Technical Information
- <SYSTEM32>\tasks\schulder
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- %APPDATA%\logs\11-10-2020
- http://ip##pi.com/json/
- DNS ASK ip##pi.com
- '<Full path to file>' ' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /query
- '%WINDIR%\syswow64\schtasks.exe' /create /sc MINUTE /tn schulder /MO 1 /tr <Full path to file>
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe'
- '<SYSTEM32>\taskeng.exe' {07B9BA0A-D213-4B8A-9EE5-43CD3ABF5CD6} S-1-5-21-1960123792-2022915161-3775307078-1001:gpefsc\user:Interactive:[1]