Computer Hope
Software => Computer viruses and spyware => Topic started by: sim619 on March 13, 2013, 07:34:21 PM
-
Hi,
I got a serious issue with my system. Somehow some trojan/rogue has affected my system. It keeps flashing me virus alert whenever i try to run any program it says "Application cannot be executed. The file **** is infected......." (not even a command prompt or notepad can be opened but with multiple try sometime i get the command prompt but it is ridiculous). Disk antivirus professional also been flash up to ask me to subscribe
Then I google'd and searched this forums and tried the instructions from the below link.
http://www.computerhope.com/forum/index.php?topic=95177.0
However, my first step already failed to do it. My PC not allowed me to install any software.
Vista and Win7 users need to right click Rkill and choose Run as Administrator. (Already do it but pc still show warning Application cannot be excuted. The file rkill.exe is infected.)
Please help me. :'(
-
Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.
1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.
If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*************************************************************************
Boot your computer in Safe Mode with NetWorking and run MBAM. Next, try running it in Normal Mode.
Safe Mode (http://www.computerhope.com/issues/chsafe.htm#03)
(http://i424.photobucket.com/albums/pp322/digistar/mbamicontw5.gif) Please download Malwarebytes Anti-Malware from here. (http://download.bleepingcomputer.com/malwarebytes/mbam-setup.exe)
Double Click mbam-setup.exe to install the application.
- Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select "Perform Full Scan", then click Scan.
- The scan may take some time to finish,so please be patient.
- When the scan is complete, click OK, then Show Results to view the results.
- Make sure that everything is checked, and click Remove Selected.
- When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
- Please save the log to a location you will remember.
- The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
- Copy and paste the entire report in your next reply.
Extra Note:
If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
-
Thanks for your help. In the process now.
Sorry that I am busy and due to different time zone.
I am at Malaysia and now is 0:11 am.
Please be patient and thanks for your help again.
-
Thanks for your help. In the process now.
Sorry that I am busy and due to different time zone.
I am at Malaysia and now is 0:11 am.
Please be patient and thanks for your help again.
No problem. Just do it at your own pace.
-
Log that scan in safe mode
Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org
Database version: v2012.12.14.11
Windows 7 Service Pack 1 x64 NTFS (Safe Mode)
Internet Explorer 9.0.8112.16421
Ting :: TING-PC [administrator]
16/3/2013 11:29:44 AM
mbam-log-2013-03-16 (11-29-44).txt
Scan type: Full scan (C:\|D:\|E:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 648705
Time elapsed: 58 minute(s), 2 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 11
HKCR\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\esrv.funmoodsESrvc (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Quarantined and deleted successfully.
HKCR\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) -> Quarantined and deleted successfully.
HKCR\thunder (Trojan.Agent) -> Delete on reboot.
HKCU\SOFTWARE\Funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
HKCU\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
Registry Values Detected: 5
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data: -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data: -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce|7C686D7BEA0D34B500007C67F11838F5 (Trojan.FakeAlert.SSGen) -> Data: C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe -> Quarantined and deleted successfully.
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 2
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
Files Detected: 5
C:\Users\Ting\Documents\PERSONAL\QvodSetup3.exe (Spyware.Passwords) -> Quarantined and deleted successfully.
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum\Live Security Platinum.lnk (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata\defs.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
C:\ProgramData\pcdfdata\config.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe (Trojan.FakeAlert.SSGen) -> Quarantined and deleted successfully.
(end)
Log that scan in normal window modeMalwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org
Database version: v2013.03.16.03
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Ting :: TING-PC [administrator]
16/3/2013 12:43:49 PM
mbam-log-2013-03-16 (12-43-49).txt
Scan type: Full scan (C:\|D:\|E:\|F:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 651884
Time elapsed: 1 hour(s), 57 minute(s), 49 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 1
HKLM\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 1
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional (Rogue.FakeAV) -> Quarantined and deleted successfully.
Files Detected: 2
C:\Users\Ting\AppData\Local\agqtwgbl.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional\Disk Antivirus Professional.lnk (Rogue.FakeAV) -> Quarantined and deleted successfully.
(end)
Now the application in PC can be use. Please advise for next step.
Thank you.
-
Please download AdwCleaner (http://general-changelog-team.fr/fr/downloads/finish/20-outils-de-xplode/2-adwcleaner)by Xplode onto your Desktop.
- Double click on AdwCleaner.exe to run the tool.
- Click on Search.
- A logfile will automatically open after the scan has finished.
- Please post the content of that logfile in your reply.
- You can find the logfile at C:\AdwCleaner[Rn].txt as well - n is the order number.
*********************************************
Download Combofix from any of the links below, and save it to your DESKTOP.
If your version of Windows defaults to you download folder you will need to copy it to your desktop.
Link 1 (http://download.bleepingcomputer.com/sUBs/ComboFix.exe)
Link 2 (http://www.forospyware.com/sUBs/ComboFix.exe)
Link 3 (http://subs.geekstogo.com/ComboFix.exe)
To prevent your anti-virus application interfering with ComboFix we need to disable it. See here (http://www.pchelpforum.com/anti-virus/110194-how-disable-your-security-applications-4.html) for a tutorial regarding how to do so if you are unsure.
- Close any open windows and double click ComboFix.exe to run it.
You will see the following image:
(http://i424.photobucket.com/albums/pp322/digistar/NSIS_disclaimer_ENG.png)
Click I Agree to start the program.
ComboFix will then extract the necessary files and you will see this:
(http://i424.photobucket.com/albums/pp322/digistar/NSIS_extraction.png)
As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. This will not occur in Windows Vista and 7
It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
If you did not have it installed, you will see the prompt below. Choose YES.
(http://i424.photobucket.com/albums/pp322/digistar/RcAuto1.gif)
Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
(http://i424.photobucket.com/albums/pp322/digistar/whatnext.png)
Click on Yes, to continue scanning for malware.
When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).
Leave your computer alone while ComboFix is running. ComboFix will restart your computer if malware is found; allow it to do so.
Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.
