12345678   4  /  8  页   跳转

【讨论】卡卡也流氓???

【回复“花落花又开”的帖子】
是默认主页被改WWW.K256.COM啊
gototop
 

【回复“ceo800”的帖子】
可是注册表那张图说明默认主页是MS的啊.
用SREng把LOG扫一个上来吧.
建议使用一下IE修复工具.
黄山IE修复:http://nj.onlinedown.net/soft/18437.htm
gototop
 

就是奇怪啊都改注册表了
gototop
 

【回复“花落花又开”的帖子】
IE修复工具我没用

这是我用SREng扫的

2005-12-03,20:09:14

System Repair Engineer 1.1.0.269
    Windows XP Professional Service Pack 2 - 管理权限用户 - 完整功能

以下内容被选中:
    所有的启动项目(包括注册表、启动文件夹、服务等)
    浏览器加载项
    正在运行的进程(包括进程模块信息)
    文件关联


启动项目
注册表
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
  <ctfmon.exe><C:\WINDOWS\system32\ctfmon.exe>
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
  <load><>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
  <KernelFaultCheck><%systemroot%\system32\dumprep 0 -k>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
  <vptray><C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
  <IgfxTray><C:\WINDOWS\system32\igfxtray.exe>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
  <HotKeysCmds><C:\WINDOWS\system32\hkcmd.exe>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
  <TkBellExe><"C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
  <shell><Explorer.exe>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
  <Userinit><C:\WINDOWS\system32\userinit.exe,>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows]
  <AppInit_DLLs><>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <AddrPlus><; RUNDLL32.EXE C:\PROGRA~1\TENCENT\AddrPlus\QAHook.dll,Rundll32>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <helper.dll><; C:\WINDOWS\system32\rundll32.exe C:\PROGRA~1\3721\helper.dll,Rundll32>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <HotKeysCmds><; C:\WINDOWS\system32\hkcmd.exe>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <IgfxTray><; C:\WINDOWS\system32\igfxtray.exe>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <SoundMan><; SOUNDMAN.EXE>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <TkBellExe><; "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <YLive.exe><; C:\PROGRA~1\Yahoo!\ASSIST~1\YLive.exe>
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
  <迅雷4><; C:\迅雷(Thunder) 4.5.1.35 完全绿\MediaIssue\TDUpdate.exe>

==================================
启动文件夹
[内存扫把]
  <C:\Documents and Settings\user\「开始」菜单\程序\启动\内存扫把.lnk><N>

==================================
服务
[Autodesk Licensing Service / Autodesk Licensing Service]
  <"C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe"><Autodesk, Inc.>
[DefWatch / DefWatch]
  <"C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe"><Symantec Corporation>
[Symantec AntiVirus Client / Norton AntiVirus Server]
  <"C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe"><Symantec Corporation>
[StdService / StdService]
  <C:\WINDOWS\system32\rundll32.exe C:\WINDOWS\system32\STDSVER.DLL,Service><N/A>

