Техническая информация
- '%PROGRAM_FILES%\edosper\edosper.exe' <Имя вируса>.exe^<Текущая директория>
- '%PROGRAM_FILES%\edosper\edosper.exe' (загружен из сети Интернет)
- '<SYSTEM32>\cmd.exe' /c ""%PROGRAM_FILES%\edosper\bat1.bat" "
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\MSINET[1].OCX
- <SYSTEM32>\VB6KO.DLL
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\VB6KO[1].DLL
- <SYSTEM32>\MSINET.OCX
- %PROGRAM_FILES%\edosper\edosper.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\edosper_9[1].exe
- %PROGRAM_FILES%\edosper\bat1.bat
- <Текущая директория>\flist.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\exefileall[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\uninstall_v31[1].exe
- <SYSTEM32>\INETKO.DLL
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\INETKO[1].DLL
- %PROGRAM_FILES%\edosper\uninstall.exe
- %TEMP%\~DF50DD.tmp
- %PROGRAM_FILES%\edosper\bat1.bat
- <Текущая директория>\flist.dll
- 'www.sa###1.pe.kr':80
- 'www.se###hover.net':80
- 'localhost':1036
- www.sa###1.pe.kr/a/download/dll/VB6KO.DLL
- www.sa###1.pe.kr/a/download/dll/MSINET.OCX
- www.sa###1.pe.kr/a/download/exe/ver31/edosper_9.exe
- www.se###hover.net/a/asp/exefileall.php
- www.sa###1.pe.kr/a/download/exe/ver31/uninstall_v31.exe
- www.sa###1.pe.kr/a/download/dll/INETKO.DLL
- DNS ASK www.sa###1.pe.kr
- DNS ASK www.se###hover.net