Шевченко Иван
Постоянный участник
- Сообщения
- 116
- Реакции
- 0
Смотрите видео ниже, чтобы узнать, как установить наш сайт в качестве веб-приложения на домашнем экране.
Примечание: Эта возможность может быть недоступна в некоторых браузерах.
begin
ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.'+#13#10+'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.');
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
SearchRootkit(true, true);
SetAVZGuardStatus(True);
TerminateProcessByName('c:\docume~1\veronika\locals~1\temp\x30811.exe');
TerminateProcessByName('c:\documents and settings\veronika\application data\fgnsnx.exe');
QuarantineFile('C:\Program Files\Common Files\System\taskmger.exe','');
QuarantineFile('c:\docume~1\veronika\locals~1\temp\x30811.exe','');
QuarantineFile('c:\documents and settings\veronika\application data\fgnsnx.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\1A.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\13.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\11.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\14.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\2D.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\12.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\10.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\F.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\E.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\C.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\B.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\9.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\8.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\6.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\5.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\D.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\A.exe','');
DeleteFile('c:\docume~1\veronika\locals~1\temp\x30811.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\Fgnsnx.exe');
DeleteFile('C:\Program Files\Common Files\System\taskmger.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\1A.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\13.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\11.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\14.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\2D.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\12.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\10.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\F.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\E.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\C.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\B.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\9.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\8.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\6.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\5.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\D.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\A.exe');
RegKeyParamDel('HKEY_CURRENT_USER','Software\Microsoft\Windows\CurrentVersion\Run','Fgnsnx');
RegKeyParamDel('HKEY_LOCAL_MACHINE','Software\Microsoft\Windows\CurrentVersion\Run','Windows Update');
RegKeyParamDel('HKLM', 'system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list', 'C:\Program Files\Common Files\System\taskmger.exe');
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
ExecuteWizard('SCU',2,3,true);
RebootWindows(true);
end.
begin
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
end.
begin
ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.'+#13#10+'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.');
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
SearchRootkit(true, true);
SetAVZGuardStatus(True);
QuarantineFile('c:\documents and settings\veronika\application data\fgnsnx.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\4.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\5.exe','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\7.tmp','');
QuarantineFile('C:\Documents and Settings\Veronika\Application Data\A.exe','');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\Fgnsnx.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\4.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\7.tmp');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\5.exe');
DeleteFile('C:\Documents and Settings\Veronika\Application Data\A.exe');
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
ExecuteWizard('SCU',2,3,true);
RebootWindows(true);
end.
begin
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
end.
его вручную удалить? или это какой вирус был?c:\documents and settings\veronika\application data\fgnsnx.exe - Trojan.Winlock.2876
его вручную удалить? или это какой вирус был?
Зараженные ключи в реестре:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DRM\amty (Worm.Autorun) -> No action taken.
Зараженные параметры в реестре:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\ForceClassicControlPanel (Hijack.ControlPanelStyle) -> Value: ForceClassicControlPanel -> No action taken.
Зараженные файлы:
c:\documents and settings\Veronika\application data\5.tmp (Trojan.EnoV.Gen) -> No action taken.
c:\documents and settings\Veronika\application data\7.exe (Trojan.BCMiner) -> No action taken.
c:\documents and settings\Veronika\application data\A.tmp (Trojan.EnoV.Gen) -> No action taken.
c:\documents and settings\Veronika\start menu\Programs\Startup\stepx2.exe (Trojan.BCMiner) -> No action taken.
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)