Follow along with the video below to see how to install our site as a web app on your home screen.
Примечание: This feature currently requires accessing the site using the built-in Safari browser.
begin
ExecuteFile('net.exe', 'stop tcpip /y', 0, 15000, true);
ClearQuarantineEx(true);
TerminateProcessByName('c:\windows\microsoft\svchost.exe');
QuarantineFile('C:\Users\Admin\AppData\Roaming\curl\curl.exe', '');
QuarantineFile('C:\Users\Admin\AppData\Roaming\curl\curl_7_54.exe', '');
QuarantineFile('c:\windows\microsoft\svchost.exe', '');
QuarantineFileF('c:\users\admin\appdata\roaming\curl', '*.exe, *.dll, *.sys, *.bat, *.vbs, *.ps1, *.js*, *.tmp*', true, '', 0 , 0);
DeleteFile('C:\Users\Admin\AppData\Roaming\curl\curl.exe', '32');
DeleteFile('C:\Users\Admin\AppData\Roaming\curl\curl_7_54.exe', '32');
DeleteFile('c:\windows\microsoft\svchost.exe', '32');
ExecuteFile('schtasks.exe', '/delete /TN "curl" /F', 0, 15000, true);
ExecuteFile('schtasks.exe', '/delete /TN "curls" /F', 0, 15000, true);
DeleteService('SvcHost Service Host');
DeleteFileMask('c:\users\admin\appdata\roaming\curl', '*', true);
DeleteDirectory('c:\users\admin\appdata\roaming\curl');
CreateQurantineArchive(GetAVZDirectory + 'quarantine.zip');
ExecuteSysClean;
ExecuteWizard('SCU', 2, 3, true);
RebootWindows(true);
end.
begin
CreateQurantineArchive(GetAVZDirectory+'quarantine.zip');
end.
Визуально возможно, но нужно убедиться. Подготовьте свежий лог автологера для проверки.Проблема вроде исчезла.
Start::
CreateRestorePoint:
Tcpip\..\Interfaces\{42b19f6e-c6d5-43ed-b807-f97fb3b06f5a}: [NameServer] 35.177.46.238,46.101.28.31,82.202.226.203,109.86.2.21,109.86.2.2
FF Homepage: Mozilla\Firefox\Profiles\tskghxfe.default -> hxxp://granena.ru/?
CHR HomePage: Default -> hxxp://granena.ru/?utm_content=31b5cebd524a9af6c7a772dca81815e9&utm_source=startpm&utm_term=24F936F8DCF8FC597016A9D8245D932E&utm_d=20171216
CustomCLSID: HKU\S-1-5-21-2993677496-2127200648-2709929357-1001_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32 -> C:\Users\Admin\AppData\Local\Microsoft\OneDrive\17.3.7074.1023\amd64\FileSyncShell64.dll => No File
CustomCLSID: HKU\S-1-5-21-2993677496-2127200648-2709929357-1001_Classes\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}\InprocServer32 -> C:\Users\Admin\AppData\Local\Microsoft\OneDrive\17.3.7074.1023\amd64\FileSyncShell64.dll => No File
CustomCLSID: HKU\S-1-5-21-2993677496-2127200648-2709929357-1001_Classes\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}\InprocServer32 -> C:\Users\Admin\AppData\Local\Microsoft\OneDrive\17.3.7074.1023\amd64\FileSyncShell64.dll => No File
ShellIconOverlayIdentifiers: [ OneDrive1] -> {BBACC218-34EA-4666-9D7A-C78F2274A524} => -> No File
ShellIconOverlayIdentifiers: [ OneDrive2] -> {5AB7172C-9C11-405C-8DD5-AF20F3606282} => -> No File
ShellIconOverlayIdentifiers: [ OneDrive3] -> {A78ED123-AB77-406B-9962-2A5D9D2F7F30} => -> No File
ShellIconOverlayIdentifiers: [ OneDrive4] -> {F241C880-6982-4CE5-8CF7-7085BA96DA5A} => -> No File
ShellIconOverlayIdentifiers: [ OneDrive5] -> {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E} => -> No File
ShellIconOverlayIdentifiers: [ OneDrive6] -> {9AA2F32D-362A-42D9-9328-24A483E2CCC3} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive1] -> {BBACC218-34EA-4666-9D7A-C78F2274A524} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive2] -> {5AB7172C-9C11-405C-8DD5-AF20F3606282} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive3] -> {A78ED123-AB77-406B-9962-2A5D9D2F7F30} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive4] -> {F241C880-6982-4CE5-8CF7-7085BA96DA5A} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive5] -> {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E} => -> No File
ShellIconOverlayIdentifiers-x32: [ OneDrive6] -> {9AA2F32D-362A-42D9-9328-24A483E2CCC3} => -> No File
FirewallRules: [TCP Query User{2A06B887-ABE2-4652-A7FB-F3F8FC83835F}E:\zjz\zjz.exe] => (Allow) E:\zjz\zjz.exe
FirewallRules: [UDP Query User{002B03BD-9682-41D1-816C-6C9CC55F6D66}E:\zjz\zjz.exe] => (Allow) E:\zjz\zjz.exe
EmptyTemp:
Reboot:
End::
var
LogPath : string;
ScriptPath : string;
begin
LogPath := GetAVZDirectory + 'log\avz_log.txt';
if FileExists(LogPath) Then DeleteFile(LogPath);
ScriptPath := GetAVZDirectory +'ScanVuln.txt';
if DownloadFile('http://dataforce.ru/~kad/ScanVuln.txt', ScriptPath, 1) then ExecuteScript(ScriptPath) else begin
if DownloadFile('http://dataforce.ru/~kad/ScanVuln.txt', ScriptPath, 0) then ExecuteScript(ScriptPath) else begin
ShowMessage('Невозможно загрузить скрипт AVZ для обнаружения наиболее часто используемых уязвимостей!');
exit;
end;
end;
if FileExists(LogPath) Then ExecuteFile('notepad.exe', LogPath, 1, 0, false)
end.