Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 00:11
Static task
static1
Behavioral task
behavioral1
Sample
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe
Resource
win10v2004-20220722-en
General
-
Target
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe
-
Size
394KB
-
MD5
56aa993a41a0cd5a8006d088d5283237
-
SHA1
8bc08024acc34a501a0cdbee4deab5fcb031de3b
-
SHA256
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be
-
SHA512
1428301912495253d03c03dbcae08ca97bb6f4ecfd10de0ea342af4115796450e494a6b2ed2662bd1e49dcf5d5c00e6f38d780a3fc16764fee226b9affef4673
Malware Config
Extracted
darkcomet
JDB
ogparm.no-ip.org:1604
DC_MUTEX-1QSZ3S8
-
gencode
ZRkFME9MDXp6
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
gvztlh.exepid process 2040 gvztlh.exe -
Loads dropped DLL 1 IoCs
Processes:
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exepid process 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exedescription pid process target process PID 736 set thread context of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 40 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 332 reg.exe 1740 reg.exe 2000 reg.exe 1616 reg.exe 992 reg.exe 1372 reg.exe 1544 reg.exe 1868 reg.exe 2024 reg.exe 1412 reg.exe 1696 reg.exe 1620 reg.exe 1712 reg.exe 1968 reg.exe 2024 reg.exe 1372 reg.exe 1492 reg.exe 1668 reg.exe 1116 reg.exe 1972 reg.exe 1644 reg.exe 1412 reg.exe 1304 reg.exe 1960 reg.exe 1348 reg.exe 1492 reg.exe 1176 reg.exe 1384 reg.exe 1788 reg.exe 1720 reg.exe 2012 reg.exe 1868 reg.exe 2016 reg.exe 1620 reg.exe 552 reg.exe 1680 reg.exe 1932 reg.exe 316 reg.exe 1732 reg.exe 1284 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gvztlh.exepid process 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe 2040 gvztlh.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exegvztlh.exedescription pid process Token: SeIncreaseQuotaPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeSecurityPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeTakeOwnershipPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeLoadDriverPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeSystemProfilePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeSystemtimePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeProfSingleProcessPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeIncBasePriorityPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeCreatePagefilePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeBackupPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeRestorePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeShutdownPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeDebugPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeSystemEnvironmentPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeChangeNotifyPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeRemoteShutdownPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeUndockPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeManageVolumePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeImpersonatePrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeCreateGlobalPrivilege 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: 33 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: 34 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: 35 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe Token: SeDebugPrivilege 2040 gvztlh.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exepid process 1656 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 1656 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe PID 736 wrote to memory of 2040 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe gvztlh.exe PID 736 wrote to memory of 2040 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe gvztlh.exe PID 736 wrote to memory of 2040 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe gvztlh.exe PID 736 wrote to memory of 2040 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe gvztlh.exe PID 736 wrote to memory of 1768 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1768 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1768 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1768 