Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Application cannot be executed. The file *** is infected.  (Read 16315 times)

0 Members and 1 Guest are viewing this topic.

sim619

    Topic Starter


    Rookie

    • Experience: Beginner
    • OS: Windows XP
    Application cannot be executed. The file *** is infected.
    « on: March 13, 2013, 07:34:21 PM »
    Hi,

    I got a serious issue with my system. Somehow some trojan/rogue has affected my system. It keeps flashing me virus alert whenever i try to run any program it says "Application cannot be executed. The file  **** is infected......." (not even a command prompt or notepad can be opened but with multiple try sometime i get the command prompt but it is ridiculous). Disk antivirus professional also been flash up to ask me to subscribe

    Then I google'd and searched this forums and tried the instructions from the below link.
    http://www.computerhope.com/forum/index.php?topic=95177.0

    However, my first step already failed to do it. My PC not allowed me to install any software.
    Vista and Win7 users need to right click Rkill and choose Run as Administrator. (Already do it but pc still show warning Application cannot be excuted. The file rkill.exe is infected.)

    Please help me. :'(

    SuperDave

    • Malware Removal Specialist
    • Moderator


    • Genius
    • Thanked: 1020
    • Certifications: List
    • Experience: Expert
    • OS: Windows 10
    Re: Application cannot be executed. The file *** is infected.
    « Reply #1 on: March 14, 2013, 12:44:50 PM »
    Hello and welcome to Computer Hope Forum. My name is Dave. I will be helping you out with your particular problem on your computer.

    1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
    2. The fixes are specific to your problem and should only be used for this issue on this machine.
    3. If you don't know or understand something, please don't hesitate to ask.
    4. Please DO NOT run any other tools or scans while I am helping you.
    5. It is important that you reply to this thread. Do not start a new topic.
    6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
    7. Absence of symptoms does not mean that everything is clear.

    If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
    *************************************************************************
    Boot your computer in Safe Mode with NetWorking and run MBAM. Next, try running it in Normal Mode.

    Safe Mode

    Please download Malwarebytes Anti-Malware from here.
    Double Click mbam-setup.exe to install the application.
    • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes Anti-Malware, then click Finish.
    • If an update is found, it will download and install the latest version.
    • Once the program has loaded, select "Perform Full Scan", then click Scan.
    • The scan may take some time to finish,so please be patient.
    • When the scan is complete, click OK, then Show Results to view the results.
    • Make sure that everything is checked, and click Remove Selected.
    • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart. (See Extra Note)
    • Please save the log to a location you will remember.
    • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
    • Copy and paste the entire report in your next reply.
    Extra Note:

    If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process. If asked to restart the computer, please do so immediately.
    Windows 8 and Windows 10 dual boot with two SSD's

    sim619

      Topic Starter


      Rookie

      • Experience: Beginner
      • OS: Windows XP
      Re: Application cannot be executed. The file *** is infected.
      « Reply #2 on: March 15, 2013, 09:55:48 AM »
      Thanks for your help. In the process now.
      Sorry that I am busy and due to different time zone.
      I am at Malaysia and now is 0:11 am.
      Please be patient and thanks for your help again.

      SuperDave

      • Malware Removal Specialist
      • Moderator


      • Genius
      • Thanked: 1020
      • Certifications: List
      • Experience: Expert
      • OS: Windows 10
      Re: Application cannot be executed. The file *** is infected.
      « Reply #3 on: March 15, 2013, 12:26:54 PM »
      Thanks for your help. In the process now.
      Sorry that I am busy and due to different time zone.
      I am at Malaysia and now is 0:11 am.
      Please be patient and thanks for your help again.
      No problem. Just do it at your own pace.
      Windows 8 and Windows 10 dual boot with two SSD's

      sim619

        Topic Starter


        Rookie

        • Experience: Beginner
        • OS: Windows XP
        Re: Application cannot be executed. The file *** is infected.
        « Reply #4 on: March 16, 2013, 12:35:34 AM »
        Log that scan in safe mode
        Malwarebytes Anti-Malware 1.70.0.1100
        www.malwarebytes.org

        Database version: v2012.12.14.11

        Windows 7 Service Pack 1 x64 NTFS (Safe Mode)
        Internet Explorer 9.0.8112.16421
        Ting :: TING-PC [administrator]

        16/3/2013 11:29:44 AM
        mbam-log-2013-03-16 (11-29-44).txt

        Scan type: Full scan (C:\|D:\|E:\|F:\|)
        Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
        Scan options disabled: P2P
        Objects scanned: 648705
        Time elapsed: 58 minute(s), 2 second(s)

        Memory Processes Detected: 0
        (No malicious items detected)

        Memory Modules Detected: 0
        (No malicious items detected)

        Registry Keys Detected: 11
        HKCR\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840} (PUP.Funmoods) -> Quarantined and deleted successfully.
        HKCR\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706} (PUP.Funmoods) -> Quarantined and deleted successfully.
        HKCR\esrv.funmoodsESrvc.1 (PUP.Funmoods) -> Quarantined and deleted successfully.
        HKCR\esrv.funmoodsESrvc (PUP.Funmoods) -> Quarantined and deleted successfully.
        HKCR\CLSID\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Quarantined and deleted successfully.
        HKCR\CLSID\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
        HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Quarantined and deleted successfully.
        HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} (PUP.Funmoods) -> Quarantined and deleted successfully.
        HKCR\thunder (Trojan.Agent) -> Delete on reboot.
        HKCU\SOFTWARE\Funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.
        HKCU\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.

        Registry Values Detected: 5
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved|{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DB8B2393-7A6C-4C76-88CE-6B1F6FF6FFE9} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
        HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A57E074F-56D8-4A33-8112-AAC9693AA909} (Trojan.Agent) -> Data:  -> Quarantined and deleted successfully.
        HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce|7C686D7BEA0D34B500007C67F11838F5 (Trojan.FakeAlert.SSGen) -> Data: C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe -> Quarantined and deleted successfully.

        Registry Data Items Detected: 0
        (No malicious items detected)

        Folders Detected: 2
        C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
        C:\ProgramData\pcdfdata (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.

        Files Detected: 5
        C:\Users\Ting\Documents\PERSONAL\QvodSetup3.exe (Spyware.Passwords) -> Quarantined and deleted successfully.
        C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Live Security Platinum\Live Security Platinum.lnk (Rogue.LiveSecurityPlatinum) -> Quarantined and deleted successfully.
        C:\ProgramData\pcdfdata\defs.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
        C:\ProgramData\pcdfdata\config.bin (Rogue.PCDefenderPlus) -> Quarantined and deleted successfully.
        C:\ProgramData\7C686D7BEA0D34B500007C67F11838F5\7C686D7BEA0D34B500007C67F11838F5.exe (Trojan.FakeAlert.SSGen) -> Quarantined and deleted successfully.

        (end)


        Log that scan in normal window modeMalwarebytes Anti-Malware 1.70.0.1100
        www.malwarebytes.org

        Database version: v2013.03.16.03

        Windows 7 Service Pack 1 x64 NTFS
        Internet Explorer 9.0.8112.16421
        Ting :: TING-PC [administrator]

        16/3/2013 12:43:49 PM
        mbam-log-2013-03-16 (12-43-49).txt

        Scan type: Full scan (C:\|D:\|E:\|F:\|)
        Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
        Scan options disabled: P2P
        Objects scanned: 651884
        Time elapsed: 1 hour(s), 57 minute(s), 49 second(s)

        Memory Processes Detected: 0
        (No malicious items detected)

        Memory Modules Detected: 0
        (No malicious items detected)

        Registry Keys Detected: 1
        HKLM\SOFTWARE\InstallCore\funmoods (PUP.FunMoods) -> Quarantined and deleted successfully.

        Registry Values Detected: 0
        (No malicious items detected)

        Registry Data Items Detected: 0
        (No malicious items detected)

        Folders Detected: 1
        C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional (Rogue.FakeAV) -> Quarantined and deleted successfully.

        Files Detected: 2
        C:\Users\Ting\AppData\Local\agqtwgbl.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
        C:\Users\Ting\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Disk Antivirus Professional\Disk Antivirus Professional.lnk (Rogue.FakeAV) -> Quarantined and deleted successfully.

