Resubmissions
25-06-2024 14:19
240625-rm6bxsvdkb 621-06-2024 15:11
240621-sknjrsygjm 617-06-2024 17:09
240617-vn6wmawhlb 1014-06-2024 13:23
240614-qmxjcawdmm 10Analysis
-
max time kernel
99s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
FileCenterSetup12.0.16.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
FileCenterSetup12.0.16.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
FileCenterSetup12.0.16.0.exe
Resource
win11-20240611-en
General
-
Target
FileCenterSetup12.0.16.0.exe
-
Size
300.4MB
-
MD5
123556b83a3dad2f59e76602768e9536
-
SHA1
b402ded286fff73aaf9b32f075bc32029da6d461
-
SHA256
df2b7f274c484ae5baecb3365b1d9fcc4821facf327ce87724b1be597d0c70a9
-
SHA512
bc8dc366b404756a55ab40b66bbcccc8d8b366b0f34938c14324d994118602f0be876eaa61234c18eef7ae4e797789da8dd996f023f0f67c0e053e8022dd3506
-
SSDEEP
6291456:f7u0oceu41pUlsFqvFyeGCIOo7qgB5Fapf5NN9nAug:T9r4vXi5IOyJmfAx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
FileCenterSetup12.0.16.0.tmpPDFXLite10.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FileCenterAgent = "C:\\Program Files (x86)\\FileCenter\\Main\\FileCenterAgent.exe" FileCenterSetup12.0.16.0.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FileCenterAutomateAgent = "C:\\Program Files (x86)\\FileCenter\\Main\\FileCenterAutomateAgent.exe" FileCenterSetup12.0.16.0.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{3780ab31-c524-4f3b-a4db-79d692700a62} = "\"C:\\ProgramData\\Package Cache\\{3780ab31-c524-4f3b-a4db-79d692700a62}\\PDFXLite10.exe\" /burn.runonce" PDFXLite10.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
MsiExec.exedescription ioc process File opened for modification C:\Users\Public\Desktop\desktop.ini MsiExec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GdPictureComReg.exeFileCenterUtils.exePDFXLite10.exeFileCenterUtils.exeFileCenterUtils.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GdPictureComReg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FileCenterUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PDFXLite10.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FileCenterUtils.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation FileCenterUtils.exe -
Drops file in System32 directory 9 IoCs
Processes:
PrnInstaller.exeprninstaller.exedescription ioc process File created C:\Windows\system32\pxcpmL.dll PrnInstaller.exe File created C:\Windows\system32\spool\DRIVERS\x64\pxcdrv.xml PrnInstaller.exe File created C:\Windows\system32\pxc50pm.dll prninstaller.exe File opened for modification C:\Windows\system32\pxc50pm.dll prninstaller.exe File created C:\Windows\system32\spool\DRIVERS\x64\PXC50f.DLL prninstaller.exe File opened for modification C:\Windows\system32\pxcpmL.dll PrnInstaller.exe File created C:\Windows\system32\spool\DRIVERS\x64\pxcdrvL.dll PrnInstaller.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\pxcdrvL.dll PrnInstaller.exe File created C:\Windows\system32\spool\DRIVERS\x64\PXC50UIf.DLL prninstaller.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
FileCenterSetup12.0.16.0.tmpPDFX5SA_sm.tmpmsiexec.exeregsvr32.exedescription ioc process File opened for modification C:\Program Files (x86)\FileCenter\Main\PDFXEditCore.x86.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-M07RP.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\IRIS\is-F69IJ.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\unins000.dat PDFX5SA_sm.tmp File created C:\Program Files (x86)\FileCenter\Main\is-PF716.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-J5SQ2.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-8THFG.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\DriverUI.pt-PT.xcl msiexec.exe File created C:\Program Files (x86)\FileCenter\Main\is-I7370.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\fonts\is-A9TMD.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\IRIS\is-ESKRB.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\TrackerUpdate.gl-ES.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Main\DTKBarReader.dll FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterOCREngineTR.exe FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrstiff15.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-CFA43.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\DriverUI.az-Latn-AZ.xcl msiexec.exe File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.fr-FR.xcl msiexec.exe File created C:\Program Files (x86)\FileCenter\Main\GdOCR\is-BHFHI.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\GdOCR\is-1PJCI.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-7ETE7.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.de-DE.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Main\Separators.exe FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterOCREngineOM.exe FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-5N81D.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\TrackerUpdate.zh-TW.xcl msiexec.exe File created C:\Program Files (x86)\FileCenter\Main\is-CNRFK.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\IRIS\is-R5U8K.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\Plugins.x86\is-654SQ.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\TrackerUpdate.zh-CN.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrsbarcodeevoi.dll FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\iristestapp.exe FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrs_sentinel_software_protection15.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-9K5OF.tmp FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrsasian315.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\fonts\is-63FS1.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.az-Latn-AZ.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Help\fc-automate.chm FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-MIF1N.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Tracker Software\PDF-XChange Lite\Drivers\PrnInst.inf msiexec.exe File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.ca-ES.xcl msiexec.exe File created C:\Program Files (x86)\FileCenter\Main\is-H9922.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-5TO2P.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\TrackerUpdate.he-IL.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\PrnInstaller.exe PDFX5SA_sm.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.Imaging.Rendering.Skia.dll FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterAddin64.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.zh-TW.xcl msiexec.exe File created C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\is-F8R1N.tmp PDFX5SA_sm.