Technical Information
- '<SYSTEM32>\nztlgpqa.exe'
- '<SYSTEM32>\hxwwgpqs.exe'
- '<SYSTEM32>\aodgahez.exe'
- '<SYSTEM32>\kaasqmal.exe'
- '<SYSTEM32>\qvbugzvj.exe'
- '<SYSTEM32>\ecusttbc.exe'
- '<SYSTEM32>\fmfjchih.exe'
- '<SYSTEM32>\okemawgv.exe'
- '<SYSTEM32>\xzadvvso.exe'
- '<SYSTEM32>\ezxruhjl.exe'
- '<SYSTEM32>\wxxkpynr.exe'
- '<SYSTEM32>\pffhnrrz.exe'
- '<SYSTEM32>\yvrraffn.exe'
- '<SYSTEM32>\pvcnygtn.exe'
- '<SYSTEM32>\gvbiibrh.exe'
- '<SYSTEM32>\vnzchmmt.exe'
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[3]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\1759CB3B5124F217143044[3]
- <SYSTEM32>\hxwwgpqs.exe
- <SYSTEM32>\nztlgpqa.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[3]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[3]
- <SYSTEM32>\kaasqmal.exe
- <SYSTEM32>\aodgahez.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[4]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[4]
- <SYSTEM32>\okemawgv.exe
- <SYSTEM32>\ecusttbc.exe
- <SYSTEM32>\qvbugzvj.exe
- <SYSTEM32>\fmfjchih.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[5]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\1759CB3B5124F217143044[4]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[4]
- <SYSTEM32>\pvcnygtn.exe
- <SYSTEM32>\pffhnrrz.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\1759CB3B5124F217143044[1]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[1]
- <SYSTEM32>\wxxkpynr.exe
- <SYSTEM32>\MSWINSCK.ocx
- <SYSTEM32>\xzadvvso.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\1759CB3B5124F217143044[2]
- <SYSTEM32>\vnzchmmt.exe
- <SYSTEM32>\yvrraffn.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[2]
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[2]
- <SYSTEM32>\ezxruhjl.exe
- <SYSTEM32>\gvbiibrh.exe
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[2]
- <SYSTEM32>\nztlgpqa.exe
- <SYSTEM32>\hxwwgpqs.exe
- <SYSTEM32>\aodgahez.exe
- <SYSTEM32>\kaasqmal.exe
- <SYSTEM32>\qvbugzvj.exe
- <SYSTEM32>\ecusttbc.exe
- <SYSTEM32>\fmfjchih.exe
- <SYSTEM32>\okemawgv.exe
- <SYSTEM32>\xzadvvso.exe
- <SYSTEM32>\ezxruhjl.exe
- <SYSTEM32>\wxxkpynr.exe
- <SYSTEM32>\pffhnrrz.exe
- <SYSTEM32>\yvrraffn.exe
- <SYSTEM32>\pvcnygtn.exe
- <SYSTEM32>\gvbiibrh.exe
- <SYSTEM32>\vnzchmmt.exe
- %TEMP%\~DFC8E5.tmp
- %TEMP%\~DFF2BA.tmp
- %TEMP%\~DF195D.tmp
- %TEMP%\~DFEFCF.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[3]
- %TEMP%\~DF9929.tmp
- %TEMP%\~DFC1D2.tmp
- %TEMP%\~DFB6EE.tmp
- %TEMP%\~DF8BE3.tmp
- %TEMP%\~DF38D9.tmp
- %TEMP%\~DF7688.tmp
- %TEMP%\~DFE8E.tmp
- %TEMP%\~DF3A55.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\2VAZY7AN\1759CB3B5124F217143044[4]
- %TEMP%\~DF984E.tmp
- %TEMP%\~DF5AB0.tmp
- %TEMP%\~DF5634.tmp
- %TEMP%\~DF815B.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[3]
- %TEMP%\~DF19B7.tmp
- %TEMP%\~DF433F.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\U98D4X8H\1759CB3B5124F217143044[2]
- %TEMP%\~DF922.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\YPORKZYZ\1759CB3B5124F217143044[1]
- %TEMP%\~DF707B.tmp
- %TEMP%\~DFD838.tmp
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\1759CB3B5124F217143044[1]
- %TEMP%\~DF99B1.tmp
- %TEMP%\~DFBDB1.tmp
- %TEMP%\~DFE54D.tmp
- %TEMP%\~DF84D9.tmp
- %TEMP%\~DF5CE8.tmp
- %TEMP%\~DFCCA3.tmp
- %TEMP%\~DFE919.tmp
- %TEMP%\~DF2D71.tmp
- %TEMP%\~DF9296.tmp
- %TEMP%\~DFC169.tmp
- 'localhost':1078
- 'localhost':1076
- 'localhost':1082
- 'localhost':1079
- 'localhost':1070
- 'localhost':1068
- 'localhost':1073
- 'localhost':1071
- 'localhost':1084
- 'localhost':1094
- 'localhost':1093
- 'localhost':1096
- 'localhost':1095
- 'localhost':1086
- 'localhost':1085
- 'localhost':1091
- 'localhost':1090
- 'localhost':1044
- 'localhost':1042
- 'localhost':1047
- 'localhost':1046
- 'cf#####9.uf.daum.net':80
- 'localhost':1035
- 'localhost':1040
- 'localhost':1038
- 'localhost':1050
- 'localhost':1062
- 'localhost':1060
- 'localhost':1066
- 'localhost':1063
- 'localhost':1055
- 'localhost':1053
- 'localhost':1058
- 'localhost':1056
- cf#####9.uf.daum.net/attach/1759CB3B5124F217143044
- DNS ASK cf#####9.uf.daum.net
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'