Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
5374baebb2368c86ec14174dfafd3c95.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5374baebb2368c86ec14174dfafd3c95.exe
Resource
win10v2004-20231215-en
General
-
Target
5374baebb2368c86ec14174dfafd3c95.exe
-
Size
686KB
-
MD5
5374baebb2368c86ec14174dfafd3c95
-
SHA1
e6231ff52c123c47a18936c168e9ee15fbccb156
-
SHA256
104486dbe85c50d2da27a784ce7095a2f26f12c7ff5087d0d9660ed15985579c
-
SHA512
4db64c8545fa6eecfb8956eb2da545a108f715e9f7503c83a46ea721bc9318f054e0f9ae3eba0a98fa915ff04bb0f775899bc141e04bb9241167234d02df42f8
-
SSDEEP
12288:Z9gaVtvsJvAGQFXiAb83nknnB2sGhsZkBPjc0/rTCF+Qx0ULjJSK/MUNFUGhuKkx:Mk6JvAzFXfbqknBlSsZON/r2dx1LjJS7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 57 IoCs
resource yara_rule behavioral1/memory/1748-9-0x0000000000400000-0x00000000004A1000-memory.dmp modiloader_stage2 behavioral1/files/0x000a000000012251-16.dat modiloader_stage2 behavioral1/memory/1748-23-0x0000000000400000-0x00000000004A1000-memory.dmp modiloader_stage2 behavioral1/memory/2680-36-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2576-42-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2012-46-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/580-50-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/584-54-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1464-59-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1852-65-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2780-70-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2916-75-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1952-81-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1996-87-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2512-91-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1264-96-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/3032-100-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1276-105-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/928-110-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1328-115-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/3004-120-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2740-124-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2336-127-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1364-129-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1252-131-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/948-134-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1540-135-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1592-136-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2168-138-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/604-140-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1112-142-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2376-144-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2764-146-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2644-148-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1496-150-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1916-153-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1300-154-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2288-156-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1608-157-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2456-158-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2736-159-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2848-161-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2940-162-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2748-163-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2564-164-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2856-165-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2624-167-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2580-169-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2212-170-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2540-171-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1444-172-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/436-174-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/576-176-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/1636-178-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/628-179-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2864-180-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 behavioral1/memory/2788-182-0x0000000000400000-0x0000000000495000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2680 SERVER.EXE 2576 services.exe 2012 services.exe 580 services.exe 584 services.exe 1464 services.exe 1852 services.exe 2780 services.exe 2916 services.exe 1952 services.exe 1996 services.exe 2512 services.exe 1264 services.exe 3032 services.exe 1276 services.exe 928 services.exe 1328 services.exe 3004 services.exe 2740 services.exe 2336 services.exe 1364 services.exe 1252 services.exe 948 services.exe 1540 services.exe 1592 services.exe 2168 services.exe 604 services.exe 1112 services.exe 2376 services.exe 2764 services.exe 2644 services.exe 1496 services.exe 1916 services.exe 1300 services.exe 2288 services.exe 1608 services.exe 2456 services.exe 2736 services.exe 2848 services.exe 2940 services.exe 2748 services.exe 2564 services.exe 2856 services.exe 2624 services.exe 2580 services.exe 2212 services.exe 2540 services.exe 1444 services.exe 436 services.exe 576 services.exe 1636 services.exe 628 services.exe 2864 services.exe 2788 services.exe 2904 services.exe 2752 services.exe 1612 services.exe 2536 services.exe 1944 services.exe 1996 services.exe 2512 services.exe 792 services.exe 924 services.exe 1720 services.exe -
