Technical Information
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Load' = '%APPDATA%\Essentials\Defender.exe.lnk '
- '%TEMP%\svhost.exe'
- '%HOMEPATH%\AppData\Roaming\Essentials\Defender.exe'
- '%HOMEPATH%\AppData\Roaming\tmp.exe'
- '<SYSTEM32>\cmd.exe'
- '<SYSTEM32>\reg.exe' add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%APPDATA%\Essentials\Defender.exe.lnk " /f
- svhost.exe
- %HOMEPATH%\AppData\Roaming\Essentials\Defender.exe
- %HOMEPATH%\AppData\Roaming\Essentials\melt.bat
- %APPDATA%\Imminent\Logs\20-06-2017
- %HOMEPATH%\AppData\Roaming\tmp.exe
- %TEMP%\svhost.exe
- <Full path to file>
- 'xd#####cher.giize.com':4848
- DNS ASK Xd#####cher.giize.com