Technical Information
- %APPDATA%\microsoft\windows\start menu\programs\startup\smartclock.lnk
- <SYSTEM32>\tasks\smart clock
- '' (downloaded from the Internet)
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %LOCALAPPDATA%\google\chrome\user data\default\cookies
- %LOCALAPPDATA%\google\chrome\user data\default\web data
- %APPDATA%\opera software\opera stable\login data
- %APPDATA%\mozilla\firefox\profiles.ini
- ClassName: 'OLLYDBG', WindowName: ''
- ClassName: 'GBDYLLO', WindowName: ''
- ClassName: 'pediy06', WindowName: ''
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass', WindowName: ''
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- %TEMP%\nsra8ae.tmp\sibuia.dll
- %TEMP%\wquhzzn\c5jmn.tmp-shm
- %TEMP%\wquhzzn\_files\_cookies\mozilla_firefox.txt
- %TEMP%\wquhzzn\files_\cookies\mozilla_firefox.txt
- %TEMP%\wquhzzn\_files\_screen_desktop.jpeg
- %TEMP%\wquhzzn\_files\_information.txt
- %TEMP%\wquhzzn\files_\screenshot.jpg
- %TEMP%\wquhzzn\files_\system_info.txt
- %TEMP%\wquhzzn\lxm8fbgxari.zip
- %TEMP%\wquhzzn\csfbab.tmp
- %TEMP%\wquhzzn\dlhmbumgotcy3.zip
- %TEMP%\siba989.tmp\2\l2.exe
- %TEMP%\vcltwfuos.exe
- %TEMP%\johgedscq.exe
- %TEMP%\863f.tmp
- %APPDATA%\smart clock\smartclock.exe
- %ALLUSERSPROFILE%\yndmjodv\8372422.txt
- %ALLUSERSPROFILE%\yndmjodv\files\_information.txt
- %ALLUSERSPROFILE%\yndmjodv\46173476.txt
- %TEMP%\wquhzzn\_files\_allforms_list.txt
- %TEMP%\wquhzzn\files_\forms.txt
- %TEMP%\wquhzzn\fehs8.tmp
- %TEMP%\wquhzzn\c5jmn.tmp
- %TEMP%\wquhzzn\files_\cookies\opera.txt
- %TEMP%\siba989.tmp\sibclr.dll
- %TEMP%\siba989.tmp\0\dd2.exe
- %TEMP%\wquhzzn\dxcz.tmp
- %TEMP%\wquhzzn\lkg86.tmp
- %TEMP%\wquhzzn\swmh.tmp
- %TEMP%\wquhzzn\qz7q.tmp
- %TEMP%\wquhzzn\df7x.tmp
- %TEMP%\wquhzzn\pufb.tmp
- %ALLUSERSPROFILE%\yndmjodv\nl_2020_09_26___21_26___ttnfgm_95.211.190.199.zip
- %TEMP%\siba989.tmp\1\f3.vbs
- %TEMP%\wquhzzn\cjdkgb.tmp
- %TEMP%\wquhzzn\_files\_cookies\google_chrome.txt
- %TEMP%\wquhzzn\files_\cookies\google_chrome.txt
- %TEMP%\wquhzzn\_files\_allcookies_list.txt
- %TEMP%\wquhzzn\files_\cookies.txt
- %TEMP%\wquhzzn\ozx2.tmp
- %TEMP%\wquhzzn\uh4srd.tmp
- %TEMP%\wquhzzn\uhc0p.tmp
- %TEMP%\wquhzzn\_files\_cookies\opera.txt
- %TEMP%\siba989.tmp\sibca.dll
- %TEMP%\wquhzzn\4etp.tmp
- %TEMP%\gepxlieqodt.exe
- %TEMP%\wquhzzn\c5jmn.tmp-shm
- %ALLUSERSPROFILE%\yndmjodv\46173476.txt
- %TEMP%\siba989.tmp\0\dd2.exe
- %TEMP%\wquhzzn\_files\_cookies\opera.txt
- %TEMP%\wquhzzn\uhc0p.tmp
- %TEMP%\wquhzzn\uh4srd.tmp
- %TEMP%\wquhzzn\swmh.tmp
- %TEMP%\wquhzzn\qz7q.tmp
- %TEMP%\wquhzzn\pufb.tmp
- %TEMP%\wquhzzn\ozx2.tmp
- %ALLUSERSPROFILE%\yndmjodv\8372422.txt
- %TEMP%\wquhzzn\lkg86.tmp
- %TEMP%\wquhzzn\files_\cookies.txt
- %TEMP%\wquhzzn\files_\cookies\opera.txt
- %TEMP%\wquhzzn\fehs8.tmp
- %TEMP%\wquhzzn\dxcz.tmp
- %TEMP%\wquhzzn\df7x.tmp
- %TEMP%\wquhzzn\csfbab.tmp
- %TEMP%\wquhzzn\cjdkgb.tmp
- %TEMP%\wquhzzn\c5jmn.tmp
- %TEMP%\wquhzzn\4etp.tmp
- %TEMP%\wquhzzn\files_\forms.txt
- %TEMP%\vcltwfuos.exe
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- http://nf###load05.top/download.php?fi########
- http://nf###load05.top/downfiles/6.exe
- http://nf###load05.top/downfiles/4.exe
- http://ip##pi.com/json
- http://su###nen.com/helka/trll.php
- http://ip##pi.com/line
- http://eb#####adersoftware.com/ebook.exe
- http://bi###ene01.top/index.php
- http://mo###ss05.top/index.php
- DNS ASK bi###ene01.top
- DNS ASK mo###ss05.top
- DNS ASK ip###ger.org
- DNS ASK microsoft.com
- DNS ASK nf###load05.top
- DNS ASK ip##pi.com
- DNS ASK 2n#.co
- DNS ASK su###nen.com
- DNS ASK eb#####adersoftware.com
- ClassName: '18467-41' WindowName: ''
- '%TEMP%\siba989.tmp\0\dd2.exe' /s
- '%TEMP%\siba989.tmp\2\l2.exe' /S
- '%TEMP%\vcltwfuos.exe'
- '%TEMP%\johgedscq.exe'
- '%APPDATA%\smart clock\smartclock.exe'
- '%WINDIR%\syswow64\cmd.exe' /c rd /s /q %TEMP%\WqUhzZn & timeout 2 & del /f /q "%TEMP%\sibA989.tmp\0\dd2.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\vcltwfuos.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\johgedscq.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c rd /s /q %ALLUSERSPROFILE%\yndmjodv & timeout 2 & del /f /q "%TEMP%\vcltwfuos.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\gepxlieqodt.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c rd /s /q %TEMP%\WqUhzZn & timeout 2 & del /f /q "%TEMP%\sibA989.tmp\0\dd2.exe"
- '%WINDIR%\syswow64\timeout.exe' 2
- '%WINDIR%\syswow64\cscript.exe' f3.vbs //e:vbscript //NOLOGO
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\vcltwfuos.exe"
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\johgedscq.exe"
- '%WINDIR%\syswow64\cmd.exe' /c rd /s /q %ALLUSERSPROFILE%\yndmjodv & timeout 2 & del /f /q "%TEMP%\vcltwfuos.exe"
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\gepxlieqodt.exe"