        (end)

        Now the application in PC can be use. Please advise for next step.
        Thank you.

        SuperDave

        • Malware Removal Specialist
        • Moderator


        • Genius
        • Thanked: 1020
        • Certifications: List
        • Experience: Expert
        • OS: Windows 10
        Re: Application cannot be executed. The file *** is infected.
        « Reply #5 on: March 16, 2013, 12:20:19 PM »
        Please download AdwCleaner by Xplode onto your Desktop.
        • Double click on AdwCleaner.exe to run the tool.
        • Click on Search.
        • A logfile will automatically open after the scan has finished.
        • Please post the content of that logfile in your reply.
        • You can find the logfile at C:\AdwCleaner[Rn].txt as well - n is the order number.
        *********************************************
        Download Combofix from any of the links below, and save it to your DESKTOP
        If your version of Windows defaults to you download folder you will need to copy it to your desktop.

        Link 1
        Link 2
        Link 3

        To prevent your anti-virus application interfering with  ComboFix we need to disable it. See here for a tutorial regarding how to do so if you are unsure.
        • Close any open windows and double click ComboFix.exe to run it.

          You will see the following image:


        Click I Agree to start the program.

        ComboFix will then extract the necessary files and you will see this:



        As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to  have this pre-installed on your machine before doing any malware  removal. This will not occur in Windows Vista and 7

        It will allow you to boot up into a special recovery/repair  mode that will allow us to more easily help you should your computer  have a problem after an attempted removal of malware.

        If you did not have it installed, you will see the prompt below. Choose YES.



        Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

        **Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

        Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



        Click on Yes, to continue scanning for malware.

        When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).

        Leave your computer alone while ComboFix is running. ComboFix will restart your computer if malware is found; allow it to do so.

        Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.
        Windows 8 and Windows 10 dual boot with two SSD's

        sim619

          Topic Starter


          Rookie

          • Experience: Beginner
          • OS: Windows XP
          Re: Application cannot be executed. The file *** is infected.
          « Reply #6 on: March 16, 2013, 01:12:40 PM »
          AdwCleaner Log
          # AdwCleaner v2.114 - Logfile created 03/17/2013 at 02:58:16
          # Updated 05/03/2013 by Xplode
          # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
          # User : Ting - TING-PC
          # Boot Mode : Normal
          # Running from : C:\Users\Ting\Downloads\adwcleaner.exe
          # Option [Search]


          ***** [Services] *****


          ***** [Files / Folders] *****

          Folder Found : C:\Program Files (x86)\TornTV.com
          Folder Found : C:\ProgramData\InstallMate
          Folder Found : C:\ProgramData\Premium
          Folder Found : C:\ProgramData\Tarma Installer
          Folder Found : C:\Users\Ting\AppData\Local\APN
          Folder Found : C:\Users\Ting\AppData\Roaming\Funmoods

          ***** [Registry] *****

          Key Found : HKCU\Software\1ClickDownload
          Key Found : HKCU\Software\AppDataLow\TENCENT
          Key Found : HKCU\Software\InstallCore
          Key Found : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
          Key Found : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
          Key Found : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
          Key Found : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
          Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
          Key Found : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
          Key Found : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
          Key Found : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
          Key Found : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
          Key Found : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband
          Key Found : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
          Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions
          Key Found : HKLM\SOFTWARE\Classes\toolband.useroptions.1
          Key Found : HKLM\Software\InstallCore
          Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
          Key Found : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
          Key Found : HKLM\Software\TENCENT
          Key Found : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
          Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
          Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
          Key Found : HKLM\SOFTWARE\Tarma Installer
          Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]

          ***** [Internet Browsers] *****

          -\\ Internet Explorer v9.0.8112.16470

          [OK] Registry is clean.

          -\\ Google Chrome v25.0.1364.172

          File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences

          Found [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
          Found [l.46] : keyword = "ask.com",
          Found [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=en_MY&apn_uid=3eabd1c9-be10-4c24-b141-d177d22c78bd&apn_ptnrs=%5EAC1&apn_sauid=9D1790AF-6B12-4CDB-A172-00B035CD35BC&apn_dtid=%5EYYYYYY%5EYY%5EMY&q={searchTerms}",
          Found [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms}",

          *************************

          AdwCleaner[R1].txt - [3899 octets] - [17/03/2013 02:58:16]

          ########## EOF - C:\AdwCleaner[R1].txt - [3959 octets] ##########



          sim619

            Topic Starter


            Rookie

            • Experience: Beginner
            • OS: Windows XP
            Re: Application cannot be executed. The file *** is infected.
            « Reply #7 on: March 16, 2013, 01:18:25 PM »
            ComboFix log


            ComboFix 13-03-16.02 - Ting 3/2013 Sun   3:04:41.1.4 - x64
            Microsoft Windows 7 Home Premium   6.1.7601.1.936.86.1033.18.3958.2302 [GMT 8:00]
            执行位置: C:\TDDOWNLOAD\ComboFix.exe
            AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
            SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
            SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
             * 成功创造新还原点


            (((((((((((((((((((((((((((((((((((((((   被删除的档案   )))))))))))))))))))))))))))))))))))))))))))))))))


