Technical Information
- <SYSTEM32>\tasks\rgbux.exe
- %TEMP%\15211960123792202291
- %TEMP%\152c6d54a1\rgbux.exe
- %TEMP%\152119601237
- %TEMP%\152119601237
- 'am##29.ru':80
- http://am##29.ru/gBcskbwWs/index.php
- http://am##29.ru/gBcskbwWs/index.php?sc###
- DNS ASK am##29.ru
- DNS ASK 90##ma.com
- DNS ASK am###100.com
- '%TEMP%\152c6d54a1\rgbux.exe'
- '%TEMP%\152c6d54a1\rgbux.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\152c6d54a1\' (with hidden window)
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN rgbux.exe /TR "%TEMP%\152c6d54a1\rgbux.exe" /F' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\152c6d54a1\
- '%WINDIR%\syswow64\schtasks.exe' /Create /SC MINUTE /MO 1 /TN rgbux.exe /TR "%TEMP%\152c6d54a1\rgbux.exe" /F
- '%WINDIR%\syswow64\reg.exe' ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d %TEMP%\152c6d54a1\
- '<SYSTEM32>\taskeng.exe' {BF8C8402-F726-456B-ADA2-77D6F7EA2EAE} S-1-5-21-1960123792-2022915161-3775307078-1001:ijprhs\user:Interactive:[1]