PandaLabs Blog : MS06-044 in the wild (Update)

MS06-044脆弱性を付く攻撃について動画付きで公開されています。、、、がcodecが無くて見れない・・・(くすん

First, the user connects to a web page which uses the exploit to launch the download of the files: q1.dll y q2l.exe. Then, when q2.exe is executed, it moves the dll to another directory to prevent the deletion of the files, as they are downloaded into a temp directory.