            C:\FavoriteVideo\InvisibleFolder
            C:\FavoriteVideo\InvisibleFolder\20101112103740_taobao101112cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110128170117_wopaiwang110128zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110530180926_zhongguoliantong110601zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110628183241_ipad110628zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110628183325_ipad110628zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110630212109_dongfengrichan110701zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110630212351_dongfengrichan110701cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110705145932_pinganchexian110705zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110706153126_zhenai110706zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110708110551_alibaba110711zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713175807_tankeshijie110714zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713181503_wushen110714qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110713181704_wushen110714zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110713185538_shenxiandao110714zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713185716_shenxiandao110714zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713185939_shenxiandao110714cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713213045_luoqi110714qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110713213211_luoqi110714zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110713214454_nuoya110714zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110713222751_nuoya110714zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714132605_bishengyuanjianfei110715shengzhengzhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714133021_pinganchexian110714zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714141030_banggouwang110714zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110714143308_zhengtuhuaijiu110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714143438_zhengtuhuaijiu110715zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110714160257_maibaobao110715zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110714160414_maibaobao110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714161212_zhengtu2110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714161448_zhengtu2110715zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110714164056_ludingji110715qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110714164314_ludingji110715zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110714180738_wushen110715qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110714182346_guomei110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714182938_guomei110715zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714183142_rujia110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110714183338_rujia110715zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110715100656_shangyou110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715105349_shenghuojia110715zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715105538_shenghuojia110715zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715134723_yingxiong110718zhu.swf
            C:\FavoriteVideo\InvisibleFolder\20110715135043_yingxiong110718zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110715152228_tanke110716zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110715174043_jushangwang110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715174613_wushen110716zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110715174738_wushen110716zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715181022_kelingkeli110716zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715184351_paipaiwang110716zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715184458_paipaiwang110716zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110715184916_ludingji110716cha1.swf
            C:\FavoriteVideo\InvisibleFolder\20110715185033_ludingji110716zanting1.swf
            C:\FavoriteVideo\InvisibleFolder\20110715185147_ludingji110716qipao1.swf
            C:\FavoriteVideo\InvisibleFolder\20110716005918_qiangshengkelingkeli110716zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110716011843_kelingkeli110716zanting15s1.swf
            C:\FavoriteVideo\InvisibleFolder\20110716011952_kelingkeli110716qipao15s1.swf
            C:\FavoriteVideo\InvisibleFolder\20110716012338_kelingkeli110716zhu5s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718094827_jiutianxianmeng110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718094942_jiutianxianmeng110718zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718095132_jiutianxianmeng110718cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718095649_haizeiwang110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718095757_haizeiwang110719zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718101908_kelingkeli110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718102029_kelingkeli110718zhu5s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718112955_tanke110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718115546_xinhuanzhugege110718zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718120626_xinhuanzhugege110718zanting.jpg
            C:\FavoriteVideo\InvisibleFolder\20110718140512_xialv110719zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718140826_xialv110719zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110718174321_haizeiwang110718zhu1.swf
            C:\FavoriteVideo\InvisibleFolder\20110718175209_banggo110718zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110718183419_zhengtu110719qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110718183609_zhengtu110719zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110719112648_kelingkeli110719zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719144001_baiduwenku110719zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719144155_baidu110719zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719153053_guaguashiping110720zanting.jpg
            C:\FavoriteVideo\InvisibleFolder\20110719173527_maibaobao110720zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719173728_maibaobao110720cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719173957_maibaobao110720zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110719175813_tanke110720zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719180241_zhengtu110720zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719180409_zhengtu110720zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719212343_ludingji110720qipao15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110719212446_ludingji110720zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110720113704_zhengtumianfei110720zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110721111842_kangshifu110721zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110721112023_kangshifu110721cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110721145327_hushubao110701zanting15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110721145938_hushubao110701cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110721160044_maibaobao110722zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110721160244_maibaobao110722zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110721160516_maibaobao110722cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110721221433_cntv110721zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110722102007_ludingji110722zanting1a.swf
            C:\FavoriteVideo\InvisibleFolder\20110722162559_yingxiongwudi110725qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110722215436_dongpeng110723jiaobiao.swf
            C:\FavoriteVideo\InvisibleFolder\20110725112028_yingxionglianmeng110725zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110725112503_yingxiongwudi110725zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110725190314_shenmozhetian110726zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110725190449_shenmozhetian110726zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110725190637_shenmozhetian110726cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110726144544_modengxinrenlei110726zanting.jpg
            C:\FavoriteVideo\InvisibleFolder\20110726144832_modengxinrenlei110726zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110726145145_modengxinrenlei110726cha15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110726145412_xinhuanzhugege110726cha15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110726153626_guomei110726zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110726165253_csol110727zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110726165531_csol110805qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110726173321_paopaokaiding110728zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110726173525_paopaokading110728qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110727212138_ludingji10728zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110727212448_5Bludingji110728zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110728145048_diaoyan110728zanting15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110728155238_wushen110729zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110728161201_shenxiandao110729zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110728161423_shenxiandao110729zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110728162107_shenxiandao110729cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110729101956_yiqizaixian110801zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110729164352_maibaobao110801cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110729170341_yingfu110801zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110729180242_taobao110801cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110730102313_nala110730cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801123635_guangqichuanqi110801zhu15s3.swf
            C:\FavoriteVideo\InvisibleFolder\20110801123818_guangqichuanqi110801zanting15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801124028_guangqichuanqi11081cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801185425_newbalance110801zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801221916_tiandiyingxiong110802zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801222113_tiandiyingxiong110802zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110801222630_tiandiyingxiong110802cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110801222825_tiandiyingxiong110802qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110802115704_wenjuan110802zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110802160122_cangsheng110805qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110802160529_cangsheng110802zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110802163157_shenmodalu110802zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110802163323_shenmodalu110802zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110802175327_maibaobao110803zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110802175519_maibaobao110803zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110803132011_taobao110803cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110803132200_taobao110803zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110803132715_taobao110803qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110803171724_qishan110804qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110803171845_qishan110804zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110803172239_xinshuihu110803zhu15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110803172440_xinshuihu110803zanting15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110803172633_xinshuihu110803cha15s.jpg
            C:\FavoriteVideo\InvisibleFolder\20110803174807_ludingji110804zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110803174935_ludingji110804zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110803182133_hrs110804zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110803191842_qiya110804zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110804143802_shasha110804zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110804143934_shasha110804cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110804144043_shasha110804zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110804154339_maibaobao110804zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110804160411_maibaobao110804zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110804162251_qishan110804zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110804172948_zhengtu2110805qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110804173211_zhengtu2110805zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110805093234_shenmozhetian110805zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110805093427_shenmozhetian110805zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110805093623_shenmozhetian110805cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110805154002_zhengtu2110805qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110805154720_zhengtu2110806zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110805161039_taobao110808qipao.swf
            C:\FavoriteVideo\InvisibleFolder\20110805161238_taobao110808zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110805161415_taobao110808cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110805164138_shandongliantong110805zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110805164252_nala110805cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110805184741_ludingji110806zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110805194116_tata110806zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110806195204_tianzi110808zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110806195426_tianzi110808zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110807215934_mingchaochuanqi110808zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110807220106_mingchaochuanqi110808zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110807220242_mingchaochuanqi110808cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110809092552_tianzi110809zhu15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110809092713_tianzi110809zanting.jpg
            C:\FavoriteVideo\InvisibleFolder\20110809113834_yougouwang110809cha15s.swf
            C:\FavoriteVideo\InvisibleFolder\20110809122112_yougouwang110806zanting.swf
            C:\FavoriteVideo\InvisibleFolder\20110811142508_qijishijie110811zanting.swf.tpp
            C:\FavoriteVideo\InvisibleFolder\peer.dll
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig.xml
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\bidconfig_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cloudcodecsdll_v1.3.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.1.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\cmdengine_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask.xml
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\collecttask_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\commondc_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\comptip_v1.1.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dictrule_v1.1.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\dsicon_v1.1.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\gcollecttask.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediadc_v1.3.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatag_v1.3.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\mediatip_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\setdrvflag_v1.1.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.2.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tasklist_v1.3.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tip_v1.4.dat
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp101C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1070.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP10E8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp10F9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1119.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp112A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11A9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11B4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP11EF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp11F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP120.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1200.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1201.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1212.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1213.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1220.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1221.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1232.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1242.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP126B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp127C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP127D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP128F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP129A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp12AA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12AF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12B1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP12E6.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP130.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1301.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP132D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1345.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1366.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1399.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp13E8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP13F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP140.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP141.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1415.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1420.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1425.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1426.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1427.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1428.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1429.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP142A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1430.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP143B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP144.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp144B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP145.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1451.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP146.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1471.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP14EB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp14FB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp150C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP152.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp152C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp153B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1548.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp154B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1559.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp156.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1579.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp158A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP15F4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1604.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1605.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1616.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1651.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1652.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1653.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1662.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1663.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1664.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1665.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1666.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1667.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1668.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1669.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp167A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1682.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1690.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1693.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16A0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16BF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16C1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16D1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16D2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16DE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16DF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16E0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16E3.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16ED.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16EF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP16F0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp16FF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1700.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp170F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1710.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp171F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1721.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1722.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP172C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp172F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1742.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp174C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp175E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp176C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp177D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17D7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP17DD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp17E8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1808.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1819.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1825.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1835.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1846.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1855.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1864.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1884.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18A4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP18D1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18D4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp18E2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1900.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1901.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1902.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP191F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1921.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1930.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1931.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1932.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1939.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1941.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1942.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1943.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1949.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1953.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp195F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1970.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP199D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19AD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19BD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19CD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19CE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19DE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19ED.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP19EF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp19FA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A01.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A1A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A1B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A3E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A40.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A41.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A47.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A60.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A67.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A76.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A77.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A78.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A86.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A87.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A88.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A89.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A8D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A96.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A97.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1A98.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1A99.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AA7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AA9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AAA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AAD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AB6.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AB8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AC7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AC8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AD6.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1AD9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1AE6.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B22.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B28.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B35.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1B36.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B42.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1B77.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BA5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BA7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BC4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BC5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1BE4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1BFD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C04.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C0C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1C12.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C1C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C22.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C2E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C3D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C43.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C51.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C71.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C7B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1C9B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1CA8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CB8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CD9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1CE9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D15.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D16.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D17.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D28.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D35.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D3D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D55.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1D63.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D76.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1D93.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1DC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1DD2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E02.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E12.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E1E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E2F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E4F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E5D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E7C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E7D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E8C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1E9E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1E9F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EAC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EAF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EBC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EBF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ECF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1ED.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1EDC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1EE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1F29.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1F9B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FC9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP1FE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp1FEA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2002.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2012.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2013.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2018.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2024.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2025.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2036.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2039.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP205F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2070.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2080.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20AF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20B5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp20EF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2111.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP211B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp213B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2160.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2180.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2226.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2320.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP233D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP236A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp237C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP238F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp239C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP239E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23AD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23AE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23BE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23C1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23D8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp23E8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23E9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23ED.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23EE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23F8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP23FF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2408.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp240F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2429.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2439.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2445.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2475.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2485.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2489.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24A5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24A9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24B2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24B4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP24D2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24D3.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24E8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp24F2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2511.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2513.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP251F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2523.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2531.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2532.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp253F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2540.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2542.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2543.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2551.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2554.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP257E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp258E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp259E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25AF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25BB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25CE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25DA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25EA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp25EC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP25FC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp260C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp261B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP261D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp262B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP262D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp263B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP263F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2648.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2668.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2686.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp268E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2697.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26B7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26BE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26C7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26D4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp26F4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP26F5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2706.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2707.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2712.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2717.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2722.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2723.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2733.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2734.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2735.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2742.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2743.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2751.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2753.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2754.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2761.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2762.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2763.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2764.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2765.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2766.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2767.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2768.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2769.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP276B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2770.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2772.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2773.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2774.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2775.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2776.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2787.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2788.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2789.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP278F.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2792.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27A0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27AF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27C5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27DD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27DF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27F0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP27FC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp27FD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2800.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2811.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2812.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2814.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp281E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2823.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP283B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp283D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp284D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp285C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp286E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2898.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28A8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28B9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28C1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E6.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28E7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F7.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp28F8.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28F9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP28FC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2908.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2909.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP290E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2915.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP291D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2928.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp292E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2934.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2935.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2945.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2956.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp295D.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2963.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2965.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2966.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2967.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2973.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2974.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2982.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2983.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2984.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2985.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2986.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2993.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A3.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29A4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29B1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B3.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29B4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29C2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29D2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29E0.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F1.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F2.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp29F3.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP29F4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A02.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A03.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A04.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A11.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A21.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A28.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A2E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A41.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A49.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A4E.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A51.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A71.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2A7C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2A9C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AAC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AAE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ABC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ABD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AC4.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACD.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ACE.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2ADC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2ADF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AE5.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AEF.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AF9.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFA.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2AFB.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2AFC.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B08.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B09.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B18.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B19.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B1B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B1C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B2C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\tmp2B38.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B39.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3A.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3B.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Temporary Internet Files\TMP2B3C.tmp
            C:\Users\Ting\AppData\Local\Microsoft\Windows\Tempor