-
AdwCleaner Log
# AdwCleaner v2.114 - Logfile created 03/17/2013 at 02:58:16
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Ting - TING-PC
# Boot Mode : Normal
# Running from : C:\Users\Ting\Downloads\adwcleaner.exe
# Option [Search]
***** [Services] *****
***** [Files / Folders] *****
Folder Found : C:\Program Files (x86)\TornTV.com
Folder Found : C:\ProgramData\InstallMate
Folder Found : C:\ProgramData\Premium
Folder Found : C:\ProgramData\Tarma Installer
Folder Found : C:\Users\Ting\AppData\Local\APN
Folder Found : C:\Users\Ting\AppData\Roaming\Funmoods
***** [Registry] *****
Key Found : HKCU\Software\1ClickDownload
Key Found : HKCU\Software\AppDataLow\TENCENT
Key Found : HKCU\Software\InstallCore
Key Found : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Found : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
Key Found : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Found : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband
Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions
Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions.1
Key Found : HKLM\Software\InstallCore
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Found : HKLM\Software\TENCENT
Key Found : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Found : HKLM\SOFTWARE\Tarma Installer
Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16470
[OK] Registry is clean.
-\\ Google Chrome v25.0.1364.172
File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences
Found [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
Found [l.46] : keyword = "ask.com",
Found [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=en_MY&apn_uid=3eabd1c9-be10-4c24-b141-d177d22c78bd&apn_ptnrs=%5EAC1&apn_sauid=9D1790AF-6B12-4CDB-A172-00B035CD35BC&apn_dtid=%5EYYYYYY%5EYY%5EMY&q={searchTerms}",
Found [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms}",
*************************
AdwCleaner[R1].txt - [3899 octets] - [17/03/2013 02:58:16]
########## EOF - C:\AdwCleaner[R1].txt - [3959 octets] ##########
-
ComboFix log
ComboFix 13-03-16.02 - Ting 3/2013 Sun 3:04:41.1.4 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.936.86.1033.18.3958.2302 [GMT 8:00]
执行位置: C:\TDDOWNLOAD\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
* 成功创造新还原点
((((((((((((((((((((((((((((((((((((((( 被删除的档案 )))))))))))))))))))))))))))))))))))))))))))))))))
C:\FavoriteVideo\InvisibleFolder
C:\FavoriteVideo\InvisibleFolder\20101112103740_taobao101112cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110128170117_wopaiwang110128zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110530180926_zhongguoliantong110601zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110628183241_ipad110628zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110628183325_ipad110628zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110630212109_dongfengrichan110701zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110630212351_dongfengrichan110701cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110705145932_pinganchexian110705zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110706153126_zhenai110706zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110708110551_alibaba110711zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713175807_tankeshijie110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713181503_wushen110714qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110713181704_wushen110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110713185538_shenxiandao110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713185716_shenxiandao110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713185939_shenxiandao110714cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713213045_luoqi110714qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110713213211_luoqi110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110713214454_nuoya110714zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110713222751_nuoya110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714132605_bishengyuanjianfei110715shengzhengzhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714133021_pinganchexian110714zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714141030_banggouwang110714zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714143308_zhengtuhuaijiu110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714143438_zhengtuhuaijiu110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714160257_maibaobao110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714160414_maibaobao110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714161212_zhengtu2110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714161448_zhengtu2110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714164056_ludingji110715qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110714164314_ludingji110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110714180738_wushen110715qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110714182346_guomei110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714182938_guomei110715zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714183142_rujia110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110714183338_rujia110715zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715100656_shangyou110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715105349_shenghuojia110715zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715105538_shenghuojia110715zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715134723_yingxiong110718zhu.swf
C:\FavoriteVideo\InvisibleFolder\20110715135043_yingxiong110718zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715152228_tanke110716zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715174043_jushangwang110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715174613_wushen110716zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110715174738_wushen110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715181022_kelingkeli110716zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184351_paipaiwang110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184458_paipaiwang110716zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110715184916_ludingji110716cha1.swf
C:\FavoriteVideo\InvisibleFolder\20110715185033_ludingji110716zanting1.swf
C:\FavoriteVideo\InvisibleFolder\20110715185147_ludingji110716qipao1.swf
C:\FavoriteVideo\InvisibleFolder\20110716005918_qiangshengkelingkeli110716zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110716011843_kelingkeli110716zanting15s1.swf
C:\FavoriteVideo\InvisibleFolder\20110716011952_kelingkeli110716qipao15s1.swf
C:\FavoriteVideo\InvisibleFolder\20110716012338_kelingkeli110716zhu5s.swf
C:\FavoriteVideo\InvisibleFolder\20110718094827_jiutianxianmeng110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718094942_jiutianxianmeng110718zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095132_jiutianxianmeng110718cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095649_haizeiwang110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718095757_haizeiwang110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718101908_kelingkeli110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718102029_kelingkeli110718zhu5s.swf
C:\FavoriteVideo\InvisibleFolder\20110718112955_tanke110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718115546_xinhuanzhugege110718zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718120626_xinhuanzhugege110718zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110718140512_xialv110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718140826_xialv110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110718174321_haizeiwang110718zhu1.swf
C:\FavoriteVideo\InvisibleFolder\20110718175209_banggo110718zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110718183419_zhengtu110719qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110718183609_zhengtu110719zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110719112648_kelingkeli110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719144001_baiduwenku110719zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719144155_baidu110719zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719153053_guaguashiping110720zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110719173527_maibaobao110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719173728_maibaobao110720cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719173957_maibaobao110720zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110719175813_tanke110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719180241_zhengtu110720zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719180409_zhengtu110720zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719212343_ludingji110720qipao15s.swf
C:\FavoriteVideo\InvisibleFolder\20110719212446_ludingji110720zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110720113704_zhengtumianfei110720zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110721111842_kangshifu110721zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721112023_kangshifu110721cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721145327_hushubao110701zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110721145938_hushubao110701cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721160044_maibaobao110722zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721160244_maibaobao110722zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110721160516_maibaobao110722cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110721221433_cntv110721zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110722102007_ludingji110722zanting1a.swf
C:\FavoriteVideo\InvisibleFolder\20110722162559_yingxiongwudi110725qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110722215436_dongpeng110723jiaobiao.swf
C:\FavoriteVideo\InvisibleFolder\20110725112028_yingxionglianmeng110725zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110725112503_yingxiongwudi110725zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110725190314_shenmozhetian110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110725190449_shenmozhetian110726zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110725190637_shenmozhetian110726cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726144544_modengxinrenlei110726zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110726144832_modengxinrenlei110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726145145_modengxinrenlei110726cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110726145412_xinhuanzhugege110726cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110726153626_guomei110726zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110726165253_csol110727zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110726165531_csol110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110726173321_paopaokaiding110728zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110726173525_paopaokading110728qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110727212138_ludingji10728zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110727212448_5Bludingji110728zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728145048_diaoyan110728zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110728155238_wushen110729zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728161201_shenxiandao110729zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110728161423_shenxiandao110729zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110728162107_shenxiandao110729cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729101956_yiqizaixian110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729164352_maibaobao110801cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729170341_yingfu110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110729180242_taobao110801cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110730102313_nala110730cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801123635_guangqichuanqi110801zhu15s3.swf
C:\FavoriteVideo\InvisibleFolder\20110801123818_guangqichuanqi110801zanting15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801124028_guangqichuanqi11081cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801185425_newbalance110801zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801221916_tiandiyingxiong110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801222113_tiandiyingxiong110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110801222630_tiandiyingxiong110802cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110801222825_tiandiyingxiong110802qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110802115704_wenjuan110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110802160122_cangsheng110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110802160529_cangsheng110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802163157_shenmodalu110802zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110802163323_shenmodalu110802zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802175327_maibaobao110803zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110802175519_maibaobao110803zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803132011_taobao110803cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803132200_taobao110803zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803132715_taobao110803qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110803171724_qishan110804qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110803171845_qishan110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803172239_xinshuihu110803zhu15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803172440_xinshuihu110803zanting15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803172633_xinshuihu110803cha15s.jpg
C:\FavoriteVideo\InvisibleFolder\20110803174807_ludingji110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803174935_ludingji110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110803182133_hrs110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110803191842_qiya110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804143802_shasha110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804143934_shasha110804cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804144043_shasha110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804154339_maibaobao110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804160411_maibaobao110804zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110804162251_qishan110804zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110804172948_zhengtu2110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110804173211_zhengtu2110805zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805093234_shenmozhetian110805zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805093427_shenmozhetian110805zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805093623_shenmozhetian110805cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805154002_zhengtu2110805qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110805154720_zhengtu2110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805161039_taobao110808qipao.swf
C:\FavoriteVideo\InvisibleFolder\20110805161238_taobao110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805161415_taobao110808cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805164138_shandongliantong110805zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805164252_nala110805cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110805184741_ludingji110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110805194116_tata110806zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110806195204_tianzi110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110806195426_tianzi110808zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110807215934_mingchaochuanqi110808zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110807220106_mingchaochuanqi110808zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110807220242_mingchaochuanqi110808cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809092552_tianzi110809zhu15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809092713_tianzi110809zanting.jpg
C:\FavoriteVideo\InvisibleFolder\20110809113834_yougouwang110809cha15s.swf
C:\FavoriteVideo\InvisibleFolder\20110809122112_yougouwang110806zanting.swf
C:\FavoriteVideo\InvisibleFolder\20110811142508_qijishijie110811zanting.swf.tpp
C:\FavoriteVideo\InvisibleFolder\peer.dll
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig.xml
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask.xml
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\commondc_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\comptip_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dictrule_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dsicon_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\gcollecttask.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediadc_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatag_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatip_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\setdrvflag_v1.1.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.2.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.3.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tip_v1.4.dat
