Смотрите видео ниже, чтобы узнать, как установить наш сайт в качестве веб-приложения на домашнем экране.
Примечание: Эта возможность может быть недоступна в некоторых браузерах.
Добро пожаловать на компьютерный форум Tehnari.ru. Здесь разбираемся с проблемами ПК и ноутбуков: Windows, драйверы, «железо», сборка и апгрейд, софт и безопасность. Форум работает много лет, сейчас он переехал на новый движок, но старые темы и аккаунты мы постарались сохранить максимально аккуратно.
Форум не связан с магазинами и сервисами – мы ничего не продаём и не даём «рекламу под видом совета». Отвечают обычные участники и модераторы, которые следят за порядком и качеством подсказок.
Если вы у нас впервые, загляните на страницу о проекте, чтобы узнать больше. Чтобы создавать темы и писать сообщения, сначала зарегистрируйтесь, а затем войдите под своим логином.
;uVS v4.11.3 [http://dsrt.dyndns.org:8888]
;Target OS: NTv10.0
v400c
OFFSGNSAVE
zoo %SystemDrive%\PROGRAMDATA\WINDOWS\RUTSERV.EXE
addsgn 9204749A556AA5990F89EBE4A7201305258A17AB3217E0877AC0183DBBD6412623947EDF3A559D49A21D0C9B4616467FB6DCE872D85F24282D77F4D052AF2D73 32 Program.RemoteAdmin.753 [DrWeb] 7
zoo %SystemDrive%\PROGRAMDATA\WINDOWSTASK\TRZ4AF3.TMP
addsgn 9252775A1D6AC1CC0B84594E33231995AF8CBA7E8EBD1EA3F0C44EA2D3388D5DF8652EEF3F559D492A5BF198CD08CA1481CE336395DB6B5F26028CA4D985CC8F 8 Trojan.Win32.Autoit.acbae [Kaspersky] 7
chklst
delvir
delall %SystemDrive%\PROGRAMDATA\REALTEKHD\TASKHOST.EXE
delall %SystemDrive%\PROGRAMDATA\REALTEKHD\TASKHOSTW.EXE
deldir %SystemDrive%\PROGRAMDATA\REALTEKHD
deldir %SystemDrive%\PROGRAMDATA\WINDOWSTASK
deldir %SystemDrive%\PROGRAMDATA\WINDOWS
regt 14
regt 27
deltmp
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.41\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.137.99\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.37\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.139.59\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.139.65\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.49\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.133.5\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.29\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.127.15\PSMACHINE_64.DLL
delref %SystemDrive%\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\DAO\DAO360.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.41\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.137.99\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.37\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.139.59\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.139.65\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.49\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.133.5\PSMACHINE.DLL
delref %SystemRoot%\SYSWOW64\MEARJUOY.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.135.29\PSMACHINE.DLL
delref %SystemDrive%\PROGRAM FILES\COMMON FILES\SYSTEM\OLE DB\MSDAORA.DLL
delref %SystemDrive%\PROGRAM FILES (X86)\MICROSOFT\EDGEUPDATE\1.3.127.15\PSMACHINE.DLL
delref G:\SETUP.EXE
apply
czoo
restart
{Перед использованием скрипта убедиться, что в системе не установлены упомянутые в скрипте антивирусы. Автор скрипта: regist}
var
ProgramData, ProgramFiles, ProgramFiles86, fname, OSVer: string;
PD_folders, PF_folders, O_folders, L_SID : TStringList;
i : integer;
procedure FillList;
begin
PD_folders := TStringList.Create;
PD_folders.Add('360TotalSecurity');
PD_folders.Add('360safe');
PD_folders.Add('Avg');
PD_folders.Add('Avira');
PD_folders.Add('Doctor Web');
PD_folders.Add('ESET');
