Analysis
-
max time kernel
3s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 11:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
86c6e9efb022f4337e0b5efdc6c24de0.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
86c6e9efb022f4337e0b5efdc6c24de0.exe
-
Size
18KB
-
MD5
86c6e9efb022f4337e0b5efdc6c24de0
-
SHA1
d767781b0853543cea63e7b3b86a374c3e64f659
-
SHA256
8dc251536b81887b455a7fce8177fb434116fab29d5b33aa53ce8f9f0891e65a
-
SHA512
fd8814c1ddde2cd24d7aa300394141f976f42d43ab8ad8093d72962bdde6727d13259f8312899561440d90588f0f63c08672dbe373c15d4ebab5ed1f81ac53b6
-
SSDEEP
384:Is76FphMOOJ8uVRHXHKNz5fA3p+ikNEa37uOe/iXclaPtpwZXK:IP6NvdXstY3YEniXHt0a
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 6892 zscqahlp.exe 3208 zscqahlp.exe 5160 zscqahlp.exe 7728 zscqahlp.exe 6096 zscqahlp.exe 1956 zscqahlp.exe 6292 zscqahlp.exe 7456 cmd.exe 712 cmd.exe 5504 zscqahlp.exe 3552 Conhost.exe 5348 zscqahlp.exe -
Installs/modifies Browser Helper Object 2 TTPs 24 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" 86c6e9efb022f4337e0b5efdc6c24de0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07} cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{70AF1289-F140-A140-D012-C1458759FC07}\ = "ypcqfhlp.dll" zscqahlp.exe -
Drops file in System32 directory 62 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe Conhost.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys cmd.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe 86c6e9efb022f4337e0b5efdc6c24de0.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe cmd.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys 86c6e9efb022f4337e0b5efdc6c24de0.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll cmd.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe cmd.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe cmd.exe File created C:\Windows\SysWOW64\zscqahlp.exe 86c6e9efb022f4337e0b5efdc6c24de0.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll cmd.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll Conhost.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll Conhost.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 86c6e9efb022f4337e0b5efdc6c24de0.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll cmd.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll 86c6e9efb022f4337e0b5efdc6c24de0.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe cmd.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys cmd.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys Conhost.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll cmd.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll 86c6e9efb022f4337e0b5efdc6c24de0.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File created C:\Windows\SysWOW64\ypcqfhlp.dll zscqahlp.exe -
Modifies registry class 39 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07} 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" 86c6e9efb022f4337e0b5efdc6c24de0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" Conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 86c6e9efb022f4337e0b5efdc6c24de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqfhlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{70AF1289-F140-A140-D012-C1458759FC07}\InprocServer32 zscqahlp.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 6892 zscqahlp.exe 6892 zscqahlp.exe 6892 zscqahlp.exe 6892 zscqahlp.exe 3208 zscqahlp.exe 3208 zscqahlp.exe 3208 zscqahlp.exe 3208 zscqahlp.exe 5160 zscqahlp.exe 5160 zscqahlp.exe 5160 zscqahlp.exe 5160 zscqahlp.exe 7728 zscqahlp.exe 7728 zscqahlp.exe 7728 zscqahlp.exe 7728 zscqahlp.exe 6096 zscqahlp.exe 6096 zscqahlp.exe 6096 zscqahlp.exe 6096 zscqahlp.exe 1956 zscqahlp.exe 1956 zscqahlp.exe 1956 zscqahlp.exe 1956 zscqahlp.exe 6292 zscqahlp.exe 6292 zscqahlp.exe 6292 zscqahlp.exe 6292 zscqahlp.exe 7456 cmd.exe 7456 cmd.exe 7456 cmd.exe 7456 cmd.exe 712 cmd.exe 712 cmd.exe 712 cmd.exe 712 cmd.exe 5504 zscqahlp.exe 5504 zscqahlp.exe 5504 zscqahlp.exe 5504 zscqahlp.exe 3552 Conhost.exe 3552 Conhost.exe 3552 Conhost.exe 3552 Conhost.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe Token: SeDebugPrivilege 6892 zscqahlp.exe Token: SeDebugPrivilege 3208 zscqahlp.exe Token: SeDebugPrivilege 5160 zscqahlp.exe Token: SeDebugPrivilege 7728 zscqahlp.exe Token: SeDebugPrivilege 6096 zscqahlp.exe Token: SeDebugPrivilege 1956 zscqahlp.exe Token: SeDebugPrivilege 6292 zscqahlp.exe Token: SeDebugPrivilege 7456 cmd.exe Token: SeDebugPrivilege 712 cmd.exe Token: SeDebugPrivilege 5504 zscqahlp.exe Token: SeDebugPrivilege 3552 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1584 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 86 PID 2256 wrote to memory of 1584 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 86 PID 2256 wrote to memory of 1584 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 86 PID 2256 wrote to memory of 6892 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 88 PID 2256 wrote to memory of 6892 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 88 PID 2256 wrote to memory of 6892 2256 86c6e9efb022f4337e0b5efdc6c24de0.exe 88 PID 6892 wrote to memory of 6932 6892 zscqahlp.exe 89 PID 6892 wrote to memory of 6932 6892 zscqahlp.exe 89 PID 6892 wrote to memory of 6932 6892 zscqahlp.exe 89 PID 6892 wrote to memory of 3208 6892 zscqahlp.exe 91 PID 6892 wrote to memory of 3208 6892 zscqahlp.exe 91 PID 6892 wrote to memory of 3208 6892 zscqahlp.exe 91 PID 3208 wrote to memory of 1984 3208 zscqahlp.exe 92 PID 3208 wrote to memory of 1984 3208 zscqahlp.exe 92 PID 3208 wrote to memory of 1984 3208 zscqahlp.exe 92 PID 3208 wrote to memory of 5160 3208 zscqahlp.exe 94 PID 3208 wrote to memory of 5160 3208 zscqahlp.exe 94 PID 3208 wrote to memory of 5160 3208 zscqahlp.exe 94 PID 5160 wrote to memory of 5244 5160 zscqahlp.exe 95 PID 5160 wrote to memory of 5244 5160 zscqahlp.exe 95 PID 5160 wrote to memory of 5244 5160 zscqahlp.exe 95 PID 5160 wrote to memory of 7728 5160 zscqahlp.exe 97 PID 5160 wrote to memory of 7728 5160 zscqahlp.exe 97 PID 5160 wrote to memory of 7728 5160 zscqahlp.exe 97 PID 7728 wrote to memory of 7788 7728 zscqahlp.exe 98 PID 