Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winlog.exe' = '%APPDATA%\winlog\winlog.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'winlog.exe' = '%APPDATA%\winlog\winlog.exe'
- %HOMEPATH%\Start Menu\Programs\Startup\winlog.exe:Zone.Identifier
- %HOMEPATH%\Start Menu\Programs\Startup\winlog.exe
- %APPDATA%\winlog\winlog.exe
- AVP.EXE
- bdagent.exe
- zlclient.exe
- outpost.exe
- %APPDATA%\winlog\is.tmp
- %APPDATA%\kgx
- %APPDATA%\winlog\winlog.exe:Zone.Identifier
- <Полный путь к вирусу>:Zone.Identifier
- %APPDATA%\winlog\winlog.exe
- %HOMEPATH%\Start Menu\Programs\Startup\winlog.exe
- %APPDATA%\winlog\winlog.exe
- %APPDATA%\winlog\is.tmp
- %HOMEPATH%\Start Menu\Programs\Startup\winlog.exe
- '18#.#2.26.118':32151
- 'ch####p.dyndns.org':80
- 'wp#d':80
- ch####p.dyndns.org/
- wp#d/wpad.dat
- DNS ASK ch####p.dyndns.org
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''