Search for msinfo. dll in the registry.
Delete the subkeys that contain this field
Restart the machine
In fact, this thing is hidden
C: \ Program Files \ common files \ microsoft shared \ msinfo
Under this folder, note that it is a hidden system file (the virus writer is abnormal and put the file here)
You can use ultraedit to open msinfo. dll and you will find the temp2.inf string in it.
It creates the temp2.inf file under c: \ windows \ system32. The content of the file is two URLs.
After the machine is restarted, delete the DLL and temp2.inf to clear the buffer and history of IE (I used Filemon to find that it is constantly creating temp2.inf and writing files to the cache folder of IE)
I used unlocker to unlock it and then deleted it directly.
You can simply remove them using Kaspersky. I can use Microsoft's Anti-Spyware antispyware, and I will always go out. Later I can't delete it in security mode. Finally I can use this software to stop msinfo. dll.
Haha. Finally. It's really stubborn. In "safe mode with command line", I first modify its attributes (in normal mode, it cannot be modified, and access is denied), and use the attrib-s-h msinfo command. DLL hey, it succeeded. Delete it with Del. Then return to normal mode and delete all files containing c: \ Program Files \ common files \ microsoft shared \ msinfo in the registry. DLL key, and then clear the buffer and history of IE. Ha, it seems that the alarm is not there.