Здраствуйте. При включении ПК не запускался explorer.exe (была видна только обоина). Прошелся нодом - теперь запускается, но тормозит комп. Подозрение что не все вирусы удалил.
Здраствуйте. При включении ПК не запускался explorer.exe (была видна только обоина). Прошелся нодом - теперь запускается, но тормозит комп. Подозрение что не все вирусы удалил.
Уважаемый(ая) Ipkis, спасибо за обращение на наш форум!
Удаление вирусов - абсолютно бесплатная услуга на VirusInfo.Info. Хелперы, в самое ближайшее время, ответят на Ваш запрос. Для оказания помощи необходимо предоставить логи сканирования утилитами АВЗ и HiJackThis, подробнее можно прочитать в правилах оформления запроса о помощи.
Если наш сайт окажется полезен Вам и у Вас будет такая возможность - пожалуйста поддержите проект.
avz.exe запакуйте с паролем virus и пришлите по красной ссылке Прислать запрошенный карантин вверху темы
Выполните скрипт в AVZ
Компьютер перезагрузится.Код:begin ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.' + #13#10 + 'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.'); ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true); SearchRootkit(true, true); SetAVZGuardStatus(True); QuarantineFile('C:\Documents and Settings\Admin\Application Data\FAA.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\F8.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\E8.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\E3.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\D0.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\CA.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\C0.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\AB.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\A0.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\9E.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\9D.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\9C.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\9B.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\94.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\83.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\7E.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\77.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\70.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\6D.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\64.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\63.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\56.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\54.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\48.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\47D.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\47.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\44.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\43.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\42.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\3D.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\3C.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\3B.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\34.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\2EDB.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\2D.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\2B1.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\2AE.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\21A.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\207.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\1B5.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\1A2.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\19E.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\1968.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\171.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\14B.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\147.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\145.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\129.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\123.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\122.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\119.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\108.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\1071.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\100C.exe',''); QuarantineFile('C:\Program Files\btljfysv\jadvoqal.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\regsrv32.exe',''); QuarantineFile('C:\Documents and Settings\Admin\Application Data\Zqemel.exe',''); DeleteFile('C:\Documents and Settings\Admin\Application Data\Zqemel.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\regsrv32.exe'); DeleteFile('C:\Program Files\btljfysv\jadvoqal.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\100C.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\1071.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\108.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\119.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\122.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\123.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\129.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\145.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\147.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\14B.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\171.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\1968.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\19E.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\1A2.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\1B5.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\207.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\21A.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\2AE.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\2B1.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\2D.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\2EDB.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\34.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\3B.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\3C.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\3D.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\42.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\43.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\44.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\47.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\47D.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\48.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\54.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\56.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\63.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\64.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\6D.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\70.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\77.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\7E.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\83.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\94.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\9B.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\9C.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\9D.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\9E.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\A0.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\AB.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\C0.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\CA.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\D0.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\E3.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\E8.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\F8.exe'); DeleteFile('C:\Documents and Settings\Admin\Application Data\FAA.exe'); BC_ImportAll; ExecuteSysClean; BC_Activate; RebootWindows(true); end.
Пришлите карантин согласно Приложения 3 правил по красной ссылке Прислать запрошенный карантин вверху темы
Сделайте новые логи
Microsoft MVP 2012-2016 Consumer Security
Microsoft MVP 2016 ReconnectАнтивирусная помощь
готово сделал
Товарищи, проверьте может я чтото не так сделал? или уже всё?
Сделайте лог полного сканирования МВАМ
Microsoft MVP 2012-2016 Consumer Security
Microsoft MVP 2016 ReconnectАнтивирусная помощь
Статистика проведенного лечения:
- Получено карантинов: 2
- Обработано файлов: 169
- В ходе лечения обнаружены вредоносные программы:
- c:\\documents and settings\\admin\\application data\\ab.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\a0.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\ca.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\c0.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\d0.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\e3.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\e8.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\faa.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\f8.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\1a2.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\1b5.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\100c.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\1071.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\108.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\119.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\122.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\123.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\129.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\14b.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\145.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\147.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\171.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\19e.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\1968.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\2ae.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\2b1.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\2d.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\2edb.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\207.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\21a.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\3b.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\3c.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\3d.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\34.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\42.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\43.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\44.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\47d.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\47.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\48.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\54.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\56.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\6d.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\63.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\64.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\7e.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\70.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\77.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\83.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\9b.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\9c.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\9d.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\9e.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
- c:\\documents and settings\\admin\\application data\\94.exe - Trojan.BAT.Miner.i ( DrWEB: archive: archive: Tool.BtcMine.8, BitDefender: Backdoor.Bot.149730, AVAST4: Win32:IRCBot-EIY [Trj] )
Уважаемый(ая) Ipkis, наши специалисты оказали Вам всю возможную помощь по вашему обращению.
В целях поддержания безопасности вашего компьютера настоятельно рекомендуем:
Чтобы всегда быть в курсе актуальных угроз в области информационной безопасности и сохранять свой компьютер защищенным, рекомендуем следить за последними новостями ИТ-сферы портала Anti-Malware.ru:
Надеемся больше никогда не увидеть ваш компьютер зараженным!
Если Вас не затруднит, пополните пожалуйста нашу базу безопасных файлов.