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp101C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1070.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp10F9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1119.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp112A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11A9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP11EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP120.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1200.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1201.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1212.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1213.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1220.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1221.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1232.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1242.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP126B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp127C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP127D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP129A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp12AA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12E6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP130.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1301.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP132D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1345.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1366.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1399.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP13F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP140.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP141.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1415.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1420.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1425.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1426.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1427.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1428.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1429.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1430.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP144.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp144B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP145.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1451.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP146.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1471.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP14EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp14FB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp150C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP152.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp152C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp153B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1548.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp154B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1559.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp156.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1579.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp158A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP15F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1604.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1605.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1616.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1651.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1652.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1653.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1662.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1663.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1664.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1665.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1666.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1667.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1668.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1669.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp167A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1682.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1690.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1693.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16A0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16BF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16D1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16DE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16E0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16E3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16F0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1700.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1710.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1721.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1722.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP172C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp172F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1742.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp174C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp175E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp176C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp177D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17D7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp17E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1808.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1819.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1825.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1835.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1846.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1855.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1864.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1884.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18A4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP18D1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18D4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18E2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1900.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1901.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1902.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP191F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1921.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1930.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1931.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1932.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1939.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1941.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1942.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1943.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1949.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1953.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp195F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1970.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19BD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19CD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19CE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19FA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A01.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A1A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A1B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A3E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A40.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A41.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A47.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A60.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A67.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A76.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A77.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A78.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A86.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A87.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A88.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A89.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A8D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A96.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A97.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A98.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A99.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AA7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AAA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AB6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AB8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AC7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AC8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AD6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AD9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AE6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B22.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B35.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B36.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B42.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B77.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BA5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BA7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BC4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BC5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BE4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C04.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C0C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C12.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C1C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C22.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C3D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C43.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C51.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C71.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C7B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1CA8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CD9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CE9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D15.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D16.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D17.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D35.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D3D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D55.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D63.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D76.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D93.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1DC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1DD2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E02.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E12.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E1E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E2F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E4F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E5D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E7C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E7D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E8C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E9E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EAC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EBC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EDC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1F29.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1F9B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FC9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1FEA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2002.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2012.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2013.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2018.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2024.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2025.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2036.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2039.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP205F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2070.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2080.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20B5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20EF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2111.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP211B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp213B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2160.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2180.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2226.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2320.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP233D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP236A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp239C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23AD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23BE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23D8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23E9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23ED.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23F8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23FF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2408.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp240F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2429.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2439.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2445.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2475.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2485.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2489.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24A5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24A9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24B2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24D3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24F2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2511.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2513.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP251F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2523.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2531.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2532.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp253F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2540.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2542.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2543.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2551.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2554.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp259E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25BB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25CE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25DA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25EA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp261B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp262B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP262D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp263B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2648.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2668.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2686.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2697.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26B7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26BE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26C7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26D4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26F5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2706.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2707.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2712.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2717.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2722.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2723.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2733.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2734.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2735.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2742.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2743.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2751.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2753.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2754.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2761.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2762.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2763.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2764.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2765.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2766.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2767.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2768.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2769.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2770.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2772.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2773.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2774.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2775.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2776.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2787.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2788.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2789.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP278F.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2792.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27A0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27AF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27C5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27DD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27DF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27F0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27FD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2800.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2811.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2812.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2814.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2823.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP283B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp284D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp285C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2898.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28A8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28B9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28C1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E6.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F7.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F8.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28F9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28FC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2908.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2909.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2915.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP291D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2928.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp292E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2934.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2935.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2945.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2956.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp295D.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2963.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2965.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2966.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2967.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2973.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2974.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2982.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2983.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2984.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2985.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2986.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2993.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29B1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29C2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29D2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29E0.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F1.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F2.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F3.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29F4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A02.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A03.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A04.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A11.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A21.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A28.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A2E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A41.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A49.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A4E.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A51.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A71.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A7C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A9C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AC4.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACD.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACE.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AE5.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEF.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AF9.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFA.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AFB.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFC.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B08.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B09.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B18.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B19.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B1C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B38.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B39.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3A.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3B.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3C.tmp
C:\Users\Ting\AppData\Local\Microsoft\Windows\Tempor
-
Remove the Adware:
- Please close all open programs and internet browsers.
