Technical Information
- <SYSTEM32>\tasks\rnzcszllry.exe
- %WINDIR%\microsoft.net\framework\v4.0.30319\regsvcs.exe
- %WINDIR%\microsoft.net\framework\v4.0.30319\regsvcs.exe
- %APPDATA%\rnzcszllry.exe
- %APPDATA%\36d1130a-ac2e-44f7-9dc1-e424fbcbe0ee\run.dat
- 'localhost':5454
- 'pa##e.ee':443
- DNS ASK pa##e.ee
- '%APPDATA%\rnzcszllry.exe'
- '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn RNZCSZllrY.exe /tr %APPDATA%\RNZCSZllrY.exe' (with hidden window)
- '%APPDATA%\rnzcszllry.exe' ' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /create /sc minute /mo 1 /tn RNZCSZllrY.exe /tr %APPDATA%\RNZCSZllrY.exe
- '<SYSTEM32>\taskeng.exe' {6B427DE2-3D16-4AE6-99A0-ADC26E1910C8} S-1-5-21-1960123792-2022915161-3775307078-1001:gmaqvvibzi\user:Interactive:[1]
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regsvcs.exe'