Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe
-
Size
181KB
-
MD5
81c38658dc07ce5d15ed9f1fd2d87eb6
-
SHA1
a45f08755bc8f9565ba89b6c3c6fa23072d60c92
-
SHA256
d748d4a1d241c9c21683a17357004bfa80e14b94450a4d89c87a55e8946fc3b8
-
SHA512
15dd33f33ebda3dcb5d5b0ed707671c07e1fa8a20f57b3116069b4ff310793e81e624a62151a3ec84691c7cc410cb5870d6f18a76e065fc440027d40a7b0f35f
-
SSDEEP
3072:vIB1KPkCMeo3Yk1KDlBxFFnDglvjar0WPU8nM5/G1PKacql3hiXXSFO2XUBcX5:Ck0eookADlBdglkW5ORKacOhi
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4772 SVCH0ST.EXE 1664 SVCH0ST.EXE 5040 SVCH0ST.EXE 3020 SVCH0ST.EXE 3208 SVCH0ST.EXE 4980 SVCH0ST.EXE 2016 SVCH0ST.EXE 4428 SVCH0ST.EXE 3080 SVCH0ST.EXE 4040 SVCH0ST.EXE 4236 SVCH0ST.EXE 2456 SVCH0ST.EXE 2640 SVCH0ST.EXE 932 SVCH0ST.EXE 2832 SVCH0ST.EXE 3036 SVCH0ST.EXE 3548 SVCH0ST.EXE 4888 SVCH0ST.EXE 1876 SVCH0ST.EXE 4792 SVCH0ST.EXE 4284 SVCH0ST.EXE 4548 SVCH0ST.EXE 628 SVCH0ST.EXE 2620 SVCH0ST.EXE 3156 SVCH0ST.EXE 4876 SVCH0ST.EXE 5000 SVCH0ST.EXE 3164 SVCH0ST.EXE 3140 SVCH0ST.EXE 2276 SVCH0ST.EXE 4636 SVCH0ST.EXE 4336 SVCH0ST.EXE 2956 SVCH0ST.EXE 4248 SVCH0ST.EXE 2084 SVCH0ST.EXE 1896 SVCH0ST.EXE 2844 SVCH0ST.EXE 3204 SVCH0ST.EXE 4584 SVCH0ST.EXE 1232 SVCH0ST.EXE 1940 SVCH0ST.EXE 2796 SVCH0ST.EXE 1740 SVCH0ST.EXE 4560 SVCH0ST.EXE 924 SVCH0ST.EXE 4044 SVCH0ST.EXE 4492 SVCH0ST.EXE 5064 SVCH0ST.EXE 4212 SVCH0ST.EXE 3924 SVCH0ST.EXE 3596 SVCH0ST.EXE 4360 SVCH0ST.EXE 4848 SVCH0ST.EXE 4160 SVCH0ST.EXE 2356 SVCH0ST.EXE 380 SVCH0ST.EXE 804 SVCH0ST.EXE 1576 SVCH0ST.EXE 3760 SVCH0ST.EXE 4572 SVCH0ST.EXE 1568 SVCH0ST.EXE 3676 SVCH0ST.EXE 3592 SVCH0ST.EXE 2292 SVCH0ST.EXE -
Loads dropped DLL 64 IoCs
pid Process 4504 regsvr32.exe 4704 regsvr32.exe 3884 regsvr32.exe 4580 regsvr32.exe 4580 regsvr32.exe 208 regsvr32.exe 208 regsvr32.exe 1672 regsvr32.exe 3448 regsvr32.exe 704 regsvr32.exe 704 regsvr32.exe 2328 regsvr32.exe 3200 regsvr32.exe 2220 regsvr32.exe 4892 regsvr32.exe 4892 regsvr32.exe 2076 regsvr32.exe 2076 regsvr32.exe 1504 regsvr32.exe 3388 regsvr32.exe 2512 regsvr32.exe 1940 regsvr32.exe 64 regsvr32.exe 1352 regsvr32.exe 3452 regsvr32.exe 3452 regsvr32.exe 4560 regsvr32.exe 4560 regsvr32.exe 3192 regsvr32.exe 440 regsvr32.exe 4232 regsvr32.exe 3852 regsvr32.exe 4808 regsvr32.exe 4844 regsvr32.exe 4844 regsvr32.exe 4484 regsvr32.exe 4484 regsvr32.exe 3924 regsvr32.exe 2656 regsvr32.exe 4536 regsvr32.exe 3916 regsvr32.exe 3620 regsvr32.exe 2356 regsvr32.exe 2356 regsvr32.exe 1824 regsvr32.exe 1824 regsvr32.exe 804 regsvr32.exe 804 regsvr32.exe 2916 regsvr32.exe 2916 regsvr32.exe 3124 regsvr32.exe 3124 regsvr32.exe 1864 regsvr32.exe 4572 regsvr32.exe 4572 regsvr32.exe 3992 regsvr32.exe 1568 regsvr32.exe 3676 regsvr32.exe 4304 regsvr32.exe 3192 regsvr32.exe 1720 regsvr32.exe 5080 regsvr32.exe 8 regsvr32.exe 8 regsvr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix Process not Found File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel0.wix Process not Found File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix Process not Found File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel0.wix Process not Found File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File created C:\Windows\SysWOW64\Objectsl.WIX SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Prgusel0.wix Process not Found File opened for modification C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\Objectsl.WIX Process not Found File opened for modification C:\Windows\SysWOW64\$$336699.bat Process not Found File opened for modification C:\Windows\SysWOW64\Prgusel1.wix SVCH0ST.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE SVCH0ST.EXE File created C:\Windows\SysWOW64\Prgusel0.wix SVCH0ST.EXE -
Program crash 7 IoCs
pid pid_target Process procid_target 7944 4212 WerFault.exe 183 8204 4160 WerFault.exe 193 8528 2356 WerFault.exe 195 9140 1716 WerFault.exe 217 10732 1720 WerFault.exe 275 4996 9488 Process not Found 763 11340 9528 Process not Found 817 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCH0ST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\Prgusel1.wix" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "Prgusel1.classname" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Prgusel1.classname\Clsid regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 4772 SVCH0ST.EXE 4772 SVCH0ST.EXE 1664 SVCH0ST.EXE 1664 SVCH0ST.EXE 5040 SVCH0ST.EXE 5040 SVCH0ST.EXE 3020 SVCH0ST.EXE 3020 SVCH0ST.EXE 3208 SVCH0ST.EXE 3208 SVCH0ST.EXE 4980 SVCH0ST.EXE 4980 SVCH0ST.EXE 2016 SVCH0ST.EXE 2016 SVCH0ST.EXE 4428 SVCH0ST.EXE 4428 SVCH0ST.EXE 3080 SVCH0ST.EXE 3080 SVCH0ST.EXE 4040 SVCH0ST.EXE 4040 SVCH0ST.EXE 4236 SVCH0ST.EXE 4236 SVCH0ST.EXE 2456 SVCH0ST.EXE 2456 SVCH0ST.EXE 2640 SVCH0ST.EXE 2640 SVCH0ST.EXE 932 SVCH0ST.EXE 932 SVCH0ST.EXE 2832 SVCH0ST.EXE 2832 SVCH0ST.EXE 3036 SVCH0ST.EXE 3036 SVCH0ST.EXE 3548 SVCH0ST.EXE 3548 SVCH0ST.EXE 4888 SVCH0ST.EXE 4888 SVCH0ST.EXE 1876 SVCH0ST.EXE 1876 SVCH0ST.EXE 4792 SVCH0ST.EXE 4792 SVCH0ST.EXE 4284 SVCH0ST.EXE 4284 SVCH0ST.EXE 4548 SVCH0ST.EXE 4548 SVCH0ST.EXE 628 SVCH0ST.EXE 628 SVCH0ST.EXE 2620 SVCH0ST.EXE 2620 SVCH0ST.EXE 3156 SVCH0ST.EXE 3156 SVCH0ST.EXE 4876 SVCH0ST.EXE 4876 SVCH0ST.EXE 5000 SVCH0ST.EXE 5000 SVCH0ST.EXE 3164 SVCH0ST.EXE 3164 SVCH0ST.EXE 3140 SVCH0ST.EXE 3140 SVCH0ST.EXE 2276 SVCH0ST.EXE 2276 SVCH0ST.EXE 4636 SVCH0ST.EXE 4636 SVCH0ST.