- Double click on adwcleaner.exe to run the tool.
- Click on Delete.
- Confirm each time with OK
- Your computer will be rebooted automatically. A text file will open after the restart.
- Please post the content of that logfile in your reply.
- You can find the logfile at C:\AdwCleaner[Sn].txt as well - n is the order number.
*********************************************
That is not the complete ComboFix log. ComboFix was run from the incorrect location. Please copy ComboFix from C:\TDDOWNLOAD to your desktop and run it from there. Please post all the log even if you need to break it up into two or more posts.
-
AdwCleaner Log
# AdwCleaner v2.114 - Logfile created 03/17/2013 at 10:00:53
# Updated 05/03/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : Ting - TING-PC
# Boot Mode : Normal
# Running from : C:\Users\Ting\Desktop\adwcleaner.exe
# Option [Delete]
***** [Services] *****
***** [Files / Folders] *****
Folder Deleted : C:\Program Files (x86)\TornTV.com
Folder Deleted : C:\ProgramData\InstallMate
Folder Deleted : C:\ProgramData\Premium
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\Users\Ting\AppData\Local\APN
Folder Deleted : C:\Users\Ting\AppData\Roaming\Funmoods
***** [Registry] *****
Key Deleted : HKCU\Software\1ClickDownload
Key Deleted : HKCU\Software\AppDataLow\TENCENT
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband
Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions
Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions.1
Key Deleted : HKLM\Software\InstallCore
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
Key Deleted : HKLM\Software\TENCENT
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16470
[OK] Registry is clean.
-\\ Google Chrome v25.0.1364.172
File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences
Deleted [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
Deleted [l.46] : keyword = "ask.com",
Deleted [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=e[...]
Deleted [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms[...]
*************************
AdwCleaner[R1].txt - [4024 octets] - [17/03/2013 02:58:16]
AdwCleaner[S1].txt - [3734 octets] - [17/03/2013 10:00:53]
########## EOF - C:\AdwCleaner[S1].txt - [3794 octets] ##########
-
ComboFix Log
ComboFix 13-03-16.02 - Ting 3/2013 Sun 10:07:34.3.4 - x64
Microsoft Windows 7 Home Premium 6.1.7601.1.936.86.1033.18.3958.2713 [GMT 8:00]
执行位置: c:\users\Ting\Desktop\ComboFix.exe
AV: Avira Desktop *Enabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Enabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((( 2013-02-17 至 2013-03-17 的新的档案 )))))))))))))))))))))))))))))))
.
.
2013-03-17 02:25 . 2013-03-17 02:25 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-03-15 15:22 . 2013-03-15 15:22 -------- d-----w- c:\users\Ting\AppData\Local\ElevatedDiagnostics
2013-03-15 15:18 . 2013-03-15 15:18 -------- d-----w- c:\users\Ting\AppData\Roaming\Malwarebytes
2013-03-15 15:18 . 2013-03-15 15:18 -------- d-----w- c:\programdata\Malwarebytes
2013-03-15 15:18 . 2012-12-14 08:49 24176 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-03-15 15:18 . 2013-03-15 15:18 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware
2013-03-15 15:17 . 2013-03-15 15:17 -------- d-----w- c:\users\Ting\AppData\Local\Programs
2013-03-13 02:05 . 2013-03-13 02:11 -------- d-----w- c:\programdata\7C686D7BEA0D34B500007C67F11838F5
2013-03-02 00:10 . 2013-03-02 00:10 -------- d-----w- c:\users\Ting\AppData\Roaming\Avira
2013-03-02 00:08 . 2013-03-01 23:58 27800 ----a-w- c:\windows\system32\drivers\avkmgr.sys
2013-03-02 00:08 . 2013-03-01 23:58 129216 ----a-w- c:\windows\system32\drivers\avipbb.sys
2013-03-02 00:08 . 2013-03-01 23:58 99912 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2013-03-02 00:08 . 2013-03-02 00:08 -------- d-----w- c:\programdata\Avira
2013-03-02 00:08 . 2013-03-02 00:08 -------- d-----w- c:\program files (x86)\Avira
2013-03-02 00:00 . 2013-02-08 00:28 9162192 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{587E5F77-185E-4D31-8F7E-5B721B93FB96}\mpengine.dll
2013-02-27 11:21 . 2013-02-27 11:21 -------- d-----w- c:\program files (x86)\Gophoto.it
2013-02-23 05:59 . 2013-02-23 05:59 -------- d-----w- c:\users\Ting\AppData\Local\Windows Live Writer
2013-02-23 05:59 . 2013-02-23 05:59 -------- d-----w- c:\users\Ting\AppData\Roaming\Windows Live Writer
2013-02-21 12:10 . 2013-02-22 06:10 -------- d-sh--w- c:\users\Ting\AppData\Roaming\WT082439
.
.
.
