Техническая информация
- '<SYSTEM32>\cmd.exe' /c %HOMEPATH%\Local Settings\Tempscratch.bat
- '<SYSTEM32>\ping.exe' -n 0127.0.0.1
- '<SYSTEM32>\cmd.exe' /c %WINDIR%\Temp\7za.exe x -aoa -o%WINDIR%\temp\Visio213 %WINDIR%\temp\Visio2013.7z
- '%WINDIR%\Temp\7za.exe' x -aoa -o%WINDIR%\temp\Visio213 %WINDIR%\temp\Visio2013.7z
- %WINDIR%\Temp\7za.exe
- %HOMEPATH%\Local Settings\Tempscratch.bat
- %TEMP%\aut2.tmp
- %TEMP%\aut1.tmp
- %TEMP%\cvjnjvj
- %TEMP%\aut2.tmp
- %WINDIR%\Temp\7za.exe
- %TEMP%\aut1.tmp
- %TEMP%\cvjnjvj
- 'ft#.bmc.com':21
- DNS ASK ft#.bmc.com
- ClassName: 'Shell_TrayWnd' WindowName: ''