Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 16:10
Static task
static1
Behavioral task
behavioral1
Sample
PI_160420PDF ARJ005634420200429 ,pdf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PI_160420PDF ARJ005634420200429 ,pdf.exe
Resource
win10v2004-en-20220113
General
-
Target
PI_160420PDF ARJ005634420200429 ,pdf.exe
-
Size
781KB
-
MD5
e132a0c2ded7c6dd950cc745862896b1
-
SHA1
c63c29aefc1245fb66f67d0049cc682c76d6287b
-
SHA256
2cc9a439b0ba13097ff33a8bb0af64130fec5c4f128c5cc4fcec7403e55ff50c
-
SHA512
7ffe8b5e25f6b7b24cb5453de02b098273747d08fc4a9195791cef9876af43baf2daacb1e4785d7e416f50874b0340856b5cad7e8eded5db461cc68d0055d584
Malware Config
Extracted
hawkeye_reborn
10.1.2.2
Protocol: ftp- Host:
ftp.tashipta.com - Port:
21 - Username:
[email protected] - Password:
@Success$2020
74d527f5-bde5-4c9c-9f90-0d96801270c7
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:2 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPort:0 _EmailSSL:false _ExecutionDelay:10 _FTPPassword:@Success$2020 _FTPPort:21 _FTPSFTP:true _FTPServer:ftp.tashipta.com _FTPUsername:[email protected] _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:false _LogInterval:10 _MeltFile:false _Mutex:74d527f5-bde5-4c9c-9f90-0d96801270c7 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.2.2 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - RebornX, Version=10.1.2.2, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
M00nD3v Logger Payload 2 IoCs
Detects M00nD3v Logger payload in memory.
Processes:
resource yara_rule behavioral1/memory/1104-60-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/2736-137-0x0000000000EE0000-0x0000000001090000-memory.dmp m00nd3v_logger -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 64 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\None = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\None" PI_160420PDF ARJ005634420200429 ,pdf.exe -
Looks up external IP address via web service 10 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 bot.whatismyipaddress.com 25 bot.whatismyipaddress.com 26 bot.whatismyipaddress.com 28 bot.whatismyipaddress.com 19 bot.whatismyipaddress.com 21 bot.whatismyipaddress.com 22 bot.whatismyipaddress.com 23 bot.whatismyipaddress.com 24 bot.whatismyipaddress.com 27 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exedescription pid process target process PID 1152 set thread context of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 set thread context of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 set thread context of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1052 set thread context of 1500 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1980 set thread context of 1476 1980 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1616 set thread context of 1956 1616 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1068 set thread context of 668 1068 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 584 set thread context of 1212 584 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1480 set thread context of 548 1480 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 740 set thread context of 288 740 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1224 set thread context of 944 1224 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1000 set thread context of 2180 1000 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2280 set thread context of 2376 2280 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2468 set thread context of 2556 2468 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2640 set thread context of 2708 2640 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2788 set thread context of 2868 2788 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2980 set thread context of 2228 2980 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1600 set thread context of 2260 1600 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2720 set thread context of 2784 2720 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 648 set thread context of 2748 648 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2892 set thread context of 2736 2892 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2568 set thread context of 3152 2568 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3232 set thread context of 3324 3232 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3428 set thread context of 3556 3428 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3644 set thread context of 3760 3644 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3852 set thread context of 3888 3852 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3980 set thread context of 2776 3980 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1904 set thread context of 3460 1904 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3728 set thread context of 3400 3728 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4016 set thread context of 3672 4016 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2612 set thread context of 3500 2612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2276 set thread context of 1820 2276 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3640 set thread context of 4160 3640 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4288 set thread context of 4392 4288 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4480 set thread context of 4564 4480 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4648 set thread context of 4748 4648 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4836 set thread context of 4920 4836 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5008 set thread context of 5092 5008 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3404 set thread context of 2356 3404 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3208 set thread context of 4028 3208 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 904 set thread context of 2836 904 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4492 