\program files (x86)\QvodPlayer\QvodTerminal.exe" [2012-06-08 1079216]
"Easy-PrintToolBox"="c:\program files (x86)\Canon\Easy-PrintToolBox\BJPSMAIN.EXE" [2004-01-14 409600]
"QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2012-10-24 421888]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-12-12 152544]
"avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2013-03-01 385248]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2009-12-30 1082656]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"EnableShellExecuteHooks"= 1 (0x1)
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2013-01-08 161536]
R3 netw5v64;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-08-23 19456]
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2009-09-23 225280]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2012-08-23 57856]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-07-09 52736]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-03-08 1255736]
R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-22 57184]
S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys [2013-03-01 27800]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-02-26 202752]
S2 AntiVirSchedulerService;Avira Scheduler;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [2013-03-01 86752]
S2 ARUpdate;Tencent AddressBar Update Service;c:\program files\TENCENT\AddrUpdate\AddrUpdate.exe [2012-05-29 116656]
S2 HPWMISVC;HPWMISVC;c:\program files\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-01-18 20480]
S2 NitroDriverReadSpool8;NitroPDFDriverCreatorReadSpool8;c:\program files\Common Files\Nitro\Pro\8.0\NitroPDFDriverService8x64.exe [2012-11-06 230408]
S2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\SysWOW64\NLSSRV32.EXE [2012-11-06 69640]
S2 SageUBSBackupService;Sage UBS Backup Service;c:\program files (x86)\Common Files\Sage Software\BackupService\UBS.UBSService.exe [2011-08-23 9216]
S2 SageUBSLicenseService;Sage UBS License Service;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe [2012-02-28 15952]
S2 SageUBSServiceWatchdog;Sage UBS Service Watchdog;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe [2012-02-28 25936]
S2 UNS;Intel(R) Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [2010-03-18 2320920]
S2 XLServicePlatform;XLServicePlatform;c:\windows\system32\svchost
S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [2010-01-07 35104]
S3 HECIx64;Intel(R) Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [2009-09-17 56344]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2011-06-09 539240]
S3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\DRIVERS\rtl8192se.sys [2011-09-07 1225832]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
XLServicePlatform   REG_MULTI_SZ      XLServicePlatform
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2010-02-22 18:38   451872   ----a-w-   c:\program files (x86)\Common Files\LightScribe\LSRunOnce.exe
.
 ‘计划任务’ 文件夹 里的内容
.
2013-03-17 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-16 01:24]
.
2013-03-13 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
- c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
.
2013-03-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
- c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{004B0726-A010-4ABF-8556-FCDB7F1FCA1E}]
2012-07-30 10:08   625952   ----a-w-   c:\program files\BHO\XunleiBHO647.2.9.3634.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2010-01-29 6160928]
"RtkOSD"="c:\program files (x86)\Realtek\Audio\OSD\RtVOsd64.exe" [2010-01-13 995840]
"HP Quick Launch"="c:\program files\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2010-01-18 451072]
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost  - LocalService
FontCache
.
------- 而外的扫描 -------
.
uStart Page = about:blank
uLocal Page = c:\windows\system32\blank.htm
mStart Page = about:blank
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
IE: &ê1ó?&??à×à??????? - c:\program files\BHO\OfflineDownload.htm
IE: &ê1ó?&??à×???? - c:\program files\BHO\geturl.htm
IE: &ê1ó?&??à×????è?2?á′?ó - c:\program files\BHO\GetAllUrl.htm
IE: ???????????
IE: ???????????????
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~3\Office12\EXCEL.EXE/3000
IE: Easy-WebPrint?? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
IE: Easy-WebPrint???? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
IE: Easy-WebPrint??????? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
IE: Send image to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send page to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
IE: 使用迅雷看看播放器播放 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenu.htm
IE: 添加当前页到迅雷看看播放器标签 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenuAddStoreTab.htm
IE: {{0000016b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolMenu.htm
IE: {{0000026b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolBar.htm
TCP: DhcpNameServer = 192.168.1.254
Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-Easy-WebPrint - c:\windows\IsUn0804.exe
AddRemove-PocketRAR - c:\program files\uninstall.exe
AddRemove-{3183E053-DA5C-4233-8761-AF3B5DE22A57}_is1 - c:\program files\KuGou2008\unins000.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):63,58,a3,3b,ea,04,93,15,02,3d,b0,20,46,c5,0b,7b,82,84,b2,4c,4d,
   52,a2,3a,38,19,6d,0a,21,ad,ee,f7,91,86,6b,03,1a,df,47,95,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{8be85315-e61e-4b01-a536-41981925e766}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:0000011d
"Therad"=dword:0000001e
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
   38,95,44,a1,e0,d2,1a,06,30,1f,b5,e8,8c,1e,4b,6f,1b,cf,03,4c,59,84,12,82,d1,\
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
完成时间: 2013-03-17  10:27:15
ComboFix-quarantined-files.txt  2013-03-17 02:27
ComboFix2.txt  2013-03-16 19:24
.
Pre-Run: 384,117,325,824 bytes free
Post-Run: 383,818,661,888 bytes free
.
- - End Of File - - 14E331E0E9A6C33AE3B4DA41BE2376F0


