回复 29# 的帖子
【1】2026-03-16 22:03:38,网络防护,恶意网址拦截,svchost.exe尝试访问【thyrsi.com】,已阻止
风险分类:木马盗号
访问网址:thyrsi.com
操作结果:已阻止
进程ID:2848
操作进程:C:\Windows\System32\svchost.exe
操作进程命令行:C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
【2】2026-03-16 22:03:35,网络防护,恶意网址拦截,msedge.exe尝试访问【thyrsi.com】,已阻止
风险分类:木马盗号
访问网址:thyrsi.com
操作结果:已阻止
进程ID:2824
操作进程:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
操作进程命令行:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=zh-CN --service-sandbox-type=none --startup-read-main-dll --metrics-shmem-handle=2476,i,14660477897063513880,2960455908129523235,524288 --field-trial-handle=2316,i,9114511559702826399,11117374596492374582,262144 --variations-seed-version --trace-process-track-uuid=3190708989122997041 --mojo-platform-channel-handle=2468 /prefetch:3
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
【3】2026-03-16 22:01:56,网络防护,恶意网址拦截,svchost.exe尝试访问【thyrsi.com】,已阻止
风险分类:木马盗号
访问网址:thyrsi.com
操作结果:已阻止
进程ID:2848
操作进程:C:\Windows\System32\svchost.exe
操作进程命令行:C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
【4】2026-03-16 22:01:56,网络防护,恶意网址拦截,msedge.exe尝试访问【thyrsi.com】,已阻止
风险分类:木马盗号
访问网址:thyrsi.com
操作结果:已阻止
进程ID:2824
操作进程:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
操作进程命令行:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=zh-CN --service-sandbox-type=none --startup-read-main-dll --metrics-shmem-handle=2476,i,14660477897063513880,2960455908129523235,524288 --field-trial-handle=2316,i,9114511559702826399,11117374596492374582,262144 --variations-seed-version --trace-process-track-uuid=3190708989122997041 --mojo-platform-channel-handle=2468 /prefetch:3
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>