Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '<File name>' = '"%APPDATA%\<File name>.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'uuis2N' = '"%APPDATA%\uuis2N.exe"'
- %APPDATA%\microsoft\windows\start menu\programs\startup\<File name>.vbs
- %APPDATA%\microsoft\windows\start menu\programs\startup\uuis2n.vbs
- %APPDATA%\<File name>.exe
- %TEMP%\uuis2n.exe
- %APPDATA%\uuis2n.exe
- '37.#.10.205':4045
- '14#.#9.173.10':80
- http://14#.#9.173.10/1/Defender.jpg
- '37.#.10.205':4045
- '%TEMP%\uuis2n.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -enc UwB0AG8AcAAtAHAAcgBvAGMAZQBzAHMAIAAtAEkAZAAgADcAMwAyADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAHUAcwBlAHIAXABBAHAAcABEAGEAdABhAFwATABv...' (with hidden window)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -enc UwB0AG8AcAAtAHAAcgBvAGMAZQBzAHMAIAAtAEkAZAAgADcAMwAyADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAHUAcwBlAHIAXABBAHAAcABEAGEAdABhAFwATABv...