Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%WINDIR%\smss.exe'
- [<HKLM>\SOFTWARE\Microsoft\Command Processor] 'AutoRun' = '%WINDIR%\smss.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe %WINDIR%\smss.exe'
- %WINDIR%\smss.exe
- C:\boot_net.log
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\sm[1].txt
- %WINDIR%\smss.exe
- <Полный путь к вирусу>
- %WINDIR%\smss.exe
- 'www.fr###ebs.com':80
- 'localhost':1035
- www.fr###ebs.com/kelly6666/sm.txt
- DNS ASK www.fr###ebs.com
- '<IP-адрес в локальной сети>':1036