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\secman.dll.log regsvr32.exe File created C:\Program Files\Common Files\Tracker Software\Common\Languages\pdfSaver.zh-CN.xcl msiexec.exe File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterConnect.exe FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-G55RA.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-R0M66.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\IRIS\is-AMOJU.tmp FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrspdf15.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\GdOCR\is-O8DQM.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\Samples\is-IHQ6I.tmp FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-HEDHM.tmp FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterScanner.exe FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\IRIS\idrs15_wrapper.dll FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\FileCenterInjector32.exe FileCenterSetup12.0.16.0.tmp File opened for modification C:\Program Files (x86)\FileCenter\Main\EZT4Jpeg.dll FileCenterSetup12.0.16.0.tmp File created C:\Program Files (x86)\FileCenter\Main\is-AICFH.tmp FileCenterSetup12.0.16.0.tmp -
Drops file in Windows directory 20 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSIFA05.tmp msiexec.exe File created C:\Windows\Installer\e58c02e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF191.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF26D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIF473.tmp msiexec.exe File created C:\Windows\Installer\{6318D993-1BE8-4BE4-B9E9-D6BFED11A071}\AppIco msiexec.exe File opened for modification C:\Windows\Installer\{6318D993-1BE8-4BE4-B9E9-D6BFED11A071}\AppIco msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIF2CB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF30B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF4C2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF82E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF977.tmp msiexec.exe File created C:\Windows\Installer\e58c032.msi msiexec.exe File opened for modification C:\Windows\Installer\e58c02e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF0D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF122.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{6318D993-1BE8-4BE4-B9E9-D6BFED11A071} msiexec.exe -
Executes dropped EXE 24 IoCs
Processes:
FileCenterSetup12.0.16.0.tmpFileCenterUtils.exeFileCenterUtils.exeFileCenterUtils.exeFileCenterUtils.exeFileCenterUtils.exeGdPictureComReg.exevc_redist.x86.exevc_redist.x86.exeFileCenterAutomateService.exeFileCenterUtils.exePDFXLite10.exePDFXLite10.exePDFXLite10.exePrnInstaller.exepdfSaverL.exepdfSaverL.exeFileCenterUtils.exePDFX5SA_sm.exePDFX5SA_sm.tmpprninstaller.exepdfSaver5.exeXCVault.exepid process 2060 FileCenterSetup12.0.16.0.tmp 1212 FileCenterUtils.exe 3336 FileCenterUtils.exe 1432 FileCenterUtils.exe 3356 FileCenterUtils.exe 4080 FileCenterUtils.exe 1172 GdPictureComReg.exe 3928 vc_redist.x86.exe 4780 vc_redist.x86.exe 2520 FileCenterAutomateService.exe 2404 FileCenterUtils.exe 2480 PDFXLite10.exe 3344 PDFXLite10.exe 3440 PDFXLite10.exe 1736 PrnInstaller.exe 2116 2456 pdfSaverL.exe 2636 pdfSaverL.exe 684 FileCenterUtils.exe 3508 PDFX5SA_sm.exe 3308 PDFX5SA_sm.tmp 4568 prninstaller.exe 4884 pdfSaver5.exe 2860 XCVault.exe -
Loads dropped DLL 26 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregasm.exevc_redist.x86.exePDFXLite10.exeMsiExec.exeMsiExec.exePDFX5SA_sm.tmppid process 2052 regsvr32.exe 3948 regsvr32.exe 3468 regsvr32.exe 4332 regsvr32.exe 868 regsvr32.exe 4312 regsvr32.exe 4312 regsvr32.exe 236 regasm.exe 236 regasm.exe 236 regasm.exe 236 regasm.exe 4780 vc_redist.x86.exe 3344 PDFXLite10.exe 1760 MsiExec.exe 1760 MsiExec.exe 1760 MsiExec.exe 1760 MsiExec.exe 1760 MsiExec.exe 1760 MsiExec.exe 1760 MsiExec.exe 4784 MsiExec.exe 4784 MsiExec.exe 1760 MsiExec.exe 3308 PDFX5SA_sm.tmp 2116 2116 -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
regasm.exeregsvr32.exepdfSaver5.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CBD34A5D-CCD7-47B5-B8D4-121D40FA0934}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6835517-900C-37F4-B861-936E79F91A48}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C9E52549-FC4C-33F9-99DE-61302E5F2E47}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{021BDF87-EEFB-4384-9183-F8170E3DC459}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6835517-900C-37F4-B861-936E79F91A48}\InprocServer32\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3AB685D-A017-34B0-B2B6-08EE7121AF3C}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{732C85A4-B68F-4D3F-920A-B13DB0BDC9C8}\InprocServer32\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CEB68BB-FEF5-3F6C-9F82-7C6B1F524A3F}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3AB685D-A017-34B0-B2B6-08EE7121AF3C}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6BA216B3-0CCA-39E5-B68B-F4F943B65D9D}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DBED514A-A877-398F-AE2A-A1EDE5F43724}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C9E52549-FC4C-33F9-99DE-61302E5F2E47}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{718C8EE7-1EEF-4717-8E60-C3661B610550}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{516A4C96-825D-3A42-8C62-0ECE20DE935D}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6BA216B3-0CCA-39E5-B68B-F4F943B65D9D}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\InprocServer32\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CC0D923-B9ED-310C-B453-D1A59F25712C}\InprocServer32\Class = "GdPicture14.GdViewer" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3AB685D-A017-34B0-B2B6-08EE7121AF3C}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{718C8EE7-1EEF-4717-8E60-C3661B610550}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{732C85A4-B68F-4D3F-920A-B13DB0BDC9C8}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32\14.2.69.0\Class = "GdPicture14.GdPictureSegmenter" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24DFB749-780D-41B4-9BE3-8894D202B944}\LocalServer32\ = "\"C:\\Program Files (x86)\\FileCenter\\Drivers\\PDF-XChange 5\\pdfSaver5.exe\"" pdfSaver5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C9E52549-FC4C-33F9-99DE-61302E5F2E47}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0DF179B8-96F1-4F3E-9338-DFEEB61B810A}\LocalServer32\ = "\"C:\\Program Files\\Tracker