Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
Resource
win10v2004-20220901-en
General
-
Target
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
-
Size
552KB
-
MD5
c1dca394e84edbea87941342072c82cc
-
SHA1
32b4f5aff7fbe60b21efe6a71263cb702d0030e1
-
SHA256
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e
-
SHA512
2f525867ae31599e9f9cb7c155958220859419a3fe2d4fbd5024648c7c5aae0a2e2dccb4afc3784a2b56090b693d9fbf9a6fc304b1700158a47da33cc4b2cfc5
-
SSDEEP
12288:60vQwJcJmLoMIOABV2AWzj6b7MP+Dd2dvI4MW7K7yRLVVZLVMq:663Jwr3VgO7MP+h2/N7KwnIq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4884 EmailSpiderEasy.exe 2796 what.exe 1560 what.exe 2320 what.exe 4944 what.exe 4992 what.exe 996 what.exe 1888 what.exe 1564 what.exe 4204 what.exe 4772 what.exe 1228 what.exe 2336 what.exe 4284 what.exe 5004 what.exe 748 what.exe 1316 what.exe 2356 what.exe 1808 what.exe 720 what.exe 3992 what.exe 3164 what.exe 2980 what.exe 2824 what.exe 3888 what.exe 3112 what.exe 2240 what.exe 1536 what.exe 100 what.exe 5112 what.exe 3956 what.exe 2408 what.exe 4968 what.exe 4864 what.exe 2164 what.exe 1724 what.exe 3680 what.exe 3276 what.exe 1260 what.exe 2184 what.exe 1312 what.exe 4992 what.exe 3632 what.exe 1888 what.exe 3096 what.exe 2800 what.exe 3380 what.exe 3828 what.exe 452 what.exe 212 what.exe 3056 what.exe 4040 what.exe 4028 what.exe 5012 what.exe 2072 what.exe 4356 what.exe 2800 what.exe 1460 what.exe 3872 what.exe 1740 what.exe 2128 what.exe 3380 what.exe 4300 what.exe 1208 what.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\what.exe 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2796 set thread context of 1560 2796 what.exe 87 PID 1560 set thread context of 2320 1560 what.exe 88 PID 2320 set thread context of 4944 2320 what.exe 91 PID 4944 set thread context of 4992 4944 what.exe 92 PID 4992 set thread context of 996 4992 what.exe 94 PID 996 set thread context of 1888 996 what.exe 95 PID 1888 set thread context of 1564 1888 what.exe 96 PID 1564 set thread context of 4204 1564 what.exe 98 PID 4204 set thread context of 4772 4204 what.exe 99 PID 4772 set thread context of 1228 4772 what.exe 100 PID 1228 set thread context of 2336 1228 what.exe 102 PID 2336 set thread context of 4284 2336 what.exe 104 PID 4284 set thread context of 5004 4284 what.exe 105 PID 5004 set thread context of 748 5004 what.exe 106 PID 748 set thread context of 1316 748 what.exe 107 PID 1316 set thread context of 2356 1316 what.exe 108 PID 2356 set thread context of 1808 2356 what.exe 109 PID 1808 set thread context of 720 1808 what.exe 110 PID 720 set thread context of 3992 720 what.exe 111 PID 3992 set thread context of 3164 3992 what.exe 112 PID 3164 set thread context of 2980 3164 what.exe 113 PID 2980 set thread context of 2824 2980 what.exe 114 PID 2824 set thread context of 3888 2824 what.exe 115 PID 3888 set thread context of 3112 3888 what.exe 116 PID 3112 set thread context of 2240 3112 what.exe 117 PID 2240 set thread context of 1536 2240 what.exe 118 PID 1536 set thread context of 100 1536 what.exe 120 PID 100 set thread context of 5112 100 what.exe 121 PID 5112 set thread context of 3956 5112 what.exe 122 PID 3956 set thread context of 2408 3956 what.exe 123 PID 2408 set thread context of 4968 2408 what.exe 124 PID 4968 set thread context of 4864 4968 what.exe 125 PID 4864 set thread context of 2164 4864 what.exe 126 PID 2164 set thread context of 1724 2164 what.exe 127 PID 1724 set thread context of 3680 1724 what.exe 128 PID 3680 set thread context of 3276 3680 what.exe 129 PID 3276 set thread context of 1260 3276 what.exe 130 PID 1260 set thread context of 2184 1260 what.exe 131 PID 2184 set thread context of 1312 2184 what.exe 132 PID 1312 set thread context of 4992 1312 what.exe 133 PID 4992 set thread context of 3632 4992 what.exe 134 PID 3632 set thread context of 1888 3632 what.exe 135 PID 1888 set thread context of 3096 1888 what.exe 137 PID 3096 set thread context of 2800 3096 what.exe 139 PID 2800 set thread context of 3380 2800 what.exe 141 PID 3380 set thread context of 3828 3380 what.exe 143 PID 3828 set thread context of 452 3828 what.exe 145 PID 452 set thread context of 212 452 what.exe 146 PID 212 set thread context of 3056 212 what.exe 149 PID 3056 set thread context of 4040 3056 what.exe 151 PID 4040 set thread context of 4028 4040 what.exe 153 PID 4028 set thread context of 5012 4028 what.exe 154 PID 5012 set thread context of 2072 5012 what.exe 155 PID 2072 set thread context of 4356 2072 what.exe 156 PID 4356 set thread context of 2800 4356 what.exe 157 PID 2800 set thread context of 1460 2800 what.exe 158 PID 1460 set thread context of 3872 1460 what.exe 159 PID 3872 set thread context of 1740 3872 what.exe 160 PID 1740 set thread context of 2128 1740 what.exe 161 PID 2128 set thread context of 3380 2128 what.exe 162 PID 3380 set thread context of 4300 3380 what.exe 163 PID 4300 set thread context of 1208 4300 what.exe 164 PID 1208 set thread context of 2668 1208 what.exe 165 PID 2668 set thread context of 3844 2668 what.exe 166 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\VersionIndependentProgID\ = "OneNote.IEAddin" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5} EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\ProgID\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\Programmable EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\0\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\FLAGS\ = "0" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\InprocServer32\ = "C:\\Program Files\\Microsoft Office\\root\\VFS\\ProgramFilesX86\\Microsoft Office\\Office16\\ONBttnIE.dll" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\TypeLib\ = "{450F85FD-AE12-87CE-1840-37470F3C198F}" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\0\win64\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\ = "Ojida" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\InprocServer32 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\InprocServer32\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\Programmable\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F} EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\VersionIndependentProgID EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\ = "krnlprov 1.0 Type Library" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\wbem\\krnlprov.dll" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\FLAGS\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\TypeLib\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\FLAGS EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\VersionIndependentProgID\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\ProgID EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\TypeLib EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1CE7C0AA-50FE-4853-F1A2-F1FF187839D5}\ProgID\ = "OneNote.IEAddin.12" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\0 EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{450F85FD-AE12-87CE-1840-37470F3C198F}\1.0\0\win64 EmailSpiderEasy.