set thread context of 5104 4492 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4776 set thread context of 1116 4776 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4296 set thread context of 3896 4296 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3876 set thread context of 1556 3876 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3136 set thread context of 1952 3136 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4684 set thread context of 4228 4684 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3376 set thread context of 4448 3376 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4804 set thread context of 5228 4804 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5292 set thread context of 5404 5292 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5500 set thread context of 5580 5500 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5668 set thread context of 5756 5668 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5836 set thread context of 5932 5836 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 6036 set thread context of 6120 6036 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 2064 set thread context of 3172 2064 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 4812 set thread context of 5660 4812 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3936 set thread context of 5764 3936 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5212 set thread context of 5272 5212 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 6012 set thread context of 4136 6012 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5416 set thread context of 5948 5416 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5072 set thread context of 5368 5072 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 3908 set thread context of 4720 3908 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 5952 set thread context of 5328 5952 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 6188 set thread context of 6276 6188 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.exepid process 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exepid process 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe 1980 PI_160420PDF ARJ005634420200429 ,pdf.exe 1616 PI_160420PDF ARJ005634420200429 ,pdf.exe 1068 PI_160420PDF ARJ005634420200429 ,pdf.exe 584 PI_160420PDF ARJ005634420200429 ,pdf.exe 1480 PI_160420PDF ARJ005634420200429 ,pdf.exe 740 PI_160420PDF ARJ005634420200429 ,pdf.exe 1224 PI_160420PDF ARJ005634420200429 ,pdf.exe 1000 PI_160420PDF ARJ005634420200429 ,pdf.exe 2280 PI_160420PDF ARJ005634420200429 ,pdf.exe 2468 PI_160420PDF ARJ005634420200429 ,pdf.exe 2468 PI_160420PDF ARJ005634420200429 ,pdf.exe 2640 PI_160420PDF ARJ005634420200429 ,pdf.exe 2788 PI_160420PDF ARJ005634420200429 ,pdf.exe 2980 PI_160420PDF ARJ005634420200429 ,pdf.exe 1600 PI_160420PDF ARJ005634420200429 ,pdf.exe 2720 PI_160420PDF ARJ005634420200429 ,pdf.exe 2720 PI_160420PDF ARJ005634420200429 ,pdf.exe 648 PI_160420PDF ARJ005634420200429 ,pdf.exe 2892 PI_160420PDF ARJ005634420200429 ,pdf.exe 2892 PI_160420PDF ARJ005634420200429 ,pdf.exe 2568 PI_160420PDF ARJ005634420200429 ,pdf.exe 3232 PI_160420PDF ARJ005634420200429 ,pdf.exe 3428 PI_160420PDF ARJ005634420200429 ,pdf.exe 3644 PI_160420PDF ARJ005634420200429 ,pdf.exe 3852 PI_160420PDF ARJ005634420200429 ,pdf.exe 3980 PI_160420PDF ARJ005634420200429 ,pdf.exe 1904 PI_160420PDF ARJ005634420200429 ,pdf.exe 3728 PI_160420PDF ARJ005634420200429 ,pdf.exe 4016 PI_160420PDF ARJ005634420200429 ,pdf.exe 2612 PI_160420PDF ARJ005634420200429 ,pdf.exe 2276 PI_160420PDF ARJ005634420200429 ,pdf.exe 3640 PI_160420PDF ARJ005634420200429 ,pdf.exe 4288 PI_160420PDF ARJ005634420200429 ,pdf.exe 4288 PI_160420PDF ARJ005634420200429 ,pdf.exe 4480 PI_160420PDF ARJ005634420200429 ,pdf.exe 4648 PI_160420PDF ARJ005634420200429 ,pdf.exe 4836 PI_160420PDF ARJ005634420200429 ,pdf.exe 5008 PI_160420PDF ARJ005634420200429 ,pdf.exe 3404 PI_160420PDF ARJ005634420200429 ,pdf.exe 3208 PI_160420PDF ARJ005634420200429 ,pdf.exe 904 PI_160420PDF ARJ005634420200429 ,pdf.exe 4492 PI_160420PDF ARJ005634420200429 ,pdf.exe 4776 PI_160420PDF ARJ005634420200429 ,pdf.exe 4776 PI_160420PDF ARJ005634420200429 ,pdf.exe 4296 PI_160420PDF ARJ005634420200429 ,pdf.exe 3876 PI_160420PDF ARJ005634420200429 ,pdf.exe 3136 PI_160420PDF ARJ005634420200429 ,pdf.exe 4684 PI_160420PDF ARJ005634420200429 ,pdf.exe 3376 PI_160420PDF ARJ005634420200429 ,pdf.exe 4804 PI_160420PDF ARJ005634420200429 ,pdf.exe 5292 PI_160420PDF ARJ005634420200429 ,pdf.exe 5500 PI_160420PDF ARJ005634420200429 ,pdf.exe 5668 PI_160420PDF ARJ005634420200429 ,pdf.exe 5836 PI_160420PDF ARJ005634420200429 ,pdf.exe 6036 PI_160420PDF ARJ005634420200429 ,pdf.exe 2064 PI_160420PDF ARJ005634420200429 ,pdf.exe 4812 PI_160420PDF ARJ005634420200429 ,pdf.exe 3936 PI_160420PDF ARJ005634420200429 ,pdf.exe 3936 PI_160420PDF ARJ005634420200429 ,pdf.exe 5212 PI_160420PDF ARJ005634420200429 ,pdf.exe -
Suspicious behavior: SetClipboardViewer 64 IoCs
Processes:
RegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exepid process 548 RegAsm.exe 2556 RegAsm.exe 288 RegAsm.exe 668 RegAsm.exe 1104 RegAsm.exe 1536 RegAsm.exe 2180 RegAsm.exe 1212 RegAsm.exe 2376 RegAsm.exe 672 RegAsm.exe 944 RegAsm.exe 1500 RegAsm.exe 1476 RegAsm.exe 2708 RegAsm.exe 2868 RegAsm.exe 2228 RegAsm.exe 2260 RegAsm.exe 2784 RegAsm.exe 2748 RegAsm.exe 2736 RegAsm.exe 3152 RegAsm.exe 3324 RegAsm.exe 3556 RegAsm.exe 3760 RegAsm.exe 3888 RegAsm.exe 2776 RegAsm.exe 3460 RegAsm.exe 3400 RegAsm.exe 3672 RegAsm.exe 3500 RegAsm.exe 1820 RegAsm.exe 4160 RegAsm.exe 4392 RegAsm.exe 4564 RegAsm.exe 4748 RegAsm.exe 4920 RegAsm.exe 5092 RegAsm.exe 2356 RegAsm.exe 4028 RegAsm.exe 2836 RegAsm.exe 5104 RegAsm.exe 1116 RegAsm.exe 3896 RegAsm.exe 1556 RegAsm.exe 1952 RegAsm.exe 4228 RegAsm.exe 4448 RegAsm.exe 5228 RegAsm.exe 5404 RegAsm.exe 5580 RegAsm.exe 5756 RegAsm.exe 5932 RegAsm.exe 6120 RegAsm.exe 3172 RegAsm.exe 5660 RegAsm.exe 5764 RegAsm.exe 5272 RegAsm.exe 