Technical Information
- <SYSTEM32>\tasks\nvngxupdatecheckdaily_{1322a5ab-a5ab-a5ab-a5ab-1322a5aba5ab}
- %WINDIR%\syswow64\explorer.exe
- %WINDIR%\explorer.exe
- 8049.tmp.exe
- [<HKCU>\Software\Martin Prikryl\WinSCP 2\Sessions]
- %LOCALAPPDATA%\google\chrome\user data\default\cookies
- %LOCALAPPDATA%\google\chrome\user data\default\login data
- %LOCALAPPDATA%\google\chrome\user data\default\web data
- %APPDATA%\opera software\opera stable\login data
- %APPDATA%\thunderbird\profiles.ini
- %TEMP%\2276.tmp
- %TEMP%\e9fd.tmp
- %TEMP%\e99e.tmp
- %TEMP%\e98d.tmp
- %TEMP%\e98c.tmp
- %TEMP%\e92d.tmp
- %TEMP%\e871.tmp
- %TEMP%\e831.tmp
- %TEMP%\e811.tmp
- %TEMP%\e590.tmp
- %TEMP%\e56f.tmp
- %TEMP%\e520.tmp
- %TEMP%\e51f.tmp
- %TEMP%\ea1d.tmp
- %TEMP%\d8ab.tmp
- %TEMP%\d86b.tmp
- %LOCALAPPDATA%\microsoft\vault\4bf4c442-9b8a-41a0-b380-dd4a704ddb28\policy.vpol
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\2f1a6504-0641-44cf-8bb5-3612d865f2e5.vsch
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\3ccd5499-87a8-4b10-a215-608888dd3b55.vsch
- %PROGRAMDATA%\microsoft\vault\ac658cb4-9126-49bd-b877-31eedab3f204\policy.vpol
- %TEMP%\nsaa7d7.tmp\system.dll
- %TEMP%\739605646
- %TEMP%\9190.tmp.exe
- %TEMP%\8049.tmp.exe
- %APPDATA%\tresduc
- %APPDATA%\abvgeji
- %APPDATA%\wreufcf
- %TEMP%\d86b.tmp-shm
- %TEMP%\ea1d.tmp-shm
- %APPDATA%\wreufcf
- %APPDATA%\abvgeji
- %APPDATA%\tresduc
- %TEMP%\d86b.tmp-shm
- %TEMP%\ea1d.tmp-shm
- %TEMP%\e9fd.tmp
- %TEMP%\e99e.tmp
- %TEMP%\e98d.tmp
- %TEMP%\e98c.tmp
- %TEMP%\e92d.tmp
- %TEMP%\e871.tmp
- %TEMP%\e831.tmp
- %TEMP%\e811.tmp
- %TEMP%\e590.tmp
- %TEMP%\e56f.tmp
- %TEMP%\e520.tmp
- %TEMP%\e51f.tmp
- %TEMP%\d8ab.tmp
- %TEMP%\d86b.tmp
- %TEMP%\ea1d.tmp
- %TEMP%\8049.tmp.exe
- 'ob###atorvv.pw':80
- http://wi#.#adseek.com/api/check.get
- http://wi#.#adseek.com/api/gate.get?p1#####################################################################################
- http://ob###atorvv.pw/
- DNS ASK ob###atorvv.pw
- DNS ASK wi#.#adseek.com
- '%TEMP%\8049.tmp.exe'
- '%TEMP%\9190.tmp.exe'
- '%WINDIR%\syswow64\cmd.exe' /c ping 127.0.0.1 && del "%TEMP%\8049.tmp.exe"' (with hidden window)
- '%WINDIR%\syswow64\explorer.exe'
- '%WINDIR%\explorer.exe'
- '%WINDIR%\syswow64\cmd.exe' /c ping 127.0.0.1 && del "%TEMP%\8049.tmp.exe"
- '%WINDIR%\syswow64\ping.exe' 127.0.0.1