Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe
-
Size
114KB
-
MD5
863e8308667bbb8d7bad223f4b612e7c
-
SHA1
7f7870310916214f7736d5b73dc61dc10f2f9cfd
-
SHA256
59de5f450e1d360d082497bad068ec8e59e8b2891487c6243b4828c85bd798c6
-
SHA512
f6147a881b061ea27704ce13597e8980e59988501c373710f7e4a823dfabd0dc6db6567b2bc1fabcf37bdf62f89e87211fa2da4b477d52d982873f54b5ed424d
-
SSDEEP
3072:UhiPLaCWnzRm/vjYZihCCrQKfaAQDWkGcz:M6LaVn9m3jYZVCrAHW5cz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\bnbmabel\\jtsykbnc.exe" svchost.exe -
Ramnit family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jtsykbnc.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jtsykbnc.exe svchost.exe -
Executes dropped EXE 64 IoCs
pid Process 1836 byqtmdpi.exe 1280 byqtmdpi.exe 316 byqtmdpi.exe 1184 byqtmdpi.exe 2380 byqtmdpi.exe 1076 byqtmdpi.exe 3008 byqtmdpi.exe 2372 byqtmdpi.exe 2336 byqtmdpi.exe 1596 byqtmdpi.exe 1264 byqtmdpi.exe 1416 byqtmdpi.exe 2884 byqtmdpi.exe 496 byqtmdpi.exe 944 byqtmdpi.exe 2244 byqtmdpi.exe 1832 byqtmdpi.exe 3068 byqtmdpi.exe 1316 byqtmdpi.exe 2072 byqtmdpi.exe 1372 byqtmdpi.exe 1868 byqtmdpi.exe 1704 byqtmdpi.exe 1636 byqtmdpi.exe 2960 byqtmdpi.exe 2148 byqtmdpi.exe 2744 byqtmdpi.exe 556 byqtmdpi.exe 2968 byqtmdpi.exe 1060 byqtmdpi.exe 604 byqtmdpi.exe 1888 byqtmdpi.exe 2380 byqtmdpi.exe 3040 byqtmdpi.exe 2388 byqtmdpi.exe 2384 byqtmdpi.exe 1448 byqtmdpi.exe 2612 byqtmdpi.exe 2720 byqtmdpi.exe 1064 byqtmdpi.exe 2420 byqtmdpi.exe 1168 byqtmdpi.exe 2128 byqtmdpi.exe 1092 byqtmdpi.exe 1756 byqtmdpi.exe 2564 byqtmdpi.exe 1292 byqtmdpi.exe 1040 byqtmdpi.exe 348 byqtmdpi.exe 2600 byqtmdpi.exe 1464 byqtmdpi.exe 2264 byqtmdpi.exe 2780 byqtmdpi.exe 2760 byqtmdpi.exe 2952 byqtmdpi.exe 2956 byqtmdpi.exe 2676 byqtmdpi.exe 2332 byqtmdpi.exe 2888 byqtmdpi.exe 592 byqtmdpi.exe 2868 byqtmdpi.exe 264 byqtmdpi.exe 576 byqtmdpi.exe 2976 byqtmdpi.exe -
Loads dropped DLL 64 IoCs
pid Process 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 1836 byqtmdpi.exe 1280 byqtmdpi.exe 316 byqtmdpi.exe 1184 byqtmdpi.exe 2380 byqtmdpi.exe 1076 byqtmdpi.exe 3008 byqtmdpi.exe 2372 byqtmdpi.exe 2336 byqtmdpi.exe 1596 byqtmdpi.exe 1264 byqtmdpi.exe 1416 byqtmdpi.exe 2884 byqtmdpi.exe 496 byqtmdpi.exe 944 byqtmdpi.exe 2244 byqtmdpi.exe 1832 byqtmdpi.exe 3068 byqtmdpi.exe 1316 byqtmdpi.exe 2072 byqtmdpi.exe 1372 byqtmdpi.exe 1868 byqtmdpi.exe 1704 byqtmdpi.exe 1636 byqtmdpi.exe 2960 byqtmdpi.exe 2148 byqtmdpi.exe 2744 byqtmdpi.exe 556 byqtmdpi.exe 2968 byqtmdpi.exe 1060 byqtmdpi.exe 604 byqtmdpi.exe 1888 byqtmdpi.exe 2380 byqtmdpi.exe 3040 byqtmdpi.exe 2388 byqtmdpi.exe 2384 byqtmdpi.exe 1448 byqtmdpi.exe 2612 byqtmdpi.exe 2720 byqtmdpi.exe 1064 byqtmdpi.exe 2420 byqtmdpi.exe 1168 byqtmdpi.exe 2128 byqtmdpi.exe 1092 byqtmdpi.exe 1756 byqtmdpi.exe 2564 byqtmdpi.exe 1292 byqtmdpi.exe 1040 byqtmdpi.exe 348 byqtmdpi.exe 2600 byqtmdpi.exe 1464 byqtmdpi.exe 2264 byqtmdpi.exe 2780 byqtmdpi.exe 2760 byqtmdpi.exe 2952 byqtmdpi.exe 2956 byqtmdpi.exe 2676 byqtmdpi.exe 2332 byqtmdpi.exe 2888 byqtmdpi.exe 592 byqtmdpi.exe 2868 byqtmdpi.exe 264 byqtmdpi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\JtsYkbnc = "C:\\Users\\Admin\\AppData\\Local\\bnbmabel\\jtsykbnc.exe" svchost.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2548 set thread context of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 1836 set thread context of 1280 1836 byqtmdpi.exe 34 PID 316 set thread context of 1184 316 byqtmdpi.exe 36 PID 2380 set thread context of 1076 2380 byqtmdpi.exe 38 PID 3008 set thread context of 2372 3008 byqtmdpi.exe 40 PID 2336 set thread context of 1596 2336 byqtmdpi.exe 42 PID 1264 set thread context of 1416 1264 byqtmdpi.exe 44 PID 2884 set thread context of 496 2884 byqtmdpi.exe 46 PID 944 set thread context of 2244 944 byqtmdpi.exe 48 PID 1832 set thread context of 3068 1832 byqtmdpi.exe 50 PID 1316 set thread context of 2072 1316 byqtmdpi.exe 52 PID 1372 set thread context of 1868 1372 byqtmdpi.exe 54 PID 1704 set thread context of 1636 1704 byqtmdpi.exe 56 PID 2960 set thread context of 2148 2960 byqtmdpi.exe 58 PID 2744 set thread context of 556 2744 byqtmdpi.exe 60 PID 2968 set thread context of 1060 2968 byqtmdpi.exe 62 PID 604 set thread context of 1888 604 byqtmdpi.exe 64 PID 2380 set thread context of 3040 2380 byqtmdpi.exe 66 PID 2388 set thread context of 2384 2388 byqtmdpi.exe 68 PID 1448 set thread context of 2612 1448 byqtmdpi.exe 70 PID 2720 set thread context of 1064 2720 byqtmdpi.exe 72 PID 2420 set thread context of 1168 2420 byqtmdpi.exe 74 PID 2128 set thread context of 1092 2128 byqtmdpi.exe 76 PID 1756 set thread context of 2564 1756 byqtmdpi.exe 79 PID 1292 set thread context of 1040 1292 byqtmdpi.exe 81 PID 348 set thread context of 2600 348 byqtmdpi.exe 83 PID 1464 set thread context of 2264 1464 byqtmdpi.exe 85 PID 2780 set thread context of 2760 2780 byqtmdpi.exe 87 PID 2952 set thread context of 2956 2952 byqtmdpi.exe 89 PID 2676 set thread context of 2332 2676 byqtmdpi.exe 91 PID 2888 set thread context of 592 2888 byqtmdpi.exe 93 PID 2868 set thread context of 264 2868 byqtmdpi.exe 95 PID 576 set thread context