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4504 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 83 PID 1592 wrote to memory of 4504 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 83 PID 1592 wrote to memory of 4504 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 83 PID 1592 wrote to memory of 4772 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 84 PID 1592 wrote to memory of 4772 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 84 PID 1592 wrote to memory of 4772 1592 81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe 84 PID 4772 wrote to memory of 4704 4772 SVCH0ST.EXE 85 PID 4772 wrote to memory of 4704 4772 SVCH0ST.EXE 85 PID 4772 wrote to memory of 4704 4772 SVCH0ST.EXE 85 PID 4772 wrote to memory of 1664 4772 SVCH0ST.EXE 87 PID 4772 wrote to memory of 1664 4772 SVCH0ST.EXE 87 PID 4772 wrote to memory of 1664 4772 SVCH0ST.EXE 87 PID 1664 wrote to memory of 3884 1664 SVCH0ST.EXE 88 PID 1664 wrote to memory of 3884 1664 SVCH0ST.EXE 88 PID 1664 wrote to memory of 3884 1664 SVCH0ST.EXE 88 PID 1664 wrote to memory of 5040 1664 SVCH0ST.EXE 89 PID 1664 wrote to memory of 5040 1664 SVCH0ST.EXE 89 PID 1664 wrote to memory of 5040 1664 SVCH0ST.EXE 89 PID 5040 wrote to memory of 4580 5040 SVCH0ST.EXE 90 PID 5040 wrote to memory of 4580 5040 SVCH0ST.EXE 90 PID 5040 wrote to memory of 4580 5040 SVCH0ST.EXE 90 PID 5040 wrote to memory of 3020 5040 SVCH0ST.EXE 92 PID 5040 wrote to memory of 3020 5040 SVCH0ST.EXE 92 PID 5040 wrote to memory of 3020 5040 SVCH0ST.EXE 92 PID 3020 wrote to memory of 208 3020 SVCH0ST.EXE 93 PID 3020 wrote to memory of 208 3020 SVCH0ST.EXE 93 PID 3020 wrote to memory of 208 3020 SVCH0ST.EXE 93 PID 3020 wrote to memory of 3208 3020 SVCH0ST.EXE 94 PID 3020 wrote to memory of 3208 3020 SVCH0ST.EXE 94 PID 3020 wrote to memory of 3208 3020 SVCH0ST.EXE 94 PID 3208 wrote to memory of 1672 3208 SVCH0ST.EXE 95 PID 3208 wrote to memory of 1672 3208 SVCH0ST.EXE 95 PID 3208 wrote to memory of 1672 3208 SVCH0ST.EXE 95 PID 3208 wrote to memory of 4980 3208 SVCH0ST.EXE 97 PID 3208 wrote to memory of 4980 3208 SVCH0ST.EXE 97 PID 3208 wrote to memory of 4980 3208 SVCH0ST.EXE 97 PID 4980 wrote to memory of 3448 4980 SVCH0ST.EXE 98 PID 4980 wrote to memory of 3448 4980 SVCH0ST.EXE 98 PID 4980 wrote to memory of 3448 4980 SVCH0ST.EXE 98 PID 4980 wrote to memory of 2016 4980 SVCH0ST.EXE 99 PID 4980 wrote to memory of 2016 4980 SVCH0ST.EXE 99 PID 4980 wrote to memory of 2016 4980 SVCH0ST.EXE 99 PID 2016 wrote to memory of 704 2016 SVCH0ST.EXE 100 PID 2016 wrote to memory of 704 2016 SVCH0ST.EXE 100 PID 2016 wrote to memory of 704 2016 SVCH0ST.EXE 100 PID 2016 wrote to memory of 4428 2016 SVCH0ST.EXE 101 PID 2016 wrote to memory of 4428 2016 SVCH0ST.EXE 101 PID 2016 wrote to memory of 4428 2016 SVCH0ST.EXE 101 PID 4428 wrote to memory of 2328 4428 SVCH0ST.EXE 102 PID 4428 wrote to memory of 2328 4428 SVCH0ST.EXE 102 PID 4428 wrote to memory of 2328 4428 SVCH0ST.EXE 102 PID 4428 wrote to memory of 3080 4428 SVCH0ST.EXE 103 PID 4428 wrote to memory of 3080 4428 SVCH0ST.EXE 103 PID 4428 wrote to memory of 3080 4428 SVCH0ST.EXE 103 PID 3080 wrote to memory of 3200 3080 SVCH0ST.EXE 104 PID 3080 wrote to memory of 3200 3080 SVCH0ST.EXE 104 PID 3080 wrote to memory of 3200 3080 SVCH0ST.EXE 104 PID 3080 wrote to memory of 4040 3080 SVCH0ST.EXE 105 PID 3080 wrote to memory of 4040 3080 SVCH0ST.EXE 105 PID 3080 wrote to memory of 4040 3080 SVCH0ST.EXE 105 PID 4040 wrote to memory of 2220 4040 SVCH0ST.EXE 106 PID 4040 wrote to memory of 2220 4040 SVCH0ST.EXE 106 PID 4040 wrote to memory of 2220 4040 SVCH0ST.EXE 106 PID 4040 wrote to memory of 4236 4040 SVCH0ST.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\81c38658dc07ce5d15ed9f1fd2d87eb6_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix2⤵
- Loads dropped DLL
PID:4504
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix3⤵
- Loads dropped DLL
PID:4704
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix4⤵
- Loads dropped DLL
PID:3884
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix5⤵
- Loads dropped DLL
PID:4580
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix6⤵
- Loads dropped DLL
PID:208
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix7⤵
- Loads dropped DLL
- Modifies registry class
PID:1672
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix8⤵
- Loads dropped DLL
- Modifies registry class
PID:3448
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix9⤵
- Loads dropped DLL
PID:704