Software\\Update\\TrackerUpdate.exe\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{51DE5D08-F43E-386D-AE8D-9A8EEF3C7B60}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\InprocServer32\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3AB685D-A017-34B0-B2B6-08EE7121AF3C}\InprocServer32\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{51DE5D08-F43E-386D-AE8D-9A8EEF3C7B60}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CBD34A5D-CCD7-47B5-B8D4-121D40FA0934}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CEB68BB-FEF5-3F6C-9F82-7C6B1F524A3F}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C9E52549-FC4C-33F9-99DE-61302E5F2E47}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{732C85A4-B68F-4D3F-920A-B13DB0BDC9C8}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D8DD4B1-B719-303C-8F01-7C00B4A93B1F}\InprocServer32 regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6835517-900C-37F4-B861-936E79F91A48}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6BA216B3-0CCA-39E5-B68B-F4F943B65D9D}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A46B9230-3A18-3180-9BA9-1D063B9DB1B7}\InprocServer32\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{732C85A4-B68F-4D3F-920A-B13DB0BDC9C8}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{516A4C96-825D-3A42-8C62-0ECE20DE935D}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B6835517-900C-37F4-B861-936E79F91A48}\InprocServer32\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{516A4C96-825D-3A42-8C62-0ECE20DE935D}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A46B9230-3A18-3180-9BA9-1D063B9DB1B7}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A46B9230-3A18-3180-9BA9-1D063B9DB1B7}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{732C85A4-B68F-4D3F-920A-B13DB0BDC9C8}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CC0D923-B9ED-310C-B453-D1A59F25712C}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8F656181-7551-47DC-8A8A-7BB562F91A6F}\InprocServer32\Class = "GdPicture14.PDFReducerConfiguration" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DBED514A-A877-398F-AE2A-A1EDE5F43724}\InprocServer32\14.2.69.0\Class = "GdPicture14.ThumbnailEx" regasm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000003f3ccc8c3b3921e10000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800003f3ccc8c0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809003f3ccc8c000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d3f3ccc8c000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000003f3ccc8c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Kills process with taskkill 14 IoCs
Processes:
TASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exepid process 4272 TASKKILL.exe 3328 TASKKILL.exe 2084 TASKKILL.exe 2196 TASKKILL.exe 2856 TASKKILL.exe 1592 TASKKILL.exe 2184 TASKKILL.exe 4488 TASKKILL.exe 4772 TASKKILL.exe 4952 TASKKILL.exe 2380 TASKKILL.exe 3764 TASKKILL.exe 3468 TASKKILL.exe 1084 TASKKILL.exe -
Processes:
msiexec.exePDFX5SA_sm.tmpdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8F1C58E0-2797-4EB7-A74A-397B24BB769D}\Policy = "3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ABA61947-63DA-4A87-A926-786EB7A10B40} PDFX5SA_sm.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ABA61947-63DA-4A87-A926-786EB7A10B40}\AppName = "pdfSaver5.exe" PDFX5SA_sm.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ABA61947-63DA-4A87-A926-786EB7A10B40}\AppPath = "C:\\Program Files (x86)\\FileCenter\\Drivers\\PDF-XChange 5\\" PDFX5SA_sm.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{ABA61947-63DA-4A87-A926-786EB7A10B40}\Policy = "3" PDFX5SA_sm.tmp Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8F1C58E0-2797-4EB7-A74A-397B24BB769D} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8F1C58E0-2797-4EB7-A74A-397B24BB769D}\AppName = "C:\\Program Files\\Tracker Software\\PDF-XChange Lite\\pdfSaverL.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8F1C58E0-2797-4EB7-A74A-397B24BB769D}\AppPath = "C:\\Program Files\\Tracker Software\\PDF-XChange Lite\\" msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe -
Modifies registry class 64 IoCs
Processes:
regasm.exeregsvr32.exeregsvr32.exeregsvr32.exeregasm.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AC305882-1ABA-3F2C-A65E-21C65724405D}\TypeLib\ = "{B5893B58-701E-4110-9871-1DA14CF9C1DC}" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{91F594C1-7C1A-465D-BC9C-004E2FD7C6C4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4EDC5163-6E6C-411C-994F-FD3FD74483DE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34C6E22F-8BE0-454F-9BEB-0AA6BAD031D0}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D63F369-74F5-4C4B-A203-B68374F6A35A}\ = "IPdfOcrOptions" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Dten600.IndexJob\ = "IndexJob Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CF79EF22-544F-4E0B-8557-57A7950A507C}\ProxyStubClsid32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{048DF9C9-E6DB-303F-A676-F6C241423050}\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{09EA520D-7D38-4CB7-A9A4-75D3091D1886}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{56169002-DDE6-3E69-B5A6-F822875A8F98}\TypeLib\ = "{B5893B58-701E-4110-9871-1DA14CF9C1DC}" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DBED514A-A877-398F-AE2A-A1EDE5F43724}\InprocServer32\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{8594B97D-DE56-3238-8D69-6888903637B2}\14.2.69.0\Class = "GdPicture14.OCRSpecialContext" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2F578A25-D034-35D4-86DE-F5B986E0AC71}\TypeLib\Version = "e.2" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4EDC5163-6E6C-411C-994F-FD3FD74483DE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{12A37198-695A-3C12-B1A1-A55E89A5753F}\14.2.69.0 regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{1FB2340C-1E2A-3B9C-A78E-28C55F46EC7C}\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{FF9C4E60-328E-3A72-8F5D-E49FED1E8CF3}\14.2.69.0\Class = "GdPicture14.TwainCapabilities" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{443882E6-D69C-4E94-A9A6-F2D6D856CC16}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B148BBD-F357-4166-A073-16B44503B6AC}\TypeLib\ = "{0AAFF38C-CB91-4424-A8B9-F8B504ACBE0C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{EF5FC277-ED69-3343-8AF7-B140C21CE2E2}\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{29ABE265-6CDB-3D02-B577-CA01A9859877}\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DEF6A2E-AE0C-33DB-907D-F5C2153DE192}\TypeLib regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4C199F2-0F2A-4E4A-80C9-F5B36D96F527}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8756C601-DB33-3E27-A201-89D054D1148A}\ProxyStubClsid32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AC305882-1ABA-3F2C-A65E-21C65724405D}\TypeLib\Version = "e.2" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{BDC35748-A9B4-31C9-8D53-E3A5647D701D}\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{E6B3C777-1FFC-3498-A081-729A1A623397}\14.2.69.0\Assembly = "GdPicture.NET.14, Version=14.2.69.0, Culture=neutral, PublicKeyToken=f52a2e60ad468dbb" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{EE073683-21DE-3474-A8EF-128FD3A5CE81}\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{732F9719-9EA7-3026-A19D-D320EDAC3088}\TypeLib\Version = "e.2" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B430FB9-7FBB-4645-94BC-76E917FFCE42}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6EBB31E2-2E6A-4463-B53B-EA7C502D564D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B2D544A1-449E-46A1-83EB-DD4A261BA283} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{53674462-76AA-41A3-A5A3-5241912E4222}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1DA36BE4-B5F2-4B33-9D8C-72593FEBDF99} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8AFC06F6-7848-37B5-8044-97A2EBECF8BB}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A12D321-718B-3588-A18A-F7F236C6CB46}\TypeLib regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lbvProt.ProtocolHandler\ = "CProtocolHandler Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{999A6C12-A602-4601-9866-0B9AE973B7F2}\ = "IUIX_Ruler" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{93C19653-9C8D-3058-B701-31E0263CF0D6} regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{DAAB4CCC-0DED-382B-B4B8-533519BED688}\14.2.69.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4F44B54-E71F-41F9-95E7-401437931922}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4813FAB2-FDF6-3ACA-8C00-511671D1214B}\Implemented Categories regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D6E145F8-828D-36C9-9FAD-24DAFD63BE9A}\TypeLib\Version = "e.2" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3862573D-5BFA-3850-ABBF-016FCCAF161F}\TypeLib\Version = "e.2" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{AE9FE02C-2917-3CDF-83C6-040C869E2504}\14.2.69.0\Class = "GdPicture14.PdfColorSpace" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F16D4312-0B2D-4C64-9FC7-DBC648B9B3AA}\TypeLib\ = "{0AAFF38C-CB91-4424-A8B9-F8B504ACBE0C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49423ABA-6AC6-3259-BF41-09893EEE9A32} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E8C2F816-B4B2-311D-BAA8-EF842F78E378}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{097275F3-B4E1-4219-97B2-8E1B17C5E4EE}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0BCE7AC-1387-4C70-9184-912EB94AE3ED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{E17795EB-5144-3228-979F-A1013FE7C79B}\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{697DF022-B24E-11D3-B57C-00105AA461D0}\TypeLib\ = "{A967E5C4-B0E1-11D3-B57C-00105AA461D0}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{FF9C4E60-328E-3A72-8F5D-E49FED1E8CF3}\14.2.69.0\CodeBase = "file:///C:/Program Files (x86)/FileCenter/Main/GdPicture.NET.14.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{71C80989-F318-3838-8A71-65669C415BD0}\14.2.69.0\Class = "GdPicture14.ColorDropoutFilter" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A967E5C4-B0E1-11D3-B57C-00105AA461D0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E44BB2E-FE28-495A-9D65-B4845C676567}\TypeLib\ = "{0AAFF38C-CB91-4424-A8B9-F8B504ACBE0C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{107507E4-8258-4E89-9167-CADCD46059BB}\ProxyStubClsid32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Record\{264197D5-6440-3006-8548-E33267CA93BA}\14.2.69.0\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{55767E02-2E2D-47FB-A666-BB6B3498521D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{35A751A3-6421-43CE-A2C3-AF90882A8875} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3C2B51C-003A-4D39-A90A-BB4486BF1E2C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1987CCA-CF31-47CE-932A-A19A07AFBAB2}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5CED0F57-B96A-4CF2-83B8-130E544A2644}\ = "IPXV_BookmEvent" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
FileCenterUtils.exeFileCenterUtils.exeFileCenterUtils.exeFileCenterSetup12.0.16.0.tmpFileCenterUtils.exeFileCenterUtils.exeregsvr32.exeFileCenterAutomateService.exeFileCenterUtils.exemsiexec.exeMsiExec.exeFileCenterUtils.exePDFX5SA_sm.tmppid process 1212 FileCenterUtils.exe 1212 FileCenterUtils.exe 3336 FileCenterUtils.exe 3336 FileCenterUtils.exe 1432 FileCenterUtils.exe 1432 FileCenterUtils.exe 2060 FileCenterSetup12.0.16.0.tmp 2060 FileCenterSetup12.0.16.0.tmp 3356 FileCenterUtils.exe 3356 FileCenterUtils.exe 4080 FileCenterUtils.exe 4080 FileCenterUtils.exe 4312 regsvr32.exe 4312 regsvr32.exe 2520 FileCenterAutomateService.exe 2520 FileCenterAutomateService.exe 2404 FileCenterUtils.exe 2404 FileCenterUtils.exe 4996 msiexec.exe 4996 msiexec.exe 1760 MsiExec.exe 1760 MsiExec.exe 684 FileCenterUtils.exe 684 FileCenterUtils.exe 3308 PDFX5SA_sm.tmp 3308 PDFX5SA_sm.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
TASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exeTASKKILL.exevssvc.exePDFXLite10.exemsiexec.exesrtasks.exedescription pid process Token: SeDebugPrivilege 2084 TASKKILL.exe Token: SeDebugPrivilege 4772 TASKKILL.exe Token: SeDebugPrivilege 1592 TASKKILL.exe Token: SeDebugPrivilege 3468 TASKKILL.exe Token: SeDebugPrivilege 1084 TASKKILL.exe Token: SeDebugPrivilege 3764 TASKKILL.exe Token: SeDebugPrivilege 2380 TASKKILL.exe Token: SeDebugPrivilege 3328 TASKKILL.exe Token: SeDebugPrivilege 2184 TASKKILL.exe Token: SeDebugPrivilege 4272 TASKKILL.exe Token: SeDebugPrivilege 4488 TASKKILL.exe Token: SeDebugPrivilege 2196 TASKKILL.exe Token: SeDebugPrivilege 2856 TASKKILL.exe Token: SeDebugPrivilege 4952 TASKKILL.exe Token: SeBackupPrivilege 1904 vssvc.exe Token: SeRestorePrivilege 1904 vssvc.exe Token: SeAuditPrivilege 1904 vssvc.exe Token: SeShutdownPrivilege 3440 PDFXLite10.exe Token: SeIncreaseQuotaPrivilege 3440 PDFXLite10.exe Token: SeSecurityPrivilege 4996 msiexec.exe Token: SeCreateTokenPrivilege 3440 PDFXLite10.exe Token: SeAssignPrimaryTokenPrivilege 3440 PDFXLite10.exe Token: SeLockMemoryPrivilege 3440 PDFXLite10.exe Token: SeIncreaseQuotaPrivilege 3440 PDFXLite10.exe Token: SeMachineAccountPrivilege 3440 PDFXLite10.exe Token: SeTcbPrivilege 3440 PDFXLite10.exe Token: SeSecurityPrivilege 3440 PDFXLite10.exe Token: SeTakeOwnershipPrivilege 3440 PDFXLite10.exe Token: SeLoadDriverPrivilege 3440 PDFXLite10.exe Token: SeSystemProfilePrivilege 3440 PDFXLite10.exe Token: SeSystemtimePrivilege 3440 PDFXLite10.exe Token: SeProfSingleProcessPrivilege 3440 PDFXLite10.exe Token: SeIncBasePriorityPrivilege 3440 PDFXLite10.exe Token: SeCreatePagefilePrivilege 3440 PDFXLite10.exe Token: SeCreatePermanentPrivilege 3440 PDFXLite10.exe Token: SeBackupPrivilege 3440 PDFXLite10.exe Token: SeRestorePrivilege 3440 PDFXLite10.exe Token: SeShutdownPrivilege 3440 PDFXLite10.exe Token: SeDebugPrivilege 3440 PDFXLite10.exe Token: SeAuditPrivilege 3440 PDFXLite10.exe