Technical Information
- '%WINDIR%\syswow64\taskkill.exe' /F /PID 2252
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- %WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe
- '51.#3.171.6':6677
- http://dl#.#oxi.net/drive/2020/05/12/0042/0126/2777214/14/c13007e6a1.txt
- DNS ASK dl#.#oxi.net
- ClassName: '' WindowName: ''
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' [System.Threading.Thread]::GetDomain().Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey('Software\pyMsqOzgAcNt').GetValue('qYwuCHrzsJkLg'));[dIcjc]::LcrHWFoznaxhwO('<Full path to file>',...' (with hidden window)
- '%WINDIR%\syswow64\windowspowershell\v1.0\powershell.exe' [System.Threading.Thread]::GetDomain().Load([Microsoft.Win32.Registry]::CurrentUser.OpenSubKey('Software\pyMsqOzgAcNt').GetValue('qYwuCHrzsJkLg'));[dIcjc]::LcrHWFoznaxhwO('<Full path to file>',...
- '%WINDIR%\microsoft.net\framework\v4.0.30319\regasm.exe'
- '%WINDIR%\syswow64\cmd.exe' /C taskkill /F /PID 2252 && choice /C Y /N /D Y /T 3 & Del "%WINDIR%\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
- '%WINDIR%\syswow64\choice.exe' /C Y /N /D Y /T 3