Board logo

标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用 [打印本页]

作者: dymusic    时间: 2006-5-23 07:28     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

[求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用
Logfile of HijackThis v1.99.1
Scan saved at 6:44:21, on 2006-5-23
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Unable to get Internet Explorer version!
Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\csrss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
D:\Program Files\Iparmor\Iparmor.exe
D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\WINDOWS\system32\ctfmon.exe
D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\System32\alg.exe
C:\Program Files\ChinaNet\VnetClient.exe
D:\Program Files\Maxthon\Maxthon.exe
F:\Downloads\ha_hijackthis_1991\HijackThis.exe
O3 - Toolbar: BitCometBar - {3F1ABCDB-A875-46c1-8345-B72A4567E486} - d:\Program Files\BitComet\BitCometBar\BitCometBar0.3.dll
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [iparmor] D:\Program Files\Iparmor\Iparmor.exe mini
O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k
O4 - HKLM\..\Run: [SKYNET Personal FireWall] D:\PROGRA~1\SKYNET\FIREWALL\pfw.exe
O4 - HKLM\..\Run: [kav] "D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [TaskMon] C:\WINDOWS\system32\TaskMon.exe
O9 - Extra button: Web Anti-Virus - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scieplugin.dll
O9 - Extra button: (no name) - {3F686D91-4AFA-4ed1-B43F-F1DB46ED480C} - C:\WINDOWS\system32\shdocvw.dll
O9 - Extra ';Tools'; menuitem: Link Filter - {3F686D91-4AFA-4ed1-B43F-F1DB46ED480C} - C:\WINDOWS\system32\shdocvw.dll
O15 - Trusted Zone: http://www.icbc.com.cn
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=36467&clcid=0x409
O16 - DPF: {9E0B29-563C-4226-86C1-5FF2AE77E1D2} (AxSubmitControl Class) - https://mybank.icbc.com.cn/icbc/perbank/AxSafeControls.cab
O16 - DPF: {FEE1002D-90A5-4A5D-AABE-01803FFBCF7A} (pCastPanel Class) - http://ps.itv.mop.com/dn/files/pCastCtl_1.0.0.84_20060511.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{4E1EFFB6-B080-4591-B577-89E7E115BEFF}: NameServer = 220.189.127.108 220.189.127.107
O17 - HKLM\System\CCS\Services\Tcpip\..\{EA7462D2-8E08-499B-B777-1B28A6EAE92C}: NameServer = 192.168.0.1
O20 - Winlogon Notify: klogon - C:\WINDOWS\system32\klogon.dll
O23 - Service: Kaspersky Anti-Virus 6.0 (AVP) - Unknown owner - D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r (file missing)
O23 - Service: Macromedia Licensing Service - Unknown owner - C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - Unknown owner - %ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini (file missing)
每次都手动结束那个iexplore.exe;所在目录没错;每次我到文件夹改掉名字时,还会马上新建一个iexplore.exe;安全模式下可以改名字,而且开机就没有这个进程了;但是一旦改回来还会自动出现这个进程。我该怎么解决呢?下了N多灰鸽子专杀查不到。安全模式搜索_hook.dll也找不到。
用冰剑和BLACKLIGHT也没发现什么隐藏进程,那个iexplore.exe从来也不隐藏

作者: dymusic    时间: 2006-5-23 07:29     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

