Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe
-
Size
441KB
-
MD5
27ce923d90cb217fc5fe16dd670c1103
-
SHA1
b5c9bcce85e7bbb3d54750dec18f36a935054ce0
-
SHA256
f6c77af4080cb7a1491e64e577dc2302aca1660546bfa7ad755e18e9a1c4c1ec
-
SHA512
e53ab7284a0123ce8c273a84ae447798a62390db0ff1e93efc71c29e8f0769a71db618c329f79f9ecde6e0c05b3517ac8b35b6c913e6658dc03d51432e338d42
-
SSDEEP
6144:Rxan57fPB5/xI0A/mk/xd/TfeYvJBMMpw0fsTIro9WAQgBjJoMFrWvK8ajX2+RYz:W57nn+0mrUUwWAoMFrsanRq24b
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4100 svohst.exe 1268 svohst.exe 2908 svohst.exe 3508 svohst.exe 456 svohst.exe 384 svohst.exe 3952 svohst.exe 452 svohst.exe 5012 svohst.exe 3116 svohst.exe 3184 svohst.exe 1448 svohst.exe 2404 svohst.exe 212 svohst.exe 4004 svohst.exe 4412 svohst.exe 3472 svohst.exe 4828 svohst.exe 2440 svohst.exe 3732 svohst.exe 3012 svohst.exe 1412 svohst.exe 1548 svohst.exe 1524 svohst.exe 1916 svohst.exe 3264 svohst.exe 3332 svohst.exe 4820 svohst.exe 3628 svohst.exe 3512 svohst.exe 1740 svohst.exe 4040 svohst.exe 2064 svohst.exe 4672 svohst.exe 4036 svohst.exe 3352 svohst.exe 3612 svohst.exe 2284 svohst.exe 3552 svohst.exe 1912 svohst.exe 4536 svohst.exe 2460 svohst.exe 2988 svohst.exe 3940 svohst.exe 1572 svohst.exe 1968 svohst.exe 4200 svohst.exe 2300 svohst.exe 4152 svohst.exe 2156 svohst.exe 3412 svohst.exe 752 svohst.exe 1876 svohst.exe 5084 svohst.exe 2384 svohst.exe 4748 svohst.exe 3092 svohst.exe 3064 svohst.exe 1384 svohst.exe 5052 svohst.exe 3388 svohst.exe 4352 svohst.exe 2212 svohst.exe 3728 svohst.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File opened for modification C:\Windows\SysWOW64\Deleteme.bat svohst.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 4100 3840 27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe 83 PID 3840 wrote to memory of 4100 3840 27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe 83 PID 3840 wrote to memory of 4100 3840 27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe 83 PID 4100 wrote to memory of 1268 4100 svohst.exe 84 PID 4100 wrote to memory of 1268 4100 svohst.exe 84 PID 4100 wrote to memory of 1268 4100 svohst.exe 84 PID 1268 wrote to memory of 2908 1268 svohst.exe 85 PID 1268 wrote to memory of 2908 1268 svohst.exe 85 PID 1268 wrote to memory of 2908 1268 svohst.exe 85 PID 2908 wrote to memory of 3508 2908 svohst.exe 86 PID 2908 wrote to memory of 3508 2908 svohst.exe 86 PID 2908 wrote to memory of 3508 2908 svohst.exe 86 PID 3508 wrote to memory of 456 3508 svohst.exe 88 PID 3508 wrote to memory of 456 3508 svohst.exe 88 PID 3508 wrote to memory of 456 3508 svohst.exe 88 PID 456 wrote to memory of 384 456 svohst.exe 89 PID 456 wrote to memory of 384 456 svohst.exe 89 PID 456 wrote to memory of 384 456 svohst.exe 89 PID 384 wrote to memory of 3952 384 svohst.exe 90 PID 384 wrote to memory of 3952 384 svohst.exe 90 PID 384 wrote to memory of 3952 384 svohst.exe 90 PID 3952 wrote to memory of 452 3952 svohst.exe 92 PID 3952 wrote to memory of 452 3952 svohst.exe 92 PID 3952 wrote to memory of 452 3952 svohst.exe 92 PID 452 wrote to memory of 5012 452 svohst.exe 93 PID 452 wrote to memory of 5012 452 svohst.exe 93 PID 452 wrote to memory of 5012 452 svohst.exe 93 PID 5012 wrote to memory of 3116 5012 svohst.exe 94 PID 5012 wrote to memory of 3116 5012 svohst.exe 94 PID 5012 wrote to memory of 3116 5012 svohst.exe 94 PID 3116 wrote to memory of 3184 3116 svohst.exe 95 PID 3116 wrote to memory of 3184 3116 svohst.exe 95 PID 3116 wrote to memory of 3184 3116 svohst.exe 95 PID 3184 wrote to memory of 1448 3184 svohst.exe 96 PID 3184 wrote to memory of 1448 3184 svohst.exe 96 PID 3184 wrote to memory of 1448 3184 svohst.exe 96 PID 1448 wrote to memory of 2404 1448 svohst.exe 97 PID 1448 wrote to memory of 2404 1448 svohst.exe 97 PID 1448 wrote to memory of 2404 1448 svohst.exe 97 PID 2404 wrote to memory of 212 2404 svohst.exe 98 PID 2404 wrote to memory of 212 2404 svohst.exe 98 PID 2404 wrote to memory of 212 2404 svohst.exe 98 PID 212 wrote to memory of 4004 212 svohst.exe 99 PID 212 wrote to memory of 4004 212 svohst.exe 99 PID 212 wrote to memory of 4004 212 svohst.exe 99 PID 4004 wrote to memory of 4412 4004 svohst.exe 100 PID 4004 wrote to memory of 4412 4004 svohst.exe 100 PID 4004 wrote to memory of 4412 4004 svohst.exe 100 PID 4412 wrote to memory of 3472 4412 svohst.exe 101 PID 4412 wrote to memory of 3472 4412 svohst.exe 101 PID 4412 wrote to memory of 3472 4412 svohst.exe 101 PID 3472 wrote to memory of 4828 3472 svohst.exe 102 PID 3472 wrote to memory of 4828 3472 svohst.exe 102 PID 3472 wrote to memory of 4828 3472 svohst.exe 102 PID 4828 wrote to memory of 2440 4828 svohst.exe 103 PID 4828 wrote to memory of 2440 4828 svohst.exe 103 PID 4828 wrote to memory of 2440 4828 svohst.exe 103 PID 2440 wrote to memory of 3732 2440 svohst.exe 104 PID 2440 wrote to memory of 3732 2440 svohst.exe 104 PID 2440 wrote to memory of 3732 2440 svohst.exe 104 PID 3732 wrote to memory of 3012 3732 svohst.exe 105 PID 3732 wrote to memory of 3012 3732 svohst.exe 105 PID 3732 wrote to memory of 3012 3732 svohst.exe 105 PID 3012 wrote to memory of 1412 3012 svohst.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27ce923d90cb217fc5fe16dd670c1103_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe23⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe24⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe25⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe26⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe27⤵
- Executes dropped EXE
PID:3264 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe28⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe29⤵
- Executes dropped EXE