PD_folders.Add('Indus');
PD_folders.Add('Kaspersky Lab Setup Files');
PD_folders.Add('Kaspersky Lab');
PD_folders.Add('McAfee');
PD_folders.Add('Microsoft\Check');
PD_folders.Add('Microsoft\Intel');
PD_folders.Add('Microsoft\temp');
PD_folders.Add('Norton');
PD_folders.Add('RealtekHD');
PD_folders.Add('RunDLL');
PD_folders.Add('Setup');
PD_folders.Add('System32');
PD_folders.Add('Windows');
PD_folders.Add('WindowsTask');
PD_folders.Add('bebca3bc90');
PD_folders.Add('grizzly');
PD_folders.Add('install');
PD_folders.Add('microsoft\clr_optimization_v4.0.30318_64');
PF_folders := TStringList.Create;
PF_folders.Add('360');
PF_folders.Add('AVG');
PF_folders.Add('ByteFence');
PF_folders.Add('COMODO');
PF_folders.Add('Cezurity');
PF_folders.Add('Common Files\McAfee');
PF_folders.Add('ESET');
PF_folders.Add('Enigma Software Group');
PF_folders.Add('GRIZZLY Antivirus');
PF_folders.Add('Internet Explorer\bin');
PF_folders.Add('Kaspersky Lab');
PF_folders.Add('Microsoft JDX');
PF_folders.Add('Panda Security');
PF_folders.Add('RDP Wrapper');
PF_folders.Add('SpyHunter');
O_folders := TStringList.Create;
O_folders.Add(NormalDir('%SYSTEMDRIVE%'+'\AdwCleaner'));
O_folders.Add(NormalDir('%SYSTEMDRIVE%'+'\KVRT_Data'));
O_folders.Add(NormalDir('%SYSTEMDRIVE%'+'\Config.Msi'));
O_folders.Add(NormalDir('%windir%'+'\NetworkDistribution'));
O_folders.Add(NormalDir('%windir%'+'\speechstracing'));
O_folders.Add(NormalDir('%windir%'+'\Fonts\Mysql'));
end;
procedure Del_folders(path:string; AFL : TStringList);
var i : integer;
begin
for i := 0 to AFL.Count - 1 do
begin
fname := NormalDir(path + AFL[i]);
if DirectoryExists(fname) then
begin
AddToLog(fname + ' - Exists');
FSResetSecurity(fname);
QuarantineFileF(fname, '*.exe, *.dll, *.sys, *.bat, *.vbs, *.ps1, *.js*, *.tmp*', true, '', 0, 0);
DeleteFileMask(fname, '*', true);
DeleteDirectory(fname);
end;
end;
end;
procedure Del_c_rdp;
var c_rdp: string;
begin
c_rdp := NormalDir('%SYSTEMDRIVE%'+'\rdp');
if DirectoryExists(NormalDir(c_rdp)) then
begin
AddToLog(c_rdp + ' - Exists');
FSResetSecurity(c_rdp);
QuarantineFileF(c_rdp, '*.exe, *.dll, *.sys, *.bat, *.vbs, *.ps1, *.js*, *.tmp*, *.rar', true, '', 0, 0);
DeleteFile(c_rdp + '..txt');
DeleteFile(c_rdp + 'bat.bat');
DeleteFile(c_rdp + 'pause.bat');
DeleteFile(c_rdp + 'run.vbs');
DeleteFile(c_rdp + 'install.vbs');
DeleteFile(c_rdp + 'fsuc.vbs');
DeleteFile(c_rdp + 'db.rar');
DeleteFile(c_rdp + 'Rar.exe');
DeleteFile(c_rdp + 'RDPWInst.exe');
DeleteFile(c_rdp + 'Privatek.exe');
DeleteDirectory(c_rdp);
end;
end;
procedure DelTasks;
var
i : integer;
L_Tasks : TStringList;
begin
L_Tasks := TStringList.Create;
L_Tasks.Add('Microsoft\Windows\Wininet\Cleaner');
L_Tasks.Add('Microsoft\Windows\Wininet\RealtekHDControl');
L_Tasks.Add('Microsoft\Windows\Wininet\RealtekHDStartUP');
L_Tasks.Add('Microsoft\Windows\Wininet\Taskhost');
L_Tasks.Add('Microsoft\Windows\Wininet\Taskhostw');
for i := 0 to L_Tasks.Count - 1 do
begin
DeleteSchedulerTask(L_Tasks[i]);
end;
L_Tasks.Free;
end;
procedure Del_DisallowRun(SID_Name : string);
const
PolExplKey = '\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\';
DR = 'DisallowRun';
begin
if (RegKeyExists('HKEY_USERS', SID_Name + PolExplKey + DR)) then
begin
AddToLog('HKEY_USERS\' + SID_Name + PolExplKey + DR + ' - Exists');
BackupRegKey('HKEY_USERS', SID_Name + PolExplKey, DR + SID_Name);
RegKeyDel('HKEY_USERS', SID_Name + PolExplKey + DR);
RegKeyParamDel('HKEY_USERS', SID_Name + PolExplKey, DR);
end;
end;
procedure swprv;
begin
