Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{T5TBB77L-4678-0MKC-421Q-14416031DYU6}] 'StubPath' = '<SYSTEM32>\System32\HDD.exe.exe Restart'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'HDD' = ''
- %APPDATA%\<Имя вируса>.exe
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:"%TEMP%\RES2.tmp"" "%TEMP%\CSC1.tmp"
- %WINDIR%\Microsoft.NET\Framework\v2.0.50727\csc.exe /noconfig /fullpaths @"%TEMP%\scnfbd_c.cmdline"
- %APPDATA%\<Имя вируса>.exe
- %TEMP%\scnfbd_c.dll
- <SYSTEM32>\System32\data.dat
- <SYSTEM32>\System32\HDD.exe.exe
- %TEMP%\RES2.tmp
- %TEMP%\scnfbd_c.cmdline
- %TEMP%\scnfbd_c.0.cs
- %TEMP%\CSC1.tmp
- %TEMP%\scnfbd_c.out
- <SYSTEM32>\System32\data.dat
- %TEMP%\scnfbd_c.cmdline
- %TEMP%\scnfbd_c.out
- %TEMP%\scnfbd_c.0.cs
- %TEMP%\RES2.tmp
- %TEMP%\CSC1.tmp
- %TEMP%\scnfbd_c.dll
- '??.##caldomain':5160
- 'localhost':5160
- 'sn####.no-ip.org':5160
- DNS ASK sn####.no-ip.org