==================================
浏览器加载项
[ThunderIEHelper Class]
  <C:\WINDOWS\system32\xunleibho_v8.dll>
[QQBrowserHelperObject Class]
  <C:\Program Files\Tencent\QQ\QQIEHelper.dll>
[DragSearch BHO]
  <C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\YDRAGS~1.DLL>
[std software]
  <C:\WINDOWS\SYSTEM32\stdup.dll>
[IeCatch2 Class]
  <C:\PROGRA~1\FLASHGET\jccatch.dll>
[浩方对战平台]
  <D:\wc3\浩方对战平台\GameClient.exe>
[QQ]
  <C:\Program Files\Tencent\QQ\QQ.EXE>
[QQIEFloatBarCfgCmd Class]
  <C:\Program Files\Tencent\QQ\QQIEHelper.dll>
[ThunderIEHelper Class]
  <C:\WINDOWS\system32\xunleibho_v8.dll>
[QQBrowserHelperObject Class]
  <C:\Program Files\Tencent\QQ\QQIEHelper.dll>
[DragSearch BHO]
  <C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\YDRAGS~1.DLL>
[std software]
  <C:\WINDOWS\SYSTEM32\stdup.dll>
[IeCatch2 Class]
  <C:\PROGRA~1\FLASHGET\jccatch.dll>
[Shockwave Flash Object]
  <C:\WINDOWS\system32\Macromed\Flash\Flash8.ocx>
[&使用迅雷下载]
  <C:\迅雷(Thunder) 4.5.1.35 完全绿\geturl.htm>
[&使用迅雷下载全部链接]
  <C:\迅雷(Thunder) 4.5.1.35 完全绿\getallurl.htm>
[上传到QQ网络硬盘]
  <C:\Program Files\Tencent\QQ\AddToNetDisk.htm>
[使用IS下载]
  <>
[使用网际快车下载]
  <C:\Program Files\FlashGet\jc_link.htm>
[使用网际快车下载全部链接]
  <C:\Program Files\FlashGet\jc_all.htm>
[添加到QQ自定义面板]
  <C:\Program Files\Tencent\QQ\AddPanel.htm>
[添加到QQ表情]
  <C:\Program Files\Tencent\QQ\AddEmotion.htm>
[用QQ彩信发送该图片]
  <C:\Program Files\Tencent\QQ\SendMMS.htm>

==================================
正在运行的进程
[PID: 428][\SystemRoot\System32\smss.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 488][\??\C:\WINDOWS\system32\csrss.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 512][\??\C:\WINDOWS\system32\winlogon.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
    [C:\WINDOWS\system32\NavLogon.dll]  <N/A><N/A>
[PID: 556][C:\WINDOWS\system32\services.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 576][C:\WINDOWS\system32\lsass.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 736][C:\WINDOWS\system32\svchost.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 784][C:\WINDOWS\system32\svchost.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 844][C:\WINDOWS\System32\svchost.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 900][C:\WINDOWS\system32\svchost.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 976][C:\WINDOWS\system32\svchost.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 1216][C:\WINDOWS\Explorer.EXE]  <Microsoft Corporation><6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)>
    [C:\PROGRA~1\FLASHGET\jccatch.dll]  <Amaze Soft><1, 1, 4, 0>
[PID: 1316][C:\WINDOWS\system32\spoolsv.exe]  <Microsoft Corporation><5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)>
[PID: 1492][C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe]  <Autodesk, Inc.><2.51.000>
[PID: 1528][C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe]  <Symantec Corporation><8.00.00.9374>
[PID: 1588][C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe]  <Symantec Corporation><8.00.00.9374>
    [C:\WINDOWS\system32\CBA.DLL]  <Intel? Corporation><6.12.0.71 E>
    [C:\WINDOWS\system32\MsgSys.dll]  <Intel? Corporation><6.12.0.71 E>
    [C:\WINDOWS\system32\NTS.dll]  <Intel? Corporation><6.12.0.71 E>
    [C:\WINDOWS\system32\PDS.DLL]  <Intel? Corporation><6.12.0.71 E>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\NAVLU.dll]  <Symantec Corporation><8.00.00.9374>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\NAVNTUTL.DLL]  <Symantec/Peter Norton Group><1, 0, 0, 1>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\i2ldvp3.dll]  <Symantec Corporation><8.00.00.9374>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\NAVAPI32.DLL]  <Symantec Corp.><4.1.0.15>
    [C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20051130.006\NAVEX32a.DLL]  <Symantec Corporation><20051.3.0.16>
    [C:\PROGRA~1\COMMON~1\SYMANT~1\VIRUSD~1\20051130.006\NAVENG32.DLL]  <Symantec Corporation><20051.3.0.16>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\NAVAP32.DLL]  <Symantec Corporation><9.0.0.14>
[PID: 1676][C:\WINDOWS\system32\wdfmgr.exe]  <Microsoft Corporation><5.2.3790.1230 built by: dnsrv(bld4act)>
[PID: 204][C:\WINDOWS\System32\alg.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 228][C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe]  <Symantec Corporation><8.00.00.9374>
    [C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Cliscan.dll]  <Symantec Corporation><8.00.00.9374>
    [C:\PROGRA~1\SYMANT~1\SYMANT~1\NAVNTUTL.DLL]  <Symantec/Peter Norton Group><1, 0, 0, 1>
[PID: 312][C:\Program Files\Common Files\Real\Update_OB\realsched.exe]  <RealNetworks, Inc.><0.1.0.3275>
[PID: 404][C:\WINDOWS\system32\ctfmon.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 348][C:\Program Files\内存扫把\ram.exe]  <jfzlnyf><1.09.0004>
    [C:\Program Files\内存扫把\Command.ocx]  <随想软件工作室 Capricciososoft><3.00.0915>
    [C:\Program Files\内存扫把\TrayForm.ocx]  <Eduardo Morcillo><1.03.0007>
[PID: 2016][C:\WINDOWS\system32\conime.exe]  <Microsoft Corporation><5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)>
[PID: 412][C:\Program Files\Internet Explorer\iexplore.exe]  <Microsoft Corporation><6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)>
    [C:\WINDOWS\system32\xunleibho_v8.dll]  <N/A><4, 5, 1, 33>
    [C:\Program Files\Tencent\QQ\QQIEHelper.dll]  <深圳市腾讯计算机系统有限公司><1, 1, 0, 5>
    [C:\PROGRA~1\FLASHGET\jccatch.dll]  <Amaze Soft><1, 1, 4, 0>
    [C:\WINDOWS\system32\PYJJU.IME]  <北京六合源软件技术有限公司><2, 2, 0, 4>
[PID: 2592][C:\WINDOWS\system32\PYINTAU.EXE]  <北京六合源软件技术有限公司><2, 2, 1, 4>
    [C:\WINDOWS\system32\PYCODEU.dll]  <北京六合源软件技术有限公司><2, 2, 0, 4>
    [C:\WINDOWS\system32\PYJJCZU.dll]  <北京六合源软件技术有限公司><2, 2, 0, 0>
[PID: 3668][C:\Program Files\WinRAR\WinRAR.exe]  <N/A><N/A>
[PID: 3664][C:\DOCUME~1\user\LOCALS~1\Temp\Rar$EX07.558\SREng.exe]  <Smallfrogs Studio><1.1.0.269>