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 1768 wrote to memory of 552 1768 cmd.exe reg.exe PID 1768 wrote to memory of 552 1768 cmd.exe reg.exe PID 1768 wrote to memory of 552 1768 cmd.exe reg.exe PID 1768 wrote to memory of 552 1768 cmd.exe reg.exe PID 736 wrote to memory of 1556 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1556 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1556 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1556 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 1556 wrote to memory of 1492 1556 cmd.exe reg.exe PID 1556 wrote to memory of 1492 1556 cmd.exe reg.exe PID 1556 wrote to memory of 1492 1556 cmd.exe reg.exe PID 1556 wrote to memory of 1492 1556 cmd.exe reg.exe PID 736 wrote to memory of 1576 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1576 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1576 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1576 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 1576 wrote to memory of 2012 1576 cmd.exe reg.exe PID 1576 wrote to memory of 2012 1576 cmd.exe reg.exe PID 1576 wrote to memory of 2012 1576 cmd.exe reg.exe PID 1576 wrote to memory of 2012 1576 cmd.exe reg.exe PID 736 wrote to memory of 1124 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1124 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1124 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 1124 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 1124 wrote to memory of 332 1124 cmd.exe reg.exe PID 1124 wrote to memory of 332 1124 cmd.exe reg.exe PID 1124 wrote to memory of 332 1124 cmd.exe reg.exe PID 1124 wrote to memory of 332 1124 cmd.exe reg.exe PID 736 wrote to memory of 636 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 636 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 636 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 636 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 636 wrote to memory of 1668 636 cmd.exe reg.exe PID 636 wrote to memory of 1668 636 cmd.exe reg.exe PID 636 wrote to memory of 1668 636 cmd.exe reg.exe PID 636 wrote to memory of 1668 636 cmd.exe reg.exe PID 736 wrote to memory of 520 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 520 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 520 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 736 wrote to memory of 520 736 5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe cmd.exe PID 520 wrote to memory of 1116 520 cmd.exe reg.exe PID 520 wrote to memory of 1116 520 cmd.exe reg.exe PID 520 wrote to memory of 1116 520 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\gvztlh.exe"C:\Users\Admin\AppData\Local\Temp\gvztlh.exe" "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe-true"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe" & exit2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "WindowsDefender" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\5b55e2dbac9d4cd6ac167d2901fc0757efe21ac0fc9d0f44aa45ed38d6df82be.exe"3⤵
- Adds Run key to start application
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\gvztlh.exeFilesize
9KB
MD588d821627e48b2ae11df5898dd827b68
SHA104963ea40344bbc4126f5f9c39f2135af356aab2
SHA2564b3b647df8ec0b257e0b253e18609595798e02650dbae948c7503d4183fbdbca
SHA512de32b4fa0d1608cb113bf2eb6c4b96a11f85897d38122ed3df55159c1fe888a7e7c727094715f32feea061ee08dadfbb3eb355095f2f220557984ca8e1f1031e
-
C:\Users\Admin\AppData\Local\Temp\gvztlh.exeFilesize
9KB
MD588d821627e48b2ae11df5898dd827b68
SHA104963ea40344bbc4126f5f9c39f2135af356aab2
SHA2564b3b647df8ec0b257e0b253e18609595798e02650dbae948c7503d4183fbdbca
SHA512de32b4fa0d1608cb113bf2eb6c4b96a11f85897d38122ed3df55159c1fe888a7e7c727094715f32feea061ee08dadfbb3eb355095f2f220557984ca8e1f1031e
-
\Users\Admin\AppData\Local\Temp\gvztlh.exeFilesize
9KB
MD588d821627e48b2ae11df5898dd827b68
SHA104963ea40344bbc4126f5f9c39f2135af356aab2
SHA2564b3b647df8ec0b257e0b253e18609595798e02650dbae948c7503d4183fbdbca
SHA512de32b4fa0d1608cb113bf2eb6c4b96a11f85897d38122ed3df55159c1fe888a7e7c727094715f32feea061ee08dadfbb3eb355095f2f220557984ca8e1f1031e
-
memory/316-128-0x0000000000000000-mapping.dmp
-