            SuperDave

            • Malware Removal Specialist
            • Moderator


            • Genius
            • Thanked: 1020
            • Certifications: List
            • Experience: Expert
            • OS: Windows 10
            Re: Application cannot be executed. The file *** is infected.
            « Reply #8 on: March 16, 2013, 05:35:54 PM »
            Remove the Adware:
            • Please close all open programs and internet browsers.
            • Double click on adwcleaner.exe to run the tool.
            • Click on Delete.
            • Confirm each time with OK
            • Your computer will be rebooted automatically. A text file will open after the restart.
            • Please post the content of that logfile in your reply.
            • You can find the logfile at C:\AdwCleaner[Sn].txt as well - n is the order number.
            *********************************************
            That is not the complete ComboFix log. ComboFix was run from the incorrect location. Please copy ComboFix from C:\TDDOWNLOAD to your desktop and run it from there. Please post all the log even if you need to break it up into two or more posts.
            Windows 8 and Windows 10 dual boot with two SSD's

            sim619

              Topic Starter


              Rookie

              • Experience: Beginner
              • OS: Windows XP
              Re: Application cannot be executed. The file *** is infected.
              « Reply #9 on: March 16, 2013, 08:14:55 PM »
              AdwCleaner Log

              # AdwCleaner v2.114 - Logfile created 03/17/2013 at 10:00:53
              # Updated 05/03/2013 by Xplode
              # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
              # User : Ting - TING-PC
              # Boot Mode : Normal
              # Running from : C:\Users\Ting\Desktop\adwcleaner.exe
              # Option [Delete]


              ***** [Services] *****


              ***** [Files / Folders] *****

              Folder Deleted : C:\Program Files (x86)\TornTV.com
              Folder Deleted : C:\ProgramData\InstallMate
              Folder Deleted : C:\ProgramData\Premium
              Folder Deleted : C:\ProgramData\Tarma Installer
              Folder Deleted : C:\Users\Ting\AppData\Local\APN
              Folder Deleted : C:\Users\Ting\AppData\Roaming\Funmoods

              ***** [Registry] *****

              Key Deleted : HKCU\Software\1ClickDownload
              Key Deleted : HKCU\Software\AppDataLow\TENCENT
              Key Deleted : HKCU\Software\InstallCore
              Key Deleted : HKLM\SOFTWARE\Classes\AppID\{608D3067-77E8-463D-9084-908966806826}
              Key Deleted : HKLM\SOFTWARE\Classes\AppID\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}
              Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
              Key Deleted : HKLM\SOFTWARE\Classes\AppID\esrv.EXE
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.eb_explorerbar.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.fh_hookeventsink.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.ipm_printlistitem.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_dialogeventshandler.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_launcher.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pm_printmanager.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_bindstatuscallback.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_cancelbuttoneventhandler.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.pr_printdialogcallback.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.tbtoolband.1
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions
              Key Deleted : HKLM\SOFTWARE\Classes\toolband.useroptions.1
              Key Deleted : HKLM\Software\InstallCore
              Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASAPI32
              Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\FunmoodsSetup_RASMANCS
              Key Deleted : HKLM\Software\TENCENT
              Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\jbpkiefagocgkmemidfngdkamloieekf
              Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
              Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}

              ***** [Internet Browsers] *****

              -\\ Internet Explorer v9.0.8112.16470

              [OK] Registry is clean.

              -\\ Google Chrome v25.0.1364.172

              File : C:\Users\Ting\AppData\Local\Google\Chrome\User Data\Default\Preferences

              Deleted [l.43] : icon_url = "hxxp://www.ask.com/favicon.ico",
              Deleted [l.46] : keyword = "ask.com",
              Deleted [l.49] : search_url = "hxxp://websearch.ask.com/redirect?client=cr&src=kw&tb=AVR-3&o=APN10403&locale=e[...]
              Deleted [l.50] : suggest_url = "hxxp://ss.websearch.ask.com/query?qsrc=2922&li=ff&sstype=prefix&q={searchTerms[...]

              *************************

              AdwCleaner[R1].txt - [4024 octets] - [17/03/2013 02:58:16]
              AdwCleaner[S1].txt - [3734 octets] - [17/03/2013 10:00:53]

              ########## EOF - C:\AdwCleaner[S1].txt - [3794 octets] ##########

              sim619

                Topic Starter


                Rookie

                • Experience: Beginner
                • OS: Windows XP
                Re: Application cannot be executed. The file *** is infected.
                « Reply #10 on: March 16, 2013, 08:16:19 PM »
                ComboFix Log