2006-05-23,07:12:27 System Repair Engineer 2.0.12.350 (2.0 RC 1) Windows XP Professional Service Pack 2 - 管理权限用户 - 完整功能 以下内容被选中: 所有的启动项目(包括注册表、启动文件夹、服务等) 浏览器加载项 正在运行的进程(包括进程模块信息) 文件关联 启动项目 注册表 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows] <> [HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows] <> [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] <%systemroot%\system32\dumprep 0 -k> [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] <"D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe"> [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows] <> ================================== 启动文件夹 服务 [Kaspersky Anti-Virus 6.0 / AVP] <"D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\avp.exe" -r> [Macromedia Licensing Service / Macromedia Licensing Service] <"C:\Program Files\Common Files\Macromedia Shared\Service\Macromedia Licensing.exe"> [NVIDIA Display Driver Service / NVSvc] [Remote Packet Capture Protocol v.0 (experimental) / rpcapd] <"C:\Program Files\WinPcap\rpcapd.exe" -d -f "C:\Program Files\WinPcap\rpcapd.ini"> ================================== 浏览器加载项 [Web Anti-Virus] {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} [BitCometBar] {3F1ABCDB-A875-46c1-8345-B72A4567E486} [Windows Genuine Advantage Validation Tool] {17492023-C23A-453E-A040-C7C580BBF700} [AxSubmitControl Class] {8D9E0B29-563C-4226-86C1-5FF2AE77E1D2} [Shockwave Flash Object] {D27CDB6E-AE6D-11CF-96B8-444553540000} [pCastPanel Class] {FEE1002D-90A5-4A5D-AABE-01803FFBCF7A} [Web Browser Applet Control] {08B0E5C0-4FCB-11CF-AAA5-00401C608501} [虎翼DIY吧!] {0A00D11E-B1E7-44B5-AD88-C9190876AAC4} [CEnroll Class] {127698E4-E730-4E5C-A2B1-21490A70C8A1} [Windows Media Player] {22D6F312-B0F6-11D0-94AB-0080C74C7E95} [Tabular Data Control] {333C7BC4-460F-11D0-BC04-0080C7055A83} [PSICAAtv Control] {3E6E10ED-B1E4-443B-9F52-4D16E119DC16} [BitCometBar] {3F1ABCDB-A875-46C1-8345-B72A4567E486} [HHCtrl Object] {41B23C28-488E-4E5C-ACE2-BB0BBABE99E8} [WEBChatRoomOCX Control] {448A5F6B-8C03-4B54-A338-F00237C508AD} [HHCtrl Object] {52A2AAAE-085D-4187-97EA-8C30DB990436} [WUWebControl Class] {6414512B-B978-451D-A0D8-FCFDF33E833C} [Microsoft 外壳 UI 帮助程序] {64AB4BB7-111E-11D1-8F79-00C04FC2FBE1} <%SystemRoot%\system32\shdocvw.dll, N/A> [Windows Media Player] {6BF52A52-394A-11D3-B153-00C04F79FAA6} [Active Desktop Mover] {72267F6A-A6F9-11D0-BC94-00C04FB67863} <%SystemRoot%\system32\SHELL32.dll, N/A> [Microsoft Web 浏览器] {8856F961-340A-11D0-A96B-00C04FD705A2} [Microsoft Scriptlet Component] {AE24FDAE-03C6-11D1-8B76-0080C744F389} [SearchAssistantOC] {B45FF030-4447-11D2-85DE-00C04FA35C89} <%SystemRoot%\system32\shdocvw.dll, N/A> [AUDIO__MID Moniker Class] {CD3AFA74-B84F-48F0-9393-7EDC34128127} [AUDIO__X_MS_WMA Moniker Class] {CD3AFA84-B84F-48F0-9393-7EDC34128127} [VIDEO__X_MS_ASF Moniker Class] {CD3AFA8F-B84F-48F0-9393-7EDC34128127} [RealPlayer G2 Control] {CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA} [雅虎邮箱通] {D1B76CE4-CCCA-4B22-9ECB-09F85C140904} [Shockwave Flash Object] {D27CDB6E-AE6D-11CF-96B8-444553540000} [LoginObj Class] {D8FD7701-6A25-48B2-8EFA-4998901A9180} [XML DOM Document 3.0] {F5078F32-C551-11D3-89B9-0000F81FE221} <%SystemRoot%\system32\msxml3.dll, N/A> [pCastPanel Class] {FEE1002D-90A5-4A5D-AABE-01803FFBCF7A} ================================== 正在运行的进程 [PID: 904][\SystemRoot\System32\smss.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 980][\??\C:\WINDOWS\system32\csrss.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 1004][\??\C:\WINDOWS\system32\winlogon.