Technical Information
- <SYSTEM32>\tasks\ly3ms1uwe0ee
- <Current directory>\ija19pw.xml
- <Current directory>\ija19pw.xml
- <Full path to file>
- from <Full path to file> to <Current directory>\old_<File name>.exe
- 'pa###bin.com':443
- 'cu##t.org':443
- 'q.#s':80
- 'hu##rk.net':80
- http://q.#s/EVnYC
- http://hu##rk.net/-20QLOU/EVnYC?rn#########################
- http://hu##rk.net/suspended?a=############
- DNS ASK pa###bin.com
- DNS ASK cu##t.org
- DNS ASK q.#s
- DNS ASK hu##rk.net
- '%WINDIR%\syswow64\schtasks.exe' /CREATE /RL HIGHEST /SC ONLOGON /TR "<Full path to file>" /TN Ly3ms1uWe0ee /F
- '%WINDIR%\syswow64\cmd.exe' /c schtasks.exe /Query /XML /TN Ly3ms1uWe0ee > <Current directory>\ija19pW.xml
- '%WINDIR%\syswow64\schtasks.exe' /Query /XML /TN Ly3ms1uWe0ee