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix10⤵
- Loads dropped DLL
PID:2328
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix11⤵
- Loads dropped DLL
- Modifies registry class
PID:3200
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix12⤵
- Loads dropped DLL
PID:2220
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4236 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix13⤵
- Loads dropped DLL
PID:4892
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix14⤵
- Loads dropped DLL
PID:2076
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix15⤵
- Loads dropped DLL
PID:1504
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:932 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix16⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix17⤵
- Loads dropped DLL
PID:2512
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix18⤵
- Loads dropped DLL
PID:1940
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3548 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix19⤵
- Loads dropped DLL
PID:64
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix20⤵
- Loads dropped DLL
PID:1352
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix21⤵
- Loads dropped DLL
PID:3452
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix22⤵
- Loads dropped DLL
PID:4560
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4284 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3192
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix25⤵
- Loads dropped DLL
PID:4232
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix26⤵
- Loads dropped DLL
PID:3852
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix27⤵
- Loads dropped DLL
PID:4808
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix28⤵
- Loads dropped DLL
PID:4844
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix29⤵
- Loads dropped DLL
PID:4484
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3164 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix30⤵
- Loads dropped DLL
PID:3924
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3140 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix31⤵
- Loads dropped DLL
PID:2656
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix32⤵
- Loads dropped DLL
PID:4536
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix33⤵
- Loads dropped DLL
PID:3916
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE33⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix34⤵
- Loads dropped DLL
PID:3620
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE34⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix35⤵
- Loads dropped DLL
PID:2356
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE35⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix36⤵
- Loads dropped DLL
PID:1824
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE36⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix37⤵
- Loads dropped DLL
- Modifies registry class
PID:804
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE37⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix38⤵
- Loads dropped DLL
- Modifies registry class
PID:2916
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE38⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix39⤵
- Loads dropped DLL
PID:3124
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE39⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix40⤵
- Loads dropped DLL
PID:1864
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE40⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix41⤵
- Loads dropped DLL
PID:4572
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE41⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix42⤵
- Loads dropped DLL
PID:3992
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE42⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix43⤵
- Loads dropped DLL
PID:1568
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE43⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix44⤵
- Loads dropped DLL
PID:3676
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE44⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix45⤵
- Loads dropped DLL
PID:4304
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE45⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix46⤵
- Loads dropped DLL
PID:3192
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE46⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix47⤵
- Loads dropped DLL
PID:1720
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4044 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix48⤵
- Loads dropped DLL
PID:5080
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE48⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix49⤵
- Loads dropped DLL
PID:8
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE49⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix50⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE50⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix51⤵