memory/332-98-0x0000000000000000-mapping.dmp
-
memory/520-102-0x0000000000000000-mapping.dmp
-
memory/552-133-0x0000000000000000-mapping.dmp
-
memory/552-91-0x0000000000000000-mapping.dmp
-
memory/604-121-0x0000000000000000-mapping.dmp
-
memory/636-99-0x0000000000000000-mapping.dmp
-
memory/736-101-0x00000000743F0000-0x000000007499B000-memory.dmpFilesize
5.7MB
-
memory/736-54-0x00000000762B1000-0x00000000762B3000-memory.dmpFilesize
8KB
-
memory/736-83-0x00000000743F0000-0x000000007499B000-memory.dmpFilesize
5.7MB
-
memory/816-151-0x0000000000000000-mapping.dmp
-
memory/820-111-0x0000000000000000-mapping.dmp
-
memory/948-123-0x0000000000000000-mapping.dmp
-
memory/992-126-0x0000000000000000-mapping.dmp
-
memory/996-105-0x0000000000000000-mapping.dmp
-
memory/1116-103-0x0000000000000000-mapping.dmp
-
memory/1124-97-0x0000000000000000-mapping.dmp
-
memory/1176-138-0x0000000000000000-mapping.dmp
-
memory/1248-129-0x0000000000000000-mapping.dmp
-
memory/1304-154-0x0000000000000000-mapping.dmp
-
memory/1320-113-0x0000000000000000-mapping.dmp
-
memory/1324-139-0x0000000000000000-mapping.dmp
-
memory/1348-122-0x0000000000000000-mapping.dmp
-
memory/1356-125-0x0000000000000000-mapping.dmp
-
memory/1368-107-0x0000000000000000-mapping.dmp
-
memory/1372-142-0x0000000000000000-mapping.dmp
-
memory/1384-148-0x0000000000000000-mapping.dmp
-
memory/1412-130-0x0000000000000000-mapping.dmp
-
memory/1412-146-0x0000000000000000-mapping.dmp
-
memory/1432-109-0x0000000000000000-mapping.dmp
-
memory/1444-147-0x0000000000000000-mapping.dmp
-
memory/1492-134-0x0000000000000000-mapping.dmp
-
memory/1492-94-0x0000000000000000-mapping.dmp
-
memory/1496-149-0x0000000000000000-mapping.dmp
-
memory/1544-150-0x0000000000000000-mapping.dmp
-
memory/1556-93-0x0000000000000000-mapping.dmp
-
memory/1576-95-0x0000000000000000-mapping.dmp
-
memory/1616-108-0x0000000000000000-mapping.dmp
-
memory/1620-144-0x0000000000000000-mapping.dmp
-
memory/1644-116-0x0000000000000000-mapping.dmp
-
memory/1656-90-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-62-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-71-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-76-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-58-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-81-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-60-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-70-0x000000000048F888-mapping.dmp
-
memory/1656-65-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-64-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-67-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-56-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1656-55-0x0000000000080000-0x0000000000132000-memory.dmpFilesize
712KB
-
memory/1668-100-0x0000000000000000-mapping.dmp
-
memory/1680-106-0x0000000000000000-mapping.dmp
-
memory/1696-140-0x0000000000000000-mapping.dmp
-
memory/1732-132-0x0000000000000000-mapping.dmp
-
memory/1740-114-0x0000000000000000-mapping.dmp
-
memory/1760-119-0x0000000000000000-mapping.dmp
-
memory/1768-89-0x0000000000000000-mapping.dmp
-
memory/1780-117-0x0000000000000000-mapping.dmp
-
memory/1792-137-0x0000000000000000-mapping.dmp
-
memory/1824-143-0x0000000000000000-mapping.dmp
-
memory/1836-127-0x0000000000000000-mapping.dmp
-
memory/1864-115-0x0000000000000000-mapping.dmp
-
memory/1868-124-0x0000000000000000-mapping.dmp
-
memory/1932-110-0x0000000000000000-mapping.dmp
-
memory/1940-145-0x0000000000000000-mapping.dmp
-
memory/1960-120-0x0000000000000000-mapping.dmp
-
memory/1964-141-0x0000000000000000-mapping.dmp
-
memory/1972-112-0x0000000000000000-mapping.dmp
-
memory/2000-152-0x0000000000000000-mapping.dmp
-
memory/2012-96-0x0000000000000000-mapping.dmp
-
memory/2016-136-0x0000000000000000-mapping.dmp
-
memory/2016-153-0x0000000000000000-mapping.dmp
-
memory/2024-118-0x0000000000000000-mapping.dmp
-
memory/2032-135-0x0000000000000000-mapping.dmp
-
memory/2040-92-0x00000000743F0000-0x000000007499B000-memory.dmpFilesize
5.7MB
-
memory/2040-85-0x0000000000000000-mapping.dmp
-
memory/2040-104-0x00000000743F0000-0x000000007499B000-memory.dmpFilesize
5.7MB
-
memory/2044-131-0x0000000000000000-mapping.dmp