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [C:\WINDOWS\system32\klogon.dll] <6.0.0.299> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 1048][C:\WINDOWS\system32\services.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 1060][C:\WINDOWS\system32\lsass.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 1220][C:\WINDOWS\system32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 1284][C:\WINDOWS\system32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 1408][C:\WINDOWS\System32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 1520][C:\WINDOWS\system32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 1648][C:\WINDOWS\system32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 1920][C:\WINDOWS\system32\spoolsv.exe] <5.1.2600.2696 (xpsp_sp2_gdr.050610-1519)> [C:\WINDOWS\system32\LMPDPMON.DLL] <1.0.0.260> [C:\WINDOWS\system32\lxbgmdm.dll] <1, 0, 9, 0> [C:\WINDOWS\System32\spool\PRTPROCS\W32X86\LMPriNT.DLL] <1.0.0.260> [C:\WINDOWS\system32\LMLayout.DLL] <1.0.0.260> [C:\WINDOWS\System32\spool\PRTPROCS\W32X86\vprproc.dll] <5.00.2195.1620> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 284][C:\WINDOWS\Explorer.EXE] <6.00.2900.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [C:\Program Files\Adobe\Acrobat 7.0\ActiveX\PDFShell.dll] <7.0.0.0> [C:\Program Files\WinRAR\rarext.dll] [d:\Program Files\GlobalSCAPE\CuteFTP ZH\Cuteshell.dll] <50, 6, 3, 2> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\shellex.dll] <6.0.0.299> [PID: 400][D:\Program Files\Iparmor\Iparmor.exe] <5.5.0.0> [D:\Program Files\Iparmor\getportlistxp.dll] <><1, 0, 0, 1> [D:\Program Files\Iparmor\socketinit.dll] [D:\Program Files\Iparmor\hookhookdll.dll] [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 476][C:\WINDOWS\system32\ctfmon.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 712][C:\WINDOWS\system32\svchost.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [D:\Program Files\Iparmor\SocketArmor.dll] [PID: 732][C:\WINDOWS\system32\wdfmgr.exe] <5.2.3790.1230 built by: dnsrv(bld4act)> [PID: 616][C:\WINDOWS\System32\alg.exe] <5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)> [PID: 2840][C:\Program Files\ChinaNet\VnetClient.exe] <><2005, 6, 1, 1> [C:\Program Files\ChinaNet\Communicate.dll] <0><2005, 3, 3, 1> [C:\Program Files\ChinaNet\DialModule.dll] <><2005, 3, 22, 1> [C:\PROGRA~1\ChinaNet\CLIENT~1.DLL] <><2004, 2, 28, 1> [C:\PROGRA~1\ChinaNet\PLUGIN~1.OCX] <><2005, 7, 27, 1> [C:\PROGRA~1\ChinaNet\sign.dll] <0><2004, 12, 1, 1> [C:\PROGRA~1\ChinaNet\WEBPLU~1.DLL] <><2005, 8, 18, 1> [C:\PROGRA~1\ChinaNet\PostPlug.dll] <><2004, 12, 16, 2> [C:\PROGRA~1\ChinaNet\ADVERT~1.OCX] <><2005, 6, 21, 1> [C:\PROGRA~1\ChinaNet\VnetBs.ocx] <><2004, 11, 18, 1> [C:\PROGRA~1\ChinaNet\ACCOUN~2.DLL] <><2005, 8, 11, 1> [C:\PROGRA~1\ChinaNet\AccountMgr.dll] <><2005, 8, 16, 1> [C:\PROGRA~1\ChinaNet\VnetSkin.ocx] <1, 0, 0, 1> [C:\PROGRA~1\ChinaNet\DialogStyle.dll] <><1, 0, 0, 1> [C:\PROGRA~1\ChinaNet\Timer.ocx] <><2005, 8, 4, 1> [C:\PROGRA~1\ChinaNet\PLUGIN~2.OCX] <><2005, 2, 24, 1> [C:\PROGRA~1\ChinaNet\NEWMES~1.DLL] <><2005, 8, 26, 1> [C:\PROGRA~1\ChinaNet\PassCtrl.dll] <><1, 0, 0, 1> [C:\WINDOWS\system32\wpcap.dll] <3, 0, 0, 18> [C:\WINDOWS\system32\pthreadVC.dll] [C:\WINDOWS\system32\packet.dll] <3, 0, 0, 18> [C:\PROGRA~1\ChinaNet\PlugPush.dll] <><2004, 12, 21, 1> [C:\PROGRA~1\ChinaNet\ALLINT~1.DLL] <><2004, 11, 23, 1> [C:\PROGRA~1\ChinaNet\VNetLog.ocx] <><2005, 10, 9, 1> [C:\PROGRA~1\ChinaNet\StatNum.dll] <><2004, 11, 18, 1> [C:\PROGRA~1\ChinaNet\VNETON~1.OCX] <><2005, 3, 2, 1> [C:\PROGRA~1\ChinaNet\ALLFUN~1.DLL] <2005, 8, 26, 1> [C:\PROGRA~1\ChinaNet\VnetOptLog.dll] <><2005, 8, 23, 17> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scr_ch_pg.dll] <1.0.6.