<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://178.140.10.58:8080/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://178.140.10.58:8080/feed.php">
        <title>Библиотека знаний - windows:virils</title>
        <description>Заметки IT программиста</description>
        <link>http://178.140.10.58:8080/</link>
        <image rdf:resource="http://178.140.10.58:8080/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-17T09:42:46+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://178.140.10.58:8080/doku.php?id=windows:virils:qqpcmgr"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://178.140.10.58:8080/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Библиотека знаний</title>
        <link>http://178.140.10.58:8080/</link>
        <url>http://178.140.10.58:8080/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="http://178.140.10.58:8080/doku.php?id=windows:virils:qqpcmgr">
        <dc:format>text/html</dc:format>
        <dc:date>2016-02-12T19:55:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Как удалить QQPCMgr от Tencent</title>
        <link>http://178.140.10.58:8080/doku.php?id=windows:virils:qqpcmgr</link>
        <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;как_удалить_qqpcmgr_от_tencent&quot;&gt;Как удалить QQPCMgr от Tencent&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Вот и тож смог познакомиться с этой напастью, правда только на планшете. Ну и как следствие пошел гуглить решение и естественно его не нашел, но опыт как говориться не пропьешь. И так приступим.
&lt;/p&gt;

&lt;p&gt;
&lt;a href=&quot;http://178.140.10.58:8080/lib/exe/fetch.php?tok=b336d7&amp;amp;media=http%3A%2F%2Fi59.tinypic.com%2Fj9q6i0.jpg&quot; class=&quot;media&quot; title=&quot;http://i59.tinypic.com/j9q6i0.jpg&quot;&gt;&lt;img src=&quot;http://178.140.10.58:8080/lib/exe/fetch.php?tok=b336d7&amp;amp;media=http%3A%2F%2Fi59.tinypic.com%2Fj9q6i0.jpg&quot; class=&quot;media&quot; loading=&quot;lazy&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;\u041a\u0430\u043a \u0443\u0434\u0430\u043b\u0438\u0442\u044c QQPCMgr \u043e\u0442 Tencent&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;\u043a\u0430\u043a_\u0443\u0434\u0430\u043b\u0438\u0442\u044c_qqpcmgr_\u043e\u0442_tencent&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-450&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;требуемые_программы&quot;&gt;Требуемые программы&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;ul&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt;
 Замечательная программа Unlocker
&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt;
 Не менее замечательная утилита AVZ
&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt;
 &lt;a href=&quot;https://technet.microsoft.com/ru-ru/sysinternals/processexplorer.aspx&quot; class=&quot;urlextern&quot; title=&quot;https://technet.microsoft.com/ru-ru/sysinternals/processexplorer.aspx&quot; rel=&quot;ugc nofollow&quot;&gt;Process Explorer&lt;/a&gt; - Очень удобная софтина для анализа запущенных программ
&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt;
 regedit - Редактор реестра
&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;
Для начала запускаем Process Explorer под администратором, данная программа нам позволит запускать нужные нам программы, а также закрывать вредоносные. Для начала закрывем зараженный explorer, затем все программы относящиеся к Tencent - это QQPCMgr.exe, PerfTraceService.exe, QQPCRTP.exe, tencentdl.exe, QQBrowser.exe и QQPCTray.exe итд.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;\u0422\u0440\u0435\u0431\u0443\u0435\u043c\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;\u0442\u0440\u0435\u0431\u0443\u0435\u043c\u044b\u0435_\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;451-1388&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;удаляем_вредоноса_с_помощью_скрипта_для_avz&quot;&gt;Удаляем вредоноса с помощью скрипта для AVZ&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;pre class=&quot;code&quot;&gt;begin
ShowMessage(&amp;#039;Внимание! Перед выполнением скрипта AVZ автоматически закроет все сетевые подключения.&amp;#039; + #13#10 + &amp;#039;После перезагрузки компьютера подключения к сети будут восстановлены в автоматическом режиме.&amp;#039;);
ExecuteFile(&amp;#039;net.exe&amp;#039;, &amp;#039;stop tcpip /y&amp;#039;, 0, 15000, true);
if not IsWOW64
 then
  begin
   SearchRootkit(true, true);
   SetAVZGuardStatus(True);
  end;
 QuarantineFile(&amp;#039;&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Users\Alex\AppData\Roaming\newSI_4396\s_inst.exe&amp;#039;,&amp;#039;&amp;#039;);
 DelCLSID(&amp;#039;{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}&amp;#039;);
 DelBHO(&amp;#039;{FB4F6285-4C32-49F2-950F-A5998F9CEC6C}&amp;#039;);
 DeleteService(&amp;#039;TS888&amp;#039;);
 TerminateProcessByName(&amp;#039;d:\iqiyi video\lstyle\qyclient.exe&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\application assistance\apphelper.exe&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\defendmon.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\jsonv6.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\program files\kingsoft\kingsoft antivirus\kavmenu.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kcctrl.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kdefendpop.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kdgui.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kdgui2.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kdynmrey.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\keasyipcn.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kfloatwin.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kismain.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kminit