7728 wrote to memory of 7788 7728 zscqahlp.exe 98 PID 7728 wrote to memory of 7788 7728 zscqahlp.exe 98 PID 7728 wrote to memory of 6096 7728 zscqahlp.exe 100 PID 7728 wrote to memory of 6096 7728 zscqahlp.exe 100 PID 7728 wrote to memory of 6096 7728 zscqahlp.exe 100 PID 6096 wrote to memory of 6068 6096 zscqahlp.exe 101 PID 6096 wrote to memory of 6068 6096 zscqahlp.exe 101 PID 6096 wrote to memory of 6068 6096 zscqahlp.exe 101 PID 6096 wrote to memory of 1956 6096 zscqahlp.exe 103 PID 6096 wrote to memory of 1956 6096 zscqahlp.exe 103 PID 6096 wrote to memory of 1956 6096 zscqahlp.exe 103 PID 1956 wrote to memory of 1268 1956 zscqahlp.exe 104 PID 1956 wrote to memory of 1268 1956 zscqahlp.exe 104 PID 1956 wrote to memory of 1268 1956 zscqahlp.exe 104 PID 1956 wrote to memory of 6292 1956 zscqahlp.exe 106 PID 1956 wrote to memory of 6292 1956 zscqahlp.exe 106 PID 1956 wrote to memory of 6292 1956 zscqahlp.exe 106 PID 6292 wrote to memory of 6332 6292 zscqahlp.exe 107 PID 6292 wrote to memory of 6332 6292 zscqahlp.exe 107 PID 6292 wrote to memory of 6332 6292 zscqahlp.exe 107 PID 6292 wrote to memory of 7456 6292 zscqahlp.exe 570 PID 6292 wrote to memory of 7456 6292 zscqahlp.exe 570 PID 6292 wrote to memory of 7456 6292 zscqahlp.exe 570 PID 7456 wrote to memory of 464 7456 cmd.exe 110 PID 7456 wrote to memory of 464 7456 cmd.exe 110 PID 7456 wrote to memory of 464 7456 cmd.exe 110 PID 7456 wrote to memory of 712 7456 cmd.exe 687 PID 7456 wrote to memory of 712 7456 cmd.exe 687 PID 7456 wrote to memory of 712 7456 cmd.exe 687 PID 712 wrote to memory of 7388 712 cmd.exe 113 PID 712 wrote to memory of 7388 712 cmd.exe 113 PID 712 wrote to memory of 7388 712 cmd.exe 113 PID 712 wrote to memory of 5504 712 cmd.exe 115 PID 712 wrote to memory of 5504 712 cmd.exe 115 PID 712 wrote to memory of 5504 712 cmd.exe 115 PID 5504 wrote to memory of 6996 5504 zscqahlp.exe 116 PID 5504 wrote to memory of 6996 5504 zscqahlp.exe 116 PID 5504 wrote to memory of 6996 5504 zscqahlp.exe 116 PID 5504 wrote to memory of 3552 5504 zscqahlp.exe 542
Processes
-
C:\Users\Admin\AppData\Local\Temp\86c6e9efb022f4337e0b5efdc6c24de0.exe"C:\Users\Admin\AppData\Local\Temp\86c6e9efb022f4337e0b5efdc6c24de0.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606234.bat2⤵PID:1584
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606609.bat3⤵PID:6932
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606953.bat4⤵PID:1984
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607250.bat5⤵PID:5244
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607484.bat6⤵PID:7788
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607765.bat7⤵PID:6068
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608031.bat8⤵PID:1268
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608296.bat9⤵PID:6332
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe9⤵PID:7456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608609.bat10⤵PID:464
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe10⤵PID:712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608859.bat11⤵PID:7388
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe11⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609156.bat12⤵PID:6996
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe12⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609437.bat13⤵PID:6532
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609765.bat14⤵PID:5856
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe14⤵PID:6968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610046.bat15⤵PID:6304
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe15⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610265.bat16⤵PID:5708
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe16⤵PID:1304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610578.bat17⤵PID:7704
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe17⤵PID:6044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610921.bat18⤵PID:3856
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe18⤵PID:7004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611703.bat19⤵PID:7860
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe19⤵PID:5404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612296.bat20⤵PID:8244
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe20⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612546.bat21⤵PID:3460
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe21⤵PID:7296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612843.bat22⤵PID:1828
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe22⤵PID:5908
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe23⤵PID:5164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613328.bat24⤵PID:6664
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe24⤵PID:6368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613593.bat25⤵PID:7716
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe25⤵PID:6136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613890.bat26⤵PID:6472
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe26⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614187.bat27⤵PID:7320
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe27⤵PID:5748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614484.bat28⤵PID:8004
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe28⤵PID:6544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614796.bat29⤵PID:5724
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe29⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615078.bat30⤵PID:6852
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe30⤵PID:1772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615406.bat31⤵PID:4904
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe31⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615656.bat32⤵PID:3712
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe32⤵PID:9336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615921.bat33⤵PID:9376
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe33⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616140.bat34⤵PID:5452
