Technical Information
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %LOCALAPPDATA%\google\chrome\user data\default\cookies
- %LOCALAPPDATA%\google\chrome\user data\default\web data
- %APPDATA%\opera software\opera stable\login data
- %APPDATA%\mozilla\firefox\profiles.ini
- ClassName: 'FilemonClass', WindowName: ''
- ClassName: '', WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS', WindowName: ''
- ClassName: '', WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass', WindowName: ''
- ClassName: '', WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'OLLYDBG', WindowName: ''
- ClassName: 'GBDYLLO', WindowName: ''
- ClassName: 'pediy06', WindowName: ''
- %TEMP%\nsrbf78.tmp\uac.dll
- %TEMP%\z4yv7ceqx\6xlqam.tmp
- %TEMP%\z4yv7ceqx\_files\_cookies\opera.txt
- %TEMP%\z4yv7ceqx\files_\cookies\opera.txt
- %TEMP%\z4yv7ceqx\c5jmn.tmp
- %TEMP%\z4yv7ceqx\fehs8.tmp
- %TEMP%\z4yv7ceqx\_files\_allforms_list.txt
- %TEMP%\z4yv7ceqx\files_\forms.txt
- %TEMP%\z4yv7ceqx\c5jmn.tmp-shm
- %TEMP%\z4yv7ceqx\_files\_cookies\mozilla_firefox.txt
- %TEMP%\z4yv7ceqx\files_\cookies\mozilla_firefox.txt
- %TEMP%\z4yv7ceqx\_files\_screen_desktop.jpeg
- %TEMP%\z4yv7ceqx\_files\_information.txt
- %TEMP%\z4yv7ceqx\files_\screenshot.jpg
- %TEMP%\z4yv7ceqx\files_\system_info.txt
- %TEMP%\z4yv7ceqx\igeakznu8os.zip
- %TEMP%\z4yv7ceqx\rl5w0.tmp
- %TEMP%\z4yv7ceqx\j7g4xjmx.zip
- %TEMP%\z4yv7ceqx\t2w2cr.tmp
- %TEMP%\z4yv7ceqx\_files\_allcookies_list.txt
- %ProgramFiles(x86)%\jaoler\kader\3.exe
- %ProgramFiles(x86)%\jaoler\kader\setup3.exe
- %ProgramFiles(x86)%\jaoler\kader\setup3.vbs
- %TEMP%\nsrbf78.tmp\nsexec.dll
- %TEMP%\z4yv7ceqx\qwjs.tmp
- %TEMP%\z4yv7ceqx\2u6et.tmp
- %TEMP%\z4yv7ceqx\md5mln.tmp
- %TEMP%\z4yv7ceqx\axpw.tmp
- %TEMP%\z4yv7ceqx\nzaui.tmp
- %TEMP%\z4yv7ceqx\nfkppp.tmp
- %TEMP%\z4yv7ceqx\vgeoxo.tmp
- %TEMP%\z4yv7ceqx\04i6s.tmp
- %TEMP%\z4yv7ceqx\0aoghu.tmp
- %TEMP%\z4yv7ceqx\_files\_cookies\google_chrome.txt
- %TEMP%\z4yv7ceqx\files_\cookies\google_chrome.txt
- %TEMP%\z4yv7ceqx\files_\cookies.txt
- %TEMP%\8832.tmp
- %TEMP%\z4yv7ceqx\c5jmn.tmp-shm
- %ProgramFiles(x86)%\jaoler\kader\3.exe
- %TEMP%\z4yv7ceqx\_files\_cookies\opera.txt
- %TEMP%\z4yv7ceqx\vgeoxo.tmp
- %TEMP%\z4yv7ceqx\t2w2cr.tmp
- %TEMP%\z4yv7ceqx\rl5w0.tmp
- %TEMP%\z4yv7ceqx\qwjs.tmp
- %TEMP%\z4yv7ceqx\nzaui.tmp
- %TEMP%\z4yv7ceqx\nfkppp.tmp
- %TEMP%\z4yv7ceqx\md5mln.tmp
- %TEMP%\nsrbf78.tmp\nsexec.dll
- %TEMP%\z4yv7ceqx\j7g4xjmx.zip
- %TEMP%\z4yv7ceqx\files_\cookies.txt
- %TEMP%\z4yv7ceqx\files_\cookies\opera.txt
- %TEMP%\z4yv7ceqx\fehs8.tmp
- %TEMP%\z4yv7ceqx\c5jmn.tmp
- %TEMP%\z4yv7ceqx\axpw.tmp
- %TEMP%\z4yv7ceqx\6xlqam.tmp
- %TEMP%\z4yv7ceqx\2u6et.tmp
- %TEMP%\z4yv7ceqx\0aoghu.tmp
- %TEMP%\z4yv7ceqx\04i6s.tmp
- %TEMP%\z4yv7ceqx\files_\forms.txt
- %TEMP%\nsrbf78.tmp\uac.dll
- http://ip##pi.com/json
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
- http://bi###yky16.top/index.php
- http://mo###ss04.top/index.php
- DNS ASK ip###ger.org
- DNS ASK bi###yky16.top
- DNS ASK mo###ss04.top
- DNS ASK nf###load03.top
- DNS ASK ip##pi.com
- DNS ASK 2n#.co
- DNS ASK microsoft.com
- ClassName: '18467-41' WindowName: ''
- '%WINDIR%\syswow64\cscript.exe' "%ProgramFiles(x86)%\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO
- '%ProgramFiles(x86)%\jaoler\kader\3.exe'
- '%ProgramFiles(x86)%\jaoler\kader\setup3.exe'
- '%WINDIR%\syswow64\cscript.exe' "%ProgramFiles(x86)%\Jaoler\kader\Setup3.vbs" //e:vbscript //B //NOLOGO' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c rd /s /q %TEMP%\Z4YV7cEqX & timeout 2 & del /f /q "%ProgramFiles(x86)%\Jaoler\kader\3.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\goitjkgfhbt.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\ptqulsmpc.exe"' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\cyrdtbyk.exe"' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c rd /s /q %TEMP%\Z4YV7cEqX & timeout 2 & del /f /q "%ProgramFiles(x86)%\Jaoler\kader\3.exe"
- '<SYSTEM32>\timeout.exe' 2
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\goitjkgfhbt.exe"
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\ptqulsmpc.exe"
- '%WINDIR%\syswow64\cmd.exe' /c start "" "%TEMP%\cyrdtbyk.exe"