Technical Information
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAttachment.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sdrun.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upiea.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AST.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\USBCleaner.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQSC.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ghost.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.com] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngPS.EXE] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XDelBox.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWSUpd.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCTray.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFWLiveUpdate.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ras.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwcfg.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\irsetup.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.EXE] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\appdllman.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sos.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsTray.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zhudongfangyu.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stormii.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jisu.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\filmst.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qheart.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qsetup.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sxgame.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wbapp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfserver.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\799d.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\servet.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TNT.Exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XP.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wsyscheck.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TxoMoU.Exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AoYun.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zxsweep.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Discovery.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guangd.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kernelwind32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logogo.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctorRtp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVSetup.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.pif] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UFO.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cross.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loaddll.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zjb.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctorMain.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atpup.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQKav.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FYFireWall.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWSMain.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NPFMntor.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravcopy.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastU3.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanU3.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvU3Launcher.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCMgr.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPF.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SelfUpdate.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCRTP.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DSMain.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sd.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp3.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVScan.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP_1.kxp] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp2.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwstray.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSWebShield.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntiU.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rp.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kabaload.exe] 'Debugger' = 'ntsd -d'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCSmashFile.exe] 'Debugger' = 'ntsd -d'
- hidden files
- Registry Editor (RegEdit)
- iexplore.exe process, cryptsp.dll module