==================================
文件关联
.TXT  OK. [C:\WINDOWS\system32\NOTEPAD.EXE %1]
.EXE  OK. ["%1" %*]
.COM  OK. ["%1" %*]
.PIF  OK. ["%1" %*]
.REG  OK. [regedit.exe "%1"]
.BAT  OK. ["%1" %*]
.SCR  OK. ["%1" /S]
.CHM  OK. ["C:\WINDOWS\hh.exe" %1]
.HLP  OK. [C:\WINDOWS\System32\winhlp32.exe %1]
.INI  OK. [C:\WINDOWS\System32\NOTEPAD.EXE %1]
.INF  OK. [C:\WINDOWS\System32\NOTEPAD.EXE %1]

==================================
gototop
 

重新启动到安全模式(进入安全模式的方法:重新启动电脑, 开机自动检测完后, 按[F8]键(可以一直按到启动菜单出来为止), 选择安全模式(Safe Mode)进入Windows。)

开始→控制面板→性能和维护→管理工具→服务→查找StdService→右击→属性→启动类型→禁止→应用→停止→确定。

然后打开我的电脑→再点工具→打开文件夹选项→查看→把隐藏受保护的系统文件(推荐)和隐藏已知文件类型的扩展名的勾去掉→再显示所有文件→找到以下文件并删除:(如果有的话)
C:\WINDOWS\system32\STDSVER.DLL
C:\WINDOWS\SYSTEM32\stdup.dll

删除文件夹C:\WINDOWS\system32\stdcache


gototop
 

引用:
【飞跃迷离的贴子】重新启动到安全模式(进入安全模式的方法:重新启动电脑, 开机自动检测完后, 按[F8]键(可以一直按到启动菜单出来为止), 选择安全模式(Safe Mode)进入Windows。)