ExecuteFile('sc.exe', 'create "swprv" binpath= "%SystemRoot%\System32\svchost.exe -k swprv" type= own start= demand depend= RPCSS', 0, 15000, true);
RegKeyParamDel ('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv', 'wow64');
RegKeyStrParamWrite ('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv', 'Description', '@%SystemRoot%\System32\swprv.dll,-102');
RegKeyStrParamWrite ('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv', 'DisplayName', '@%SystemRoot%\System32\swprv.dll,-103');
RegKeyIntParamWrite ('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv', 'ServiceSidType', '1');
RegKeyParamWrite('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv\Parameters', 'ServiceDll', 'REG_EXPAND_SZ', '%Systemroot%\System32\swprv.dll');
OSVer := RegKeyStrParamRead('HKLM','SOFTWARE\Microsoft\Windows NT\CurrentVersion','CurrentVersion');
if OSVer > '6.1' then RegKeyIntParamWrite ('HKLM', 'SYSTEM\CurrentControlSet\Services\swprv\Parameters', 'ServiceDllUnloadOnStop', '1');;
ExecuteFile('sc.exe', 'privs "swprv" SeBackupPrivilege/SeChangeNotifyPrivilege/SeCreateGlobalPrivilege/SeCreatePermanentPrivilege/SeImpersonatePrivilege/SeManageVolumePrivilege/SeRestorePrivilege/SeIncreaseBasePriorityPrivilege/SeManageVolumePrivilege/SeRestorePrivilege/SeTcbPrivilege', 0, 15000, true);
ExecuteFile('net.exe', 'start "swprv"', 0, 15000, true);
end;
procedure AV_block_remove;
begin
clearlog;
if GetAVZVersion < 5.14 then begin
ShowMessage('Пожалуйста, используйте актуальную версию AVZ, например, из папки AutoLogger-а.'+#13#10+'Please use actual AVZ version, for example from AutoLogger’s folder.');
AddToLog('Текущая версия - '+FormatFloat('#0.00', GetAVZVersion));
exitAVZ;
end;
StopService('RManService');
FillList;
ProgramData := GetEnvironmentVariable('ProgramData') + '\';
ProgramFiles := NormalDir('%PF%');
ProgramFiles86 := NormalDir('%PF% (x86)');
Del_folders(ProgramData, PD_folders);
Del_folders(ProgramFiles, PF_folders);
Del_folders(ProgramFiles86, PF_folders);
Del_folders('', O_folders);
Del_c_rdp;
PD_folders.Free;
PF_folders.Free;
O_folders.Free;
if FileExists (ProgramData + 'RDPWinst.exe') then DeleteFile(ProgramData + 'RDPWinst.exe');
if FileExists ('%windir%'+'\WrpYGF74DrEm.ini') then DeleteFile('%windir%'+'\WrpYGF74DrEm.ini');
L_SID := TStringList.Create;
RegKeyEnumKey('HKEY_USERS', '\', L_SID);
for i:= 0 to L_SID.Count-1 do
Del_DisallowRun(L_SID[i]);
L_SID.Free;
DelTasks;
DeleteService('RManService', true);
RegKeyParamWrite('HKLM', 'SYSTEM\CurrentControlSet\services\TermService\Parameters', 'ServiceDll', 'REG_EXPAND_SZ', '%SystemRoot%\System32\termsrv.dll');
swprv;
BackupRegKey('HKLM', 'System\Remote Manipulator System', 'RMS');
RegKeyDel('HKLM', 'System\Remote Manipulator System');
ExecuteFile('netsh.exe', 'advfirewall firewall delete rule name="allow RDP" protocol=tcp localport=3389', 0, 15000, true);
ExecuteFile('netsh.exe', 'advfirewall firewall delete rule name="Port Blocking" protocol=tcp localport=445', 0, 15000, true);
ExecuteFile('netsh.exe', 'advfirewall firewall delete rule name="Port Blocking" protocol=udp localport=445', 0, 15000, true);
ExecuteFile('netsh.exe', 'advfirewall firewall delete rule name="Port Blocking" protocol=tcp localport=139', 0, 15000, true);
ExecuteFile('netsh.exe', 'advfirewall firewall delete rule name="Port Blocking" protocol=udp localport=139', 0, 15000, true);
ExecuteFile('net.exe', 'user john /delete', 0, 15000, true);
SaveLog(GetAVZDirectory +'AV_block_remove.log');
ExecuteSysClean;
end;
begin
AV_block_remove;
RebootWindows(false);
end.