Please advise for next step.
Thank you.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 17, 2013, 11:21:14 AM
Please download Rooter (http://eric71.geekstogo.com/tools/Rooter.exe) and Save it to your desktop.
*******************************************
**************************************
Download Security Check by screen317 from one of the following links and save it to your desktop.

Link 1 (http://screen317.spywareinfoforum.org/SecurityCheck.exe)
Link 2 (http://screen317.changelog.fr/SecurityCheck.exe)

* Double-click Security Check.bat
* Follow the on-screen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.

Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 18, 2013, 05:41:36 AM
Rooter Log

Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows 7 Home Edition (6.1.7601) Service Pack 1
[32_bits] - Intel64 Family 6 Model 37 Stepping 2, GenuineIntel
.
[wscsvc] (Security Center) RUNNING (state:4)
[MpsSvc] RUNNING (state:4)
Windows Firewall -> Enabled
Windows Defender -> Enabled
User Account Control (UAC) -> Enabled
.
Internet Explorer 9.0.8112.16421
.
C:\  [Fixed-NTFS] .. ( Total:451 Go - Free:357 Go )
D:\  [Fixed-NTFS] .. ( Total:14 Go - Free:2 Go )
E:\  [Fixed-FAT32] .. ( Total:0 Go - Free:0 Go )
F:\  [CD_Rom]
.
Scan : 19:45.05
Path : C:\Users\Ting\Desktop\Rooter.exe
User : Ting ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
Locked System (4)
______ 燕瞕旅??蔼瞕蓰瞕 (308)
______ 燕瞕旅??蔼瞕蓰瞕 (436)
______ 燕瞕旅??蔼瞕蓰瞕 (508)
______ 燕瞕旅??蔼瞕蓰瞕 (532)
______ 燕瞕旅??蔼瞕蓰瞕 (572)
______ 燕瞕旅??蔼瞕蓰瞕 (588)
______ 燕瞕旅??蔼瞕蓰瞕 (596)
______ 燕瞕旅??蔼瞕蓰瞕 (656)
______ 燕瞕旅??蔼瞕蓰瞕 (740)
______ 燕瞕旅??蔼瞕蓰瞕 (824)
______ 燕瞕旅??蔼瞕蓰瞕 (892)
______ 燕瞕旅??蔼瞕蓰瞕 (956)
______ 燕瞕旅??蔼瞕蓰瞕 (996)
______ 燕瞕旅??蔼瞕蓰瞕 (116)
______ 燕瞕旅??蔼瞕蓰瞕 (352)
Locked audiodg.exe (368)
______ 燕瞕旅??蔼瞕蓰瞕 (928)
______ 燕瞕旅??蔼瞕蓰瞕 (1084)
______ 燕瞕旅??蔼瞕蓰瞕 (1240)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (1272)
______ 燕瞕旅??蔼瞕蓰瞕 (1292)
______ 燕瞕旅??蔼瞕蓰瞕 (1428)
______ 燕瞕旅??蔼瞕蓰瞕 (1536)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (1560)
______ C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (1592)
______ C:\Program Files\TENCENT\AddrUpdate\AddrUpdate.exe (1644)
______ 燕瞕旅??蔼瞕蓰瞕 (1696)
______ 燕瞕旅??蔼瞕蓰瞕 (1720)
______ 燕瞕旅??蔼瞕蓰瞕 (1756)
______ 燕瞕旅??蔼瞕蓰瞕 (1796)
______ C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe (1828)
______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (1864)
______ C:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe (1888)
______ 燕瞕旅??蔼瞕蓰瞕 (1932)
______ C:\Windows\SysWOW64\NLSSRV32.EXE (1980)
______ C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe (1076)
______ 燕瞕旅??蔼瞕蓰瞕 (1020)
______ 燕瞕旅??蔼瞕蓰瞕 (2096)
______ 燕瞕旅??