开始→控制面板→性能和维护→管理工具→服务→查找StdService→右击→属性→启动类型→禁止→应用→停止→确定。

然后打开我的电脑→再点工具→打开文件夹选项→查看→把隐藏受保护的系统文件(推荐)和隐藏已知文件类型的扩展名的勾去掉→再显示所有文件→找到以下文件并删除:(如果有的话)
C:\WINDOWS\system32\STDSVER.DLL
C:\WINDOWS\SYSTEM32\stdup.dll

删除文件夹C:\WINDOWS\system32\stdcache



...........................



这些早就操作过了啊
文件和文件夹也都删了

附件附件:

下载次数:0
文件类型:image/pjpeg
文件大小:
上传时间:2005-12-3 20:36:09
描述:



gototop
 

呵呵~~看看您的日志罢,项目可都是没有操作的,请到安全模式下修复!
gototop
 

我又重新把这些步骤做了一遍

选择安全模式进入Windows
开始→控制面板→性能和维护→管理工具→服务→查找StdService→右击→属性→启动类型→禁止→应用→停止→确定
扫描

我想是不是"飞跃迷离"把"修复"打错成"修改"了呢???
于是修复下列项目

O2 - BHO: std software - {6A512BF7-EC78-4e8d-9841-6C02E8FA9838} - C:\WINDOWS\SYSTEM32\stdup.dll (file missing)
O18 - Protocol: koboo - {7DEE9D05-FA0A-4416-A6F3-6537D0EAB6A6} - C:\WINDOWS\system32\mbprot.dll

然后是找到以下文件并删除:(如果有的话)
C:\WINDOWS\system32\STDSVER.DLL
C:\WINDOWS\SYSTEM32\stdup.dll
C:\WINDOWS\system32\stdcache
都没有!
然后是把hosts还原成我原来的备份

重启-扫描

Logfile of HijackThis v1.99.1
Scan saved at 10:47:37, on 2005-12-4
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Unable to get Internet Explorer version!

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe
C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\内存扫把\ram.exe
C:\WINDOWS\system32\conime.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\WINDOWS\system32\PYINTAU.EXE
D:\hj\HijackThis.exe