Loads dropped DLL 64 IoCs
pid Process 1748 5374baebb2368c86ec14174dfafd3c95.exe 1748 5374baebb2368c86ec14174dfafd3c95.exe 2680 SERVER.EXE 2680 SERVER.EXE 2576 services.exe 2576 services.exe 2012 services.exe 2012 services.exe 580 services.exe 580 services.exe 584 services.exe 584 services.exe 1464 services.exe 1464 services.exe 1852 services.exe 1852 services.exe 2780 services.exe 2780 services.exe 2916 services.exe 2916 services.exe 1952 services.exe 1952 services.exe 1996 services.exe 1996 services.exe 2512 services.exe 2512 services.exe 1264 services.exe 1264 services.exe 3032 services.exe 3032 services.exe 1276 services.exe 1276 services.exe 928 services.exe 928 services.exe 1328 services.exe 1328 services.exe 3004 services.exe 3004 services.exe 2740 services.exe 2740 services.exe 2336 services.exe 2336 services.exe 1364 services.exe 1364 services.exe 1252 services.exe 1252 services.exe 948 services.exe 948 services.exe 1540 services.exe 1540 services.exe 1592 services.exe 1592 services.exe 2168 services.exe 2168 services.exe 604 services.exe 604 services.exe 1112 services.exe 1112 services.exe 2376 services.exe 2376 services.exe 2764 services.exe 2764 services.exe 2644 services.exe 2644 services.exe -
resource yara_rule behavioral1/memory/1748-4-0x0000000000400000-0x00000000004A1000-memory.dmp upx behavioral1/memory/1748-7-0x0000000000400000-0x00000000004A1000-memory.dmp upx behavioral1/memory/1748-9-0x0000000000400000-0x00000000004A1000-memory.dmp upx behavioral1/memory/1748-23-0x0000000000400000-0x00000000004A1000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File opened for modification C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe SERVER.EXE File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe File created C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe services.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 2400 wrote to memory of 1748 2400 5374baebb2368c86ec14174dfafd3c95.exe 28 PID 1748 wrote to memory of 2680 1748 5374baebb2368c86ec14174dfafd3c95.exe 30 PID 1748 wrote to memory of 2680 1748 5374baebb2368c86ec14174dfafd3c95.exe 30 PID 1748 wrote to memory of 2680 1748 5374baebb2368c86ec14174dfafd3c95.exe 30 PID 1748 wrote to memory of 2680 1748 5374baebb2368c86ec14174dfafd3c95.exe 30 PID 2680 wrote to memory of 2576 2680 SERVER.EXE 31 PID 2680 wrote to memory of 2576 2680 SERVER.EXE 31 PID 2680 wrote to memory of 2576 2680 SERVER.EXE 31 PID 2680 wrote to memory of 2576 2680 SERVER.EXE 31 PID 2576 wrote to memory of 2012 2576 services.exe 32 PID 2576 wrote to memory of 2012 2576 services.exe 32 PID 2576 wrote to memory of 2012 2576 services.exe 32 PID 2576 wrote to memory of 2012 2576 services.exe 32 PID 2012 wrote to memory of 580 2012 services.exe 33 PID 2012 wrote to memory of 580 2012 services.exe 33 PID 2012 wrote to memory of 580 2012 services.exe 33 PID 2012 wrote to memory of 580 2012 services.exe 33 PID 580 wrote to memory of 584 580 services.exe 34 PID 580 wrote to memory of 584 580 services.exe 34 PID 580 wrote to memory of 584 580 services.exe 34 PID 580 wrote to memory of 584 580 services.exe 34 PID 584 wrote to memory of 1464 584 services.exe 35 PID 584 wrote to memory of 1464 584 services.exe 35 PID 584 wrote to memory of 1464 584 services.exe 35 PID 584 wrote to memory of 1464 584 services.exe 35 PID 1464 wrote to memory of 1852 1464 services.exe 36 PID 1464 wrote to memory of 1852 1464 services.exe 36 PID 1464 wrote to memory of 1852 1464 services.exe 36 PID 1464 wrote to memory of 1852 1464 services.exe 36 PID 1852 wrote to memory of 2780 1852 services.exe 37 PID 1852 wrote to memory of 2780 1852 services.exe 37 PID 1852 wrote to memory of 2780 1852 services.exe 37 PID 1852 wrote to memory of 2780 1852 services.exe 37 PID 2780 wrote to memory of 2916 2780 services.exe 38 PID 2780 wrote to memory of 2916 2780 services.exe 38 PID 2780 wrote to memory of 2916 2780 services.exe 38 PID 2780 wrote to memory of 2916 2780 services.exe 38 PID 2916 wrote to memory of 1952 2916 services.exe 39 PID 2916 wrote to memory of 1952 2916 services.exe 39 PID 2916 wrote to memory of 1952 2916 services.exe 39 PID 2916 wrote to memory of 1952 2916 services.exe 39 PID 1952 wrote to memory of 1996 1952 services.exe 40 PID 1952 wrote to memory of 1996 1952 services.exe 40 PID 1952 wrote to memory of 1996 1952 services.exe 40 PID 1952 wrote to memory of 1996 1952 services.exe 40 PID 1996 wrote to memory of 2512 1996 services.exe 41 PID 1996 wrote to memory of 2512 1996 services.exe 41 PID 1996 wrote to memory of 2512 1996 services.exe 41 PID 1996 wrote to memory of 2512 1996 services.exe 41 PID 2512 wrote to memory of 1264 2512 services.exe 42 PID 2512 wrote to memory of 1264 2512 services.exe 42 PID 2512 wrote to memory of 1264 2512 services.exe 42 PID 2512 wrote to memory of 1264 2512 services.exe 42 PID 1264 wrote to memory of 3032 1264 services.exe 43 PID 1264 wrote to memory of 3032 1264 services.exe 43 PID 1264 wrote to memory of 3032 1264 services.exe 43 PID 1264 wrote to memory of 3032 1264 services.exe 43 PID 3032 wrote to memory of 1276 3032 services.exe 44 PID 3032 wrote to memory of 1276 3032 services.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\5374baebb2368c86ec14174dfafd3c95.exe"C:\Users\Admin\AppData\Local\Temp\5374baebb2368c86ec14174dfafd3c95.