蔼瞕蓰瞕 (2116)
______ 燕瞕旅??蔼瞕蓰瞕 (2208)
______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe (2348)
______ 燕瞕旅??蔼瞕蓰瞕 (2412)
______ 燕瞕旅??蔼瞕蓰瞕 (2420)
______ 燕瞕旅??蔼瞕蓰瞕 (2432)
______ 燕瞕旅??蔼瞕蓰瞕 (2440)
______ C:\Program Files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe (2468)
______ 燕瞕旅??蔼瞕蓰瞕 (2492)
______ C:\Program Files (x86)\Hp\HP Software Update\hpwuschd2.exe (2668)
______ 燕瞕旅??蔼瞕蓰瞕 (2696)
______ C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe (2728)
______ C:\Program Files (x86)\QvodPlayer\QvodTerminal.exe (2780)
______ C:\Program Files (x86)\iTunes\iTunesHelper.exe (2876)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (2892)
______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe (932)
______ 燕瞕旅??蔼瞕蓰瞕 (2808)
______ 燕瞕旅??蔼瞕蓰瞕 (3060)
______ C:\Windows\SysWOW64\svchost.exe (2912)
______ 燕瞕旅??蔼瞕蓰瞕 (2748)
______ 燕瞕旅??蔼瞕蓰瞕 (3428)
______ 燕瞕旅??蔼瞕蓰瞕 (3760)
______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqwmiex.exe (3788)
______ 燕瞕旅??蔼瞕蓰瞕 (3848)
______ 燕瞕旅??蔼瞕蓰瞕 (3880)
______ 燕瞕旅??蔼瞕蓰瞕 (4000)
______ 燕瞕旅??蔼瞕蓰瞕 (4032)
______ 燕瞕旅??蔼瞕蓰瞕 (3648)
______ 燕瞕旅??蔼瞕蓰瞕 (4116)
______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqToaster.exe (4344)
______ 燕瞕旅??蔼瞕蓰瞕 (4376)
______ C:\Program Files\WIDCOMM\Bluetooth Software\BluetoothHeadsetProxy.exe (4512)
______ 燕瞕旅??蔼瞕蓰瞕 (4672)
______ 燕瞕旅??蔼瞕蓰瞕 (4748)
______ 燕瞕旅??蔼瞕蓰瞕 (4768)
______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (2504)
______ 燕瞕旅??蔼瞕蓰瞕 (4664)
______ C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_11_6_602_180_ActiveX.exe (4148)
______ C:\Program Files\Program\Thunder.exe (1684)
______ c:\program files (x86)\common files\thunder network\tp\ver1\1.1.2.186_1111\thunderplatform.exe (5072)
______ 燕瞕旅??蔼瞕蓰瞕 (3600)
______ 燕瞕旅??蔼瞕蓰瞕 (4232)
______ C:\Program Files\Program\XLUEOPS.exe (5300)
______ 燕瞕旅??蔼瞕蓰瞕 (5320)
______ 燕瞕旅??蔼瞕蓰瞕 (5872)
______ 燕瞕旅??蔼瞕蓰瞕 (1172)
______ 燕瞕旅??蔼瞕蓰瞕 (3384)
______ C:\Users\Ting\Desktop\Rooter.exe (1488)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:1048576 | Length:208666624)
\Device\Harddisk0\Partition2 (Start_Offset:209715200 | Length:484708450304)
\Device\Harddisk0\Partition3 (Start_Offset:484918165504 | Length:15080620032)
\Device\Harddisk0\Partition4 (Start_Offset:499998785536 | Length:108027904)
.
----------------------\\ Scheduled Tasks
.
C:\Windows\Tasks\Adobe Flash Player Updater.job
C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
C:\Windows\Tasks\SA.DAT
C:\Windows\Tasks\SCHEDLGU.TXT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 19:45.11
.
C:\Rooter$\Rooter_2.txt - (18/03/2013 | 19:45.11)
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 18, 2013, 05:43:19 AM
RogueKiller Log

RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Ting [Admin rights]
Mode : Remove -- Date : 03/18/2013 19:50:47
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 6 ¤¤¤
[TASK][SUSP PATH] Funmoods : C:\Users\Ting\AppData\Roaming\Funmoods\UPDATE~1\UPDATE~1.EXE /Check [HJPOL] HKCU\[...]\System : DisableTaskmgr (0) -> DELETED
[HJPOL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: Hitachi HTS725050A9A364 +++++
--- User ---
[MBR] 85c28d761bdf138d67df3122bb314869
[BSP] 26bdf2b66feb79e295528b0fccee24bf : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 462254 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 947105792 | Size: 14382 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 976560128 | Size: 103 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_03182013_02d1950.txt >>
RKreport[1]_S_03182013_02d1948.txt ; RKreport[2]_D_03182013_02d1950.txt

Checkup Log  

Results of screen317's Security Check version 0.99.61 
 Windows 7 Service Pack 1 x64 (UAC is enabled) 
 Internet Explorer 9 
``````````````Antivirus/Firewall Check:``````````````[/u]
 Windows Firewall Enabled! 
Avira Desktop   
 Antivirus up to date!  (On Access scanning disabled!)
`````````Anti-malware/Other Utilities Check:`````````[/u]
 Malwarebytes Anti-Malware version 1.70.0.1100 
 Java(TM) 6 Update 31 
 Java version out of Date!
 Adobe Reader 9 Adobe Reader out of Date!
 Google Chrome 25.0.1364.152 
 Google Chrome 25.0.1364.172 
````````Process Check: objlist.exe by Laurent````````[/u] 
 Avira Antivir avgnt.exe
 Avira Antivir avguard.exe
`````````````````System Health check`````````````````[/u]
 Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````[/u]


Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 18, 2013, 12:25:23 PM
The Security Check shows that your AV is disabled. Please enable it soon.

Update Your Java (JRE)

Old versions of Java have vulnerabilities that malware can use to infect your system.

First Verify your Java Version (http://www.java.com/en/download/installed.jsp)

If there are any other version(s) installed then update now.

Get the new version (if needed)

If your version is out of date install the newest version of the Sun Java Runtime Environment (http://www.majorgeeks.com/Sun_Java_Runtime_Environment_d4648.html).

Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Be sure to close ALL open web browsers before starting the installation.

Remove any old versions

1. Download JavaRa (http://raproducts.org/click/click.php?id=1) and unzip the file to your Desktop.
2. Open JavaRA.exe and choose Remove Older Versions
3. Once complete exit JavaRA.

Additional Note: The Java Quick Starter (JQS.exe) (http://java.sun.com/javase/6/docs/technotes/guides/jweb/otherFeatures/jqs.html) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
**********************************************
Update your Adobe Reader. get.adobe.com/reader (http://get.adobe.com/reader/).

Be sure to uncheck the Free McAfee Security Scan so it isn't installed.