of 2976 576 byqtmdpi.exe 97 PID 1700 set thread context of 1980 1700 byqtmdpi.exe 99 PID 2388 set thread context of 2124 2388 byqtmdpi.exe 101 PID 1632 set thread context of 840 1632 byqtmdpi.exe 103 PID 1680 set thread context of 1388 1680 byqtmdpi.exe 105 PID 960 set thread context of 2884 960 byqtmdpi.exe 107 PID 1572 set thread context of 1724 1572 byqtmdpi.exe 109 PID 1860 set thread context of 2076 1860 byqtmdpi.exe 111 PID 1292 set thread context of 1872 1292 byqtmdpi.exe 113 PID 2548 set thread context of 2412 2548 byqtmdpi.exe 115 PID 1464 set thread context of 2596 1464 byqtmdpi.exe 117 PID 2908 set thread context of 2216 2908 byqtmdpi.exe 119 PID 2704 set thread context of 1912 2704 byqtmdpi.exe 121 PID 2352 set thread context of 852 2352 byqtmdpi.exe 123 PID 560 set thread context of 2968 560 byqtmdpi.exe 125 PID 1732 set thread context of 2848 1732 byqtmdpi.exe 127 PID 1148 set thread context of 1776 1148 byqtmdpi.exe 129 PID 2992 set thread context of 2020 2992 byqtmdpi.exe 131 PID 2248 set thread context of 2432 2248 byqtmdpi.exe 133 PID 2140 set thread context of 2720 2140 byqtmdpi.exe 135 PID 1144 set thread context of 704 1144 byqtmdpi.exe 137 PID 1008 set thread context of 1376 1008 byqtmdpi.exe 139 PID 1768 set thread context of 2228 1768 byqtmdpi.exe 141 PID 2260 set thread context of 900 2260 byqtmdpi.exe 143 PID 2608 set thread context of 2092 2608 byqtmdpi.exe 145 PID 2936 set thread context of 2932 2936 byqtmdpi.exe 147 PID 2912 set thread context of 2908 2912 byqtmdpi.exe 149 PID 2768 set thread context of 2704 2768 byqtmdpi.exe 151 PID 2744 set thread context of 2500 2744 byqtmdpi.exe 153 PID 1176 set thread context of 2620 1176 byqtmdpi.exe 155 PID 2876 set thread context of 1520 2876 byqtmdpi.exe 157 PID 1284 set thread context of 3020 1284 byqtmdpi.exe 159 -
resource yara_rule behavioral1/memory/804-6-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-10-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-11-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-9-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-3-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-2-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-63-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/804-85-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1280-106-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1184-119-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1184-124-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1076-141-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2372-158-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1596-175-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1416-192-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/496-209-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2244-222-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2244-227-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/3068-244-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2072-261-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1868-278-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1636-290-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2148-312-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1060-345-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1888-356-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1888-359-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2384-382-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2384-385-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2612-398-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1168-421-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1040-460-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2600-469-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2956-510-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2332-523-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2976-560-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1980-573-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/840-598-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1388-611-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2076-648-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/852-721-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2968-734-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2848-745-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1776-760-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2020-773-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1264-978-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/3004-1120-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2684-1242-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2516-1375-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2408-1614-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2580-2989-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2580-3487-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2480-3506-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2316-3601-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2160-3638-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2144-3651-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1292-3736-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1344-3797-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtmapair.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byqtmdpi.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5673931-071E-11F0-9F30-7694D31B45CA} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe 2328 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe Token: SeDebugPrivilege 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe Token: SeSecurityPrivilege 2512 svchost.exe Token: SeSecurityPrivilege 2328 svchost.exe Token: SeDebugPrivilege 2328 svchost.exe Token: SeSecurityPrivilege 1280 byqtmdpi.exe Token: SeDebugPrivilege 1280 byqtmdpi.exe Token: SeSecurityPrivilege 1184 byqtmdpi.exe Token: SeDebugPrivilege 1184 byqtmdpi.exe Token: SeSecurityPrivilege 1076 byqtmdpi.exe Token: SeDebugPrivilege 1076 byqtmdpi.exe Token: SeSecurityPrivilege 2372 byqtmdpi.exe Token: SeDebugPrivilege 2372 byqtmdpi.exe Token: SeSecurityPrivilege 1596 byqtmdpi.exe Token: SeDebugPrivilege 1596 byqtmdpi.exe Token: SeSecurityPrivilege 1416 byqtmdpi.exe Token: SeDebugPrivilege 1416 byqtmdpi.exe Token: SeSecurityPrivilege 496 byqtmdpi.exe Token: SeDebugPrivilege 496 byqtmdpi.exe Token: SeSecurityPrivilege 2244 byqtmdpi.exe Token: SeDebugPrivilege 2244 byqtmdpi.exe Token: SeSecurityPrivilege 3068 byqtmdpi.exe Token: SeDebugPrivilege 3068 byqtmdpi.exe Token: SeSecurityPrivilege 2072 byqtmdpi.exe Token: SeDebugPrivilege 2072 byqtmdpi.exe Token: SeSecurityPrivilege 1868 byqtmdpi.exe Token: SeDebugPrivilege 1868 byqtmdpi.exe Token: SeSecurityPrivilege 1636 byqtmdpi.exe Token: SeDebugPrivilege 1636 byqtmdpi.exe Token: SeSecurityPrivilege 2148 byqtmdpi.exe Token: SeDebugPrivilege 2148 byqtmdpi.exe Token: SeSecurityPrivilege 556 byqtmdpi.exe Token: SeDebugPrivilege 556 byqtmdpi.exe Token: SeSecurityPrivilege 1060 byqtmdpi.exe Token: SeDebugPrivilege 1060 byqtmdpi.exe Token: SeSecurityPrivilege 1888 byqtmdpi.exe Token: SeDebugPrivilege 1888 byqtmdpi.exe Token: SeSecurityPrivilege 3040 byqtmdpi.exe Token: SeDebugPrivilege 3040 byqtmdpi.exe Token: SeSecurityPrivilege 2384 byqtmdpi.exe Token: SeDebugPrivilege 2384 byqtmdpi.exe Token: SeSecurityPrivilege 2612 byqtmdpi.exe Token: SeDebugPrivilege 2612 byqtmdpi.exe Token: SeSecurityPrivilege 1064 byqtmdpi.exe Token: SeDebugPrivilege 1064 byqtmdpi.exe Token: SeSecurityPrivilege 1168 byqtmdpi.exe Token: SeDebugPrivilege 1168 byqtmdpi.exe Token: SeSecurityPrivilege 1092 byqtmdpi.exe Token: SeDebugPrivilege 1092 byqtmdpi.exe Token: SeSecurityPrivilege 2564 byqtmdpi.exe Token: SeDebugPrivilege 2564 byqtmdpi.exe Token: SeSecurityPrivilege 1040 byqtmdpi.exe Token: SeDebugPrivilege 1040 byqtmdpi.exe Token: SeSecurityPrivilege 2600 byqtmdpi.exe Token: SeDebugPrivilege 2600 byqtmdpi.exe Token: SeSecurityPrivilege 2264 byqtmdpi.exe Token: SeDebugPrivilege 2264 byqtmdpi.exe Token: SeSecurityPrivilege 2760 byqtmdpi.exe Token: SeDebugPrivilege 2760 byqtmdpi.exe Token: SeSecurityPrivilege 2956 byqtmdpi.exe Token: SeDebugPrivilege 2956 byqtmdpi.exe Token: SeSecurityPrivilege 2332 byqtmdpi.exe Token: SeDebugPrivilege 2332 byqtmdpi.exe Token: SeSecurityPrivilege 592 byqtmdpi.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 2548 wrote to memory of 804 2548 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 30 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2512 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 31 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 2328 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 32 PID 804 wrote to memory of 1836 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 33 PID 804 wrote to memory of 1836 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 33 PID 804 wrote to memory of 1836 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 33 PID 804 wrote to memory of 1836 804 JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe 33 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1836 wrote to memory of 1280 1836 byqtmdpi.exe 34 PID 1280 wrote to memory of 316 1280 byqtmdpi.exe 35 PID 1280 wrote to memory of 316 1280 byqtmdpi.exe 35 PID 1280 wrote to memory of 316 1280 byqtmdpi.exe 35 PID 1280 wrote to memory of 316 1280 byqtmdpi.exe 35 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 316 wrote to memory of 1184 316 byqtmdpi.exe 36 PID 1184 wrote to memory of 2380 1184 byqtmdpi.exe 37 PID 1184 wrote to memory of 2380 1184 byqtmdpi.exe 37 PID 1184 wrote to memory of 2380 1184 byqtmdpi.exe 37 PID 1184 wrote to memory of 2380 1184 byqtmdpi.exe 37 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38 PID 2380 wrote to memory of 1076 2380 byqtmdpi.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_863e8308667bbb8d7bad223f4b612e7c.