4136 RegAsm.exe 5948 RegAsm.exe 5368 RegAsm.exe 4720 RegAsm.exe 5328 RegAsm.exe 6276 RegAsm.exe 6460 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exeRegAsm.exePI_160420PDF ARJ005634420200429 ,pdf.exedescription pid process Token: SeDebugPrivilege 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1980 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1616 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1068 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 584 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1480 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 740 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1224 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1000 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2280 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2468 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2640 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2788 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2980 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1600 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2720 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 648 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 1536 RegAsm.exe Token: SeDebugPrivilege 1956 RegAsm.exe Token: SeDebugPrivilege 944 RegAsm.exe Token: SeDebugPrivilege 1476 RegAsm.exe Token: SeDebugPrivilege 548 RegAsm.exe Token: SeDebugPrivilege 1104 RegAsm.exe Token: SeDebugPrivilege 668 RegAsm.exe Token: SeDebugPrivilege 2180 RegAsm.exe Token: SeDebugPrivilege 672 RegAsm.exe Token: SeDebugPrivilege 288 RegAsm.exe Token: SeDebugPrivilege 1500 RegAsm.exe Token: SeDebugPrivilege 1212 RegAsm.exe Token: SeDebugPrivilege 2376 RegAsm.exe Token: SeDebugPrivilege 2892 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2556 RegAsm.exe Token: SeDebugPrivilege 2568 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2708 RegAsm.exe Token: SeDebugPrivilege 2868 RegAsm.exe Token: SeDebugPrivilege 3232 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3428 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2228 RegAsm.exe Token: SeDebugPrivilege 3644 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3852 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2260 RegAsm.exe Token: SeDebugPrivilege 2784 RegAsm.exe Token: SeDebugPrivilege 3980 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2748 RegAsm.exe Token: SeDebugPrivilege 1904 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2736 RegAsm.exe Token: SeDebugPrivilege 3728 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3152 RegAsm.exe Token: SeDebugPrivilege 4016 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3324 RegAsm.exe Token: SeDebugPrivilege 2612 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3556 RegAsm.exe Token: SeDebugPrivilege 2276 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3760 RegAsm.exe Token: SeDebugPrivilege 3640 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3888 RegAsm.exe Token: SeDebugPrivilege 4288 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 2776 RegAsm.exe Token: SeDebugPrivilege 4480 PI_160420PDF ARJ005634420200429 ,pdf.exe Token: SeDebugPrivilege 3460 RegAsm.exe Token: SeDebugPrivilege 4648 PI_160420PDF ARJ005634420200429 ,pdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PI_160420PDF ARJ005634420200429 ,pdf.execmd.exePI_160420PDF ARJ005634420200429 ,pdf.execmd.exePI_160420PDF ARJ005634420200429 ,pdf.execmd.exePI_160420PDF ARJ005634420200429 ,pdf.exedescription pid process target process PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1104 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1152 wrote to memory of 1412 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1152 wrote to memory of 1412 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1152 wrote to memory of 1412 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1152 wrote to memory of 1412 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1412 wrote to memory of 1616 1412 cmd.exe choice.exe PID 1412 wrote to memory of 1616 1412 cmd.exe choice.exe PID 1412 wrote to memory of 1616 1412 cmd.exe choice.exe PID 1412 wrote to memory of 1616 1412 cmd.exe choice.exe PID 1152 wrote to memory of 1612 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1152 wrote to memory of 1612 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1152 wrote to memory of 1612 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1152 wrote to memory of 1612 1152 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 672 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1612 wrote to memory of 1224 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1612 wrote to memory of 1224 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1612 wrote to memory of 1224 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1612 wrote to memory of 1224 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1224 wrote to memory of 1460 1224 cmd.exe choice.exe PID 1224 wrote to memory of 1460 1224 cmd.exe choice.exe PID 1224 wrote to memory of 1460 1224 cmd.exe choice.exe PID 1224 wrote to memory of 1460 1224 cmd.exe choice.exe PID 1612 wrote to memory of 1964 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1612 wrote to memory of 1964 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1612 wrote to memory of 1964 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1612 wrote to memory of 1964 1612 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 1536 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1964 wrote to memory of 804 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1964 wrote to memory of 804 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1964 wrote to memory of 804 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 1964 wrote to memory of 804 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe cmd.exe PID 804 wrote to memory of 1212 804 cmd.exe choice.exe PID 804 wrote to memory of 1212 804 cmd.exe choice.exe PID 804 wrote to memory of 1212 804 cmd.exe choice.exe PID 804 wrote to memory of 1212 804 cmd.exe choice.exe PID 1964 wrote to memory of 1052 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1964 wrote to memory of 1052 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1964 wrote to memory of 1052 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1964 wrote to memory of 1052 1964 PI_160420PDF ARJ005634420200429 ,pdf.exe PI_160420PDF ARJ005634420200429 ,pdf.exe PID 1052 wrote to memory of 1500 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1052 wrote to memory of 1500 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1052 wrote to memory of 1500 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe PID 1052 wrote to memory of 1500 1052 PI_160420PDF ARJ005634420200429 ,pdf.exe RegAsm.exe -