(((((((((((((((((((((((((((((((((((((((( 在三个月内被修改的档案 ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-13 23:46 . 2012-08-26 00:50 72013344 ----a-w- c:\windows\system32\MRT.exe
2013-03-13 01:24 . 2012-11-16 17:17 693976 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-03-13 01:24 . 2012-03-07 11:58 73432 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-02-12 05:45 . 2013-03-13 23:45 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll
2013-02-12 05:45 . 2013-03-13 23:45 350208 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll
2013-02-12 05:45 . 2013-03-13 23:45 308736 ----a-w- c:\windows\apppatch\AppPatch64\AcGenral.dll
2013-02-12 05:45 . 2013-03-13 23:45 111104 ----a-w- c:\windows\apppatch\AppPatch64\acspecfc.dll
2013-02-12 04:48 . 2013-03-13 23:45 474112 ----a-w- c:\windows\apppatch\AcSpecfc.dll
2013-02-12 04:48 . 2013-03-13 23:45 2176512 ----a-w- c:\windows\apppatch\AcGenral.dll
2013-01-16 17:28 . 2012-03-07 10:53 273840 ------w- c:\windows\system32\MpSigStub.exe
2013-01-05 05:53 . 2013-02-13 04:30 5553512 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-05 05:00 . 2013-02-13 04:30 3967848 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe
2013-01-05 05:00 . 2013-02-13 04:30 3913064 ----a-w- c:\windows\SysWow64\ntoskrnl.exe
2013-01-04 05:46 . 2013-02-13 04:30 215040 ----a-w- c:\windows\system32\winsrv.dll
2013-01-04 04:51 . 2013-02-13 04:30 5120 ----a-w- c:\windows\SysWow64\wow32.dll
2013-01-04 04:43 . 2013-02-13 04:30 44032 ----a-w- c:\windows\apppatch\acwow64.dll
2013-01-04 03:26 . 2013-02-13 04:30 3153408 ----a-w- c:\windows\system32\win32k.sys
2013-01-04 02:47 . 2013-02-13 04:30 25600 ----a-w- c:\windows\SysWow64\setup16.exe
2013-01-04 02:47 . 2013-02-13 04:30 7680 ----a-w- c:\windows\SysWow64\instnm.exe
2013-01-04 02:47 . 2013-02-13 04:30 2048 ----a-w- c:\windows\SysWow64\user.exe
2013-01-04 02:47 . 2013-02-13 04:30 14336 ----a-w- c:\windows\SysWow64\ntvdm64.dll
2013-01-03 06:00 . 2013-02-13 04:30 1913192 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-01-03 06:00 . 2013-02-13 04:30 288088 ----a-w- c:\windows\system32\drivers\FWPKCLNT.SYS
2012-08-14 11:24 . 2012-08-14 11:24 189404 ----a-w- c:\program files\uninstall_xl7.exe
.
.
((((((((((((((((((((((((((((((((((((( 重要登入点 ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*注意* 空白与合法缺省登录将不会被显示
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{00000ADA-7E0D-47C1-986C-F017D09C4304}]
2012-11-20 08:30 518096 ----a-w- c:\users\Public\Thunder Network\XMP4\Core\Program\VideoUrlSniffer.2.0.3.100.(175).dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{0EA37B17-6B8B-4085-8257-F3A4AA69C27A}]
2012-07-30 10:08 88080 ----a-w- c:\program files\BHO\XlBrowserAddin1.0.8.71.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{24F7D5E7-84A5-E238-543A-F69079E30962}]
2012-02-28 11:02 516472 ----a-w- c:\program files (x86)\TENCENT\SOSOAddr\ieaddr.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{A8502600-B272-4F68-A67B-A0305D46D297}]
2012-04-21 03:11 173968 ----a-w- c:\program files (x86)\QvodPlayer\QvodExtend.dll
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\AAADesktopTips]
@="{4562B511-62E9-4533-B7B2-56A8BB10B482}"
[HKEY_CLASSES_ROOT\CLSID\{4562B511-62E9-4533-B7B2-56A8BB10B482}]
2012-11-14 11:32 251856 ----a-w- c:\program files (x86)\Common Files\Thunder Network\Kankan\xappex.1.1.1.62.(176).dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LightScribe Control Panel"="c:\program files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe" [2010-02-22 2363392]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-26 98304]
"Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-28 35696]
"HP Software Update"="c:\program files (x86)\Hp\HP Software Update\HPWuSchd2.exe" [2008-12-08 54576]
"WirelessAssistant"="c:\program files (x86)\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2009-07-23 498744]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]
"QvodTerminal"="c:\program files (x86)\QvodPlayer\QvodTerminal.exe" [2012-06-08 1079216]
"Easy-PrintToolBox"="c:\program files (x86)\Canon\Easy-PrintToolBox\BJPSMAIN.EXE" [2004-01-14 409600]
"QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2012-10-24 421888]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-12-12 152544]
"avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2013-03-01 385248]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2009-12-30 1082656]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"EnableShellExecuteHooks"= 1 (0x1)
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2013-01-08 161536]
R3 netw5v64;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-08-23 19456]
R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2009-09-23 225280]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2012-08-23 57856]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-07-09 52736]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-03-08 1255736]
R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-22 57184]
S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys [2013-03-01 27800]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-02-26 202752]
S2 AntiVirSchedulerService;Avira Scheduler;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [2013-03-01 86752]
S2 ARUpdate;Tencent AddressBar Update Service;c:\program files\TENCENT\AddrUpdate\AddrUpdate.exe [2012-05-29 116656]
S2 HPWMISVC;HPWMISVC;c:\program files\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-01-18 20480]
S2 NitroDriverReadSpool8;NitroPDFDriverCreatorReadSpool8;c:\program files\Common Files\Nitro\Pro\8.0\NitroPDFDriverService8x64.exe [2012-11-06 230408]
S2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\SysWOW64\NLSSRV32.EXE [2012-11-06 69640]
S2 SageUBSBackupService;Sage UBS Backup Service;c:\program files (x86)\Common Files\Sage Software\BackupService\UBS.UBSService.exe [2011-08-23 9216]
S2 SageUBSLicenseService;Sage UBS License Service;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe [2012-02-28 15952]
S2 SageUBSServiceWatchdog;Sage UBS Service Watchdog;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe [2012-02-28 25936]
S2 UNS;Intel(R) Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [2010-03-18 2320920]
S2 XLServicePlatform;XLServicePlatform;c:\windows\system32\svchost
S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [2010-01-07 35104]
S3 HECIx64;Intel(R) Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [2009-09-17 56344]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2011-06-09 539240]
S3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\DRIVERS\rtl8192se.sys [2011-09-07 1225832]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
XLServicePlatform REG_MULTI_SZ XLServicePlatform
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2010-02-22 18:38 451872 ----a-w- c:\program files (x86)\Common Files\LightScribe\LSRunOnce.exe
.
‘计划任务’ 文件夹 里的内容
.
2013-03-17 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-16 01:24]
.
