alexperevoz
Новый пользователь
- Сообщения
- 8
- Реакции
- 0
Follow along with the video below to see how to install our site as a web app on your home screen.
Примечание: This feature currently requires accessing the site using the built-in Safari browser.
begin
ShowMessage('Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.' + #13#10 + 'После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.');
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
TerminateProcessByName('c:\users\аркаша\appdata\roaming\nssm.exe');
TerminateProcessByName('C:\Users\аркаша\AppData\Roaming\svchost.exe');
QuarantineFile('c:\users\аркаша\appdata\roaming\nssm.exe','');
QuarantineFile('C:\Users\аркаша\AppData\Roaming\svchost.exe','');
QuarantineFile('C:\Program Files\Intel\SUR\WILLAMETTE\ESRV\task.vbs','');
QuarantineFile('C:\Users\аркаша\appdata\roaming\svchost.exe','');
QuarantineFileF('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD', '*.exe, *.dll, *.sys, *.bat, *.vbs, *.js, *.com', true, '', 0, 0);
QuarantineFileF('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD', '*.exe, *.dll, *.sys, *.bat, *.vbs, *.js, *.com', true, '', 0, 0);
QuarantineFileF('C:\ProgramData\KRB Updater Utility', '*.exe, *.dll, *.sys, *.bat, *.vbs, *.js, *.com', true, '', 0, 0);
DeleteFile('C:\windows\system32\Tasks\Microsoft\Windows\565607C1-68FA-483D-9F80-E35C0F75433B','64');
DeleteFile('C:\windows\system32\Tasks\KRB Updater Utility','64');
DeleteFile('C:\ProgramData\KRB Updater Utility\krbupdater-utility.exe','32');
DeleteFile('C:\windows\system32\Tasks\Microsoft\Windows\A565607C1-68FA-483D-9F80-E35C0F75433B','64');
DeleteFile('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD\275BF293-EFF5-4723-AC56-30E0F7E05950.exe','32');
DeleteFile('C:\Users\аркаша\appdata\roaming\svchost.exe','32');
DeleteFile('C:\Users\аркаша\AppData\Roaming\Adobe\NativePlugin\OOBA\PPAPI\565607C1-68FA-483D-9F80-E35C0F75433B\96E9F379-5969-4657-9183-5E205B84421D.exe','32');
DeleteFile('C:\Users\аркаша\AppData\Roaming\svchost.exe','32');
DeleteFile('c:\users\аркаша\appdata\roaming\nssm.exe','32');
DeleteFileMask('C:\ProgramData\KRB Updater Utility','*', true);
DeleteFileMask('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD','*', true);
DeleteFileMask('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD','*', true);
DeleteDirectory('C:\ProgramData\KRB Updater Utility');
DeleteDirectory('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD');
DeleteDirectory('C:\Program Files (x86)\Common Files\758CB622-03A6-4C8F-8B65-37F4F50E4ADD');
RegKeyParamDel('HKEY_LOCAL_MACHINE','Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run','AppDownloads');
RegKeyParamDel('HKEY_LOCAL_MACHINE','Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run','565607C1-68FA-483D-9F80-E35C0F75433B');
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
ExecuteSysClean;
RebootWindows(true);
end.
O2 - BHO: Визуальные закладки - {D5FEC983-01DB-414a-9456-AF95AC9ED7B5} - (no file)
O4 - MSConfig..HKLM: 2015/03/03 [YandexElements] "C:\Program Files (x86)\Yandex\Common\elements64.exe" /auto (no file)
O9 - Extra button: (no name) - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - (no file)
O9 - Extra button: (no name) - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - (no file)
O18 - Protocol: wlpg - {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - (no file)
"C:\Users\аркаша\AppData\Local\Microsoft\Start Menu\Вoйти в Интeрнeт.lnk"
"C:\Users\Public\Desktop\Aliexpress.lnk"
"C:\Users\Public\Desktop\War Thunder.lnk"
"C:\ProgramData\Microsoft\Windows\Start Menu\Aliexpress.lnk"
"C:\ProgramData\Microsoft\Windows\Start Menu\Black Desert.lnk"
"C:\ProgramData\Microsoft\Windows\Start Menu\War Thunder.lnk"
var
LogPath : string;
ScriptPath : string;
begin
LogPath := GetAVZDirectory + 'log\avz_log.txt';
if FileExists(LogPath) Then DeleteFile(LogPath);
ScriptPath := GetAVZDirectory +'ScanVuln.txt';
if DownloadFile('http://dataforce.ru/~kad/ScanVuln.txt', ScriptPath, 1) then ExecuteScript(ScriptPath) else begin
if DownloadFile('http://dataforce.ru/~kad/ScanVuln.txt', ScriptPath, 0) then ExecuteScript(ScriptPath) else begin
ShowMessage('Невозможно загрузить скрипт AVZ для обнаружения наиболее часто используемых уязвимостей!');
exit;
end;
end;
if FileExists(LogPath) Then ExecuteFile('notepad.exe', LogPath, 1, 0, false)
end.