看这些老板怎么赚黑心钱的...

我的电脑格式化后,重装新系统,联上Microsoft Internet Explorer 可以升级Internet Explorer 再装卡卡助手,然后在QQ网站的下载网叶下载了一个windows Media player 它那个网址跟开始登陆的网址不一样,要下载的时候会弹出一个安全警告提示.下载以后问题就多多啦,打开网叶就慢多了,打开网叶它会跑到雅虎网站去,它会把雅虎助手慢慢装到你的电脑里去,在卡卡里查毒就更慢,有时下载不了.软驱也失效,软盘没办法再格式化,是不是中毒了?是中毒了,中的什么毒我看不懂,好象它还控制软驱驱动器,它还可以把病毒写到软盘里,我是用win98启动盘格式化的,软驱用不了,我改用光驱里把硬盘重新格式化,再装win98系统,因为我的电脑装不了其它系统,再升级Internet Explorer惨啦惨啦!又跑到假的网站去了,这个流氓不知躲在哪个角落?软驱?软盘?电脑里面?不知道,我不是电脑高手,我对电脑不是很懂,但是我知道肯定有假的Microsoft Internet Explorer 网站,不出我所料,打开几次Internet Explorer,默认的网叶就跑到雅虎网站去了,再下载卡卡系统就提示说可能含恶意代码,以前都不会啊。我没设置这个网站啊:http://music.yahoo.com.cn/?source=3721_nokw 打开几次Internet Explorer就变成它的了呢,以前打开一百次也不变啊!这什么世道啊!撕开这些人的面孔吧,看这些老板怎么赚黑心钱的,给我拉出去斩斩斩斩斩斩斩斩斩啦!看来要立立立立立立......法......了啊!
Logfile of Kaka v2. 0. 0. 7 Scan Module v2. 0. 0. 1
Scan saved at 01:36:42, on 2006-01-23
Platform: Microsoft Windows 98 SE
MSIE: Internet Explorer v6.00 SP1; (6.00.2800.1106)


Running processes:
[KERNEL32.DLL]
CommandLine =

[MSGSRV32.EXE]
CommandLine =

[MPREXE.EXE]
CommandLine = C:\WINDOWS\SYSTEM\MPREXE.EXE

[MSTASK.EXE]
CommandLine = mstask.exe

[RAVMON.EXE]
CommandLine = "C:\PROGRAM FILES\RISING\RAV\RavMon.exe" /AUTO

[CCENTER.EXE]
CommandLine = "C:\Program Files\rising\Rav\CCenter.exe"

[mmtask.tsk]
CommandLine =

[EXPLORER.EXE]
CommandLine = C:\WINDOWS\Explorer.exe

[INTERNAT.EXE]
CommandLine = "C:\WINDOWS\SYSTEM\internat.exe"

[TASKMON.EXE]
CommandLine = "C:\WINDOWS\taskmon.exe"

[SYSTRAY.EXE]
CommandLine = "C:\WINDOWS\SYSTEM\SysTray.Exe"

[RAVTIMER.EXE]
CommandLine = "C:\PROGRAM FILES\RISING\RAV\RavTimer.exe"

[WMIEXE.EXE]
CommandLine = WmiExe 56

[TELWIN.EXE]
CommandLine = "C:\JFS\TELWIN.EXE"

[RPCSS.EXE]
CommandLine = RPCSS

[IEXPLORE.EXE]
CommandLine = "C:\PROGRA~1\INTERN~1\iexplore.exe"

[DDHELP.EXE]
CommandLine = ddhelp.exe

[KKSCAN.EXE]
CommandLine = "C:\Program Files\Rising\KakaToolBar\KkScan.exe"

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page=C:\WINDOWS\SYSTEM\blank.htm
O3 - Toolbar: 卡卡上网安全助手 - {DB9ECD4F-FB8F-4311-B3CE-90B976C2707C} - C:\WINDOWS\SYSTEM\KAKATOOL.DLL
O3 - Toolbar: 电台(&R) - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
O4 - HKLM\..\Run: [internat.exe] internat.exe
O4 - HKLM\..\Run: [ScanRegistry] C:\WINDOWS\scanregw.exe /autorun
O4 - HKLM\..\Run: [TaskMonitor] C:\WINDOWS\taskmon.exe
O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\Run: [RavTimer] C:\PROGRAM FILES\RISING\RAV\RavTimer.exe
O4 - HKLM\..\Run: [RavMon] C:\PROGRAM FILES\RISING\RAV\RavMon.exe
O4 - HKLM\..\Run: [ccenter] C:\Program Files\rising\Rav\CCenter.exe
O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
O4 - HKLM\..\RunServices: [RavMon] C:\PROGRAM FILES\RISING\RAV\RavMon.exe /AUTO
O4 - HKLM\..\RunServices: [ccenter] C:\Program Files\rising\Rav\CCenter.exe
O9 - Extra Button: @shdoclc.dll,-866 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\SYSTEM\SHDOCVW.DLL
O9 - Extra 'Tools' menuitem: @shdoclc.dll,-864 - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\SYSTEM\SHDOCVW.DLL
O14 - IERESET.INF: START_PAGE_URL=http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
O16 - DPF: DirectAnimation Java Classes - file://C:\WINDOWS\SYSTEM\dajava.cab
O16 - DPF: Internet Explorer Classes for Java - file://C:\WINDOWS\SYSTEM\iejava.cab
O16 - DPF: {E4E2F180-CB8B-4DE9-ACBB-DA745D3BA153} (Rising Web Scan Object) - http://download.rising.com.cn/register/pcver/autoupgradepad/pcver2006new/OL2006.cab
O18 - Protocol: http - {79eac9e2-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: ftp - {79eac9e3-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: gopher - {79eac9e4-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: https - {79eac9e5-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: mk - {79eac9e6-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: file - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: local - {79eac9e7-baf9-11ce-8c82-00aa004ba90b} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: cdl - {3dd53d40-7b8b-11D0-b013-00aa0059ce02} - C:\WINDOWS\SYSTEM\urlmon.dll
O18 - Protocol: javascript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: vbscript - {3050F3B2-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: about - {3050F406-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: res - {3050F3BC-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: mailto - {3050f3DA-98B5-11CF-BB82-00AA00BDCE0B} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: sysimage - {76E67A63-06E9-11D2-A840-006008059382} - C:\WINDOWS\SYSTEM\MSHTML.DLL
O18 - Protocol: its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\SYSTEM\ITSS.DLL
O18 - Protocol: ms-its - {9D148291-B9C8-11D0-A4CC-0000F80149F6} - C:\WINDOWS\SYSTEM\ITSS.DLL
O18 - Protocol: mhtml - {05300401-BCBC-11d0-85E3-00C04FD85AB4} - C:\WINDOWS\SYSTEM\INETCOMM.DLL
O18 - Protocol: msdaipp - (no CLSID) - (no file)
O18 - Protocol: vnd.ms.radio - {3DA2AA3B-3D96-11D2-9BD2-204C4F4F5020} - C:\WINDOWS\SYSTEM\MSDXM.OCX
最后编辑2006-01-22 11:25:17