                ComboFix 13-03-16.02 - Ting 3/2013 Sun  10:07:34.3.4 - x64
                Microsoft Windows 7 Home Premium   6.1.7601.1.936.86.1033.18.3958.2713 [GMT 8:00]
                执行位置: c:\users\Ting\Desktop\ComboFix.exe
                AV: Avira Desktop *Enabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
                SP: Avira Desktop *Enabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
                SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
                .
                .
                (((((((((((((((((((((((((  2013-02-17 至 2013-03-17 的新的档案  )))))))))))))))))))))))))))))))
                .
                .
                2013-03-17 02:25 . 2013-03-17 02:25   --------   d-----w-   c:\users\Default\AppData\Local\temp
                2013-03-15 15:22 . 2013-03-15 15:22   --------   d-----w-   c:\users\Ting\AppData\Local\ElevatedDiagnostics
                2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\users\Ting\AppData\Roaming\Malwarebytes
                2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\programdata\Malwarebytes
                2013-03-15 15:18 . 2012-12-14 08:49   24176   ----a-w-   c:\windows\system32\drivers\mbam.sys
                2013-03-15 15:18 . 2013-03-15 15:18   --------   d-----w-   c:\program files (x86)\Malwarebytes' Anti-Malware
                2013-03-15 15:17 . 2013-03-15 15:17   --------   d-----w-   c:\users\Ting\AppData\Local\Programs
                2013-03-13 02:05 . 2013-03-13 02:11   --------   d-----w-   c:\programdata\7C686D7BEA0D34B500007C67F11838F5
                2013-03-02 00:10 . 2013-03-02 00:10   --------   d-----w-   c:\users\Ting\AppData\Roaming\Avira
                2013-03-02 00:08 . 2013-03-01 23:58   27800   ----a-w-   c:\windows\system32\drivers\avkmgr.sys
                2013-03-02 00:08 . 2013-03-01 23:58   129216   ----a-w-   c:\windows\system32\drivers\avipbb.sys
                2013-03-02 00:08 . 2013-03-01 23:58   99912   ----a-w-   c:\windows\system32\drivers\avgntflt.sys
                2013-03-02 00:08 . 2013-03-02 00:08   --------   d-----w-   c:\programdata\Avira
                2013-03-02 00:08 . 2013-03-02 00:08   --------   d-----w-   c:\program files (x86)\Avira
                2013-03-02 00:00 . 2013-02-08 00:28   9162192   ----a-w-   c:\programdata\Microsoft\Windows Defender\Definition Updates\{587E5F77-185E-4D31-8F7E-5B721B93FB96}\mpengine.dll
                2013-02-27 11:21 . 2013-02-27 11:21   --------   d-----w-   c:\program files (x86)\Gophoto.it
                2013-02-23 05:59 . 2013-02-23 05:59   --------   d-----w-   c:\users\Ting\AppData\Local\Windows Live Writer
                2013-02-23 05:59 . 2013-02-23 05:59   --------   d-----w-   c:\users\Ting\AppData\Roaming\Windows Live Writer
                2013-02-21 12:10 . 2013-02-22 06:10   --------   d-sh--w-   c:\users\Ting\AppData\Roaming\WT082439
                .
                .
                .
                ((((((((((((((((((((((((((((((((((((((((   在三个月内被修改的档案   ))))))))))))))))))))))))))))))))))))))))))))))))))))
                .
                2013-03-13 23:46 . 2012-08-26 00:50   72013344   ----a-w-   c:\windows\system32\MRT.exe
                2013-03-13 01:24 . 2012-11-16 17:17   693976   ----a-w-   c:\windows\SysWow64\FlashPlayerApp.exe
                2013-03-13 01:24 . 2012-03-07 11:58   73432   ----a-w-   c:\windows\SysWow64\FlashPlayerCPLApp.cpl
                2013-02-12 05:45 . 2013-03-13 23:45   135168   ----a-w-   c:\windows\apppatch\AppPatch64\AcXtrnal.dll
                2013-02-12 05:45 . 2013-03-13 23:45   350208   ----a-w-   c:\windows\apppatch\AppPatch64\AcLayers.dll
                2013-02-12 05:45 . 2013-03-13 23:45   308736   ----a-w-   c:\windows\apppatch\AppPatch64\AcGenral.dll
                2013-02-12 05:45 . 2013-03-13 23:45   111104   ----a-w-   c:\windows\apppatch\AppPatch64\acspecfc.dll
                2013-02-12 04:48 . 2013-03-13 23:45   474112   ----a-w-   c:\windows\apppatch\AcSpecfc.dll
                2013-02-12 04:48 . 2013-03-13 23:45   2176512   ----a-w-   c:\windows\apppatch\AcGenral.dll
                2013-01-16 17:28 . 2012-03-07 10:53   273840   ------w-   c:\windows\system32\MpSigStub.exe
                2013-01-05 05:53 . 2013-02-13 04:30   5553512   ----a-w-   c:\windows\system32\ntoskrnl.exe
                2013-01-05 05:00 . 2013-02-13 04:30   3967848   ----a-w-   c:\windows\SysWow64\ntkrnlpa.exe
                2013-01-05 05:00 . 2013-02-13 04:30   3913064   ----a-w-   c:\windows\SysWow64\ntoskrnl.exe
                2013-01-04 05:46 . 2013-02-13 04:30   215040   ----a-w-   c:\windows\system32\winsrv.dll
                2013-01-04 04:51 . 2013-02-13 04:30   5120   ----a-w-   c:\windows\SysWow64\wow32.dll
                2013-01-04 04:43 . 2013-02-13 04:30   44032   ----a-w-   c:\windows\apppatch\acwow64.dll
                2013-01-04 03:26 . 2013-02-13 04:30   3153408   ----a-w-   c:\windows\system32\win32k.sys
                2013-01-04 02:47 . 2013-02-13 04:30   25600   ----a-w-   c:\windows\SysWow64\setup16.exe
                2013-01-04 02:47 . 2013-02-13 04:30   7680   ----a-w-   c:\windows\SysWow64\instnm.exe
                2013-01-04 02:47 . 2013-02-13 04:30   2048   ----a-w-   c:\windows\SysWow64\user.exe
                2013-01-04 02:47 . 2013-02-13 04:30   14336   ----a-w-   c:\windows\SysWow64\ntvdm64.dll
                2013-01-03 06:00 . 2013-02-13 04:30   1913192   ----a-w-   c:\windows\system32\drivers\tcpip.sys
                2013-01-03 06:00 . 2013-02-13 04:30   288088   ----a-w-   c:\windows\system32\drivers\FWPKCLNT.SYS
                2012-08-14 11:24 . 2012-08-14 11:24   189404   ----a-w-   c:\program files\uninstall_xl7.exe
                .
                .
                (((((((((((((((((((((((((((((((((((((   重要登入点   ))))))))))))))))))))))))))))))))))))))))))))))))))
                .
                .
                *注意* 空白与合法缺省登录将不会被显示
                REGEDIT4
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{00000ADA-7E0D-47C1-986C-F017D09C4304}]
                2012-11-20 08:30   518096   ----a-w-   c:\users\Public\Thunder Network\XMP4\Core\Program\VideoUrlSniffer.2.0.3.100.(175).dll
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{0EA37B17-6B8B-4085-8257-F3A4AA69C27A}]
                2012-07-30 10:08   88080   ----a-w-   c:\program files\BHO\XlBrowserAddin1.0.8.71.dll
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{24F7D5E7-84A5-E238-543A-F69079E30962}]
                2012-02-28 11:02   516472   ----a-w-   c:\program files (x86)\TENCENT\SOSOAddr\ieaddr.dll
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{A8502600-B272-4F68-A67B-A0305D46D297}]
                2012-04-21 03:11   173968   ----a-w-   c:\program files (x86)\QvodPlayer\QvodExtend.dll
                .
                [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\AAADesktopTips]
                @="{4562B511-62E9-4533-B7B2-56A8BB10B482}"
                [HKEY_CLASSES_ROOT\CLSID\{4562B511-62E9-4533-B7B2-56A8BB10B482}]
                2012-11-14 11:32   251856   ----a-w-   c:\program files (x86)\Common Files\Thunder Network\Kankan\xappex.1.1.1.62.(176).dll
                .
                [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
                "LightScribe Control Panel"="c:\program files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe" [2010-02-22 2363392]
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
                "StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-02-26 98304]
                "Adobe Reader Speed Launcher"="c:\program files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2009-02-28 35696]
                "HP Software Update"="c:\program files (x86)\Hp\HP Software Update\HPWuSchd2.exe" [2008-12-08 54576]
                "WirelessAssistant"="c:\program files (x86)\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2009-07-23 498744]
                "SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
                "APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]
                "QvodTerminal"="c:\program files (x86)\QvodPlayer\QvodTerminal.exe" [2012-06-08 1079216]
                "Easy-PrintToolBox"="c:\program files (x86)\Canon\Easy-PrintToolBox\BJPSMAIN.EXE" [2004-01-14 409600]
                "QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2012-10-24 421888]
                "iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-12-12 152544]
                "avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2013-03-01 385248]
                .
                c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
                Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2009-12-30 1082656]
                .
                [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
                "ConsentPromptBehaviorAdmin"= 5 (0x5)
                "ConsentPromptBehaviorUser"= 3 (0x3)
                "EnableUIADesktopToggle"= 0 (0x0)
                .
                [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
                "EnableShellExecuteHooks"= 1 (0x1)
                .
                R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]
                R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2013-01-08 161536]
                R3 netw5v64;Intel(R) Wireless WiFi Link 5000 Series Adapter Driver for Windows Vista 64 Bit;c:\windows\system32\DRIVERS\netw5v64.sys [2009-06-10 5434368]
                R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2012-08-23 19456]
                R3 RSUSBSTOR;RtsUStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUStor.sys [2009-09-23 225280]
                R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS [2009-06-10 292864]
                R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS [2009-06-10 1485312]
                R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS [2009-06-10 740864]
                R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2012-08-23 57856]
                R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-07-09 52736]
                R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-03-08 1255736]
                R3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x64.sys [2009-06-10 389120]
                R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-22 57184]
                S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys [2013-03-01 27800]
                S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [2009-11-18 98208]
                S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2010-02-26 202752]
                S2 AntiVirSchedulerService;Avira Scheduler;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [2013-03-01 86752]
                S2 ARUpdate;Tencent AddressBar Update Service;c:\program files\TENCENT\AddrUpdate\AddrUpdate.exe [2012-05-29 116656]
                S2 HPWMISVC;HPWMISVC;c:\program files\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [2010-01-18 20480]
                S2 NitroDriverReadSpool8;NitroPDFDriverCreatorReadSpool8;c:\program files\Common Files\Nitro\Pro\8.0\NitroPDFDriverService8x64.exe [2012-11-06 230408]
                S2 nlsX86cc;Nalpeiron Licensing Service;c:\windows\SysWOW64\NLSSRV32.EXE [2012-11-06 69640]
                S2 SageUBSBackupService;Sage UBS Backup Service;c:\program files (x86)\Common Files\Sage Software\BackupService\UBS.UBSService.exe [2011-08-23 9216]
                S2 SageUBSLicenseService;Sage UBS License Service;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe [2012-02-28 15952]
                S2 SageUBSServiceWatchdog;Sage UBS Service Watchdog;c:\program files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe [2012-02-28 25936]
                S2 UNS;Intel(R) Management & Security Application User Notification Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [2010-03-18 2320920]
                S2 XLServicePlatform;XLServicePlatform;c:\windows\system32\svchost

