Technical Information
- <SYSTEM32>\tasks\updates\jzajpbgwvxf
- %APPDATA%\jzajpbgwvxf.exe
- %TEMP%\tmpfe5.tmp
- %APPDATA%\36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee\run.dat
- %APPDATA%\36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee\catalog.dat
- %APPDATA%\36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee\storage.dat
- %APPDATA%\36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee\settings.bin
- %APPDATA%\jzajpbgwvxf.exe
- %TEMP%\tmpfe5.tmp
- 'u8####5.awsmppl.com':2013
- DNS ASK u8####5.awsmppl.com
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\jzAjpbgWVxf" /XML "%TEMP%\tmpFE5.tmp"' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /Create /TN "Updates\jzAjpbgWVxf" /XML "%TEMP%\tmpFE5.tmp"