|
|
想发上来,但怕承担传播病毒的嫌疑。
该程序修改MBR偏移地址1B5、1B6、1B7的数字为00、00、00(原来是2C、44、63)。
监视的应用程序
鬼影
已监视的应用程序路径
2006-7-14 下午 07:04:32
已监视的应用程序路径
"C:\Documents and Settings\Administrator\桌面\鬼影.exe"
安装前快照名称
2006-7-14 下午 07:03:29
安装快照名称
2006-7-14 下午 07:04:30
比较配置文件
默认
检测更改
文件系统
创建的文件夹: 2
删除的文件夹: 0
创建的文件: 38
删除的文件: 1
修改的文件: 7
文件大小: 1.03 MB
注册表
创建的注册表键: 136
删除的注册表键: 0
创建的注册表值: 183
删除的注册表值: 0
修改的注册表值: 1
文件大小: 9.32 KB
日志文件名
C:\Documents and Settings\Administrator\Local Settings\Application Data\Martau\Total Uninstall 4\MonitoredApps\鬼影.tun
文件系统详细信息 [查看: 全部详细信息] (全部)
--------------------------
(+)(文件夹) C:\000D3E83
(+)(文件) C_754.nls = 2006-7-14 下午 07:04, 759 字节, A
(文件夹) C:\Documents and Settings\Administrator\Application Data\Tencent\QQ\Misc\com.tencent.advertisement
(+)(文件) huashuo_140240_richbt_0322.swf = 2006-7-14 下午 07:03, 31148 字节, A
(+)(文件) huashuo_14040_richbt_0322.jpg = 2006-7-14 下午 07:03, 5037 字节, A
(+)(文件) rich_361_zhengkai140x40.gif = 2006-7-14 下午 07:04, 8039 字节, A
(文件夹) C:\Documents and Settings\Administrator\Application Data\Tencent\Users\77723036\QQ\WinTemp
(+)(文件) 1952697950.idx = 2006-7-14 下午 07:04, 18 字节, A
(+)(文件) 2309372372.idx = 2006-7-14 下午 07:04, 0 字节, A
(+)(文件) 3330573499.idx = 2006-7-14 下午 07:04, 18 字节, A
(*)(文件) 3526289898.idx
2006-7-14 下午 07:01, 18 字节, A ==> 2006-7-14 下午 07:03, 18 字节, A
(*)(文件) 3532606315.idx
2006-7-14 下午 07:01, 0 字节, A ==> 2006-7-14 下午 07:04, 18 字节, A
(+)(文件) 366875558.idx = 2006-7-14 下午 07:03, 18 字节, A
(*)(文件) 3796103867.idx
2006-7-14 下午 07:01, 18 字节, A ==> 2006-7-14 下午 07:03, 18 字节, A
(+)(文件) 47395f425108fea2e15869369b1d7529.tpt = 2006-7-14 下午 07:04, 71 字节, A
(+)(文件) 968f82a772bd335c2331cf95050b067f.tpt = 2006-7-14 下午 07:03, 71 字节, A
(+)(文件) b9533c8dd753d4add006aed348de9ea5.tpt = 2006-7-14 下午 07:03, 71 字节, A
(+)(文件) c96779c042f15b04b8f3b38e1705d4e4.tpt = 2006-7-14 下午 07:04, 71 字节, A
(文件夹) C:\Documents and Settings\Administrator\Application Data\Tencent\Users\77723036\QQ\WinTemp\com.tencent.advertisement
(+)(文件) 3)0}FY3CK4EJ@01RTRQY~QV.tmp = 2006-7-14 下午 07:03, 31148 字节, A
(+)(文件) DDE3OS%N$IW)8$}YNDYHA~7.tmp.tdl = 2006-7-14 下午 07:04, 32768 字节, A
(+)(文件) JDJ1(U~Z1TZCH134}F_1A}6.tmp = 2006-7-14 下午 07:04, 8039 字节, A
(+)(文件) U[0C%%D}T0G0I@3E89OY4@7.tmp = 2006-7-14 下午 07:03, 5037 字节, A
(文件夹) C:\Documents and Settings\Administrator\桌面
(-)(文件) 鬼影.exe = 2006-7-14 下午 06:32, 51631 字节, A
(+)(文件夹) C:\Program Files\MSDN
(+)(文件) 000000000 = 2006-7-14 下午 07:04, 29700 字节, A
(+)(文件) atixi.inf = 2006-7-14 下午 07:04, 2529 字节, A
(+)(文件) atixi.sys = 2006-7-14 下午 07:04, 14208 字节, A
(+)(文件) atixx.sys = 2006-7-14 下午 07:04, 15392 字节, A
(文件夹) C:\WINDOWS
(*)(文件) setupapi.log
2006-7-14 下午 06:46, 516834 字节, A ==> 2006-7-14 下午 07:04, 520946 字节, A
(文件夹) C:\WINDOWS\inf
(+)(文件) oem13.inf = 2006-7-14 下午 07:04, 2529 字节, A
(+)(文件) oem13.PNF = 2006-7-14 下午 07:04, 9452 字节, A
(+)(文件) oem14.inf = 2006-7-14 下午 07:04, 2529 字节, A
(+)(文件) oem14.PNF = 2006-7-14 下午 07:04, 9452 字节, A
(文件夹) C:\WINDOWS\LastGood\INF
(+)(文件) oem13.inf = 2006-7-14 下午 07:04, 0 字节, HA
(+)(文件) oem13.PNF = 2006-7-14 下午 07:04, 0 字节, HA
(+)(文件) oem14.inf = 2006-7-14 下午 07:04, 0 字节, HA
(+)(文件) oem14.PNF = 2006-7-14 下午 07:04, 0 字节, HA
(文件夹) C:\WINDOWS\system32
(+)(文件) A7B5D26.dll = 2006-7-14 下午 07:04, 72252 字节, A
(+)(文件) C5A2C30.exe = 2006-7-14 下午 07:04, 3948 字节, A