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:944 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:604 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate35⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate37⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate39⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate41⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate45⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate47⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate49⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate51⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:348 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate53⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"54⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate55⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate57⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"58⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate59⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate61⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate63⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:576 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"66⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate67⤵
- Suspicious use of SetThreadContext
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"68⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate69⤵
- Suspicious use of SetThreadContext
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"70⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate71⤵
- Suspicious use of SetThreadContext
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"72⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate73⤵
- Suspicious use of SetThreadContext
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"74⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate75⤵
- Suspicious use of SetThreadContext
PID:960 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"76⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate77⤵
- Suspicious use of SetThreadContext
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"78⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"80⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate81⤵
- Suspicious use of SetThreadContext
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"82⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate83⤵
- Suspicious use of SetThreadContext
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"84⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate85⤵
- Suspicious use of SetThreadContext
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"86⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate87⤵
- Suspicious use of SetThreadContext
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"88⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate89⤵
- Suspicious use of SetThreadContext
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"90⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate91⤵
- Suspicious use of SetThreadContext
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"92⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:560 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"94⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate95⤵
- Suspicious use of SetThreadContext
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"96⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate97⤵
- Suspicious use of SetThreadContext
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"98⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate99⤵
- Suspicious use of SetThreadContext
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"100⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate101⤵
- Suspicious use of SetThreadContext
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"102⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"104⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"106⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate107⤵
- Suspicious use of SetThreadContext
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"108⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate109⤵
- Suspicious use of SetThreadContext
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"110⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate111⤵
- Suspicious use of SetThreadContext
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"112⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate113⤵
- Suspicious use of SetThreadContext
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"114⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate115⤵
- Suspicious use of SetThreadContext
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"116⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate117⤵
- Suspicious use of SetThreadContext
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"118⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate119⤵
- Suspicious use of SetThreadContext
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"120⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe" elevate121⤵
- Suspicious use of SetThreadContext
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"C:\Users\Admin\AppData\Local\Temp\byqtmdpi.exe"122⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-