outlook_office_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"4⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"5⤵PID:1480
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"6⤵PID:1720
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 37⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"6⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"7⤵PID:1556
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"7⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"8⤵PID:1540
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 39⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"8⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"9⤵PID:956
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 310⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"9⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"10⤵PID:1828
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 311⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"10⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"11⤵PID:1556
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 312⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"11⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"12⤵PID:1900
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 313⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"12⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"13⤵PID:2216
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 314⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"13⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"14⤵PID:2396
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 315⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"14⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵PID:2548
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"15⤵PID:2576
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 316⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"15⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"16⤵PID:2736
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 317⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"16⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"17⤵PID:2888
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 318⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"17⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"18⤵PID:1732
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 319⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"18⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"19⤵PID:2616
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 320⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"19⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵PID:2440
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"20⤵PID:2840
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 321⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"20⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"21⤵PID:2792
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 322⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"21⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵PID:2384
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"22⤵PID:2224
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 323⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"22⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"23⤵PID:3168
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 324⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"23⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"24⤵PID:3364
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 325⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"24⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"25⤵PID:3576
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 326⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"25⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"26⤵PID:3796
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 327⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"26⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"27⤵PID:3908
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 328⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"27⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"28⤵PID:2360
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 329⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"28⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"29⤵PID:3612
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 330⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"29⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:3400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"30⤵PID:3880
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 331⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"30⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:3672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"31⤵PID:3796
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 332⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"31⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:3500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"32⤵PID:1440