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\krcmdmon.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\ksapi.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\ksdectrl.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kshmpg.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\program files\kingsoft\kingsoft antivirus\kskinmgr.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kspupwnd.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kstools.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kswscxex.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\ksysopteng.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\program files\kingsoft\kingsoft antivirus\ktoolupd.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\ktrashmon.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kupdatesp.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kusbcore.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kusbtool.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;c:\program files\kingsoft\kingsoft antivirus\kvip.dll&amp;#039;,&amp;#039;32&amp;#039;);
 RegKeyParamDel(&amp;#039;HKEY_LOCAL_MACHINE&amp;#039;,&amp;#039;Software\Microsoft\Windows\CurrentVersion\Run&amp;#039;,&amp;#039;AppHelper&amp;#039;);
BC_ImportAll;
ExecuteSysClean;
BC_Activate;
RebootWindows(false);
end.&lt;/pre&gt;
&lt;pre class=&quot;code&quot;&gt;begin
ExecuteFile(&amp;#039;net.exe&amp;#039;, &amp;#039;stop tcpip /y&amp;#039;, 0, 15000, true);
 TerminateProcessByName(&amp;#039;c:\program files (x86)\tencent\qqpcmgr\10.6.15950.224\qqpcrtp.exe&amp;#039;);
 StopService(&amp;#039;TSSysKit&amp;#039;);
 StopService(&amp;#039;TSDefenseBt&amp;#039;);
 StopService(&amp;#039;TSCPM&amp;#039;);
 StopService(&amp;#039;QQSysMonX64&amp;#039;);
 StopService(&amp;#039;QQPCRTP&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\plugins\FileSmash\QMSoftExt64.dll&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\plugins\FileSmash\QMSoftExt.dll&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QQPCTray.exe&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QMContextUninstall64.dll&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\TSSysKit64.sys&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\TSDefenseBT64.sys&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\tscpm64.sys&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QQSysMonX64.sys&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Program Files (x86)\IGS\CCL.exe&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;c:\program files (x86)\tencent\qqpcmgr\10.6.15950.224\qqpcrtp.exe&amp;#039;,&amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\Browsers\exe.erolpxei.bat&amp;#039;, &amp;#039;&amp;#039;);
 QuarantineFile(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\newSI_649\s_inst.exe&amp;#039;, &amp;#039;&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QQPCRTP.exe&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\IGS\CCL.exe&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QQSysMonX64.sys&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\tscpm64.sys&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\TSDefenseBT64.sys&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\TSSysKit64.sys&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QMContextUninstall64.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\QQPCTray.exe&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\plugins\FileSmash\QMSoftExt.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Program Files (x86)\Tencent\QQPCMgr\10.6.15950.224\plugins\FileSmash\QMSoftExt64.dll&amp;#039;,&amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\windows\Tasks\newSI_649.job&amp;#039;, &amp;#039;64&amp;#039;);
 DeleteFile(&amp;#039;C:\windows\system32\Tasks\newSI_649&amp;#039;, &amp;#039;64&amp;#039;);
 DeleteFile(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\Browsers\exe.erolpxei.bat&amp;#039;, &amp;#039;32&amp;#039;);
 DeleteFile(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\newSI_649\s_inst.exe&amp;#039;, &amp;#039;32&amp;#039;);
 DeleteService(&amp;#039;TSSysKit&amp;#039;);
 DeleteService(&amp;#039;TSDefenseBt&amp;#039;);
 DeleteService(&amp;#039;TSCPM&amp;#039;);
 DeleteService(&amp;#039;QQSysMonX64&amp;#039;);
 DeleteService(&amp;#039;CCL&amp;#039;);
 DeleteService(&amp;#039;QQPCRTP&amp;#039;);
 DeleteFileMask(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\newSI_649\&amp;#039;, &amp;#039;*&amp;#039;, true);
 DeleteDirectory(&amp;#039;C:\Users\al.NWTRUSSIA\AppData\Roaming\newSI_649\&amp;#039;);
 DelCLSID(&amp;#039;{754DF2CE-51E8-4895-B53C-6381418B84AE}&amp;#039;);
 RegKeyParamDel(&amp;#039;HKEY_LOCAL_MACHINE&amp;#039;,&amp;#039;Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved&amp;#039;,&amp;#039;{CBDECEF7-7A29-4cbf-A009-2673D82C7BF9}&amp;#039;);
 RegKeyParamDel(&amp;#039;HKEY_LOCAL_MACHINE&amp;#039;,&amp;#039;Software\Microsoft\Windows\CurrentVersion\Run&amp;#039;,&amp;#039;QQPCTray&amp;#039;);
 RegKeyParamDel(&amp;#039;HKEY_LOCAL_MACHINE&amp;#039;,&amp;#039;Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved&amp;#039;,&amp;#039;{754DF2CE-51E8-4895-B53C-6381418B84AE}&amp;#039;);
ExecuteSysClean;
 ExecuteRepair(1);
 ExecuteWizard(&amp;#039;SCU&amp;#039;, 2, 3, true);
 CreateQurantineArchive(GetAVZDirectory + &amp;#039;quarantine.zip&amp;#039;);
RebootWindows(true);
end.&lt;/pre&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;\u0423\u0434\u0430\u043b\u044f\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043a\u0440\u0438\u043f\u0442\u0430 \u0434\u043b\u044f AVZ&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;\u0443\u0434\u0430\u043b\u044f\u0435\u043c_\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430_\u0441_\u043f\u043e\u043c\u043e\u0449\u044c\u044e_\u0441\u043a\u0440\u0438\u043f\u0442\u0430_\u0434\u043b\u044f_avz&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1389-&amp;quot;} --&gt;</description>
    </item>
</rdf:RDF>
