Техническая информация
- <SYSTEM32>\tasks\c26a6
- %HOMEPATH%\documents\4ixxpv.exe
- %HOMEPATH%\documents\vselog.dll
- %HOMEPATH%\documents\wordpadfilter.db
- %HOMEPATH%\documents\msmplist.dat
- <DRIVERS>\189atohci.sys
- %HOMEPATH%\documents\4ixxpv.exe
- %HOMEPATH%\documents\vselog.dll
- %HOMEPATH%\documents\wordpadfilter.db
- %HOMEPATH%\documents\msmplist.dat
- 'ss####.###-cn-hangzhou.aliyuncs.com':443
- 'ss####.###-cn-hangzhou.aliyuncs.com':443
- DNS ASK ss####.###-cn-hangzhou.aliyuncs.com
- '%HOMEPATH%\documents\4ixxpv.exe'
- '<SYSTEM32>\taskeng.exe' {638289B6-1A89-40AA-BD8F-EDF7EF0F129C} S-1-5-21-3691498038-2086406363-2140527554-1000:tepyozq\user:Interactive:[1]
- '%HOMEPATH%\documents\4ixxpv.exe' (со скрытым окном)