Помогите исправить. После Nechta некоторые exe файлы потеряли свои иконки и не запускаются с сообщением "Версия этого файла несовместима и используемой версией Windows"
Помогите исправить. После Nechta некоторые exe файлы потеряли свои иконки и не запускаются с сообщением "Версия этого файла несовместима и используемой версией Windows"
Пролечил Dr.Web Cure It! и Malwarebytes.
В реестре exefile стер то что дописал вирус. Половина exe файлов запускаются нормально, половина утратили свои иконки и не запускаются.
[ATTACH=CONFIG]685517[/ATTACH]
AVZ Log
[QUOTE]Attention !!! Database was last updated 01.03.2016 it is necessary to update the database (via File - Database update)AVZ Antiviral Toolkit log; AVZ version is 4.46
Scanning started at 02.08.2021 12:12:35
Database loaded: signatures - 297570, NN profile(s) - 2, malware removal microprograms - 56, signature database released 01.03.2016 12:37
Heuristic microprograms loaded: 412
PVS microprograms loaded: 9
Digital signatures of system files loaded: 790760
Heuristic analyzer mode: Medium heuristics mode
Malware removal mode: disabled
Windows version is: 6.1.7601, Service Pack 1 "Windows 7 Professional", install date 17.03.2021 14:46:26 ; AVZ is run with administrator rights (+)
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
Analysis: kernel32.dll, export table found in section .text
Analysis: ntdll.dll, export table found in section .text
Analysis: user32.dll, export table found in section .text
Analysis: advapi32.dll, export table found in section .text
Analysis: ws2_32.dll, export table found in section .text
Analysis: wininet.dll, export table found in section .text
Analysis: rasapi32.dll, export table found in section .text
Analysis: urlmon.dll, export table found in section .text
Analysis: netapi32.dll, export table found in section .text
1.4 Searching for masking processes and drivers
Checking not performed: extended monitoring driver (AVZPM) is not installed
2. Scanning RAM
Number of processes found: 5
Number of modules loaded: 141
Scanning RAM - complete
3. Scanning disks
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\1bf9044e-50ff-480f-83d8-3854fc0449a3.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\308195f7-7318-48ba-bc7b-ef3b2e123ec1.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\369fd8e3-f87e-426f-ad10-37ca7e1f4463.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\36aebb91-4188-4c2c-b653-c7829f08d20a.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\868a2d23-16d0-4d78-98a1-9101930cd253.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\a75b52cb-8ca1-45fa-864e-acfc1a007f89.tmp
Direct reading: C:\Users\Sviat123\AppData\Local\Temp\e62a1f13-4dd8-48c5-aea6-28fd42523f59.tmp
C:\Windows\Installer\$PatchCache$\Managed\7FA53761D8D11863495A5C876AE18C23\4.8.3761\PenIMC_AMD64.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039ED763 0AD009C8 0023D29E 0022B028 17968)
C:\Windows\Installer\$PatchCache$\Managed\7FA53761D8D11863495A5C876AE18C23\4.8.3761\PenIMC_X86.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NaturalLanguage6.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NlsData0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NlsLexicons0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\NaturalLanguage6.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039ED763 0AD009C8 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\NlsData0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039ED763 0AD009C8 0023D29E 0022B028 17968)
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\NlsLexicons0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039ED763 0AD009C8 0023D29E 0022B028 17968)
C:\Windows\System32\msvcp110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\System32\msvcr100_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\System32\msvcr110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\SysWOW64\msvcp110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\SysWOW64\msvcr100_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
C:\Windows\SysWOW64\msvcr110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NaturalLanguage6.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NlsData0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\NlsLexicons0009.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\System32\msvcp110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\System32\msvcr100_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
D:\Windows\System32\msvcr110_clr0400.dll >>> suspicion for Backdoor.Win32.Agent.ahj ( 039E0947 0AB2DDDD 0023D29E 0022B028 17968)
4. Checking Winsock Layered Service Provider (SPI/LSP)
LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
Checking - disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (Службы удаленных рабочих столов)
>> Services: potentially dangerous service allowed: SSDPSRV (Обнаружение SSDP)
>> Services: potentially dangerous service allowed: Schedule (Планировщик заданий)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
>> HDD autorun is allowed
>> Network drives autorun is allowed
>> Removable media autorun is allowed
Checking - complete
Files scanned: 464373, extracted from archives: 219013, malicious software found 0, suspicions - 20
Scanning finished at 02.08.2021 12:25:16
Time of scanning: 00:12:42
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address [url]http://forum.kaspersky.com/index.php?showforum=19[/url]
For automatic scanning of files from the AVZ quarantine you can use the service [url]http://virusdetector.ru/[/url]
[/QUOTE]