Start::
CreateRestorePoint:
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer: [DisallowRun] 1
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [1] eav_trial_rus.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [2] avast_free_antivirus_setup_online.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [3] eis_trial_rus.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [4] essf_trial_rus.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [5] hitmanpro_x64.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [6] ESETOnlineScanner_UKR.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [7] ESETOnlineScanner_RUS.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [8] HitmanPro.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [9] 360TS_Setup_Mini.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [10] Cezurity_Scanner_Pro_Free.exe
HKU\S-1-5-21-3133622970-3452906757-2152561406-1001\...\Policies\Explorer\DisallowRun: [11] Cube.exe
HKLM\SOFTWARE\Policies\Google: Restriction <==== ATTENTION
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\rdp
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\RunDLL
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\Norton
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\McAfee
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\Kaspersky Lab Setup Files
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\Kaspersky Lab
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\install
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\grizzly
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\ESET
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\Doctor Web
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\ProgramData\360safe
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\SpyHunter
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\RDP Wrapper
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\Kaspersky Lab
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\ESET
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\Enigma Software Group
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\COMODO
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\Common Files\McAfee
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\Cezurity
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\ByteFence
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files\AVG
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\SpyHunter
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\Panda Security
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\Microsoft JDX
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\Kaspersky Lab
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\GRIZZLY Antivirus
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\Cezurity
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\AVG
2021-01-22 20:19 - 2021-01-22 20:32 - 000000000 __SHD C:\ProgramData\Setup
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\Program Files (x86)\360
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 __SHD C:\KVRT_Data
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 ____D C:\WINDOWS\speechstracing
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 ____D C:\ProgramData\System32
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 ____D C:\ProgramData\MB3Install
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 ____D C:\ProgramData\Indus
2021-01-22 20:19 - 2021-01-22 20:19 - 000000000 ____D C:\ProgramData\Avira
2021-01-22 20:19 - 2021-01-22 20:19 - 000116736 ___SH (Stas'M Corp.) [File not signed] c:\program files\rdp wrapper\rdpwrap.dll
R2 TermService; C:\Program Files\RDP Wrapper\rdpwrap.dll [116736 2021-01-22] (Stas'M Corp.) [File not signed] <==== ATTENTION (no ServiceDLL)
C:\Program Files\RDP Wrapper
CMD: net user john /DELETE
Unlock: C:\Program Files\Malwarebytes
Unlock: C:\Program Files (x86)\AVAST Software
CMD: attrib -R -S -H /D "C:\Program Files\Malwarebytes"
CMD: attrib -R -S -H /D "C:\Program Files (x86)\AVAST Software"
ExportKey: HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions
FirewallRules: [{7F0748ED-BADA-4826-B402-120BEF8BBC87}] => (Block) LPort=445
FirewallRules: [{6C46AEC5-8138-42DC-9F97-C97932A8D81D}] => (Block) LPort=445
FirewallRules: [{611F11D3-C528-4B8D-8CEA-672725899156}] => (Block) LPort=139
FirewallRules: [{D882032F-4450-4AEA-9711-AF5549E18309}] => (Block) LPort=139
FirewallRules: [{92CF1723-B71B-4EA4-B2A8-9BA770132778}] => (Allow) LPort=3389
FirewallRules: [{677F7D8C-673E-486B-80EA-0CAD030C5A27}] => (Allow) LPort=3389
Reboot:
End::