                S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [2010-01-07 35104]
                S3 HECIx64;Intel(R) Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [2009-09-17 56344]
                S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2011-06-09 539240]
                S3 rtl8192se;Realtek Wireless LAN 802.11n PCI-E NIC NT Driver;c:\windows\system32\DRIVERS\rtl8192se.sys [2011-09-07 1225832]
                .
                .
                [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
                XLServicePlatform   REG_MULTI_SZ      XLServicePlatform
                .
                [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
                2010-02-22 18:38   451872   ----a-w-   c:\program files (x86)\Common Files\LightScribe\LSRunOnce.exe
                .
                 ‘计划任务’ 文件夹 里的内容
                .
                2013-03-17 c:\windows\Tasks\Adobe Flash Player Updater.job
                - c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-16 01:24]
                .
                2013-03-13 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
                - c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
                .
                2013-03-17 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
                - c:\users\Ting\AppData\Local\Google\Update\GoogleUpdate.exe [2012-03-07 14:22]
                .
                .
                --------- X64 Entries -----------
                .
                .
                [HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{004B0726-A010-4ABF-8556-FCDB7F1FCA1E}]
                2012-07-30 10:08   625952   ----a-w-   c:\program files\BHO\XunleiBHO647.2.9.3634.dll
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
                "SynTPEnh"="c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe" [BU]
                "RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2010-01-29 6160928]
                "RtkOSD"="c:\program files (x86)\Realtek\Audio\OSD\RtVOsd64.exe" [2010-01-13 995840]
                "HP Quick Launch"="c:\program files\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2010-01-18 451072]
                .
                HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost  - LocalService
                FontCache
                .
                ------- 而外的扫描 -------
                .
                uStart Page = about:blank
                uLocal Page = c:\windows\system32\blank.htm
                mStart Page = about:blank
                mLocal Page = c:\windows\SysWOW64\blank.htm
                uInternet Settings,ProxyOverride = *.local
                IE: &ê1ó?&??à×à??????? - c:\program files\BHO\OfflineDownload.htm
                IE: &ê1ó?&??à×???? - c:\program files\BHO\geturl.htm
                IE: &ê1ó?&??à×????è?2?á′?ó - c:\program files\BHO\GetAllUrl.htm
                IE: ???????????
                IE: ???????????????
                IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~3\Office12\EXCEL.EXE/3000
                IE: Easy-WebPrint?? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_Preview.html
                IE: Easy-WebPrint???? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_HSPrint.html
                IE: Easy-WebPrint??????? - c:\program files (x86)\Canon\Easy-WebPrint\Toolband.dll/RC_AddToList.html
                IE: Send image to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
                IE: Send page to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
                IE: 使用迅雷看看播放器播放 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenu.htm
                IE: 添加当前页到迅雷看看播放器标签 - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEMenuAddStoreTab.htm
                IE: {{0000016b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolMenu.htm
                IE: {{0000026b-c524-4050-81a0-243669a86b9f} - c:\users\Public\Thunder Network\XMP4\Core\Program\XmpIEToolBar.htm
                TCP: DhcpNameServer = 192.168.1.254
                Handler: KuGoo - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
                Handler: KuGoo3 - {6AC4FBC7-AA38-45EC-9634-D6D20B679EFC} - c:\progra~2\KuGou\KGMusic\KUGOO3~1.OCX
                .
                - - - - ORPHANS REMOVED - - - -
                .
                AddRemove-Easy-WebPrint - c:\windows\IsUn0804.exe
                AddRemove-PocketRAR - c:\program files\uninstall.exe
                AddRemove-{3183E053-DA5C-4233-8761-AF3B5DE22A57}_is1 - c:\program files\KuGou2008\unins000.exe
                .
                .
                .
                --------------------- LOCKED REGISTRY KEYS ---------------------
                .
                [HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
                @Denied: (Full) (Everyone)
                @Allowed: (Read) (RestrictedCode)
                "scansk"=hex(0):63,58,a3,3b,ea,04,93,15,02,3d,b0,20,46,c5,0b,7b,82,84,b2,4c,4d,
                   52,a2,3a,38,19,6d,0a,21,ad,ee,f7,91,86,6b,03,1a,df,47,95,00,00,00,00,00,00,\
                .
                [HKEY_USERS\S-1-5-21-736984798-2439189511-635615907-1000_Classes\Wow6432Node\CLSID\{8be85315-e61e-4b01-a536-41981925e766}]
                @Denied: (Full) (Everyone)
                @Allowed: (Read) (RestrictedCode)
                "Model"=dword:0000011d
                "Therad"=dword:0000001e
                "MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
                   38,95,44,a1,e0,d2,1a,06,30,1f,b5,e8,8c,1e,4b,6f,1b,cf,03,4c,59,84,12,82,d1,\
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
                @Denied: (A 2) (Everyone)
                @="FlashBroker"
                "LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
                "Enabled"=dword:00000001
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
                @="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
                @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
                @Denied: (A 2) (Everyone)
                @="IFlashBroker5"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
                @="{00020424-0000-0000-C000-000000000046}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
                @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
                "Version"="1.0"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
                @Denied: (A 2) (Everyone)
                @="FlashBroker"
                "LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
                "Enabled"=dword:00000001
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
                @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
                @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
                @Denied: (A 2) (Everyone)
                @="Shockwave Flash Object"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
                @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
                "ThreadingModel"="Apartment"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
                @="0"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
                @="ShockwaveFlash.ShockwaveFlash.11"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
                @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
                @="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
                @="1.0"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
                @="ShockwaveFlash.ShockwaveFlash"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
                @Denied: (A 2) (Everyone)
                @="Macromedia Flash Factory Object"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
                @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"
                "ThreadingModel"="Apartment"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
                @="FlashFactory.FlashFactory.1"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
                @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
                @="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
                @="1.0"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
                @="FlashFactory.FlashFactory"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
                @Denied: (A 2) (Everyone)
                @="IFlashBroker5"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
                @="{00020424-0000-0000-C000-000000000046}"
                .
                [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
                @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
                "Version"="1.0"
                .
                [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
                @Denied: (A) (Users)
                @Denied: (A) (Everyone)
                @Allowed: (B 1 2 3 4 5) (S-1-5-20)
                "BlindDial"=dword:00000000
                .
                [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
                @Denied: (Full) (Everyone)
                .
                完成时间: 2013-03-17  10:27:15
                ComboFix-quarantined-files.txt  2013-03-17 02:27
                ComboFix2.txt  2013-03-16 19:24
                .
                Pre-Run: 384,117,325,824 bytes free
                Post-Run: 383,818,661,888 bytes free
                .
                - - End Of File - - 14E331E0E9A6C33AE3B4DA41BE2376F0


                Please advise for next step.
                Thank you.