2013-03-13 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
- c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
.
2013-03-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
- c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{004B0726-A010-4ABF-8556-FCDB7F1FCA1E}]
2012-07-30 10:08 625952 ----a-w- c:\program files\BHO\XunleiBHO647.2.9.3634.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2010-01-29 6160928]
"RtkOSD"="c:\program files (x86)\Realtek\Audio\OSD\RtVOsd64.exe" [2010-01-13 995840]
"HP Quick Launch"="c:\program files\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2010-01-18 451072]
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - LocalService
FontCache
.
------- 而外的扫描 -------
.
uStart Page = about:blank
uLocal Page = c:\windows\system32\blank.htm
mStart Page = about:blank
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
IE: &ê1ó?&??à×à??????? - c:\program files\BHO\OfflineDownload.htm
IE: &ê1ó?&??à×???? - c:\program files\BHO\geturl.htm
IE: &ê1ó?&??à×????è?2?á′?ó - c:\program files\BHO\GetAllUrl.htm
IE: ???????????
IE: ???????????????
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~3\Office12\EXCEL.EXE/3000
IE: Easy-WebPrint?? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
IE: Easy-WebPrint???? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
IE: Easy-WebPrint??????? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
IE: Send image to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Send page to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
IE: 使用迅雷看看播放器播放 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenu.htm
IE: 添加当前页到迅雷看看播放器标签 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenuAddStoreTab.htm
IE: {{0000016b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolMenu.htm
IE: {{0000026b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolBar.htm
TCP: DhcpNameServer = 192.168.1.254
Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-Easy-WebPrint - c:\windows\IsUn0804.exe
AddRemove-PocketRAR - c:\program files\uninstall.exe
AddRemove-{3183E053-DA5C-4233-8761-AF3B5DE22A57}_is1 - c:\program files\KuGou2008\unins000.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):63,58,a3,3b,ea,04,93,15,02,3d,b0,20,46,c5,0b,7b,82,84,b2,4c,4d,
52,a2,3a,38,19,6d,0a,21,ad,ee,f7,91,86,6b,03,1a,df,47,95,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{8be85315-e61e-4b01-a536-41981925e766}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:0000011d
"Therad"=dword:0000001e
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
38,95,44,a1,e0,d2,1a,06,30,1f,b5,e8,8c,1e,4b,6f,1b,cf,03,4c,59,84,12,82,d1,\
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
完成时间: 2013-03-17 10:27:15
ComboFix-quarantined-files.txt 2013-03-17 02:27
ComboFix2.txt 2013-03-16 19:24
.
Pre-Run: 384,117,325,824 bytes free
Post-Run: 383,818,661,888 bytes free
.
- - End Of File - - 14E331E0E9A6C33AE3B4DA41BE2376F0
Please advise for next step.
Thank you.
-
Please download Rooter (http://eric71.geekstogo.com/tools/Rooter.exe) and Save it to your desktop.
- Double click it to start the tool.Vista and Windows7 run as administrator.
- Click Scan.
- Eventually, a Notepad file containing the report will open, also found at C:\Rooter.txt. Post that log in your next reply.
*******************************************
- Download RogueKiller (http://tigzy.geekstogo.com/Tools/RogueKiller.exe) on the desktop
- Close all the running programs
- Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
- Otherwise just double-click on RogueKiller.exe
- Pre-scan will start. Let it finish.
- Click on SCAN button.
- A report (RKreport.txt) should open. Post its content in your next reply. (RKreport could also be found on your desktop)
- If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again
**************************************
Download Security Check by screen317 from one of the following links and save it to your desktop.
Link 1 (http://screen317.spywareinfoforum.org/SecurityCheck.exe)
Link 2 (http://screen317.changelog.fr/SecurityCheck.exe)
* Double-click Security Check.bat
* Follow the on-screen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt
* Post the contents of that document in your next reply.
Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.
-
Rooter Log
Rooter.exe (v1.0.2) by Eric_71
.
SeDebugPrivilege granted successfully ...
.
Windows 7 Home Edition (6.1.7601) Service Pack 1
[32_bits] - Intel64 Family 6 Model 37 Stepping 2, GenuineIntel
.
[wscsvc] (Security Center) RUNNING (state:4)
[MpsSvc] RUNNING (state:4)
Windows Firewall -> Enabled
Windows Defender -> Enabled
User Account Control (UAC) -> Enabled
.
Internet Explorer 9.0.8112.16421
.
C:\ [Fixed-NTFS] .. ( Total:451 Go - Free:357 Go )
D:\ [Fixed-NTFS] .. ( Total:14 Go - Free:2 Go )
E:\ [Fixed-FAT32] .. ( Total:0 Go - Free:0 Go )
F:\ [CD_Rom]
.
Scan : 19:45.05
Path : C:\Users\Ting\Desktop\Rooter.exe
User : Ting ( Administrator -> YES )
.
----------------------\\ Processes
.