R3 - URLSearchHook: (no name) - {BB936323-19FA-4521-BA29-ECA6A121BC78} - (no file)
O1 - Hosts: 202.232.140.12 auto.search.msn.com
O2 - BHO: ThunderIEHelper Class - {0005A87D-D626-4B3A-84F9-1D9571695F55} - C:\WINDOWS\system32\xunleibho_v8.dll
O2 - BHO: QQIEHelper - {54EBD53A-9BC1-480B-966A-843A333CA162} - C:\Program Files\Tencent\QQ\QQIEHelper.dll
O2 - BHO: YDragSearch - {62EED7C6-9F02-42f9-B634-98E2899E147B} - C:\PROGRA~1\Yahoo!\ASSIST~1\Assist\YDRAGS~1.DLL (file missing)
O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - C:\PROGRA~1\FLASHGET\jccatch.dll
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [vptray] C:\PROGRA~1\SYMANT~1\SYMANT~1\vptray.exe
O4 - HKLM\..\Run: [IgfxTray] ; C:\WINDOWS\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] ; C:\WINDOWS\system32\hkcmd.exe
O4 - HKLM\..\Run: [TkBellExe] ; "C:\Program Files\Common Files\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [AddrPlus] ; RUNDLL32.EXE C:\PROGRA~1\TENCENT\AddrPlus\QAHook.dll,Rundll32
O4 - HKLM\..\Run: [helper.dll] ; C:\WINDOWS\system32\rundll32.exe C:\PROGRA~1\3721\helper.dll,Rundll32
O4 - HKLM\..\Run: [SoundMan] ; SOUNDMAN.EXE
O4 - HKLM\..\Run: [YLive.exe] ; C:\PROGRA~1\Yahoo!\ASSIST~1\YLive.exe
O4 - HKLM\..\Run: [迅雷4] ; C:\迅雷(Thunder) 4.5.1.35 完全绿\MediaIssue\TDUpdate.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - Startup: 内存扫把.lnk = ?
O8 - Extra context menu item: &使用迅雷下载 - C:\迅雷(Thunder) 4.5.1.35 完全绿\geturl.htm
O8 - Extra context menu item: &使用迅雷下载全部链接 - C:\迅雷(Thunder) 4.5.1.35 完全绿\getallurl.htm
O8 - Extra context menu item: 上传到QQ网络硬盘 - C:\Program Files\Tencent\QQ\AddToNetDisk.htm
O8 - Extra context menu item: 使用IS下载 - C:\Program Files\IS\IS.htm
O8 - Extra context menu item: 使用网际快车下载 - C:\Program Files\FlashGet\jc_link.htm
O8 - Extra context menu item: 使用网际快车下载全部链接 - C:\Program Files\FlashGet\jc_all.htm
O8 - Extra context menu item: 添加到QQ自定义面板 - C:\Program Files\Tencent\QQ\AddPanel.htm
O8 - Extra context menu item: 添加到QQ表情 - C:\Program Files\Tencent\QQ\AddEmotion.htm
O8 - Extra context menu item: 用QQ彩信发送该图片 - C:\Program Files\Tencent\QQ\SendMMS.htm
O9 - Extra button: 浩方对战平台 - {0A155D3C-68E2-4215-A47A-E800A446447A} - D:\wc3\浩方对战平台\GameClient.exe
O9 - Extra button: QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - C:\Program Files\Tencent\QQ\QQ.EXE
O9 - Extra 'Tools' menuitem: 腾讯QQ - {c95fe080-8f5d-11d2-a20b-00aa003c157b} - C:\Program Files\Tencent\QQ\QQ.EXE
O9 - Extra button: (no name) - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - C:\Program Files\Tencent\QQ\QQIEHelper.dll
O9 - Extra 'Tools' menuitem: QQ炫彩工具条设置 - {DEDEB80D-FA35-45d9-9460-4983E5A8AFE6} - C:\Program Files\Tencent\QQ\QQIEHelper.dll
O17 - HKLM\System\CCS\Services\Tcpip\..\{10E05807-FB5E-4CC5-A812-9B935C0D9A66}: NameServer = 202.103.224.68,202.103.229.40
O17 - HKLM\System\CCS\Services\Tcpip\..\{9715656C-5D63-4E35-99C8-96D4A53AFAB3}: NameServer = 202.103.224.68 202.103.229.40
O17 - HKLM\System\CS1\Services\Tcpip\..\{10E05807-FB5E-4CC5-A812-9B935C0D9A66}: NameServer = 202.103.224.68,202.103.229.40
O17 - HKLM\System\CS2\Services\Tcpip\..\{10E05807-FB5E-4CC5-A812-9B935C0D9A66}: NameServer = 202.103.224.68,202.103.229.40
O20 - Winlogon Notify: igfxcui - C:\WINDOWS\SYSTEM32\igfxsrvc.dll
O20 - Winlogon Notify: NavLogon - C:\WINDOWS\system32\NavLogon.dll
O23 - Service: Autodesk Licensing Service - Autodesk, Inc. - C:\Program Files\Common Files\Autodesk Shared\Service\AdskScSrv.exe
O23 - Service: DefWatch - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\DefWatch.exe
O23 - Service: Symantec AntiVirus Client (Norton AntiVirus Server) - Symantec Corporation - C:\Program Files\Symantec_Client_Security\Symantec AntiVirus\Rtvscan.exe

gototop
 

hosts文件
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
#      102.54.94.97    rhino.acme.com          # source server
#      38.25.63.10    x.acme.com              # x client host
127.0.0.1      localhost

gototop
 

查看默认主页````````````````````
www.k265.com
gototop
 
12345678   4  /  8  页   跳转
页面顶部
Powered by Discuz!NT