(*)(文件) rpcss.dll
2006-7-14 上午 11:52, 399360 字节, A ==> 2006-7-14 上午 11:52, 626692 字节, A
(+)(文件) t320068.dll = 2006-7-14 下午 07:04, 88064 字节, A
(+)(文件) t320068.ini = 2006-7-14 下午 07:04, 2616 字节, A
(+)(文件) t329153.dll = 2006-7-14 下午 07:04, 81920 字节, A
(+)(文件) t329153.ini = 2006-7-14 下午 07:04, 2616 字节, A
(+)(文件) t3rpcss.dll = 2006-7-14 上午 11:52, 399360 字节, A
(文件夹) C:\WINDOWS\system32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}
(*)(文件) TimeStamp
2006-7-14 下午 06:46, 8 字节, A ==> 2006-7-14 下午 07:04, 8 字节, A
(文件夹) C:\WINDOWS\system32\dllcache
(+)(文件) acpiec.sys = 2006-7-14 下午 07:04, 11648 字节, AC
(文件夹) C:\WINDOWS\system32\drivers
(*)(文件) acpiec.sys
2006-7-14 上午 11:52, 11648 字节, A ==> 2006-7-14 下午 07:04, 11648 字节, A
(+)(文件) atixi.sys = 2006-7-14 下午 07:04, 14208 字节, A
(+)(文件) atixx.sys = 2006-7-14 下午 07:04, 15392 字节, A
注册表详细信息 [查看: 全部详细信息] (全部)
-------------------------
(REG 键) HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
(+)(REG 值) B7D6E64 = REG_SZ, "C:\WINDOWS\system32\C5A2C30.exe"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\filemon.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FYFireWall.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kabaload.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPF.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.com
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVScan.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP_1.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NPFMntor.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OllyDBG.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OllyICE.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFWLiveUpdate.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQKav.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ras.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RawCopy.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regmon.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegTool.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwcfg.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwstub.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstray.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxtray.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAttachment.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe
(+)(REG 值) debugger = REG_SZ, "ntsd -d"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{02EB6841-28D2-44C2-8303-584F54E6D913}
(+)(REG 值) (默认) = REG_SZ, "Class for atixx devices"
(+)(REG 值) Class = REG_SZ, "atixx"
(+)(REG 值) Icon = REG_SZ, "-18"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{02EB6841-28D2-44C2-8303-584F54E6D913}\0000
(+)(REG 值) DriverDate = REG_SZ, "1-2-2010"
(+)(REG 值) DriverDateData = REG_BINARY, ....>...
(+)(REG 值) DriverDesc = REG_SZ, "atixx Device"
(+)(REG 值) DriverVersion = REG_SZ, "1.0.0.0"
(+)(REG 值) InfPath = REG_SZ, "oem13.inf"
(+)(REG 值) InfSection = REG_SZ, "atixx_DDI"
(+)(REG 值) InfSectionExt = REG_SZ, ".NT"
(+)(REG 值) MatchingDeviceId = REG_SZ, "atixxdevice"
(+)(REG 值) ProviderName = REG_SZ, "ATI"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{02EB6841-28D2-44C2-8303-584F54E6D913}\0001
(+)(REG 值) DriverDate = REG_SZ, "1-2-2010"
(+)(REG 值) DriverDateData = REG_BINARY, ....>...