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 4884 EmailSpiderEasy.exe 4884 EmailSpiderEasy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4884 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 85 PID 1724 wrote to memory of 4884 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 85 PID 1724 wrote to memory of 4884 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 85 PID 1724 wrote to memory of 2796 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 86 PID 1724 wrote to memory of 2796 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 86 PID 1724 wrote to memory of 2796 1724 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 86 PID 2796 wrote to memory of 1560 2796 what.exe 87 PID 2796 wrote to memory of 1560 2796 what.exe 87 PID 2796 wrote to memory of 1560 2796 what.exe 87 PID 2796 wrote to memory of 1560 2796 what.exe 87 PID 1560 wrote to memory of 2320 1560 what.exe 88 PID 1560 wrote to memory of 2320 1560 what.exe 88 PID 1560 wrote to memory of 2320 1560 what.exe 88 PID 1560 wrote to memory of 2320 1560 what.exe 88 PID 2320 wrote to memory of 4944 2320 what.exe 91 PID 2320 wrote to memory of 4944 2320 what.exe 91 PID 2320 wrote to memory of 4944 2320 what.exe 91 PID 2320 wrote to memory of 4944 2320 what.exe 91 PID 4944 wrote to memory of 4992 4944 what.exe 92 PID 4944 wrote to memory of 4992 4944 what.exe 92 PID 4944 wrote to memory of 4992 4944 what.exe 92 PID 4944 wrote to memory of 4992 4944 what.exe 92 PID 4992 wrote to memory of 996 4992 what.exe 94 PID 4992 wrote to memory of 996 4992 what.exe 94 PID 4992 wrote to memory of 996 4992 what.exe 94 PID 4992 wrote to memory of 996 4992 what.exe 94 PID 996 wrote to memory of 1888 996 what.exe 95 PID 996 wrote to memory of 1888 996 what.exe 95 PID 996 wrote to memory of 1888 996 what.exe 95 PID 996 wrote to memory of 1888 996 what.exe 95 PID 1888 wrote to memory of 1564 1888 what.exe 96 PID 1888 wrote to memory of 1564 1888 what.exe 96 PID 1888 wrote to memory of 1564 1888 what.exe 96 PID 1888 wrote to memory of 1564 1888 what.exe 96 PID 1564 wrote to memory of 4204 1564 what.exe 98 PID 1564 wrote to memory of 4204 1564 what.exe 98 PID 1564 wrote to memory of 4204 1564 what.exe 98 PID 1564 wrote to memory of 4204 1564 what.exe 98 PID 4204 wrote to memory of 4772 4204 what.exe 99 PID 4204 wrote to memory of 4772 4204 what.exe 99 PID 4204 wrote to memory of 4772 4204 what.exe 99 PID 4204 wrote to memory of 4772 4204 what.exe 99 PID 4772 wrote to memory of 1228 4772 what.exe 100 PID 4772 wrote to memory of 1228 4772 what.exe 100 PID 4772 wrote to memory of 1228 4772 what.exe 100 PID 4772 wrote to memory of 1228 4772 what.exe 100 PID 1228 wrote to memory of 2336 1228 what.exe 102 PID 1228 wrote to memory of 2336 1228 what.exe 102 PID 1228 wrote to memory of 2336 1228 what.exe 102 PID 1228 wrote to memory of 2336 1228 what.exe 102 PID 2336 wrote to memory of 4284 2336 what.exe 104 PID 2336 wrote to memory of 4284 2336 what.exe 104 PID 2336 wrote to memory of 4284 2336 what.exe 104 PID 2336 wrote to memory of 4284 2336 what.exe 104 PID 4284 wrote to memory of 5004 4284 what.exe 105 PID 4284 wrote to memory of 5004 4284 what.exe 105 PID 4284 wrote to memory of 5004 4284 what.exe 105 PID 4284 wrote to memory of 5004 4284 what.exe 105 PID 5004 wrote to memory of 748 5004 what.exe 106 PID 5004 wrote to memory of 748 5004 what.exe 106 PID 5004 wrote to memory of 748 5004 what.exe 106 PID 5004 wrote to memory of 748 5004 what.exe 106 PID 748 wrote to memory of 1316 748 what.exe 107 PID 748 wrote to memory of 1316 748 what.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe"C:\Users\Admin\AppData\Local\Temp\942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\EmailSpiderEasy.exe"C:\Users\Admin\AppData\Local\Temp\EmailSpiderEasy.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4884
-
-
C:\Windows\SysWOW64\what.exe"C:\Windows\System32\what.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1316 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2356 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1808 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe20⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:720 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3992 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe22⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2980 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3888 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe26⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3112 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe28⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1536 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:100 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe30⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5112 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3956 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2408 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4968 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe34⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4864 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2164 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe36⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1724 