PID:4820 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe30⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe31⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe32⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe33⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe34⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe35⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe36⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe37⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe38⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe39⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe40⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe41⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4536 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe43⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe44⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe45⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe46⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe47⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe48⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe49⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe50⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe51⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe52⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe53⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe54⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe55⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe56⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe57⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe58⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe59⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe60⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe61⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe62⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe63⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe64⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe65⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe66⤵PID:3776
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe67⤵PID:3956
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe68⤵PID:1364
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe69⤵PID:3584
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe70⤵
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe71⤵PID:4728
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe72⤵PID:3548
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe73⤵PID:4300
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe74⤵PID:1408
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe75⤵PID:3764
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe76⤵PID:648
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe77⤵PID:2956
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe78⤵PID:1972
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe79⤵
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe80⤵PID:2028
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe81⤵PID:3504
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe82⤵PID:4836
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe83⤵PID:4072
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe84⤵
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe85⤵PID:1716
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe86⤵PID:4888
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe87⤵
- Drops file in System32 directory
PID:1436 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe88⤵PID:3444
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe89⤵PID:644
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe90⤵PID:2472
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe91⤵PID:440
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe92⤵PID:3076
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe93⤵PID:1552
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe94⤵PID:3788
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe95⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe96⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe97⤵PID:3052
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe98⤵PID:5136
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe99⤵PID:5156
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe100⤵PID:5172
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe101⤵PID:5188
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe102⤵PID:5204
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe103⤵PID:5220
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe104⤵
- Drops file in System32 directory
PID:5236 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe105⤵PID:5256
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe106⤵
- Drops file in System32 directory
PID:5272 -
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe107⤵PID:5288
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe108⤵PID:5304
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe109⤵PID:5320
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe110⤵PID:5336
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe111⤵PID:5352
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe112⤵PID:5368
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe113⤵PID:5384
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe114⤵PID:5400
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe115⤵PID:5416
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe116⤵PID:5432
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe117⤵PID:5448
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe118⤵PID:5464
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe119⤵PID:5484
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe120⤵PID:5500
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe121⤵PID:5516
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\system32\svohst.exe122⤵PID:5532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-