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\klscav.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\pr_remote.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\prloader.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\prkernel.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\params.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\pxstub.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\tempfile.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\nfio.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\fsdrvplgn.ppl] <6.0.0.299> [C:\PROGRA~1\ChinaNet\DlgSkin.ocx] <><1, 0, 0, 1> [C:\WINDOWS\system32\Macromed\Flash\Flash8b.ocx] <8,0,24,0> [PID: 3776][D:\Program Files\Maxthon\Maxthon.exe] <1, 5, 1, 39> [D:\Program Files\Maxthon\maxzlib.dll] < ><1, 0, 0, 2> [D:\Program Files\Maxthon\Services\RealTime\real_time.dll] <><1, 0, 0, 1> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\scr_ch_pg.dll] <1.0.6.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\klscav.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\pr_remote.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\prloader.dll] <6.0.0.299> [D:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 6.0\prkernel.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\params.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\pxstub.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\tempfile.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\nfio.ppl] <6.0.0.299> [d:\program files\kaspersky lab\kaspersky anti-virus 6.0\fsdrvplgn.ppl] <6.0.0.299> [C:\WINDOWS\system32\msdmo.dll] [C:\WINDOWS\system32\Macromed\Flash\Flash8b.ocx] <8,0,24,0> [PID: 3816][F:\Downloads\sreng9x\SREng.exe] <2.0.12.350> [D:\Program Files\Iparmor\SocketArmor.dll] ================================== 文件关联 .TXT OK. [%SystemRoot%\system32\NOTEPAD.EXE %1] .EXE OK. ["%1" %*] .COM OK. ["%1" %*] .PIF OK. ["%1" %*] .REG OK. [regedit.exe "%1"] .BAT OK. ["%1" %*] .SCR OK. ["%1" /S] .CHM OK. ["C:\WINDOWS\hh.exe" %1] .HLP OK. [%SystemRoot%\system32\winhlp32.exe %1] .INI OK. [%SystemRoot%\system32\NOTEPAD.EXE %1] .INF OK. [%SystemRoot%\system32\NOTEPAD.EXE %1] .VBS OK. [%SystemRoot%\System32\WScript.exe "%1" %*] .JS OK. [%SystemRoot%\System32\WScript.exe "%1" %*] .LNK OK. [{00021401-0000-0000-C000-000000000046}] ================================== Winsock 提供者 ==================================
作者: 一生逍遥    时间: 2006-5-23 16:41     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

我也遇到了这个问题
我的做法是.....删了这个程序win386.exe
它的位置是windows下的system32文件夹,或者是system里面
我的症状是:上网的时候弹出广告......并经常让机子死掉....
作者: 青蛙    时间: 2006-5-23 17:14     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

安全模式下杀过没
作者: 我是中国人    时间: 2006-5-29 00:18     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

给朋友个建议,把这个程序的名字用百度搜一下试试,以前有个流氓插件就是通过百度的搜索得到卸载的办法的。
作者: bigblock    时间: 2006-5-29 21:59     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

Advanced Process Manipulation
用这个软件看看进程调用的文件
删掉就可以了
作者: lopo1983    时间: 2006-5-30 12:00     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

用冰剑试试
作者: gaojinhd89    时间: 2006-5-31 14:49     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

到安全模式里把它删了就行了!!!!!!~~~~~~
作者: canxinzhu    时间: 2006-6-6 07:48     标题: [求助解答]开机就有iexplore.exe,用了所有杀灰鸽子的着数都无用

你手动结束这个进程!然后到C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temp
这两个文件夹看看有没有iexplore.exe这个文件,有就删掉!




欢迎光临 黑色海岸线论坛 (http://bbs.thysea.com/) Powered by Discuz! 7.2