Threat Database Trojans Trojan.BypassUAC

Trojan.BypassUAC

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 17,189
Threat Level: 80 % (High)
Infected Computers: 1,738
First Seen: August 28, 2017
Last Seen: September 11, 2025
OS(es) Affected: Windows

SpyHunter Detects & Remove Trojan.BypassUAC

File System Details

Trojan.BypassUAC may create the following file(s):
# File Name MD5 Detections
1. tXbAh0wN2.exe 93fd7fbcbec13397af0e5b839f58a62f 17

Analysis Report

General information

Family Name: Trojan.BypassUAC
Signature status: No Signature

Known Samples

MD5: ec202534f0420118907aab372f0bb236
SHA1: 04049611981378a24ffb7dc5802ffe82a143f01a
SHA256: AA335486D1FF3DFCB98D693895329DB13DAF4115E836A6EF372E8B03B0CF2E8C
File Size: 196.10 KB, 196096 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • .NET
  • HighEntropy
  • No Version Info
  • ntdll
  • RijndaelManaged
  • x86

Block Information

Total Blocks: 360
Potentially Malicious Blocks: 8
Whitelisted Blocks: 105
Unknown Blocks: 247

Visual Map

? ? ? ? ? ? x 0 0 0 0 ? ? 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? 0 ? ? 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 0 0 ? ? 0 ? ? ? ? ? ? ? ? 0 0 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? 0 0 0 ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? x 0 x 0 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 ? ? ? 0 ? ? 0 ? ? 0 ? ? x ? ? 0 0 ? ? 0 0 0 ? 0 ? 0 ? 0 x x x 0 ? ? ? 0 ? ? ? 0 ? 0 0 ? 0 0 ? ? ? 0 ? ? 0 0 ? 0 ? ? ? 0 0 0 0 0 0 ? 0 ? 0 ? ? ? 0 ? 0 0 0 ? 0 ? ? ? 0 0 0 ? 0 ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\programdata\microsoft\windows\csrss.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\appdata\local\temp\tmp5c74.tmp Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows defender\d5d9da38-ea2d-4b3c-b3b4-a99904458952::run ꔽ䣝 RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Network Info Queried
  • GetAdaptersAddresses
  • GetAdaptersInfo
  • GetNetworkParams
Network Winsock2
  • WSASocket
  • WSAStartup
Network Winsock
  • closesocket
  • inet_addr
  • setsockopt
Process Shell Execute
  • CreateProcess
Other Suspicious
  • AdjustTokenPrivileges

Shell Command Execution

"schtasks.exe" /delete /f /tn "Microsoft\Windows\Client Server Runtime Process"
"schtasks.exe" /create /f /tn "Microsoft\Windows\Client Server Runtime Process" /xml "C:\Users\Qhqeuein\AppData\Local\Temp\tmp5C74.tmp"

Trending

Most Viewed

Loading...