Technical Information
- <SYSTEM32>\tasks\raserver
- %WINDIR%\syswow64\cmd.exe
- rtdcpl64.exe
- %APPDATA%\blasthost.exe
- %APPDATA%\imgburn\host.exe
- %APPDATA%\aepic\rtdcpl64.exe
- %APPDATA%\imgburn\host.exe
- DNS ASK We#######19.com.strangled.net
- DNS ASK we####.warzonedns.com
- DNS ASK we####yme.ddns.net
- '%APPDATA%\blasthost.exe'
- '%APPDATA%\imgburn\host.exe'
- '%APPDATA%\aepic\rtdcpl64.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /tn raserver /tr "%APPDATA%\aepic\RtDCpl64.exe" /sc minute /mo 1 /F' (with hidden window)
- '%APPDATA%\aepic\rtdcpl64.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /tn raserver /tr "%APPDATA%\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
- '<SYSTEM32>\taskeng.exe' {8D8EE3B5-C2F8-4FC8-BBA6-128B700BE38F} S-1-5-21-1960123792-2022915161-3775307078-1001:gyphcl\user:Interactive:[1]