                SuperDave

                • Malware Removal Specialist
                • Moderator


                • Genius
                • Thanked: 1020
                • Certifications: List
                • Experience: Expert
                • OS: Windows 10
                Re: Application cannot be executed. The file *** is infected.
                « Reply #11 on: March 17, 2013, 11:21:14 AM »
                Please download Rooter and Save it to your desktop.
                • Double click it to start the tool.Vista and Windows7 run as administrator.
                • Click Scan.
                • Eventually, a Notepad file containing the report will open, also found at C:\Rooter.txt. Post that log in your next reply.
                *******************************************
                • Download RogueKiller on the desktop
                • Close all the running programs
                • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
                • Otherwise just double-click on RogueKiller.exe
                • Pre-scan will start. Let it finish.
                • Click on SCAN button.
                • A report (RKreport.txt) should open. Post its content in your next reply. (RKreport could also be found on your desktop)
                • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again
                **************************************
                Download Security Check by screen317 from one of the following links and save it to your desktop.

                Link 1
                Link 2

                * Double-click Security Check.bat
                * Follow the on-screen instructions inside of the black box.
                * A Notepad document should open automatically called checkup.txt
                * Post the contents of that document in your next reply.

                Note: If a security program requests permission from dig.exe to access the Internet, allow it to do so.
                Windows 8 and Windows 10 dual boot with two SSD's

                sim619

                  Topic Starter


                  Rookie

                  • Experience: Beginner
                  • OS: Windows XP
                  Re: Application cannot be executed. The file *** is infected.
                  « Reply #12 on: March 18, 2013, 05:41:36 AM »
                  Rooter Log

                  Rooter.exe (v1.0.2) by Eric_71
                  .
                  SeDebugPrivilege granted successfully ...
                  .
                  Windows 7 Home Edition (6.1.7601) Service Pack 1
                  [32_bits] - Intel64 Family 6 Model 37 Stepping 2, GenuineIntel
                  .
                  [wscsvc] (Security Center) RUNNING (state:4)
                  [MpsSvc] RUNNING (state:4)
                  Windows Firewall -> Enabled
                  Windows Defender -> Enabled
                  User Account Control (UAC) -> Enabled
                  .
                  Internet Explorer 9.0.8112.16421
                  .
                  C:\  [Fixed-NTFS] .. ( Total:451 Go - Free:357 Go )
                  D:\  [Fixed-NTFS] .. ( Total:14 Go - Free:2 Go )
                  E:\  [Fixed-FAT32] .. ( Total:0 Go - Free:0 Go )
                  F:\  [CD_Rom]
                  .
                  Scan : 19:45.05
                  Path : C:\Users\Ting\Desktop\Rooter.exe
                  User : Ting ( Administrator -> YES )
                  .
                  ----------------------\\ Processes
                  .
                  Locked [System Process] (0)
                  Locked System (4)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (308)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (436)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (508)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (532)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (572)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (588)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (596)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (656)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (740)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (824)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (892)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (956)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (996)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (116)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (352)
                  Locked audiodg.exe (368)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (928)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1084)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1240)
                  ______ C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (1272)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1292)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1428)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1536)
                  ______ C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (1560)
                  ______ C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (1592)
                  ______ C:\Program Files\TENCENT\AddrUpdate\AddrUpdate.exe (1644)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1696)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1720)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1756)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1796)
                  ______ C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe (1828)
                  ______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (1864)
                  ______ C:\Program Files (x86)\Common Files\Microsoft Shared\VS7DEBUG\mdm.exe (1888)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1932)
                  ______ C:\Windows\SysWOW64\NLSSRV32.EXE (1980)
                  ______ C:\Program Files (x86)\CyberLink\Shared files\RichVideo.exe (1076)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1020)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2096)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2116)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2208)
                  ______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.exe (2348)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2412)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2420)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2432)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2440)
                  ______ C:\Program Files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe (2468)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2492)
                  ______ C:\Program Files (x86)\Hp\HP Software Update\hpwuschd2.exe (2668)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2696)
                  ______ C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe (2728)
                  ______ C:\Program Files (x86)\QvodPlayer\QvodTerminal.exe (2780)
                  ______ C:\Program Files (x86)\iTunes\iTunesHelper.exe (2876)
                  ______ C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (2892)
                  ______ C:\Program Files (x86)\Common Files\Sage Software\LicenseService\UBS.Phoenix.Server.Watchdog.exe (932)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2808)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3060)
                  ______ C:\Windows\SysWOW64\svchost.exe (2912)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (2748)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3428)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3760)
                  ______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqwmiex.exe (3788)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3848)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3880)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4000)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4032)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3648)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4116)
                  ______ C:\Program Files (x86)\Hewlett-Packard\Shared\hpqToaster.exe (4344)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4376)
                  ______ C:\Program Files\WIDCOMM\Bluetooth Software\BluetoothHeadsetProxy.exe (4512)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4672)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4748)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4768)
                  ______ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (2504)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4664)
                  ______ C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_11_6_602_180_ActiveX.exe (4148)
                  ______ C:\Program Files\Program\Thunder.exe (1684)
                  ______ c:\program files (x86)\common files\thunder network\tp\ver1\1.1.2.186_1111\thunderplatform.exe (5072)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3600)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (4232)
                  ______ C:\Program Files\Program\XLUEOPS.exe (5300)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (5320)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (5872)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (1172)
                  ______ 燕瞕旅??蔼瞕蓰瞕 (3384)
                  ______ C:\Users\Ting\Desktop\Rooter.exe (1488)
                  .
                  ----------------------\\ Device\Harddisk0\
                  .
                  \Device\Harddisk0 [Sectors : 63 x 512 Bytes]
                  .
                  \Device\Harddisk0\Partition1 --[ MBR ]-- (Start_Offset:1048576 | Length:208666624)
                  \Device\Harddisk0\Partition2 (Start_Offset:209715200 | Length:484708450304)
                  \Device\Harddisk0\Partition3 (Start_Offset:484918165504 | Length:15080620032)
                  \Device\Harddisk0\Partition4 (Start_Offset:499998785536 | Length:108027904)
                  .
                  ----------------------\\ Scheduled Tasks
                  .
                  C:\Windows\Tasks\Adobe Flash Player Updater.job
                  C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000Core.job
                  C:\Windows\Tasks\GoogleUpdateTaskUserS-1-5-21-736984798-2439189511-635615907-1000UA.job
                  C:\Windows\Tasks\SA.DAT
                  C:\Windows\Tasks\SCHEDLGU.TXT
                  .
                  ----------------------\\ Registry
                  .
                  .
                  ----------------------\\ Files & Folders
                  .
                  ----------------------\\ Scan completed at 19:45.11
                  .
                  C:\Rooter$\Rooter_2.txt - (18/03/2013 | 19:45.11)

                  sim619

                    Topic Starter


                    Rookie

                    • Experience: Beginner
                    • OS: Windows XP
                    Re: Application cannot be executed. The file *** is infected.
                    « Reply #13 on: March 18, 2013, 05:43:19 AM »
                    RogueKiller Log

                    RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy
                    mail : tigzyRK<at>gmail<dot>com
                    Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
                    Website : http://tigzy.geekstogo.com/roguekiller.php
                    Blog : http://tigzyrk.blogspot.com/

                    Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
                    Started in : Normal mode
                    User : Ting [Admin rights]
                    Mode : Remove -- Date : 03/18/2013 19:50:47
                    | ARK || FAK || MBR |

                    ¤¤¤ Bad processes : 0 ¤¤¤

                    ¤¤¤ Registry Entries : 6 ¤¤¤
                    [TASK][SUSP PATH] Funmoods : C:\Users\Ting\AppData\Roaming\Funmoods\UPDATE~1\UPDATE~1.EXE /Check
                    • -> DELETED
                    [HJPOL] HKCU\[...]\System : DisableTaskmgr (0) -> DELETED
                    [HJPOL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
                    [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
                    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
                    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

                    ¤¤¤ Particular Files / Folders: ¤¤¤

                    ¤¤¤ Driver : [NOT LOADED] ¤¤¤

                    ¤¤¤ HOSTS File: ¤¤¤
                    --> C:\Windows\system32\drivers\etc\hosts

                    127.0.0.1       localhost


                    ¤¤¤ MBR Check: ¤¤¤

                    +++++ PhysicalDrive0: Hitachi HTS725050A9A364 +++++
                    --- User ---
                    [MBR] 85c28d761bdf138d67df3122bb314869
                    [BSP] 26bdf2b66feb79e295528b0fccee24bf : Windows Vista/7/8 MBR Code
                    Partition table:
                    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 199 Mo
                    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 409600 | Size: 462254 Mo
                    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 947105792 | Size: 14382 Mo
                    3 - [XXXXXX] FAT32-LBA (0x0c) [VISIBLE] Offset (sectors): 976560128 | Size: 103 Mo
                    User = LL1 ... OK!
                    User = LL2 ... OK!

