В AVZ выполните скрипт:
Код:
Function RegKeyResetSecurityEx(ARoot, AName : string) : boolean;
var
i : integer;
KeyList : TStringList;
KeyName : string;
begin
RegKeyResetSecurity(ARoot, AName);
KeyList := TStringList.Create;
RegKeyEnumKey(ARoot, AName, KeyList);
for i := 0 to KeyList.Count-1 do
begin
KeyName := AName+'\'+KeyList[i];
RegKeyResetSecurity(ARoot, KeyName);
RegKeyResetSecurityEx(ARoot, KeyName);
end;
KeyList.Free;
end;
Function BC_ServiceKill(AServiceName : string; AIsSvcHosted : boolean = true) : byte;
var
i : integer;
KeyList : TStringList;
KeyName : string;
begin
Result := 0;
if StopService(AServiceName) then Result := Result or 1;
if DeleteService(AServiceName, not(AIsSvcHosted)) then Result := Result or 2;
KeyList := TStringList.Create;
RegKeyEnumKey('HKLM','SYSTEM', KeyList);
for i := 0 to KeyList.Count-1 do
if pos('controlset', LowerCase(KeyList[i])) > 0 then begin
KeyName := 'SYSTEM\'+KeyList[i]+'\Services\'+AServiceName;
if RegKeyExistsEx('HKLM', KeyName) then begin
Result := Result or 4;
RegKeyResetSecurityEx('HKLM', KeyName);
RegKeyDel('HKLM', KeyName);
if RegKeyExistsEx('HKLM', KeyName) then
Result := Result or 8;
end;
end;
if AIsSvcHosted then
BC_DeleteSvcReg(AServiceName)
else
BC_DeleteSvc(AServiceName);
KeyList.Free;
end;
begin
SearchRootkit(true, true);
SetAVZGuardStatus(True);
DeleteFileMask(GetAVZDirectory+'Quarantine', '*.*', true);
QuarantineFile('C:\WINDOWS\system32\netprotdrvss','');
QuarantineFile('C:\DOCUME~1\8297~1\LOCALS~1\Temp\esp63BE.tmp','');
QuarantineFile('‘|x.exe','');
QuarantineFile('C:\RECYCLER\S-1-5-21-1060284298-602609370-725345543-1008\Dc10.exe','');
QuarantineFile('C:\RECYCLER\S-1-5-21-1060284298-602609370-725345543-1008\Dc11.exe','');
QuarantineFile('C:\Documents and Settings\Андрей\Главное меню\Программы\Автозагрузка\sysqpv32.exe','');
QuarantineFile('C:\WINDOWS\System32\DRIVERS\tcpip.sys','');
DeleteFile('C:\Documents and Settings\Андрей\Главное меню\Программы\Автозагрузка\sysqpv32.exe');
DeleteFile('‘|x.exe');
RegKeyParamDel('HKEY_LOCAL_MACHINE','Software\Microsoft\Windows\CurrentVersion\Run','Generic Host for Win32 Services');
DeleteFile('C:\DOCUME~1\8297~1\LOCALS~1\Temp\esp63BE.tmp');
DeleteFile('C:\WINDOWS\system32\netprotdrvss');
BC_ImportAll;
ExecuteSysClean;
AddToLog(inttostr(BC_ServiceKill('gepud')) );
BC_Activate;
ExecuteRepair(16);
ExecuteRepair(20);
RegSearch('HKLM', '', 'esp63BE.tmp');
SaveLog(GetAVZDirectory+'avz_log.txt');
setavzpmstatus(true);
RebootWindows(true);
end.
После перезагрузки
Код:
begin
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
end.
Пришлите карантин quarantine.zip по красной ссылке Прислать запрошенный карантин вверху темы
В HiJackThis пофиксите:
Код:
R3 - URLSearchHook: (no name) - {83821C2B-32A8-4DD7-B6D4-44309A78E668} - (no file)
R3 - URLSearchHook: (no name) - - (no file)
O2 - BHO: (no name) - AutorunsDisabled - (no file)
O2 - BHO: FieryAds advertising module v1.5.0 - {CF272101-7F6E-4CF2-9453-B4C5D2FC32C0} - (no file)
O2 - BHO: Ask Toolbar BHO - {FE063DB1-4EC0-403e-8DD8-394C54984B2C} - (no file)
O3 - Toolbar: (no name) - {FE063DB9-4EC0-403e-8DD8-394C54984B2C} - (no file)
O24 - Desktop Component AutorunsDisabled: (no name) - (no file
Логи повторите.