**********************************************
How's your computer running now?

I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
 ESET OnlineScan (http://eset.com/onlinescan)

•Click the (http://i424.photobucket.com/albums/pp322/digistar/esetOnline.png) button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
•Check (http://i424.photobucket.com/albums/pp322/digistar/esetAcceptTerms.png)
•Click the (http://i424.photobucket.com/albums/pp322/digistar/esetStart.png) button.
•Accept any security warnings from your browser.
•Check (http://i424.photobucket.com/albums/pp322/digistar/esetScanArchives.png)
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push (http://i424.photobucket.com/albums/pp322/digistar/esetListThreats.png)
•Push (http://i424.photobucket.com/albums/pp322/digistar/esetExport.png), and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the (http://i424.photobucket.com/albums/pp322/digistar/esetBack.png) button.
•Push (http://i424.photobucket.com/albums/pp322/digistar/esetFinish.png)
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 19, 2013, 12:23:51 PM
Already update the Java and Adobe as per your request.
I also scan my computer through ESET OnlineScan.
The result is No threat detected.
Is it consider as my computer already free of spyware and malware and consider as safe already?
Really appreciate your help would like to treat you a coffee for appreciate your help.  ;D ;D

By the way, how we can find out whether my computer has been attack by virus or malware?
Which scan is better?
ESET OnlineScan can check whether my computer been attack?

Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 19, 2013, 01:15:46 PM
Quote
By the way, how we can find out whether my computer has been attack by virus or malware?
Which scan is better?
ESET OnlineScan can check whether my computer been attack?
Since there are so many different malware infections out there it's almost impossible to use one scanner that will clean everything.
Your computer was certainly compromised. You can see some of the infections in the MBAM, adwCleaner and ComboFix logs. ESET is the best scanner because it works from outside your computer and is not influenced by any infections on your computer.
Are there any other issues before we do some cleanup?
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 19, 2013, 06:48:57 PM
So far not have any issue already.
What kind of cleanup to do?
 Format PC?
Please give me the next instruction.
Thank you and Have a nice day.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 20, 2013, 05:54:09 PM
To uninstall ComboFix

(http://i424.photobucket.com/albums/pp322/digistar/Combofix_uninstall_image.jpg)

(Note: Make sure there's a space between the word ComboFix and the forward-slash.)

***********************************************
Click Start> Computer> right click the C Drive and choose Properties> enter
Click Disk Cleanup from there.

(http://i424.photobucket.com/albums/pp322/digistar/diskcleanup2.jpg)

Click OK on the Disk Cleanup Screen.
Click Yes on the Confirmation screen.

(http://i424.photobucket.com/albums/pp322/digistar/diskcleanup.jpg)

This runs the Disk Cleanup utility along with other selections if you have chosen any. (if you had a lot System Restore points, you will see a significant change in the free space in C drive)
*********************************************
Go to Microsoft Windows Update (http://windowsupdate.microsoft.com/) and get all critical updates.

----------

I suggest using WOT - Web of Trust (http://www.mywot.com/). WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster (http://www.javacoolsoftware.com/spywareblaster.html)- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer (http://www.bleepingcomputer.com/forums/tutorial49.html) from Spyware and Malware
* If you don't know what ActiveX controls are, see here (http://www.webopedia.com/TERM/A/ActiveX_control.html)

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. (http://www.safer-networking.org/en/spybotsd/index.html) Guide: Use Spybot's Immunize Feature (http://www.bleepingcomputer.com/tutorials/tutorial43.html#immunize) to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ (http://www.safer-networking.org/en/faq/index.html)

Check out Keeping Yourself Safe On The Web  (http://evilfantasy.wordpress.com/2008/05/20/keeping-yourself-safe-on-the-web/) for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware (http://evilfantasy.wordpress.com/2008/05/24/slow-computer-it-may-not-be-malware/) for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
Title: Re: Application cannot be executed. The file *** is infected.
Post by: sim619 on March 21, 2013, 05:17:41 AM
Already done the Instruction that you giving.
Any scan I still need to install?
Is it consider as my laptop has free out of virus and malware now?
Thank you for your help.
Title: Re: Application cannot be executed. The file *** is infected.
Post by: SuperDave on March 21, 2013, 04:41:51 PM
Quote
Any scan I still need to install?
Is it consider as my laptop has free out of virus and malware now?
We are finished with the scanners and your computer should be malware-free.
Quote
Thank you for your help.
You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.