- iexplore.exe process, advapi32.dll module
- %CommonProgramFiles(x86)%\microsoft shared\explorer.exe
- %CommonProgramFiles(x86)%\ips888.dll
- C:\ysixeb.txt
- C:\eqoxmy.jpg
- C:\quheus.bmp
- C:\bdqitv.gif
- C:\lmamry.doc
- C:\85s22.dat
- C:\tstp\winlogon.exe
- D:\my documents.exe
- %LOCALAPPDATA%\microsoft\windows\history\history.ie5\mshist012020072120200722\index.dat
- %CommonProgramFiles(x86)%\ips888.dll
- %CommonProgramFiles(x86)%\microsoft shared\explorer.exe
- from C:\ysixeb.txt to C:\users\public\desktop\intennet exploner.lnk
- from C:\eqoxmy.jpg to C:\users\public\desktop\¸ä±ääãµäò»éú.url
- from C:\quheus.bmp to C:\users\public\desktop\ìô±¦¹ºîïa.url
- from C:\bdqitv.gif to C:\users\public\desktop\ãâ·ñµçó°c.url
- from C:\lmamry.doc to %HOMEPATH%\favorites\&Г§ГВ·Г—Гøö·µ¼º½&.url
- from C:\85s22.dat to %PROGRAMDATA%\microsoft\windows\start menu\programs\startup\tsps.lnk
- http://www.dh##5.com/?ie#####
- http://www.dh##5.com/u/cms/www/201901/18101904zxu3.png
- http://www.dh##5.com/u/cms/www/201901/18101830su5e.png
- http://www.dh##5.com/u/cms/www/201901/18101801dlcs.png
- http://www.dh##5.com/u/cms/www/201901/18101732qwp9.png
- http://www.dh##5.com/u/cms/www/201901/18101704nepp.png
- http://www.dh##5.com/u/cms/www/201901/18101633bcxr.png
- http://www.dh##5.com/u/cms/www/201901/18101558onne.png
- http://www.dh##5.com/u/cms/www/201901/18101534q5wr.png
- http://www.dh##5.com/u/cms/www/201901/18101501ncim.png
- http://www.dh##5.com/u/cms/www/201901/18101443zw7f.png
- http://www.dh##5.com/u/cms/www/201901/1810200453uv.png
- http://www.dh##5.com/u/cms/www/201901/18101936em1s.png
- http://www.dh##5.com/u/cms/www/201812/1514573383o1.png
- http://www.dh##5.com/u/cms/www/201812/15145707jfu3.png
- http://www.dh##5.com/u/cms/www/201812/151456454upf.png
- http://www.dh##5.com/u/cms/www/201812/151456265iao.png
- http://www.dh##5.com/u/cms/www/201812/15145608siz6.png
- http://www.dh##5.com/u/cms/www/201812/15145540kwqo.png
- http://www.dh##5.com/u/cms/www/201812/15145522myog.png
- http://www.dh##5.com/u/cms/www/201812/151454599rwi.png
- http://www.dh##5.com/u/cms/www/202007/021425527k7i.png
- http://www.dh##5.com/u/cms/www/201812/151453539azg.png
- http://www.dh##5.com/u/cms/www/201901/18101419pll5.png
- http://www.72##m.com/template/30bv/css/mm-content.css
- http://www.dh##5.com/u/cms/www/201901/18102022pgqs.png
- http://www.dh##5.com/r/cms/www/default/images/erm1-web.png
- http://www.dh##5.com/u/cms/www/201812/15150711ojv0.png
- http://www.dh##5.com/u/cms/www/202006/26091022oml1.jpg
- http://www.dh##5.com/u/cms/www/201812/151451329qyg.png
- http://www.dh##5.com/u/cms/www/201812/15145111md67.png
- http://www.dh##5.com/u/cms/www/201812/15145051rwvl.png
- http://www.dh##5.com/u/cms/www/201812/15145019ezoi.png
- http://www.dh##5.com/u/cms/www/201812/15144948q9kk.png
- http://www.dh##5.com/u/cms/www/201812/15144917jr4e.png
- http://www.dh##5.com/r/cms/www/default/images/shutter_shadow.png
- http://www.dh##5.com/r/cms/www/default/images/shutter_nextBtn.png
- http://www.dh##5.com/r/cms/www/default/images/shutter_prevBtn.png
- http://www.dh##5.com/r/cms/www/default/images/erm2-web.png
- http://www.dh##5.com/r/cms/www/default/images/footer1-web.png
- http://www.dh##5.com/u/cms/www/201812/15150919sm37.png
- http://www.dh##5.com/u/cms/www/201812/151508362hrk.png
- http://www.dh##5.com/u/cms/www/201812/15150611m9k7.png
- http://www.dh##5.com/u/cms/www/201901/17193017kufi.png
- http://www.dh##5.com/u/cms/www/201812/15150412ja7p.png
- http://www.dh##5.com/u/cms/www/201812/15150336l982.png
- http://www.dh##5.com/u/cms/www/201812/15150233fayh.png
- http://www.dh##5.com/u/cms/www/201812/151501381e5g.png
- http://www.dh##5.com/u/cms/www/201812/15150023094j.png
- http://www.dh##5.com/u/cms/www/201812/15145325btm4.png
- http://www.dh##5.com/u/cms/www/201812/15145759ud0d.png
- http://www.dh##5.com/u/cms/www/201812/15145251vjv8.png
- http://www.dh##5.com/u/cms/www/201903/27162044ygk2.jpg
- http://www.dh##5.com/u/cms/www/201812/15144842og1u.png
- http://www.dh##5.com/u/cms/www/201906/06094358xdwu.png
- http://www.72##m.com/template/30bv/js/tpl.js
- http://www.72##m.com/js/jq/jquery.autocomplete.js
- http://www.72##m.com/js/jquery.js
- http://www.72##m.com/template/30bv/css/white.css
- http://www.72##m.com/template/30bv/css/swiper.min.css
- http://www.dh##5.com/u/cms/www/202001/16112456cioh.jpg
- http://www.72##m.com/template/30bv/css/bootstrap.min.css
- http://www.72##m.com/
- http://ia.#1.la/go1?id###########################################################################################################################################################################...