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe34⤵PID:6516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616406.bat35⤵PID:7520
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe35⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616640.bat36⤵PID:5236
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe36⤵PID:7816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616859.bat37⤵PID:8624
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe37⤵PID:6676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617187.bat38⤵PID:2624
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe38⤵PID:9296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617390.bat39⤵PID:9724
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe39⤵PID:9788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617687.bat40⤵PID:9536
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe40⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617937.bat41⤵PID:6624
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe41⤵PID:9056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618171.bat42⤵PID:9192
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe42⤵PID:7988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618453.bat43⤵PID:6148
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe43⤵PID:7872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618671.bat44⤵PID:656
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe44⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618953.bat45⤵PID:6244
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe45⤵PID:7188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619281.bat46⤵PID:9424
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe46⤵PID:9680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619578.bat47⤵PID:5624
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe47⤵PID:6036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619781.bat48⤵PID:2512
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe48⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620031.bat49⤵PID:5720
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe49⤵PID:8116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620328.bat50⤵PID:6376
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe50⤵PID:8228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620656.bat51⤵PID:8688
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe51⤵PID:7868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620937.bat52⤵PID:7092
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe52⤵PID:8860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621187.bat53⤵PID:10136
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe53⤵PID:6388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621578.bat54⤵PID:5040
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe54⤵PID:10400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621796.bat55⤵PID:10444
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe55⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622015.bat56⤵PID:6392
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe56⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622250.bat57⤵PID:6352
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe57⤵PID:9736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622625.bat58⤵PID:8368
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe58⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623828.bat59⤵PID:2436
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe59⤵PID:9936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624109.bat60⤵PID:5548
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe60⤵PID:9212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624343.bat61⤵PID:9888
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe61⤵PID:5660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624562.bat62⤵PID:8424
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe62⤵PID:9508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624796.bat63⤵PID:5308
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe63⤵PID:11216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625062.bat64⤵PID:11184
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe64⤵PID:11380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625296.bat65⤵PID:11428
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe65⤵PID:9316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625546.bat66⤵PID:6396
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe66⤵PID:9188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625796.bat67⤵PID:7164
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe67⤵PID:10776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626062.bat68⤵PID:9580
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe68⤵PID:11552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626265.bat69⤵PID:11588
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe69⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626515.bat70⤵PID:2508
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe70⤵PID:9844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626765.bat71⤵PID:7600
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe71⤵PID:5440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627031.bat72⤵PID:3156
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe72⤵PID:7432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627343.bat73⤵PID:8300
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe73⤵PID:10364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627625.bat74⤵PID:11136
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe74⤵PID:7208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628078.bat75⤵PID:11844
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe75⤵PID:5364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628375.bat76⤵PID:8964
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe76⤵PID:10036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628703.bat77⤵PID:8372
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe77⤵PID:7452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629000.bat78⤵PID:9324