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 333⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"32⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵
- Suspicious behavior: SetClipboardViewer
PID:1820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"33⤵PID:3732
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 334⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"33⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:4160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"34⤵PID:4180
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 335⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"34⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵PID:4384
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:4392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"35⤵PID:4428
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 336⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"35⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵
- Suspicious behavior: SetClipboardViewer
PID:4564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"36⤵PID:4584
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 337⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"36⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵
- Suspicious behavior: SetClipboardViewer
PID:4748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"37⤵PID:4768
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 338⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"37⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:4920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"38⤵PID:4940
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 339⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"38⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵
- Suspicious behavior: SetClipboardViewer
PID:5092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"39⤵PID:5112
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 340⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"39⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵
- Suspicious behavior: SetClipboardViewer
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"40⤵PID:2000
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 341⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"40⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵
- Suspicious behavior: SetClipboardViewer
PID:4028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"41⤵PID:4548
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 342⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"41⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:2836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"42⤵PID:4472
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 343⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"42⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"43⤵PID:4668
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 344⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"43⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵PID:4468
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵
- Suspicious behavior: SetClipboardViewer
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"44⤵PID:3276
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 345⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"44⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"45⤵
- Suspicious behavior: SetClipboardViewer
PID:3896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"45⤵PID:4644
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 346⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"45⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"46⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:1556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"46⤵PID:4224
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 347⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"46⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"47⤵
- Suspicious behavior: SetClipboardViewer
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"47⤵PID:3308
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 348⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"47⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"48⤵
- Suspicious behavior: SetClipboardViewer
PID:4228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"48⤵PID:4300
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 349⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"48⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"49⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:4448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"49⤵PID:4072
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 350⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"49⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"50⤵
- Suspicious behavior: SetClipboardViewer
PID:5228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"50⤵PID:5256
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 351⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"50⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"51⤵PID:5436
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 352⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"51⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"52⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"52⤵PID:5600
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 353⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"52⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"53⤵PID:5776
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 354⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"53⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"54⤵
- Suspicious behavior: SetClipboardViewer
PID:5932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"54⤵PID:5952
