Hi qinkai,

The removal instruction for the first-mentioned trojan are as follows:
Technical details

This Trojan is a modified Windows %System%\drivers\etc\hosts file, which is used to translate domain names (DNS) to IP addresses. The modified file is 1240 bytes in size. The file is modified in such a way as to prevent the user from viewing the sites listed below.

The following strings are added to the hosts file:
127.0.0.1 cn.47555.cn
127.0.0.1 new3.etsoft.com.cn
127.0.0.1 new3.etsoft.com
127.0.0.1 etsoft.com
127.0.0.1 wl.etsoft.com.cn
127.0.0.1 wl.etsoft.com
127.0.0.1 down.jschina.com.cn
127.0.0.1 down.jschina.com
127.0.0.1 jschina.com
127.0.0.1 wow.etsoft.com.cn
127.0.0.1 wow.etsoft.com
127.0.0.1 new3.etsoft.com.cn
127.0.0.1 new3.etsoft.com
127.0.0.1 sw.etsoft.com.cn
127.0.0.1 mh.etsoft.com.cn
127.0.0.1 wool.etsoft.com.cn
127.0.0.1 zt.soft.com.cn
127.0.0.1 www.gaodumm.com

These modifications mean that all requests to the servers listed above will be blocked.

This is the result of the activity of another malicious program.
Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Modify the %System%\drivers\etc\hosts file using any standard application (e.g. Notepad). Delete the strings added by the Trojan. The original hosts file has the following contents:

    Copyright (c) 1993-1999 Microsoft Corp.

    This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

    This file contains the mappings of IP addresses to host names. Each

    entry should be kept on an individual line. The IP address should

    be placed in the first column followed by the corresponding host name.

    The IP address and the host name should be separated by at least one

    space.

    Additionally, comments (such as these) may be inserted on individual

    lines or following the machine name denoted by a ‘#’ symbol.

    For example:

    102.54.94.97 rhino.acme.com # source server

    38.25.63.10 x.acme.com # x client host

    127.0.0.1 localhost
    ====================================
    a removal tool for the second trojan can be downloaded from here:
    http://www.gdata.pl/kmdownload/download.php?op=getit&id=61

polonus