Смотрите видео ниже, чтобы узнать, как установить наш сайт в качестве веб-приложения на домашнем экране.
Примечание: Эта возможность может быть недоступна в некоторых браузерах.
Не уверен =(Удачи!
Check Browsers' LNK by Alex Dragokas & regist ver. 2.2.0.36
OS: x64 Windows 10 (Pro), 10.0.19043.1288 (ReleaseId: 2009), Service Pack: 0 ( SingleUserTS / Workstation )
Time: 10.11.2021 - 15:02
Language: OS: Russian (0x419). Display: Russian (0x419). Non-Unicode: Russian (0x419). Codepage: OEM - c_866.nls (not Valid! MD5:D6CFE30D6FE21C36A26B9C02266F04F8), ANSI - c_1251.nls (not Valid! MD5:715E0BD7BE8D2AB482F1EF7D7E125F23)
Elevated: Yes
User: Admin (group: Administrator) on DESKTOP-QQEDEGI
* Подозрительные объекты будут отмечены префиксом >>>
[=========================================================================]
(((((( Прочие ярлыки ))))))
===========================================================================
[___________________ Подозрительные ( низкий риск ) ____________________]
-[script] "C:\Users\Admin\Downloads\Dr.Web 6 Portable Scanner by HA3APET v14 (2)\Dr.Web 6 Portable Scanner by HA3APET v14\Update.lnk" -> ["C:\Windows\system32\cmd.exe" =>> /C ".\prog\nircmd.exe" elevatecmd execmd start .\prog\update.bat] -> ( NIRCMD.EXE не существует )
-[script] "C:\Users\Admin\Desktop\Google Docs.lnk" -> ["C:\Program Files\Google\Drive File Stream\launch.bat" =>> -open_gdocs_root] -> @echo off¶ ¶ rem Launcher script for GoogleDriveFS.exe that looks up the latest¶ rem GoogleDriveFS.exe and runs it with the same arguments as the script.¶ rem Convenient to use as a target for Windows shortcuts.¶ ¶ rem Use '!' instead of '%' for variable names.¶ setlocal EnableDelayedExpansion¶ ¶ re (1544 байт.) (cp: 20127) (MD5:BAE0B80B54C4791BEDBFB44B5C064F17)
-[script] "C:\Users\Admin\Desktop\Google Sheets.lnk" -> ["C:\Program Files\Google\Drive File Stream\launch.bat" =>> -open_gsheets_root] -> @echo off¶ ¶ rem Launcher script for GoogleDriveFS.exe that looks up the latest¶ rem GoogleDriveFS.exe and runs it with the same arguments as the script.¶ rem Convenient to use as a target for Windows shortcuts.¶ ¶ rem Use '!' instead of '%' for variable names.¶ setlocal EnableDelayedExpansion¶ ¶ re (1544 байт.) (cp: 20127) (MD5:BAE0B80B54C4791BEDBFB44B5C064F17)
-[script] "C:\Users\Admin\Desktop\Google Slides.lnk" -> ["C:\Program Files\Google\Drive File Stream\launch.bat" =>> -open_gslides_root] -> @echo off¶ ¶ rem Launcher script for GoogleDriveFS.exe that looks up the latest¶ rem GoogleDriveFS.exe and runs it with the same arguments as the script.¶ rem Convenient to use as a target for Windows shortcuts.¶ ¶ rem Use '!' instead of '%' for variable names.¶ setlocal EnableDelayedExpansion¶ ¶ re (1544 байт.) (cp: 20127) (MD5:BAE0B80B54C4791BEDBFB44B5C064F17)
-[HTTP] "C:\Users\Admin\Downloads\Compressed\Foxit PDF Editor 11.1.0.52543 Pro Portable RSLOAD.NET\Foxit PDF Editor 11.1.0.52543 Pro Portable RSLOAD.NET\Foxit PDF Editor\App\AppInfo\Made by RsLoad.net.lnk" -> ["(Internet Explorer)" =>> hxxps://rsload.net/]
-[CMD] "C:\Users\Admin\Downloads\Dr.Web 6 Portable Scanner by HA3APET v14 (2)\Dr.Web 6 Portable Scanner by HA3APET v14\Scanner.lnk" -> ["C:\Windows\system32\cmd.exe" =>> /C if exist ".\drweb\drweb32w.exe" start "" /D".\drweb" "drweb32w.exe" /LNG:"ru-drweb.dwl"]
[_________________________ Цель не существует __________________________]
>>> "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Origin\Средство отправки отчетов об ошибках Origin.lnk" -> ["C:\Program Files (x86)\Origin\OriginER.exe"]
>>> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk" -> ["C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"]
[=========================================================================]
(((((( Интернет-ярлыки ))))))
===========================================================================
- "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GridinSoft Anti-Malware\Documentation.url" -> hxxps://gridinsoft.com/antimalware/UsersGuide.pdf
[_________________________ Другие протоколы __________________________]
- "C:\Users\Admin\Desktop\Grim Dawn.url" -> steam://rungameid/219990
- "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Steam\Grim Dawn.url" -> steam://rungameid/219990
- "C:\Users\Admin\Desktop\Battle Realms Zen Edition.url" -> steam://rungameid/1025600
- "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Steam\Battle Realms Zen Edition.url" -> steam://rungameid/1025600
- "C:\Users\Admin\OneDrive\Личное хранилище.lnk" -> odopen://unlockVault/?accounttype=personal
[________________ Браузер по-умолчанию _______________]
- http = C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --single-argument %1 (Microsoft Edge)
- https = C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --single-argument %1 (Microsoft Edge)
- ftp = C:\Program Files\Google\Chrome\Application\chrome.exe --single-argument %1 (Google Chrome)
- .htm = C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --single-argument %1 (Microsoft Edge)
- .html = C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe --single-argument %1 (Microsoft Edge)
[____________________ Статистика ___________________]
Найдено угроз: 2
Режим запуска: /lang ru /savelog . /silent /timeout 285
Перечислено файлов: 383074 (папок: 108672, ярлыков: 178)
Затрачено времени: 4 сек. (поиск: 4 сек., анализ: 0 сек.; engine: MFT)
Проверены:
C:\Users\Admin
C:\Users\Default
C:\Users\Public
C:\ProgramData
______________________________ Конец лога ________________________________11568 bytes, CRC32: FFFFFFFF. Sign: 촨嘤