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 355⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"54⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"55⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:6120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"55⤵PID:6140
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 356⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"55⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"56⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:3172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"56⤵PID:4576
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 357⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"56⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:4812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"57⤵PID:5332
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 358⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"57⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵PID:5900
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵
- Suspicious behavior: SetClipboardViewer
PID:5764 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"58⤵PID:5632
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 359⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"58⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:5788
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:4404
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"59⤵PID:4348
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 360⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"59⤵
- Suspicious use of SetThreadContext
PID:6012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵PID:3308
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵
- Suspicious behavior: SetClipboardViewer
PID:4136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"60⤵PID:4420
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 361⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"60⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵
- Suspicious behavior: SetClipboardViewer
PID:5948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"61⤵PID:5328
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 362⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"61⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"62⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"62⤵PID:4576
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 363⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"62⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"63⤵
- Suspicious behavior: SetClipboardViewer
PID:4720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"63⤵PID:5032
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 364⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"63⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"64⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: SetClipboardViewer
PID:5328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"64⤵PID:5276
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 365⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"64⤵
- Suspicious use of SetThreadContext
PID:6188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵
- Suspicious behavior: SetClipboardViewer
PID:6276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"65⤵PID:6304
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 366⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"65⤵
- Adds Run key to start application
PID:6376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"66⤵
- Suspicious behavior: SetClipboardViewer
PID:6460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"66⤵PID:6496
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 367⤵PID:6544
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"66⤵
- Adds Run key to start application
PID:6552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵PID:6640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵
- Accesses Microsoft Outlook profiles
PID:6648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"67⤵PID:6680
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 368⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"67⤵PID:6728
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵PID:6816
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵
- Accesses Microsoft Outlook profiles
PID:6824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"68⤵PID:6856
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 369⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"68⤵
- Adds Run key to start application
PID:6928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"69⤵PID:7008
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"69⤵PID:7028
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 370⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"69⤵
- Adds Run key to start application
PID:7104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"70⤵
- Accesses Microsoft Outlook profiles
PID:3620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"70⤵PID:4884
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 371⤵PID:6176
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"70⤵
- Adds Run key to start application
PID:5456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:5840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"71⤵PID:4436
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 372⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PI_160420PDF ARJ005634420200429 ,pdf.exe"71⤵PID:6472
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e94f508a7733660f34dd8bdee3498be
SHA13ff9062790b9b2e5db956f1c5f76437db41a4872
SHA256557b364bfb2cb6e9af4bdb2dc00a8854ae502e2901bd2dd106af7197e0709116
SHA5120f7ee5f3cffaa91c7588d23e4edc2cfb0605177d3d8ccbfe48f5f46e88ce350d55dc7f594d8acd2984976fa242e337454068585aadbe14dde85b9015ec96bd5a
-
MD5
0e94f508a7733660f34dd8bdee3498be
SHA13ff9062790b9b2e5db956f1c5f76437db41a4872
SHA256557b364bfb2cb6e9af4bdb2dc00a8854ae502e2901bd2dd106af7197e0709116
SHA5120f7ee5f3cffaa91c7588d23e4edc2cfb0605177d3d8ccbfe48f5f46e88ce350d55dc7f594d8acd2984976fa242e337454068585aadbe14dde85b9015ec96bd5a