1.Профиксите в HijackThis
Код:
R1 - HKCU\Software\Microsoft\Internet Explorer,SearchURL = http://yandex.ru/yandsearch?clid=123046&text=%s
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = play4free.org
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://yandex.ru/yandsearch?clid=123044
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = play4free.org
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.smaxi.net
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.smaxi.net
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O9 - Extra button: (no name) - {8DAE90AD-4583-4977-9DD4-4360F7A45C74} - (no file)
O20 - Winlogon Notify: WinCtrl32 - WinCtrl32.dll (file missing)
2. Выполните скрипт в AVZ
Код:
procedure WhatService(AServiceName : string);
var
dllname, servicekey : string;
begin
servicekey := 'SYSTEM\CurrentControlSet\Services\'+AServiceName;
RegKeyResetSecurity( 'HKLM', servicekey);
RegKeyResetSecurity( 'HKLM', servicekey+'\Parameters');
AddToLog('Description: '+RegKeyStrParamRead( 'HKLM', servicekey, 'Description'));
AddToLog('DisplayName: '+RegKeyStrParamRead( 'HKLM', servicekey, 'DisplayName'));
AddToLog('ImagePath: '+RegKeyStrParamRead( 'HKLM', servicekey, 'ImagePath'));
dllname := RegKeyStrParamRead( 'HKLM', servicekey+'\Parameters', 'ServiceDll');
AddToLog('ServiceDll: '+dllname);
QuarantineFile(dllname,'');
end;
begin
SearchRootkit(true, true);
SetAVZGuardStatus(True);
WhatService('hdsaqnua');
WhatService('urlrfqmyd');
QuarantineFile('E:\WINDOWS\system32\inetres.dll','');
QuarantineFile('E:\autorun.inf','');
QuarantineFile('E:\WINDOWS\system32\d3dgearload.dll','');
QuarantineFile('E:\WINDOWS\System32\Drivers\Winah52.sys','');
QuarantineFile('E:\WINDOWS\System32\Drivers\Winah84.sys','');
QuarantineFile('E:\WINDOWS\System32\Drivers\Winhn28.sys','');
QuarantineFile('E:\WINDOWS\System32\Drivers\Winkq41.sys','');
QuarantineFile('E:\WINDOWS\System32\Drivers\Winnv28.sys','');
DeleteService('Winhn28');
DeleteService('Winah84');
BC_DeleteSvc('BrowserHTTPFilter');
BC_DeleteSvc('BrowserHTTPFilteraspnet_state');
BC_DeleteSvc('CiSvcose');
BC_DeleteSvc('ClipSrvNetman');
BC_DeleteSvc('ClipSrvNetmanERSvc');
BC_DeleteSvc('ClipSrvNetmanERSvcBrowserHTTPFilter');
BC_DeleteSvc('ClipSrvNetmansrserviceIrmon');
BC_DeleteSvc('CryptSvcVSSMSDTC');
BC_DeleteSvc('CryptSvcVSSMSDTCSENS');
BC_DeleteSvc('DcomLaunchPlugPlayupnphostFastUserSwitchingCompatibilityCiSvcNtLmSsp');
BC_DeleteSvc('DcomLaunchpr2ajzsb');
BC_DeleteSvc('DcomLaunchpr2ajzsbUPS');
BC_DeleteSvc('DnscacheNtLmSsp');
BC_DeleteSvc('FastUserSwitchingCompatibilityupnphost');
BC_DeleteSvc('FastUserSwitchingCompatibilityupnphostNVSvcUMWdfTermServicedmserverSpooler');
BC_DeleteSvc('gusvcMessengerdmadmin');
BC_DeleteSvc('helpsvcTrkWks');
BC_DeleteSvc('HTTPFilterxmlprovmnmsrvcRpcSs');
