Technical Information
- <SYSTEM32>\tasks\b1998b4b9b080efee9537c8f0984fa0a
- %ALLUSERSPROFILE%\b1998b4b9b080efee9537c8f0984fa0a
- %ALLUSERSPROFILE%\05cb7a58a8\bdif.exe
- http://ge###istype.top/pTcxiBd2/cred.dll
- http://ge###istype.top/pTcxiBd2/scr.dll
- http://ge###istype.top/pTcxiBd2/index.php
- DNS ASK ge###istype.top
- '%ALLUSERSPROFILE%\05cb7a58a8\bdif.exe'
- '%ALLUSERSPROFILE%\05cb7a58a8\bdif.exe' ' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN b1998b4b9b080efee9537c8f0984fa0a /TR %ALLUSERSPROFILE%\05cb7a58a8\bdif.exe /F
- '<SYSTEM32>\taskeng.exe' {08BFEE2A-D972-4580-8CAF-907EC3D9188A} S-1-5-21-1960123792-2022915161-3775307078-1001:user-PC\user:Interactive:[1]
- '%WINDIR%\syswow64\reg.exe' ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %ALLUSERSPROFILE%\05cb7a58a8