Техническая информация
- '%TEMP%\2.tmp\wget.exe' -P %HOMEPATH%\Local Settings\Temp http://pw#.a78.org/autorun.exe
- '%TEMP%\autorun.exe'
- '%TEMP%\library.exe'
- '%TEMP%\HLDSFake.exe'
- '%TEMP%\libraryx86.exe'
- '%TEMP%\autorun.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\2.tmp\library.cmd" "
- '<SYSTEM32>\ping.exe' -n 4 ya.ru
- '<SYSTEM32>\taskkill.exe' /f /im HLDSFake.exe
- '<SYSTEM32>\cmd.exe' /c ""%TEMP%\1.tmp\HLDSFake.cmd" "
- '<SYSTEM32>\ping.exe' -n 5 ya.ru
- %TEMP%\2.tmp\library.cmd
- %TEMP%\2.tmp\wget.exe
- %TEMP%\autorun.exe
- %TEMP%\library.exe
- %TEMP%\libraryx86.exe
- %TEMP%\HLDSFake.exe
- %TEMP%\1.tmp\HLDSFake.cmd
- %TEMP%\2.tmp\wget.exe
- %TEMP%\2.tmp\library.cmd
- %TEMP%\library.exe
- %TEMP%\HLDSFake.exe
- 'pw#.a78.org':80
- pw#.a78.org/autorun.exe
- DNS ASK pw#.a78.org
- DNS ASK ya.ru
- ClassName: '(null)' WindowName: '(null)'
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'EDIT' WindowName: '(null)'