Technical Information
- <SYSTEM32>\tasks\rnyuf.exe
- %TEMP%\15211960123792202291
- %TEMP%\5c436eadc6\rnyuf.exe
- %TEMP%\152119601237
- %TEMP%\152119601237
- 'de####sionk1d.ug':80
- DNS ASK de####sionk1d.ug
- '%TEMP%\5c436eadc6\rnyuf.exe'
- '%TEMP%\5c436eadc6\rnyuf.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\5c436eadc6\' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "%TEMP%\5c436eadc6\rnyuf.exe" /F' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\5c436eadc6\
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN rnyuf.exe /TR "%TEMP%\5c436eadc6\rnyuf.exe" /F
- '%WINDIR%\syswow64\reg.exe' ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\5c436eadc6\
- '<SYSTEM32>\taskeng.exe' {34EC2067-BEBB-4872-95D3-B8BF94F9AA15} S-1-5-21-1960123792-2022915161-3775307078-1001:sksuisxcyla\user:Interactive:[1]