Token: SeSystemEnvironmentPrivilege 3440 PDFXLite10.exe Token: SeChangeNotifyPrivilege 3440 PDFXLite10.exe Token: SeRemoteShutdownPrivilege 3440 PDFXLite10.exe Token: SeUndockPrivilege 3440 PDFXLite10.exe Token: SeSyncAgentPrivilege 3440 PDFXLite10.exe Token: SeEnableDelegationPrivilege 3440 PDFXLite10.exe Token: SeManageVolumePrivilege 3440 PDFXLite10.exe Token: SeImpersonatePrivilege 3440 PDFXLite10.exe Token: SeCreateGlobalPrivilege 3440 PDFXLite10.exe Token: SeRestorePrivilege 4996 msiexec.exe Token: SeTakeOwnershipPrivilege 4996 msiexec.exe Token: SeBackupPrivilege 4596 srtasks.exe Token: SeRestorePrivilege 4596 srtasks.exe Token: SeSecurityPrivilege 4596 srtasks.exe Token: SeTakeOwnershipPrivilege 4596 srtasks.exe Token: SeBackupPrivilege 4596 srtasks.exe Token: SeRestorePrivilege 4596 srtasks.exe Token: SeSecurityPrivilege 4596 srtasks.exe Token: SeTakeOwnershipPrivilege 4596 srtasks.exe Token: SeRestorePrivilege 4996 msiexec.exe Token: SeTakeOwnershipPrivilege 4996 msiexec.exe Token: SeRestorePrivilege 4996 msiexec.exe Token: SeTakeOwnershipPrivilege 4996 msiexec.exe Token: SeRestorePrivilege 4996 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
FileCenterSetup12.0.16.0.tmpPDFX5SA_sm.tmppid process 2060 FileCenterSetup12.0.16.0.tmp 3308 PDFX5SA_sm.tmp 3308 PDFX5SA_sm.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
FileCenterSetup12.0.16.0.exeFileCenterSetup12.0.16.0.tmpFileCenterUtils.exeFileCenterUtils.exeFileCenterUtils.exedescription pid process target process PID 2976 wrote to memory of 2060 2976 FileCenterSetup12.0.16.0.exe FileCenterSetup12.0.16.0.tmp PID 2976 wrote to memory of 2060 2976 FileCenterSetup12.0.16.0.exe FileCenterSetup12.0.16.0.tmp PID 2976 wrote to memory of 2060 2976 FileCenterSetup12.0.16.0.exe FileCenterSetup12.0.16.0.tmp PID 2060 wrote to memory of 1212 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 1212 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 1212 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 3336 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 3336 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 3336 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 1432 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 1432 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 1432 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 1432 wrote to memory of 4772 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 4772 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 4772 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3468 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3468 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3468 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1084 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2380 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2380 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 2380 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3764 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3764 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 3764 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1592 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1592 1432 FileCenterUtils.exe TASKKILL.exe PID 1432 wrote to memory of 1592 1432 FileCenterUtils.exe TASKKILL.exe PID 2060 wrote to memory of 3356 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 3356 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 3356 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 3356 wrote to memory of 4952 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4952 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4952 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 3328 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 3328 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 3328 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4272 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4272 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4272 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2856 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2856 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2856 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2184 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2184 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2184 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4488 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4488 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 4488 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2196 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2196 3356 FileCenterUtils.exe TASKKILL.exe PID 3356 wrote to memory of 2196 3356 FileCenterUtils.exe TASKKILL.exe PID 2060 wrote to memory of 4080 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 4080 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 2060 wrote to memory of 4080 2060 FileCenterSetup12.0.16.0.tmp FileCenterUtils.exe PID 4080 wrote to memory of 3948 4080 FileCenterUtils.exe regsvr32.exe PID 4080 wrote to memory of 3948 4080 FileCenterUtils.exe regsvr32.exe PID 4080 wrote to memory of 3948 4080 FileCenterUtils.exe regsvr32.exe PID 4080 wrote to memory of 1172 4080 FileCenterUtils.exe GdPictureComReg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe"C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-PHKRD.tmp\FileCenterSetup12.0.16.0.tmp"C:\Users\Admin\AppData\Local\Temp\is-PHKRD.tmp\FileCenterSetup12.0.16.0.tmp" /SL5="$701CA,314098152,831488,C:\Users\Admin\AppData\Local\Temp\FileCenterSetup12.0.16.0.exe"2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe"C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe" -S -INFO "-1" "3" "11" "C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtilsInfo.ini"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe"C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe" -S -INFO "-1" "3" "11" "C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtilsInfo.ini"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe"C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe" -CLOSEALL3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterScanner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterPortal.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterThumbs.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterReceipts.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterReports.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileAgent.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterAgent.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe"C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exe" -INSTBEG3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterScanner.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterPortal.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterThumbs.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterReceipts.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterReports.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileAgent.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /T /IM FileCenterAgent.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe"C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -INSTEND3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\PDFXEditCore.x86.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\FileCenter\Main\GdPictureComReg.exe"C:\Program Files (x86)\FileCenter\Main\GdPictureComReg.exe" /silent4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" /s "C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dll" /codebase /tlb5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /s "C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dll" /codebase /tlb:GdPicture.NET.14.64.tlb5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\dten600.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\lbvProt.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\VSTwain.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\secman.dll"4⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\FileCenter\Main\FileCenterAddin.dll"4⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Registers COM server for autorun
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe"C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe" /install /quiet /norestart4⤵
- Executes dropped EXE
-
C:\Windows\Temp\{331B6960-7970-4C89-813D-E58F0E6F92C8}\.cr\vc_redist.x86.exe"C:\Windows\Temp\{331B6960-7970-4C89-813D-E58F0E6F92C8}\.cr\vc_redist.x86.exe" -burn.clean.room="C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exe"C:\Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exe" /install /silent4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe"C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -PRINTER3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe"C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe" /quiet /norestart /log "C:\ProgramData\FileCenter\PDFPrinterLog.txt" PNAME="FileCenter PDF Printer" ORGANIZATION="FileCenter"4⤵
- Executes dropped EXE
-
C:\Windows\Temp\{45A36FCD-0295-4FAE-B24C-6F3BF9C760D1}\.cr\PDFXLite10.exe"C:\Windows\Temp\{45A36FCD-0295-4FAE-B24C-6F3BF9C760D1}\.cr\PDFXLite10.exe" -burn.clean.room="C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exe" -burn.filehandle.attached=540 -burn.filehandle.self=552 /quiet /norestart /log "C:\ProgramData\FileCenter\PDFPrinterLog.txt" PNAME="FileCenter PDF Printer" ORGANIZATION="FileCenter"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\.be\PDFXLite10.exe"C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\.be\PDFXLite10.exe" -q -burn.elevated BurnPipe.{019FC21B-785F-4260-B83B-5E6AEE9AEFB6} {968BB185-F9EF-45E6-A671-B27254E79B08} 33446⤵
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe"C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe" /SetOptions "Save.RunApp=false" /Printer "FileCenter PDF Printer"4⤵
- Executes dropped EXE
-
C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe"C:\Program Files\Tracker Software\PDF-XChange Lite\pdfSaverL.exe" /SetOptions "Save.RunApp=false" /Printer "PDF-XChange Lite"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe"C:\Program Files (x86)\FileCenter\Main\FileCenterUtils.exe" -DRIVER3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe"C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe" /VERYSILENT /NORESTART /NOICONS /COMPONENTS="pdfSaver,PDFXChangedriver" /DIR="C:\Program Files (x86)\FileCenter\Drivers\" /PName="XChange Internal Driver" "/Organization:FileCenter" /LOG="C:\ProgramData\FileCenter\PDFDriverLog.txt"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-4HDBB.tmp\PDFX5SA_sm.tmp"C:\Users\Admin\AppData\Local\Temp\is-4HDBB.tmp\PDFX5SA_sm.tmp" /SL5="$40304,5384545,119296,C:\Program Files (x86)\FileCenter\Drivers\PDFX5SA_sm.exe" /VERYSILENT /NORESTART /NOICONS /COMPONENTS="pdfSaver,PDFXChangedriver" /DIR="C:\Program Files (x86)\FileCenter\Drivers\" /PName="XChange Internal Driver" "/Organization:FileCenter" /LOG="C:\ProgramData\FileCenter\PDFDriverLog.txt"5⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\prninstaller.exe"C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\prninstaller.exe" /W0 /I /N:"XChange Internal Driver" /Base:"PDF-XChange "6⤵
- Drops file in System32 directory
- Executes dropped EXE
-
C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\pdfSaver5.exe"C:\Program Files (x86)\FileCenter\Drivers\PDF-XChange 5\pdfSaver5.exe" /RegServer6⤵
- Executes dropped EXE
- Registers COM server for autorun
-
C:\Program Files (x86)\FileCenter\Drivers\Vault\XCVault.exe"C:\Program Files (x86)\FileCenter\Drivers\Vault\XCVault.exe" /install6⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 66342A5A573178976D159FCD1D69914C2⤵
- Drops desktop.ini file(s)
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding CE2A3E5C0DAAD649A6D94B8CDE415D60 E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Program Files\Tracker Software\PDF-XChange Lite\Drivers\PrnInstaller.exe"C:\Program Files\Tracker Software\PDF-XChange Lite\Drivers\\PrnInstaller.exe" /L /I_D_R_M_P /F /N "FileCenter PDF Printer"2⤵
- Drops file in System32 directory
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e58c031.rbsFilesize
35KB
MD5c8cb28d3ed89380cdf048f4ee33e5cad
SHA160f3ac0a19bb990ba961c416c4eed495f595fd81
SHA2566b01c4d0804db99865bcb1e799022dee0218df2c5a59f12b0be1a1788cd00f46
SHA512aa5d51182bf8691a34097d11123b230fd446b05c24ec466f8d1f4b4be6b3be6698d67d0fcbc32fbbff01f50024d53c3ea0b7274052d923e158bdbffeca208a97
-
C:\Program Files (x86)\FileCenter\Drivers\InnoCA.dllFilesize
593KB
MD52fbf69d014ae135d473ec8243d44be9e
SHA12c28d3b23d8ff061ae554ccd92aec93900e3cb2b
SHA2566f0d663f59487a01eebb128a9c4984789b91eaa764194ed9f0ed63583577d2d3
SHA512530ab82b0ba1e148889bf41d6b00c67aee8ea4ff014b7e9d76bef682f8ce34a6908213b4d6f979ba02c6abe907cd1ac28bd323b4b766ede52b49ddd054d8b654
-
C:\Program Files (x86)\FileCenter\Drivers\PDFXLite10.exeFilesize
40.5MB
MD54c61ee01d5b84db67c38c10d3f210f39
SHA1844eab66505dc4eb88dec70c3f20307365c350ac
SHA256a7e10bda5cb2e1c347b2ee682385fd56ff5da05c659c665abc0b526f639a5583
SHA512a44a2bd871c9f0f654b0e627accc9d4388390e5e5b7326a3372a103886d74b89ab78e235e1b986da9acf0f08fdf45b642ec26000bbe32de92a44b1978f4c2f80
-
C:\Program Files (x86)\FileCenter\Main\FileCenter.exeFilesize
20.1MB
MD5879d5b401a73cc57a3166ba01ce70c60
SHA1ee8b47af48514a3b65f4ee838c95e7a3a64d3434
SHA25682da544c9d730c17c34a253c29fd7d621e8cdc064e0220c27e43bb0dd60c4ebe