                    Finished : << RKreport[2]_D_03182013_02d1950.txt >>
                    RKreport[1]_S_03182013_02d1948.txt ; RKreport[2]_D_03182013_02d1950.txt

                    Checkup Log

                    Results of screen317's Security Check version 0.99.61 
                     Windows 7 Service Pack 1 x64 (UAC is enabled) 
                     Internet Explorer 9 
                    ``````````````Antivirus/Firewall Check:``````````````[/u]
                     Windows Firewall Enabled! 
                    Avira Desktop   
                     Antivirus up to date!  (On Access scanning disabled!)
                    `````````Anti-malware/Other Utilities Check:`````````[/u]
                     Malwarebytes Anti-Malware version 1.70.0.1100 
                     Java(TM) 6 Update 31 
                     Java version out of Date!
                     Adobe Reader 9 Adobe Reader out of Date!
                     Google Chrome 25.0.1364.152 
                     Google Chrome 25.0.1364.172 
                    ````````Process Check: objlist.exe by Laurent````````[/u] 
                     Avira Antivir avgnt.exe
                     Avira Antivir avguard.exe
                    `````````````````System Health check`````````````````[/u]
                     Total Fragmentation on Drive C: 0%
                    ````````````````````End of Log``````````````````````[/u]



                    SuperDave

                    • Malware Removal Specialist
                    • Moderator


                    • Genius
                    • Thanked: 1020
                    • Certifications: List
                    • Experience: Expert
                    • OS: Windows 10
                    Re: Application cannot be executed. The file *** is infected.
                    « Reply #14 on: March 18, 2013, 12:25:23 PM »
                    The Security Check shows that your AV is disabled. Please enable it soon.

                    Update Your Java (JRE)

                    Old versions of Java have vulnerabilities that malware can use to infect your system.


                    First Verify your Java Version

                    If there are any other version(s) installed then update now.

                    Get the new version (if needed)

                    If your version is out of date install the newest version of the Sun Java Runtime Environment.

                    Note: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

                    Be sure to close ALL open web browsers before starting the installation.

                    Remove any old versions

                    1. Download JavaRa and unzip the file to your Desktop.
                    2. Open JavaRA.exe and choose Remove Older Versions
                    3. Once complete exit JavaRA.

                    Additional Note: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. To disable the JQS service if you don't want to use it, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and reboot your computer.
                    **********************************************
                    Update your Adobe Reader. get.adobe.com/reader.

                    Be sure to uncheck the Free McAfee Security Scan so it isn't installed.

                    **********************************************
                    How's your computer running now?

                    I'd like to scan your machine with ESET OnlineScan

                    •Hold down Control and click on the following link to open ESET OnlineScan in a new window.
                    ESET OnlineScan

                    •Click the button.
                    •For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
                    • Click on to download the ESET Smart Installer. Save it to your desktop.
                    • Double click on the icon on your desktop.
                    •Check
                    •Click the button.
                    •Accept any security warnings from your browser.
                    • Leave the check mark next to Remove found threats.
                    •Check
                    •Push the Start button.
                    •ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
                    •When the scan completes, push
                    •Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
                    •Push the button.
                    •Push
                    A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt
                    Windows 8 and Windows 10 dual boot with two SSD's

                    sim619

                      Topic Starter


                      Rookie

                      • Experience: Beginner
                      • OS: Windows XP
                      Re: Application cannot be executed. The file *** is infected.
                      « Reply #15 on: March 19, 2013, 12:23:51 PM »
                      Already update the Java and Adobe as per your request.
                      I also scan my computer through ESET OnlineScan.
                      The result is No threat detected.
                      Is it consider as my computer already free of spyware and malware and consider as safe already?
                      Really appreciate your help would like to treat you a coffee for appreciate your help.  ;D ;D

                      By the way, how we can find out whether my computer has been attack by virus or malware?
                      Which scan is better?
                      ESET OnlineScan can check whether my computer been attack?


                      SuperDave

                      • Malware Removal Specialist
                      • Moderator


                      • Genius
                      • Thanked: 1020
                      • Certifications: List
                      • Experience: Expert
                      • OS: Windows 10
                      Re: Application cannot be executed. The file *** is infected.
                      « Reply #16 on: March 19, 2013, 01:15:46 PM »
                      Quote
                      By the way, how we can find out whether my computer has been attack by virus or malware?
                      Which scan is better?
                      ESET OnlineScan can check whether my computer been attack?
                      Since there are so many different malware infections out there it's almost impossible to use one scanner that will clean everything.
                      Your computer was certainly compromised. You can see some of the infections in the MBAM, adwCleaner and ComboFix logs. ESET is the best scanner because it works from outside your computer and is not influenced by any infections on your computer.
                      Are there any other issues before we do some cleanup?
                      Windows 8 and Windows 10 dual boot with two SSD's

                      sim619

                        Topic Starter


                        Rookie

                        • Experience: Beginner
                        • OS: Windows XP
                        Re: Application cannot be executed. The file *** is infected.
                        « Reply #17 on: March 19, 2013, 06:48:57 PM »
                        So far not have any issue already.
                        What kind of cleanup to do?
                         Format PC?
                        Please give me the next instruction.
                        Thank you and Have a nice day.

                        SuperDave

                        • Malware Removal Specialist
                        • Moderator


                        • Genius
                        • Thanked: 1020
                        • Certifications: List
                        • Experience: Expert
                        • OS: Windows 10
                        Re: Application cannot be executed. The file *** is infected.
                        « Reply #18 on: March 20, 2013, 05:54:09 PM »
                        To uninstall ComboFix

                        • Click the Start button. Click Run. For Vista: type in Run in the Start search, and click on Run in the results pane.
                        • In the field, type in ComboFix /uninstall


                        (Note: Make sure there's a space between the word ComboFix and the forward-slash.)

                        • Then, press Enter, or click OK.
                        • This will uninstall ComboFix, delete its folders and files, hides System files and folders, and resets System Restore.
                        ***********************************************
                        Click Start> Computer> right click the C Drive and choose Properties> enter
                        Click Disk Cleanup from there.



                        Click OK on the Disk Cleanup Screen.
                        Click Yes on the Confirmation screen.



                        This runs the Disk Cleanup utility along with other selections if you have chosen any. (if you had a lot System Restore points, you will see a significant change in the free space in C drive)
                        *********************************************
                        Go to Microsoft Windows Update and get all critical updates.

                        ----------

                        I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

                        SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
                        * Using SpywareBlaster to protect your computer from Spyware and Malware
                        * If you don't know what ActiveX controls are, see here

                        Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

                        Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

                        Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
                        Safe Surfing!
                        Windows 8 and Windows 10 dual boot with two SSD's

                        sim619

                          Topic Starter


                          Rookie

                          • Experience: Beginner
                          • OS: Windows XP
                          Re: Application cannot be executed. The file *** is infected.
                          « Reply #19 on: March 21, 2013, 05:17:41 AM »
                          Already done the Instruction that you giving.
                          Any scan I still need to install?
                          Is it consider as my laptop has free out of virus and malware now?
                          Thank you for your help.

                          SuperDave

                          • Malware Removal Specialist
                          • Moderator


                          • Genius
                          • Thanked: 1020
                          • Certifications: List
                          • Experience: Expert
                          • OS: Windows 10
                          Re: Application cannot be executed. The file *** is infected.
                          « Reply #20 on: March 21, 2013, 04:41:51 PM »
                          Quote
                          Any scan I still need to install?
                          Is it consider as my laptop has free out of virus and malware now?
                          We are finished with the scanners and your computer should be malware-free.
                          Quote
                          Thank you for your help.
                          You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.
                          Windows 8 and Windows 10 dual boot with two SSD's