Техническая информация
- '%TEMP%\Zc541hGgva\VisualHack.exe'
- '%TEMP%\YEFDGYT.EXE'
- '%ProgramFiles%\Chests-Bro\ESP_RandomSteamID\%ProgramData%\ESP_RandomSteamID.exe'
- '<SYSTEM32>\wscript.exe' "%APPDATA%\Sabotage.vbs"
- '%ProgramFiles%\Chests-Bro\ESP_RandomSteamID\ESP_RandomSteamID.exe'
- '%ProgramFiles%\Internet Explorer\IEXPLORE.EXE' -Embedding
- %TEMP%\Zc541hGgva\revSrvBrowser.dll
- %TEMP%\Zc541hGgva\0000000000001.dll
- %TEMP%\Zc541hGgva\VisualHack.dll
- %TEMP%\Zc541hGgva\VisualHack.ini
- %TEMP%\Zc541hGgva\VisualHack.exe
- %TEMP%\Zc541hGgva\Run.url
- %TEMP%\$inst\temp_0.tmp
- %TEMP%\$inst\2.tmp
- %APPDATA%\Sabotage.vbs
- %ProgramFiles%\Chests-Bro\ESP_RandomSteamID\%ProgramData%\ESP_RandomSteamID.exe
- %ProgramFiles%\Chests-Bro\ESP_RandomSteamID\ESP_RandomSteamID.exe
- %TEMP%\Zc541hGgva\VisualHack.dll
- %TEMP%\Zc541hGgva\VisualHack.exe
- %TEMP%\Zc541hGgva\VisualHack.ini
- %TEMP%\Zc541hGgva\revSrvBrowser.dll
- %ProgramFiles%\Chests-Bro\ESP_RandomSteamID\%ProgramData%\ESP_RandomSteamID.exe
- %TEMP%\Zc541hGgva\Run.url
- %TEMP%\Zc541hGgva\0000000000001.dll
- %ProgramFiles%\Chests-Bro\ESP_RandomSteamID\%ProgramData%\ESP_RandomSteamID.exe
- %TEMP%\$inst\2.tmp
- %TEMP%\$inst\temp_0.tmp
- 'he###-hack.com':80
- 'localhost':1037
- http://he###-hack.com/
- DNS ASK he###-hack.com
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'EDIT' WindowName: ''