SHA5126e49343acca8ab878b4cf9e12ce4d796decd7f44c7068f8d90f5ad2eebbab31c15c82bbf66bcb571120a9bf8e375055558308d00b66053591c6ec94fb514b3b6
-
C:\Program Files (x86)\FileCenter\Main\FileCenterAddin.dllFilesize
13.0MB
MD52b9bbd88d6b6a3b7c417cbb0eae69bf4
SHA1c43ab9fa5c1085ba21280d143f8b8322d6a93883
SHA2561e5f8dbd4c08faf3a0a84b6af17454d9d21459618b411696b9604af80ee9fc0f
SHA512f07ae3e76066960a3b657146b83da724ca13873edd82d7314d048593c3e6021ced3297459d46a30daf95189631bfd4c941e44d91433549dcc70efb5407543a30
-
C:\Program Files (x86)\FileCenter\Main\FileCenterAddin.iniFilesize
27B
MD570da425f8aac14b1484047edb83e60e8
SHA169d09199af5a5ba4ed4e1d59432fec784d5271e4
SHA256258d4ad31457b1c117b248b6ba0dd1c44ba6ad0a0839623ced45ce15ebbd0a7f
SHA512a9cf352b79a8f38f03a781bf55a94e2c1344e1de55e9ea21e736ad436d7452f8349a64fec3b46e7ddc1d11f5fa3ecc80329b5b4e1da702680e9c2223e57943d2
-
C:\Program Files (x86)\FileCenter\Main\FileCenterAutomateService.exeFilesize
7.7MB
MD542d9ffbb0b7ef3cbdeb0c005619b12fb
SHA1fbaed95c25aa26c43121e8421b5154e9e5dcdca0
SHA25659e5b75c18c82acf2d94a1fd9b0a67af6795d594e1f837df1a80eec66671d307
SHA512c77b91ca41b13bb471ced5346f998805430a33e210c09c0d7e0b0a7573d9e95da1bc5e351df08c871e1c3e962b3ec4b9fdb5ef5cc806fd87ef42f50ddd99d7cb
-
C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.dllFilesize
36.9MB
MD5d9806fd0eeafd9f89e0473ad52889283
SHA1d6fca558897aaa6703129557e2d02b1a84765dcb
SHA256aa2aafe588aecd1a10bf05dcd675143061a55bcd5bc83bd749bde7b85d21dbc6
SHA512796c609dc6fa4c6fe1e6909ae3a4a22cc06c900f34b999d77a9805767f69f1b1d96a99e9ee03ad6ab68e7f6bb5fa3269c1d73db4af68a2834bfd5cbf2fe91422
-
C:\Program Files (x86)\FileCenter\Main\GdPicture.NET.14.tlbFilesize
475KB
MD52181937aa6a592be4b93413a2bcc274e
SHA1c7f3c0c3ab00361c832d9f534221b7557ffb1f8c
SHA256e5c02ad38b4db63d4615961ce52261c568ba94b6190969a84e3d9dc0fad75c85
SHA512e36676d71906fa95a4ab389b43b35de381a1ece23092171c5de23e1b0e98f650b84c166a319c2417a303141e4fda9509b4db7277d34585fb9a4ac6f0e44dca8f
-
C:\Program Files (x86)\FileCenter\Main\GdPictureComReg.exeFilesize
21KB
MD5b9718823c993fccb6352cc0210993569
SHA14d551f7cafd0040ff9657ca644c1365f3e7847ae
SHA256a173ba320929c93b9bf41186a0692d753da812b8691dcc416c16abdf004dbf89
SHA5126e513ef7535539cff90e88b95c5f57bb9e262cebbf1e51bc8268595347fbf06f628cf16eaa974d7eccd2a285ff2f8f56867c4292c1fe4fb7b0ee90f5acee9747
-
C:\Program Files (x86)\FileCenter\Main\VSTwain.dllFilesize
573KB
MD513f5f7e228ce2b8a3a41dbad4e451279
SHA11b3837572602b2620b75bf2ad2aeab89a64f5287
SHA25611b50ff0bc4e72cd2dd47fb8070a86781682b92a9fb1010a5fae97276afb2292
SHA51224ea8072abb5c0d4083989539f399ad076cc92260aaf0317320dddb4196e752e1c082d386c75049a343b1c62765d587f2b66374b53e7b24326ee6129a7aa856d
-
C:\Program Files (x86)\FileCenter\Main\dten600.dllFilesize
7.7MB
MD522cf875a0cf0ad89f5f7d7ac6628a598
SHA1c2a9620579a08d6a91557e6cb8f1d2585392d30d
SHA25611ef1b8791cfd8fee0923ec685ae1d29485349ce7d2d37a15ae1615e8d646baf
SHA5123b59898730a9eb4a8f4347b8c854983636b28f6641b072fdd0d7f9190b905fc9b03dcf204154072048dc1a6a24785d2aead865b5bf160c9af9df87cf4175c608
-
C:\Program Files (x86)\FileCenter\Main\lbvProt.dllFilesize
532KB
MD5120387e48d0556538ef3ee68de18a707
SHA10633de57f7ef851115be39d407db8e08986b3d93
SHA256e202172ad8799ee0feee2559ac06f2cf75530f702f7e11d0cb4c1b3ec57eae4e
SHA512a7509c2822bd7f08b5e67dfbd3d9ac701639599b5681966f5276f51e60608dcd7dafaa953f7589d99de7ba7b68eaa56be0ecb2c074f5c4ba6ba114880507b1da
-
C:\Program Files (x86)\FileCenter\Main\secman.dllFilesize
146KB
MD5085d87f49daf13496e0e018c4008fae6
SHA14b0c3058b8ace7e8242c941b449daa968f5b45c7
SHA256d1f1e3717a68166942d1f7a71b78e35e3381edbb07d7d37ae8b603dcc3ffad15
SHA51252886de13e538e0eef364a16da1ccd24a571450d417ead4ddb689efe8e8099f9964c5f6076a239e833bd41c88f2f95f30c20d722f880837aa541be366407145b
-
C:\Program Files (x86)\FileCenter\Main\vc_redist.x86.exeFilesize
13.6MB
MD535b40b21383ac38487ceec8ab6e53565
SHA159894bd9c96361b475c3b4b7ca9719c72e813d04
SHA256caa38fd474164a38ab47ac1755c8ccca5ccfacfa9a874f62609e6439924e87ec
SHA5123a00b40ba8cd1cf8a523efab656f5b8910a3b07f9d8fba4ffc07745165b6375affd77b00fd3064fa72fb984c1773438a39e67a55363be23dd8fe1727c1016b8e
-
C:\ProgramData\FileCenter\Config.iniFilesize
23B
MD5b2ad8f8dcc45644ea167317d050faac4
SHA1215091d6ad9d4f210b85e675b17c60a7300ca9b1
SHA2569aaebe4ab06e9de08e28b9b4da9248442c502ef5411d7d734c13af1afa2c2dd0
SHA512528737e85d799e0312c335bbbb856f12ee885465e9b999d6cfb1b64d8c003744a5a6d6cd7ae2b6e41b9cbe23115990acd65debfcdd15e1677c955944403da6f4
-
C:\ProgramData\FileCenter\PDFPrinterLog_000_PkgLite64.txtFilesize
1KB
MD568a333e2babb9b759461e533dcebe58a
SHA1e5b40bc94e43efa537ef85f186ec82c074ce19a3
SHA256fa2b8a085eface99ae0c851a1472b4aa485f3c25f720289a45c049a17d3e5ff9
SHA51239fa33c345e19a31a630807be2f21adff06ee4da0451997b002213ad9d4e74bc6478d391e53df5562c270510604f4055d63aa15a3673c677bd76405fb84bf711
-
C:\Users\Admin\AppData\Local\Temp\is-ME4LC.tmp\FileCenterUtils.exeFilesize
8.7MB
MD5e9638374a27160513f1a62827b6cf102
SHA1b9da58896020d46c4ef16f8f1b332d5f6c1e6f0f
SHA256c064ba394872e6a8277a5c71b50da34b800d682e403c6b80ec3ba37badf38942
SHA5129632c8416f542dc96f22a0ddcd109e85c29368b1263d86f74bab39aae8e9271a7b3e2eea18932cf4e3fb5e269d3892016b878d29fb6dad002db11367849f293c
-
C:\Users\Admin\AppData\Local\Temp\is-PHKRD.tmp\FileCenterSetup12.0.16.0.tmpFilesize
3.0MB
MD50acf3c16e6faca9c0aec525f53d03866
SHA15c3960b48d2b72ad02e59470d8a7b690ee826f9e
SHA2562c470730bf3efa3f4a9dc184548abefbab8c4aecc43e14834c5810159019c151
SHA51217d98a3b52eb89e02a371f1d6effa59f624696cd14b0589fe436640ddbe04fc6c5d82834f73699dbaa32a7a69343f82863820e72e225e17d710c4de5102b46c2
-
C:\Users\Admin\AppData\Local\Temp\prnInstaller.logFilesize
431B
MD5aa8de721ff57a808e13ef78cdcb2fa8c
SHA1a011ba3bdc7cad20cb557bb9dea70390cf6bf3ed
SHA2569de0d6ffab3c0f96fe8353f6510679d89e936981948446b2001132737e157084
SHA51228888018313fc2bc787e729f6ec7219b1d156fb56390e3ff7a5be62e0ec93cf788d361d438c43bcb38f20c51c8d81996ccb9ea6a5d764180f3784e9ab9f0dc13
-
C:\Windows\Installer\MSIF0D3.tmpFilesize
1.3MB
MD55a36339a5bae618a2ef09d0adab0b602
SHA1437d251abdcfe4f9379c44336ff5b920df7a0fbf
SHA2562e1d52eec9169247f75b584f874617ea4702cf2fdf92a4306d84c354a0151674
SHA512cff119e5b719c8578d199b946fc213074d89195d63bf6cf00dc2c255cc66695d0062da2e916a22d4df4c1bb1e195f69df21c463d144ad9442defe7b3033ead2a
-
C:\Windows\Temp\{331B6960-7970-4C89-813D-E58F0E6F92C8}\.cr\vc_redist.x86.exeFilesize
632KB
MD586123c033231dd7e427d619ddeefd26a
SHA1608c085348fd9c4e124e6f28f0388ccdac6ab2b5
SHA256d863fb2f65bb6eea492e79ab9d09a53cc226e85f57d6545cb82f60b122a4b737
SHA512ffb574123b350d3c9434abc88baa050ae6e54b5b9ebf3f1dcf4bf079284135696004508653e74a3a3c2fa8e4c1b681c3f31d5fe69e0f0c5f45ed37f9ddc61e78
-
C:\Windows\Temp\{45A36FCD-0295-4FAE-B24C-6F3BF9C760D1}\.cr\PDFXLite10.exeFilesize
1.4MB
MD563ed90cdd501829a2319f8cf86c52bd2