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe78⤵PID:6616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629281.bat79⤵PID:8672
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe79⤵PID:11908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630015.bat80⤵PID:12144
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe80⤵PID:5532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630328.bat81⤵PID:10832
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe81⤵PID:8724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630562.bat82⤵PID:11448
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe82⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630828.bat83⤵PID:5124
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe83⤵PID:8636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631062.bat84⤵PID:9120
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe84⤵PID:7328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631390.bat85⤵PID:10916
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe85⤵PID:12428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631656.bat86⤵PID:12456
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe86⤵PID:11916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631906.bat87⤵PID:8292
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe87⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632328.bat88⤵PID:388
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe88⤵PID:11120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632656.bat89⤵PID:10196
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe89⤵PID:9256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632937.bat90⤵PID:11328
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe90⤵PID:12164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633250.bat91⤵PID:10988
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe91⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633687.bat92⤵PID:4348
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe92⤵PID:10636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634015.bat93⤵PID:1240
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe93⤵PID:8284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634265.bat94⤵PID:7984
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe94⤵PID:12316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634796.bat95⤵PID:10696
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe95⤵PID:12968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635125.bat96⤵PID:9400
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe96⤵PID:13796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635421.bat97⤵PID:5080
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe97⤵PID:11344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635843.bat98⤵PID:10904
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe98⤵PID:7528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636140.bat99⤵PID:8808
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe99⤵PID:13592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636453.bat100⤵PID:12560
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe100⤵PID:10908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636734.bat101⤵PID:9032
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe101⤵PID:9912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637000.bat102⤵PID:6156
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe102⤵PID:12476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637484.bat103⤵PID:10632
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe103⤵PID:13324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637703.bat104⤵PID:13896
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe104⤵PID:5968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638000.bat105⤵PID:14332
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe105⤵PID:13276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638390.bat106⤵PID:11628
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe106⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638812.bat107⤵PID:6416
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe107⤵PID:10952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639140.bat108⤵PID:9612
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe108⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639468.bat109⤵PID:9940
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe109⤵PID:12344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639828.bat110⤵PID:1520
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe110⤵PID:12772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640156.bat111⤵PID:14380
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe111⤵PID:6444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640484.bat112⤵PID:9284
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe112⤵PID:10940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640843.bat113⤵PID:11532
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe113⤵PID:7912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641250.bat114⤵PID:11776
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe114⤵PID:12856
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe115⤵PID:15200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642718.bat116⤵PID:5580
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe116⤵PID:11980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643062.bat117⤵PID:13576
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe117⤵PID:15260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643437.bat118⤵PID:12048
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe118⤵PID:6420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643671.bat119⤵PID:10880
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe119⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644109.bat120⤵PID:7408
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe120⤵PID:13644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644390.bat121⤵PID:6896
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe121⤵PID:5328
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe122⤵PID:16356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-