(+)(REG 值) DriverDesc = REG_SZ, "atixi Device"
(+)(REG 值) DriverVersion = REG_SZ, "1.0.0.0"
(+)(REG 值) InfPath = REG_SZ, "oem14.inf"
(+)(REG 值) InfSection = REG_SZ, "atixi_DDI"
(+)(REG 值) InfSectionExt = REG_SZ, ".NT"
(+)(REG 值) MatchingDeviceId = REG_SZ, "atixidevice"
(+)(REG 值) ProviderName = REG_SZ, "ATI"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{02EB6841-28D2-44C2-8303-584F54E6D913}\Properties
(+)(REG 值) DeviceCharacteristics = REG_DWORD, 256
(+)(REG 值) Security = REG_BINARY, ......................H............................................................. ... ...
(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\GroupOrderList
(*)(REG 值) Extended Base
REG_BINARY, ............................................................ ==> REG_BINARY, ....................................................................
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Deleted Device IDs
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXI
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXI\0000
(+)(REG 值) Capabilities = REG_DWORD, 0
(+)(REG 值) Class = REG_SZ, "atixx"
(+)(REG 值) ClassGUID = REG_SZ, "{02EB6841-28D2-44C2-8303-584F54E6D913}"
(+)(REG 值) ConfigFlags = REG_DWORD, 0
(+)(REG 值) DeviceDesc = REG_SZ, "atixi Device"
(+)(REG 值) Driver = REG_SZ, "{02EB6841-28D2-44C2-8303-584F54E6D913}\0001"
(+)(REG 值) HardwareID = REG_MULTI_SZ, "atixiDevice "
(+)(REG 值) Mfg = REG_SZ, "ATI"
(+)(REG 值) Service = REG_SZ, "atixi"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXI\0000\Control
(+)(REG 值) ActiveService = REG_SZ, "atixi"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXI\0000\LogConf
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXX
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXX\0000
(+)(REG 值) Capabilities = REG_DWORD, 0
(+)(REG 值) Class = REG_SZ, "atixx"
(+)(REG 值) ClassGUID = REG_SZ, "{02EB6841-28D2-44C2-8303-584F54E6D913}"
(+)(REG 值) ConfigFlags = REG_DWORD, 0
(+)(REG 值) DeviceDesc = REG_SZ, "atixx Device"
(+)(REG 值) Driver = REG_SZ, "{02EB6841-28D2-44C2-8303-584F54E6D913}\0000"
(+)(REG 值) HardwareID = REG_MULTI_SZ, "atixxDevice "
(+)(REG 值) Mfg = REG_SZ, "ATI"
(+)(REG 值) Service = REG_SZ, "atixx"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXX\0000\Control
(+)(REG 值) ActiveService = REG_SZ, "atixx"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\ATIXX\0000\LogConf
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX
(+)(REG 值) NextInstance = REG_DWORD, 1
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000
(+)(REG 值) Class = REG_SZ, "LegacyDriver"
(+)(REG 值) ClassGUID = REG_SZ, "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
(+)(REG 值) ConfigFlags = REG_DWORD, 0
(+)(REG 值) DeviceDesc = REG_SZ, "ATICVVX"
(+)(REG 值) Legacy = REG_DWORD, 1
(+)(REG 值) Service = REG_SZ, "ATICVVX"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ATICVVX\0000\Control
(+)(REG 值) *NewlyCreated* = REG_DWORD, 0
(+)(REG 值) ActiveService = REG_SZ, "ATICVVX"
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ATICVVX
(+)(REG 值) DisplayName = REG_SZ, "ATICVVX"
(+)(REG 值) ErrorControl = REG_DWORD, 1
(+)(REG 值) ImagePath = REG_EXPAND_SZ, "\??\C:\WINDOWS\system32\Drivers\acpiec.sys"
(+)(REG 值) Start = REG_DWORD, 3
(+)(REG 值) Type = REG_DWORD, 1
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ATICVVX\Enum
(+)(REG 值) 0 = REG_SZ, "Root\LEGACY_ATICVVX\0000"
(+)(REG 值) Count = REG_DWORD, 1
(+)(REG 值) NextInstance = REG_DWORD, 1
(+)(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ATICVVX\Security
(+)(REG 值) Security = REG_BINARY, ................0.................................`......................................... ... ....................................... ...#...........................
(REG 键) HKEY_LOCAL_MACHINE\SYSTEM\LastKnownGoodRecovery\LastGood
(+)(REG 值) INF/oem13.inf = REG_DWORD, 1
(+)(REG 值) INF/oem13.PNF = REG_DWORD, 1
(+)(REG 值) INF/oem14.inf = REG_DWORD, 1
(+)(REG 值) INF/oem14.PNF = REG_DWORD, 1 |
|