SHA1da198bec49015e98baa5b2cb91903f659e31dd37
SHA256529bcd90e571d51a19396cb457bf7eebecf494613030389fa7c5b25b8e42757f
SHA512d8cc05a5d481e17432125d21d58c2b32696c8b3e6632f911184292a0f0b24910e9dc5cc3ae2bdc6d87e478aef81504aa34520d3bd6813517e4b9347eee0eaa19
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\.ba\logo.pngFilesize
5KB
MD504967ef5107480ea36b3e2e97af7eb7a
SHA16efdd4484dcfcfd45b3c887c852f0abb1a02a645
SHA25663f2616963b68ac13dab898c1b5938ab1b353a9ba0f73c6a2f2c3c5c9eac0b21
SHA51200ae4cff10b1a6e504d590d49bc4af707ad33c1739ed46f648dc348645bd5d4b61bf0c84448c78d7542fb6d7294f3aa753b4106579f15b1d726bf1118594c581
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\.ba\wixstdba.dllFilesize
203KB
MD50ba387d66175c20452de372f8dbb79fe
SHA15411d41a7d88291b97fb9573eb6448c72e773b70
SHA2567b3d4a22a56cd80f19c48a321f978f728d34b8227cdc7fcadeb76b7506b2bb33
SHA51213ec6e6ddc602e8053aadd4dd84ed87c23b581f2a41d738e32a522128ca4985dcfcaedc7fab192085f0eb4facd1cd7ad91ccaf8505491e29288d2f66cbf705fd
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\PkgLite64Filesize
2.6MB
MD5e91e50fc80f7d84561db5823595e5b63
SHA1b3e40b17a668586e86f346e9a7e3b8ef4838d437
SHA2563203656dcafaf1ae128dae78bab26829bf0c2c9e1c255a8ca15ed176651d8948
SHA512c9bb45c0882af7a2f5b6294fa2c29202ac529a6f1584e763a00c4812782f8274498a9c008ef0901dd67d895fd448e0eeb19a75cfe98bcd4c050c8856f97e5034
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab20036D21E40418DD3280D692958B9275Filesize
378KB
MD5bed8b8bddf71f7b921c8efac0eb69518
SHA1df2818992742ed4e80d28a94e1b0f43f280db455
SHA2563cbfff994fa8a50b2d89e0dc906eefaf50ea16b07acb8ed4478fb2b116fcb8a5
SHA5125699485985ea856d8ef3e97372e51c98eb81225c18ab5a851e1d8f574c0c9e77986563ad63e9b2118bd42edac0a39a46727306484be71af485955f9e818502d7
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab20F2A2993791BDD97B003B5578C7EAC7Filesize
2.3MB
MD5951b5426340de231c90e0be2780cc66e
SHA1fd6b966fd3270e53d8b1d660d69d4290b75b8a9d
SHA256afac74f4b16fbefff34daec002a027abab8d45b6113ce1fde320cbf2b8eec68d
SHA512038c0a171079502899366abf1101b173468a1a1997dafe94b6d217e26d5f6fec97e0d38fd4f7a70ef3d410dfdd18b7d93b3954776db3fc7ed9e91211492e0fb2
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab293E212B151FCAC5768C99D66AA8D9AEFilesize
1.8MB
MD5f7bd3fbb5859bd43e830b621c8ade037
SHA171838fa41b8906bdcb9a64eec599dafd25d92c6f
SHA256789ca746d45588380841494901a531abcf7a9a184f74af2cf049a77f489f4dc7
SHA51253dbfde654e6bdaaab257fc3968a50ee7b8e4641bdc739c55ce1697e869ac513a7f2dc72ab92074b062928d56ab6f8083c5fa8a71a16a2f6918cc52f73b81250
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab5DD1590118F3640F385DB3EB2F516E5CFilesize
17.1MB
MD5b8b961c9899ec926b1dd8258b0232626
SHA18ed4a38e4a7c856a427a068ec51539f2e630f86c
SHA256e9c26ae1625eb454e4cd78dd9ac145eeae94190f943b6fc72d250dc3acb703d7
SHA5125dbcdbaf86bb25029838b93fa5787d9833b3ac2e6861b3df405b7957f1e5355395bcc664f4a550d9d79a7d3f7d98ca740527d5a86ecd0bfe0df3e768016f1877
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab66549ACD4EE6139A64068CA8626575A9Filesize
1.5MB
MD5bf193f70c4ba12e12a592df1cdb17b40
SHA1e84a6d1cbcdc79926f7defef1ad4b7a8a651b5cb
SHA256cee91939598abb3ec23ce0dc93c7690421efdca54795997558ef0fc617442a82
SHA51223077213cb84b84096c93da33f3a23bda28bcda638ec3a9256f4ab064d8bf6f1e2860d32e6713716f35803db92fb30c4f07b0b2accccd914d7bcb75910b63d79
-
C:\Windows\Temp\{4FCEFE9F-02B1-4D0B-A1A3-EF1291D60986}\cab8D36E281ACA51D7FBE9AB973BE9B36E3Filesize
174KB
MD50102ec8e3aa2b964f2d7719dd00de809
SHA19a008c6acc5c70c8467621bf4a8e78930e2843a3
SHA256765cdd18ca4b9c8de8f16035ab46f740a9da9e628f24dbfe16800af41fa3122b
SHA512ee4f280449bcceb357290c1970914524fcb30931b240591cee3f540fbfe365a81f5d6201eee9e18598163f9be392062ee8cfcdf16d289c4bc2effa6061e69c94
-
C:\Windows\Temp\{8E651816-596C-4DA0-8F8A-1FB26470B1D7}\.ba\logo.pngFilesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
C:\Windows\Temp\{8E651816-596C-4DA0-8F8A-1FB26470B1D7}\.ba\wixstdba.dllFilesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
memory/236-567-0x0000000000EC0000-0x0000000000ED2000-memory.dmpFilesize
72KB
-
memory/236-655-0x0000000006160000-0x0000000006704000-memory.dmpFilesize
5.6MB
-
memory/236-666-0x0000000005CB0000-0x0000000005D42000-memory.dmpFilesize
584KB
-
memory/236-669-0x0000000006010000-0x0000000006018000-memory.dmpFilesize
32KB
-
memory/236-670-0x0000000006BB0000-0x0000000006BD2000-memory.dmpFilesize
136KB
-
memory/236-572-0x0000000007EB0000-0x000000000A39A000-memory.dmpFilesize
36.9MB
-
memory/684-965-0x0000000000C60000-0x00000000016F6000-memory.dmpFilesize
10.6MB
-
memory/1172-562-0x0000000000EE0000-0x0000000000EE8000-memory.dmpFilesize
32KB
-
memory/1212-13-0x00000000009A0000-0x0000000001436000-memory.dmpFilesize
10.6MB
-
memory/1212-12-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/1432-23-0x00000000009A0000-0x0000000001436000-memory.dmpFilesize
10.6MB
-
memory/2060-6-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-50-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-21-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-674-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-356-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-17-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-15-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2060-1024-0x0000000000400000-0x000000000071A000-memory.dmpFilesize
3.1MB
-
memory/2404-958-0x0000000000C60000-0x00000000016F6000-memory.dmpFilesize
10.6MB
-
memory/2404-959-0x0000000000C60000-0x00000000016F6000-memory.dmpFilesize
10.6MB
-
memory/2404-718-0x0000000000C60000-0x00000000016F6000-memory.dmpFilesize
10.6MB
-
memory/2520-630-0x0000000000140000-0x00000000008FB000-memory.dmpFilesize
7.7MB
-
memory/2976-14-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2976-0-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2976-1025-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2976-2-0x0000000000401000-0x00000000004B7000-memory.dmpFilesize
728KB
-
memory/3308-711-0x000001D5B9010000-0x000001D5B9018000-memory.dmpFilesize
32KB
-
memory/3308-679-0x000001D5D3F30000-0x000001D5D641A000-memory.dmpFilesize
36.9MB
-
memory/3308-676-0x000001D5B73B0000-0x000001D5B73C0000-memory.dmpFilesize
64KB
-
memory/3308-712-0x000001D5B9050000-0x000001D5B9072000-memory.dmpFilesize
136KB
-
memory/3308-1021-0x0000000000400000-0x000000000052C000-memory.dmpFilesize
1.2MB
-
memory/3336-19-0x00000000009A0000-0x0000000001436000-memory.dmpFilesize
10.6MB
-
memory/3356-25-0x00000000009A0000-0x0000000001436000-memory.dmpFilesize
10.6MB
-
memory/3508-961-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3508-1022-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4080-667-0x0000000000C60000-0x00000000016F6000-memory.dmpFilesize
10.6MB
-
memory/4332-559-0x0000000010000000-0x00000000101C8000-memory.dmpFilesize
1.8MB