Locked [System Process] (0)
Locked System (4)
______ 燕瞕旅??蔼瞕蓰瞕 (308)
______ 燕瞕旅??蔼瞕蓰瞕 (436)
______ 燕瞕旅??蔼瞕蓰瞕 (508)
______ 燕瞕旅??蔼瞕蓰瞕 (532)
______ 燕瞕旅??蔼瞕蓰瞕 (572)
______ 燕瞕旅??蔼瞕蓰瞕 (588)
______ 燕瞕旅??蔼瞕蓰瞕 (596)
______ 燕瞕旅??蔼瞕蓰瞕 (656)
______ 燕瞕旅??蔼瞕蓰瞕 (740)
______ 燕瞕旅??蔼瞕蓰瞕 (824)
______ 燕瞕旅??蔼瞕蓰瞕 (892)
______ 燕瞕旅??蔼瞕蓰瞕 (956)
______ 燕瞕旅??蔼瞕蓰瞕 (996)
______ 燕瞕旅??蔼瞕蓰瞕 (116)
______ 燕瞕旅??蔼瞕蓰瞕 (352)
Locked audiodg.exe (368)
______ 燕瞕旅??蔼瞕蓰瞕 (928)
______ 燕瞕旅??蔼瞕蓰瞕 (1084)
______ 燕瞕旅??蔼瞕蓰瞕 (1240)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (1272)
______ 燕瞕旅??蔼瞕蓰瞕 (1292)
______ 燕瞕旅??蔼瞕蓰瞕 (1428)
______ 燕瞕旅??蔼瞕蓰瞕 (1536)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (1560)
______ C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (1592)
______ C:\Program Files\TENCENT\AddrUpdate\AddrUpdate.exe (1644)
______ 燕瞕旅??蔼瞕蓰瞕 (1696)
______ 燕瞕旅??蔼瞕蓰瞕 (1720)
______ 燕瞕旅??蔼瞕蓰瞕 (1756)
______ 燕瞕旅??蔼瞕蓰瞕 (1796)
______ C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe (1828)
______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (1864)
______ C:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe (1888)
______ 燕瞕旅??蔼瞕蓰瞕 (1932)
______ C:\Windows\SysWOW64\NLSSRV32.EXE (1980)
______ C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe (1076)
______ 燕瞕旅??蔼瞕蓰瞕 (1020)
______ 燕瞕旅??蔼瞕蓰瞕 (2096)
______ 燕瞕旅??蔼瞕蓰瞕 (2116)
______ 燕瞕旅??蔼瞕蓰瞕 (2208)
______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe (2348)
______ 燕瞕旅??蔼瞕蓰瞕 (2412)
______ 燕瞕旅??蔼瞕蓰瞕 (2420)
______ 燕瞕旅??蔼瞕蓰瞕 (2432)
______ 燕瞕旅??蔼瞕蓰瞕 (2440)
______ C:\Program Files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe (2468)
______ 燕瞕旅??蔼瞕蓰瞕 (2492)
______ C:\Program Files (x86)\Hp\HP Software Update\hpwuschd2.exe (2668)
______ 燕瞕旅??蔼瞕蓰瞕 (2696)
______ C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe (2728)
______ C:\Program Files (x86)\QvodPlayer\QvodTerminal.exe (2780)
______ C:\Program Files (x86)\iTunes\iTunesHelper.exe (2876)
______ C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (2892)
______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe (932)
______ 燕瞕旅??蔼瞕蓰瞕 (2808)
______ 燕瞕旅??蔼瞕蓰瞕 (3060)
______ C:\Windows\SysWOW64\svchost.exe (2912)
______ 燕瞕旅??蔼瞕蓰瞕 (2748)
______ 燕瞕旅??蔼瞕蓰瞕 (3428)
______ 燕瞕旅??蔼瞕蓰瞕 (3760)
______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqwmiex.exe (3788)
______ 燕瞕旅??蔼瞕蓰瞕 (3848)
______ 燕瞕旅??蔼瞕蓰瞕 (3880)
______ 燕瞕旅??蔼瞕蓰瞕 (4000)
______ 燕瞕旅??蔼瞕蓰瞕 (4032)
______ 燕瞕旅??蔼瞕蓰瞕 (3648)
______ 燕瞕旅??蔼瞕蓰瞕 (4116)
______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqToaster.exe (4344)
______ 燕瞕旅??蔼瞕蓰瞕 (4376)
______ C:\Program Files\WIDCOMM\Bluetooth Software\BluetoothHeadsetProxy.exe (4512)
______ 燕瞕旅??蔼瞕蓰瞕 (4672)
______ 燕瞕旅??蔼瞕蓰瞕 (4748)
______ 燕瞕旅??蔼瞕蓰瞕 (4768)
______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (2504)
______ 燕瞕旅??蔼瞕蓰瞕 (4664)
______ C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_11_6_602_180_ActiveX.exe (4148)
______ C:\Program Files\Program\Thunder.exe (1684)
______ c:\program files (x86)\common files\thunder network\tp\ver1\1.1.2.186_1111\thunderplatform.exe (5072)
______ 燕瞕旅??蔼瞕蓰瞕 (3600)
______ 燕瞕旅??蔼瞕蓰瞕 (4232)
______ C:\Program Files\Program\XLUEOPS.exe (5300)
______ 燕瞕旅??蔼瞕蓰瞕 (5320)
______ 燕瞕旅??蔼瞕蓰瞕 (5872)
______ 燕瞕旅??蔼瞕蓰瞕 (1172)
______ 燕瞕旅??蔼瞕蓰瞕 (3384)
______ C:\Users\Ting\Desktop\Rooter.exe (1488)
.
----------------------\\ Device\Harddisk0\
.
\Device\Harddisk0 [Sectors : 63 x 512 Bytes]
.
\Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:1048576 | Length:208666624)
\Device\Harddisk0\Partition2 (Start_Offset:209715200 | Length:484708450304)
\Device\Harddisk0\Partition3 (Start_Offset:484918165504 | Length:15080620032)
\Device\Harddisk0\Partition4 (Start_Offset:499998785536 | Length:108027904)
.
----------------------\\ Scheduled Tasks
.
C:\Windows\Tasks\Adobe Flash Player Updater.job
C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
C:\Windows\Tasks\SA.DAT
C:\Windows\Tasks\SCHEDLGU.TXT
.
----------------------\\ Registry
.
.
----------------------\\ Files & Folders
.
----------------------\\ Scan completed at 19:45.11
.
C:\Rooter$\Rooter_2.txt - (18/03/2013 | 19:45.11)
-
RogueKiller Log
RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Ting [Admin rights]
Mode : Remove -- Date : 03/18/2013 19:50:47
| ARK || FAK || MBR |
¤¤¤ Bad processes : 0 ¤¤¤
¤¤¤ Registry Entries : 6 ¤¤¤
[TASK][SUSP PATH] Funmoods : C:\Users\Ting\AppData\Roaming\Funmoods\UPDATE~1\UPDATE~1.EXE /Check [HJPOL] HKCU\[...]\System : DisableTaskmgr (0) -> DELETED
[HJPOL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
¤¤¤ Particular Files / Folders: ¤¤¤
¤¤¤ Driver : [NOT LOADED] ¤¤¤
¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts
127.0.0.1 localhost
¤¤¤ MBR Check: ¤¤¤
+++++ PhysicalDrive0: Hitachi HTS725050A9A364 +++++
--- User ---
[MBR] 85c28d761bdf138d67df3122bb314869
[BSP] 26bdf2b66feb79e295528b0fccee24bf : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 462254 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 947105792 | Size: 14382 Mo
3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 976560128 | Size: 103 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Finished : << RKreport[2]_D_03182013_02d1950.txt >>
RKreport[1]_S_03182013_02d1948.txt ; RKreport[2]_D_03182013_02d1950.txt
Checkup Log
Results of screen317's Security Check version 0.99.61
Windows 7 Service Pack 1 x64 (UAC is enabled)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````[/u]
Windows Firewall Enabled!
