Техническая информация
- '<Текущая директория>\CODIGO.exe' (загружен из сети Интернет)
- '<Текущая директория>\CODIGO.exe'
- <SYSTEM32>\msvcp110.dll
- <SYSTEM32>\msvcr110.dll
- <Текущая директория>\op7launcer.exe
- <SYSTEM32>\svcp100d.dll
- C:\ole32.dll
- <Текущая директория>\CODIGO.exe
- C:\1
- '74.##5.232.51':80
- 'wp#d':80
- http://si###.google.com/site/failop7hack/home/44/msvcp110.dll via 74.##5.232.51
- http://si###.google.com/site/failop7hack/home/44/msvcp100d.dll via 74.##5.232.51
- http://si###.google.com/site/failop7hack/home/44/op7launcer.dll via 74.##5.232.51
- http://si###.google.com/site/failop7hack/home/44/msvcr110.dll via 74.##5.232.51
- http://si###.google.com/ via 74.##5.232.51
- http://si###.google.com/site/failop7hack/home/44/versionsfile.txt via 74.##5.232.51
- http://11#.#11.111.1/wpad.dat via wp#d
- http://si###.google.com/site/failop7hack/home/44/CODIGO.dll via 74.##5.232.51
- http://si###.google.com/site/failop7hack/home/44/ole32.dll via 74.##5.232.51
- DNS ASK si###.google.com
- DNS ASK wp#d
- ClassName: 'Shell_TrayWnd' WindowName: ''