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3680 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3276 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1260 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe40⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2184 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1312 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe42⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4992 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3632 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe44⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3096 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe46⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3380 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe48⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3828 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:452 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe50⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:212 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3056 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe52⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4040 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4028 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe54⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5012 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2072 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe56⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4356 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe58⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1460 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3872 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe60⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1740 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2128 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe62⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3380 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4300 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe64⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1208 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe65⤵
- Suspicious use of SetThreadContext
PID:2668 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe66⤵PID:3844
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe67⤵PID:1416
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe68⤵PID:4228
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe69⤵PID:4084
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe70⤵PID:2220
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe71⤵PID:2568
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe72⤵PID:3756
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe73⤵PID:256
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe74⤵PID:3112
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe75⤵PID:2788
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe76⤵PID:3164
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe77⤵PID:396
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe78⤵PID:700
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe79⤵PID:4060
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe80⤵PID:5096
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe81⤵PID:3588
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe82⤵PID:4080
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe83⤵PID:3448
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe84⤵PID:4712
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe85⤵PID:5112
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe86⤵PID:4612
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe87⤵PID:1596
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe88⤵PID:2076
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe89⤵PID:1560
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe90⤵PID:1768
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe91⤵PID:3984
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe92⤵PID:1300
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe93⤵PID:1724
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe94⤵PID:1040
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe95⤵PID:3632
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe96⤵PID:4392
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe97⤵PID:1900
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe98⤵PID:544
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe99⤵PID:3480
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe100⤵PID:1904
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe101⤵PID:1844
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe102⤵PID:2208
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe103⤵PID:3744
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe104⤵PID:4028
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe105⤵PID:1536
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe106⤵PID:4608
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe107⤵PID:4304
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe108⤵PID:1852
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe109⤵PID:2944
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe110⤵PID:2072
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe111⤵PID:4532
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe112⤵PID:1860
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe113⤵PID:1808
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe114⤵PID:4760
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe115⤵PID:2452
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe116⤵PID:2996
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe117⤵PID:2764
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe118⤵PID:3484
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe119⤵PID:3048
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe120⤵PID:3708
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe121⤵PID:4192
-
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe122⤵PID:912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-