BC_DeleteSvc('ImapiServiceAlerter');
BC_DeleteSvc('LmHostsPlugPlayupnphostFastUserSwitchingCompatibilityCiSvcNetDDEMSIServer');
BC_DeleteSvc('Messengerdmadmin');
BC_DeleteSvc('MessengerWebClient');
BC_DeleteSvc('mnmsrvcRpcSs');
BC_DeleteSvc('NetDDEdmadmin');
BC_DeleteSvc('NetDDEdmadminMSIServer');
BC_DeleteSvc('NetDDEdmadminxmlprovwuauserv');
BC_DeleteSvc('NetDDEMSIServerMSDTC');
BC_DeleteSvc('NlaMSIServer');
BC_DeleteSvc('NtmsSvcSCardSvr');
BC_DeleteSvc('NVSvcUMWdf');
BC_DeleteSvc('NVSvcUMWdfTermService');
BC_DeleteSvc('NVSvcUMWdfTermServicedmserver');
BC_DeleteSvc('PlugPlayupnphostFastUserSwitchingCompatibility');
BC_DeleteSvc('PlugPlayupnphostFastUserSwitchingCompatibilityCiSvc');
BC_DeleteSvc('PlugPlayupnphostFastUserSwitchingCompatibilityCiSvcNtLmSsp');
BC_DeleteSvc('PlugPlayupnphostFastUserSwitchingCompatibilitySCardSvrNlaMSIServer');
BC_DeleteSvc('PlugPlayupnphostFastUserSwitchingCompatibilitySCardSvrNlaMSIServeridsvc');
BC_DeleteSvc('PlugPlaywinmgmt');
BC_DeleteSvc('ProtectedStorageNetDDEdmadmin');
BC_DeleteSvc('ProtectedStorageSysmonLog');
BC_DeleteSvc('RasAutoLmHosts');
BC_DeleteSvc('RDSessMgrpr2ajzsb');
BC_DeleteSvc('RDSessMgrpr2ajzsbSharedAccess');
BC_DeleteSvc('RDSessMgrpr2ajzsbSharedAccessAppMgmtPlugPlayupnphostFastUserSwitchingCompatibilityCiSvc');
BC_DeleteSvc('RemoteAccessMessengerdmadmin');
BC_DeleteSvc('RpcSsAVP');
BC_DeleteSvc('RSVPBrowser');
BC_DeleteSvc('RSVPBrowserDcomLaunchpr2ajzsb');
BC_DeleteSvc('RSVPSysmonLog');
BC_DeleteSvc('RSVPUPSNetDDEdsdm');
BC_DeleteSvc('srserviceIrmon');
BC_DeleteSvc('SysmonLogMessengerWebClient');
BC_DeleteSvc('TlntSvrSSDPSRV');
BC_DeleteSvc('upnphostFastUserSwitchingCompatibility');
BC_DeleteSvc('UPSNetDDEdsdm');
BC_DeleteSvc('WmdmPmSNImapiService');
BC_DeleteSvc('wuauservTlntSvr');
BC_DeleteSvc('WZCSVCgupdate1c8fb5e8314128c');
BC_DeleteSvc('xmlprovmnmsrvcRpcSs');
BC_DeleteSvc('xmlprovose');
BC_DeleteSvc('xmlprovVSS');
BC_DeleteSvc('xmlprovwuauserv');
DeleteFile('E:\WINDOWS\System32\Drivers\Winnv28.sys');
DeleteFile('E:\WINDOWS\System32\Drivers\Winkq41.sys');
DeleteFile('E:\WINDOWS\System32\Drivers\Winhn28.sys');
DeleteFile('E:\WINDOWS\System32\Drivers\Winah84.sys');
DeleteFile('E:\WINDOWS\System32\Drivers\Winah52.sys');
DeleteFile('E:\autorun.inf');
BC_ImportAll;
ExecuteSysClean;
ExecuteWizard('TSW', 2, 2, true);
ExecuteWizard('SCU', 2, 2, true);
BC_Activate;
SaveLog(GetAVZDirectory+'urlrfqmyd.log');
RebootWindows(true);
end.
После перезагрузки:
- выполните такой скрипт
Код:
begin
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
end.
- Файл quarantine.zip из папки AVZ загрузите по ссылке Прислать запрошенный карантин вверху темы
- Сделайте повторные логи по правилам п.2 и 3 раздела Диагностика.(virusinfo_syscheck.zip;hijackthis.log)
- файл urlrfqmyd.log прикрепите к сообщению