- http://www.dh##5.com/u/cms/www/202002/26160214lt6d.jpg
- http://www.dh##5.com/u/cms/www/201906/28195803ji0i.jpg
- http://www.72##m.com/template/30bv/css/style.css
- http://www.dh##5.com/u/cms/www/201905/080831005ij0.jpg
- http://www.dh##5.com/r/cms/www/default/images/logo-web.png
- http://www.dh##5.com/r/cms/www/default/images/bg-web.png
- http://www.dh##5.com/common.js
- http://www.dh##5.com/r/cms/www/default/css/jquery.slideBox.css
- http://www.dh##5.com/r/cms/www/default/css/downmenu.css
- http://www.dh##5.com/tj.js
- http://www.dh##5.com/r/cms/www/default/css/shutter.css
- http://www.dh##5.com/r/cms/www/default/css/ad.css
- http://www.dh##5.com/r/cms/www/default/css/style.css
- http://oc##.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQwF4prw9S7mCbCEHD%2Fyl6nWPkczAQUe1tFz6%2FOy3r9MZIaarbzRutXSFACEEeXTXhzpbyrDS%2BzcBkvzl4%3D
- http://www.dh##5.com/u/cms/www/201901/1810204560vw.png
- http://www.72##m.com/template/30bv/fonts/glyphicons-halflings-regular.eot)%20format(%22embedded-opentype%22),%20url(../fonts/glyphicons-halflings-regular.woff2)%20format(%22woff2%22),%20url(../...
- http://www.72##m.com/template/30bv/js/home.js
- http://pi#.#99xe.xyz/hf1001.js
- http://www.dh##5.com/u/cms/www/201812/15144818m1gv.png
- http://www.dh##5.com/u/cms/www/201812/15144750ck8y.png
- http://www.dh##5.com/u/cms/www/201812/15144725goza.png
- http://www.dh##5.com/u/cms/www/201905/10100831vepc.png
- http://www.dh##5.com/u/cms/www/201812/15144649wcoo.png
- http://www.dh##5.com/u/cms/www/202005/12101623yj83.jpg
- http://www.dh##5.com/u/cms/www/202005/15171107gulh.jpg
- http://www.dh##5.com/u/cms/www/202006/12162426e96s.jpg
- http://www.dh##5.com/u/cms/www/202006/26091445lpm0.jpg
- http://www.dh##5.com/u/cms/www/202006/26091117s2le.jpg
- http://pi#.#99xe.xyz/img/qp9814.gif
- http://www.dh##5.com/u/cms/www/202006/260907435jb7.jpg
- http://www.dh##5.com/u/cms/www/202007/01181758adrr.jpg
- http://www.dh##5.com/u/cms/www/201901/0709552593pg.jpg
- http://www.dh##5.com/u/cms/www/201909/12235750yc02.jpg
- http://www.dh##5.com/u/cms/www/201911/04100519yzkg.jpg
- http://ap#.##are.baidu.com/s.gif?l=#############################
- http://www.dh##5.com/u/cms/www/201911/1110155812k2.jpg
- http://pi#.#99xe.xyz/img/dz9814.gif
- http://www.dh##5.com/u/cms/www/201911/29135836mczg.jpg
- http://pi#.#99xe.xyz/img/980140.gif
- http://pu##.###nzhang.baidu.com/push.js
- http://www.72##m.com/js/jq/jquery.lazyload.js
- http://www.72##m.com/inc/timming.php?t=#################
- DNS ASK dh##5.com
- DNS ASK js.##ers.51.la
- DNS ASK ia.#1.la
- DNS ASK 72##m.com
- DNS ASK pu##.###nzhang.baidu.com
- DNS ASK pi#.#99xe.xyz
- DNS ASK s4.#nzz.com
- DNS ASK ap#.##are.baidu.com
- DNS ASK oc##.thawte.com
- DNS ASK im#.##diziyuan.net
- DNS ASK la###opic.com
- ClassName: 'IEFrame' WindowName: ''
- ClassName: 'WorkerW' WindowName: ''
- ClassName: 'ReBarWindow32' WindowName: ''
- ClassName: 'Address Band Root' WindowName: ''
- ClassName: 'Edit' WindowName: ''
- ClassName: '_____TTFrameWnd__101__' WindowName: ''
- ClassName: 'Maxthon2_Frame' WindowName: ''
- ClassName: '360se_Frame' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebCheckMonitor' WindowName: ''
- '%CommonProgramFiles(x86)%\microsoft shared\explorer.exe'