- Modifies registry class
PID:4340
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE51⤵
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix52⤵PID:2656
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE52⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix53⤵PID:1036
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE53⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix54⤵PID:3620
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE54⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix55⤵PID:752
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4160 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix56⤵PID:1828
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix57⤵PID:3976
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE57⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix58⤵PID:2344
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE58⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix59⤵PID:2916
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE59⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix60⤵PID:2148
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE60⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix61⤵PID:2156
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE61⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix62⤵PID:2480
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE62⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix63⤵PID:4508
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE63⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix64⤵PID:3532
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE64⤵
- Executes dropped EXE
PID:3592 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix65⤵PID:1136
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE65⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix66⤵PID:784
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE66⤵PID:4808
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix67⤵PID:1636
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE67⤵
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix68⤵PID:704
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE68⤵PID:452
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix69⤵PID:3520
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE69⤵PID:1076
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix70⤵
- Modifies registry class
PID:3940
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE70⤵PID:2444
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix71⤵PID:1652
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE71⤵PID:2076
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix72⤵PID:2180
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE72⤵PID:4700
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix73⤵PID:4256
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE73⤵PID:1364
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix74⤵PID:2580
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE74⤵PID:2336
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix75⤵PID:4304
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE75⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix76⤵PID:392
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE76⤵
- Drops file in System32 directory
PID:1516 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix77⤵PID:2692
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE77⤵PID:3132
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix78⤵PID:4536
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE78⤵PID:4600
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix79⤵PID:1392
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE79⤵PID:3344
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix80⤵PID:2800
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE80⤵
- Drops file in System32 directory
PID:1892 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix81⤵PID:3976
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE81⤵PID:744
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix82⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE82⤵PID:4060
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix83⤵PID:4296
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE83⤵PID:4476
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix84⤵PID:2580
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE84⤵
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix85⤵
- Modifies registry class
PID:1136
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE85⤵PID:2516
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix86⤵PID:2284
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE86⤵
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix87⤵PID:1676
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE87⤵
- Drops file in System32 directory
PID:60 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix88⤵PID:1392