Avira Desktop
Antivirus up to date! (On Access scanning disabled!)
`````````Anti-malware/Other Utilities Check:`````````[/u]
Malwarebytes Anti-Malware version 1.70.0.1100
Java(TM) 6 Update 31
Java version out of Date!
Adobe Reader 9 Adobe Reader out of Date!
Google Chrome 25.0.1364.152
Google Chrome 25.0.1364.172
````````Process Check: objlist.exe by Laurent````````[/u]
Avira Antivir avgnt.exe
Avira Antivir avguard.exe
`````````````````System Health check`````````````````[/u]
Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````[/u]
-
The Security Check shows that your AV is disabled. Please enable it soon.
Update Your Java (JRE)
Old versions of Java have vulnerabilities that malware can use to infect your system.
First Verify your Java Version (http://www.java.com/en/download/installed.jsp)
If there are any other version(s) installed then update now.
Get the new version (if needed)
If your version is out of date install the newest version of the Sun Java Runtime Environment (http://www.majorgeeks.com/Sun_Java_Runtime_Environment_d4648.html).
Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.
Be sure to close ALL open web browsers before starting the installation.
Remove any old versions
1. Download JavaRa (http://raproducts.org/click/click.php?id=1) and unzip the file to your Desktop.
2. Open JavaRA.exe and choose Remove Older Versions
3. Once complete exit JavaRA.
Additional Note: The Java Quick Starter (JQS.exe) (http://java.sun.com/javase/6/docs/technotes/guides/jweb/otherFeatures/jqs.html) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
**********************************************
Update your Adobe Reader. get.adobe.com/reader (http://get.adobe.com/reader/).
Be sure to uncheck the Free McAfee Security Scan so it isn't installed.
**********************************************
How's your computer running now?
I'd like to scan your machine with ESET OnlineScan
•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan (http://eset.com/onlinescan)
•Click the (http://i424.photobucket.com/albums/pp322/digistar/esetOnline.png) button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
- Click on (http://i424.photobucket.com/albums/pp322/digistar/esetSmartInstall.png) to download the ESET Smart Installer. Save it to your desktop.
- Double click on the (http://i424.photobucket.com/albums/pp322/digistar/esetSmartInstallDesktopIcon-1.png) icon on your desktop.
•Check (http://i424.photobucket.com/albums/pp322/digistar/esetAcceptTerms.png)
•Click the (http://i424.photobucket.com/albums/pp322/digistar/esetStart.png) button.
•Accept any security warnings from your browser.
- Leave the check mark next to Remove found threats.
•Check (http://i424.photobucket.com/albums/pp322/digistar/esetScanArchives.png)
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push (http://i424.photobucket.com/albums/pp322/digistar/esetListThreats.png)
•Push (http://i424.photobucket.com/albums/pp322/digistar/esetExport.png), and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the (http://i424.photobucket.com/albums/pp322/digistar/esetBack.png) button.
•Push (http://i424.photobucket.com/albums/pp322/digistar/esetFinish.png)
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
-
Already update the Java and Adobe as per your request.
I also scan my computer through ESET OnlineScan.
The result is No threat detected.
Is it consider as my computer already free of spyware and malware and consider as safe already?
Really appreciate your help would like to treat you a coffee for appreciate your help. ;D ;D
By the way, how we can find out whether my computer has been attack by virus or malware?
Which scan is better?
ESET OnlineScan can check whether my computer been attack?
-
By the way, how we can find out whether my computer has been attack by virus or malware?
Which scan is better?
ESET OnlineScan can check whether my computer been attack?
Since there are so many different malware infections out there it's almost impossible to use one scanner that will clean everything.
Your computer was certainly compromised. You can see some of the infections in the MBAM, adwCleaner and ComboFix logs. ESET is the best scanner because it works from outside your computer and is not influenced by any infections on your computer.
Are there any other issues before we do some cleanup?
-
So far not have any issue already.
What kind of cleanup to do?
Format PC?
Please give me the next instruction.
Thank you and Have a nice day.
-
To uninstall ComboFix
- Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
- In the field, type in ComboFix /uninstall
(http://i424.photobucket.com/albums/pp322/digistar/Combofix_uninstall_image.jpg)
(Note: Make sure there's a space between the word ComboFix and the forward-slash.)
- Then, press Enter, or click OK.
- This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
***********************************************
Click Start> Computer> right click the C Drive and choose Properties> enter
Click Disk Cleanup from there.
(http://i424.photobucket.com/albums/pp322/digistar/diskcleanup2.jpg)
Click OK on the Disk Cleanup Screen.
Click Yes on the Confirmation screen.
(http://i424.photobucket.com/albums/pp322/digistar/diskcleanup.jpg)
This runs the Disk Cleanup utility along with other selections if you have chosen any. (if you had a lot System Restore points, you will see a significant change in the free space in C drive)
*********************************************
Go to Microsoft Windows Update (http://windowsupdate.microsoft.com/) and get all critical updates.
----------
I suggest using WOT - Web of Trust (http://www.mywot.com/). WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.
SpywareBlaster (http://www.javacoolsoftware.com/spywareblaster.html)- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer (http://www.bleepingcomputer.com/forums/tutorial49.html) from Spyware and Malware
* If you don't know what ActiveX controls are, see here (http://www.webopedia.com/TERM/A/ActiveX_control.html)
Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. (http://www.safer-networking.org/en/spybotsd/index.html) Guide: Use Spybot's Immunize Feature (http://www.bleepingcomputer.com/tutorials/tutorial43.html#immunize) to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ (http://www.safer-networking.org/en/faq/index.html)
Check out Keeping Yourself Safe On The Web (http://evilfantasy.wordpress.com/2008/05/20/keeping-yourself-safe-on-the-web/) for tips and free tools to help keep you safe in the future.
Also see Slow Computer? It may not be Malware (http://evilfantasy.wordpress.com/2008/05/24/slow-computer-it-may-not-be-malware/) for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!
-
Already done the Instruction that you giving.
Any scan I still need to install?
Is it consider as my laptop has free out of virus and malware now?
Thank you for your help.
-
Any scan I still need to install?
Is it consider as my laptop has free out of virus and malware now?
We are finished with the scanners and your computer should be malware-free.
Thank you for your help.
You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.