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\5374baebb2368c86ec14174dfafd3c95.exeC:\Users\Admin\AppData\Local\Temp\5374baebb2368c86ec14174dfafd3c95.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:604 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"34⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"35⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"36⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"40⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"41⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"43⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"44⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"45⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"47⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"48⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"49⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"50⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"52⤵
- Executes dropped EXE
PID:576 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"53⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"54⤵
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"55⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"57⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"58⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"59⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"61⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"63⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"64⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"66⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"67⤵PID:1628
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"68⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"69⤵
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"70⤵
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"71⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"72⤵
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"73⤵
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"74⤵PID:2416
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"75⤵PID:764
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"76⤵
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"77⤵PID:2360
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"78⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"79⤵PID:1900
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"80⤵PID:1796
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"81⤵PID:2168
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"82⤵
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"83⤵PID:1560
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"84⤵PID:524
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"85⤵PID:1008
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"86⤵PID:2144
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"87⤵PID:2148
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"88⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"89⤵PID:1916
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"90⤵PID:2412
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"91⤵PID:2060
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"92⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"93⤵PID:2596
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"94⤵
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"95⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"96⤵PID:2692
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"97⤵PID:2604
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"98⤵PID:2732
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"99⤵PID:2564
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"100⤵
- Drops file in System32 directory
PID:3044 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"101⤵
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"102⤵PID:2576
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"103⤵
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"104⤵
- Drops file in System32 directory
PID:664 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"105⤵
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"106⤵PID:1480
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"107⤵PID:480
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"108⤵
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"109⤵PID:2800
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"110⤵PID:2936
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"111⤵
- Drops file in System32 directory
PID:844 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"112⤵PID:2904
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"113⤵
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"114⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"115⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"116⤵PID:1968
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"117⤵
- Drops file in System32 directory
PID:532 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"118⤵PID:1960
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"119⤵PID:2628
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"120⤵PID:1668
-
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"121⤵
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"C:\Windows\system32\QBgSrtcTkpqZ0Foe7xhdWGlX52P\services.exe"122⤵PID:1664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-