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE88⤵PID:3356
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix89⤵PID:3384
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE89⤵PID:1888
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix90⤵
- Modifies registry class
PID:4900
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE90⤵PID:1572
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix91⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE91⤵PID:4508
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix92⤵PID:1980
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE92⤵PID:3820
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix93⤵PID:4400
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE93⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix94⤵PID:1456
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE94⤵
- Drops file in System32 directory
PID:5116 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix95⤵PID:1652
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE95⤵PID:1504
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix96⤵PID:860
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE96⤵PID:1720
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix97⤵PID:1604
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE97⤵PID:1176
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix98⤵PID:1288
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE98⤵PID:4280
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix99⤵PID:4352
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE99⤵PID:4900
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix100⤵PID:3188
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE100⤵PID:1980
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix101⤵PID:2212
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE101⤵PID:3976
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix102⤵PID:4304
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE102⤵PID:1100
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix103⤵PID:1676
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE103⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix104⤵PID:456
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE104⤵PID:4340
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix105⤵
- Modifies registry class
PID:5176
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE105⤵PID:5192
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix106⤵PID:5232
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE106⤵PID:5252
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix107⤵PID:5292
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE107⤵PID:5312
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix108⤵PID:5352
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE108⤵PID:5372
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix109⤵PID:5412
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE109⤵PID:5428
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix110⤵PID:5472
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE110⤵PID:5484
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix111⤵PID:5524
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE111⤵PID:5540
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix112⤵
- Modifies registry class
PID:5580
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE112⤵
- Drops file in System32 directory
PID:5596 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix113⤵PID:5636
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE113⤵PID:5656
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix114⤵PID:5696
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE114⤵
- Drops file in System32 directory
PID:5716 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix115⤵PID:5756
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE115⤵PID:5768
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix116⤵PID:5856
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE116⤵PID:5872
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix117⤵PID:5912
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE117⤵PID:5928
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix118⤵
- Modifies registry class
PID:5968
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE118⤵PID:5984
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix119⤵
- Modifies registry class
PID:6024
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE119⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6044 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix120⤵PID:6084
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE120⤵PID:6104
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix121⤵PID:4400
-
-
C:\Windows\SysWOW64\SVCH0ST.EXEC:\Windows\system32\SVCH0ST.EXE121⤵PID:860
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\Prgusel1.wix122⤵PID:5140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-