Analysis
-
max time kernel
266s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
SPCapIQProOffice-1.0.22211.1.exe
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
SPCapIQProOffice-1.0.22211.1.exe
Resource
win10v2004-20220812-en
General
-
Target
SPCapIQProOffice-1.0.22211.1.exe
-
Size
673KB
-
MD5
43a7f7024eb8795b902b4ba14b600840
-
SHA1
b7a192a8dc5470e1195d129bb760c971ee2ba202
-
SHA256
dc5cebf756baf365971ac3ff0655a40d4b57fe115a762c90d0f41897a7bfb609
-
SHA512
492c88910a0731045df2aa54b6bd0011055533ec437d9c762e21a1c6aaaf7d7e8c8f11f3e6e462a05684e76a58b71aa6c5934cf6e06d40492c06832c1396985a
-
SSDEEP
12288:/AjuakTOfDlEU4HWDblFlOTPThNp5aNUgrI7QCq8:ou/OfDlEUKWflmTP3parX8
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 42 884 msiexec.exe 44 2100 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 3208 SPCapIQProOffice-1.0.22211.1.exe 3244 SPCapIQProOffice-1.0.22211.1.exe 4100 vstor_redist.exe 2740 Setup.exe 4128 vstor40_x64.exe 4328 install.exe 2284 empower-1.0.22211.1.exe 2648 CheckIfEmpowerIsInstalled.exe 4284 CheckIfApplicationIsRunning.exe 1744 KillSync.exe 5008 mio.empower.Sync.Setup.SetAclOnDirectory.exe 4848 adxregistrator.exe 4708 empowerSync.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8704FA-5E88-467D-961C-0CC5117736E7}\ = "S&P Capital IQ Pro Office (x64)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8704FA-5E88-467D-961C-0CC5117736E7}\StubPath = "C:\\Windows\\SysWOW64\\rundll32.exe \"C:\\Program Files\\SP Global Market Intelligence\\SP Capital IQ Office\\RegisterAutomationAddIn.dll\",DllRegisterAddIn compatibility ciqcompat" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8704FA-5E88-467D-961C-0CC5117736E7}\Version = "1,0,0,1" msiexec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8704FA-5E88-467D-961C-0CC5117736E7} msiexec.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{63284027-44F1-3380-9061-5086AB58B193}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A1986E63-AB45-337D-9FAA-AEF39615FDC7}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{51942F6B-7BA8-3F5C-83B9-8A9FF85C8E49}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5BD75A9A-2710-32E2-A09F-3E8DC17193C6}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F6908791-177A-3D17-B360-A876C0785C14}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4FE9377F-5509-37D7-9EFB-D1D4ACA4120D}\InprocServer32\Class = "mio.empower.App" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{86E40577-8ADF-3C3A-B02C-435A5BE4E2A6}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A523EF7-D7B7-3F91-B28C-FDF4AD4A5AE9}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E13414D2-EF15-3D99-AAFF-48D55A2C91B8}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D4C6357D-4829-3939-8384-E7A0B245F18D}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CDC74AF-7E56-379E-84D3-DAE167DF0340}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F563228C-F526-32B5-94BB-8199105922CD}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1A523EF7-D7B7-3F91-B28C-FDF4AD4A5AE9}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3C4CC1A1-19DE-318D-93B4-6631A1B89346}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{72FF2139-4F3D-3E69-9955-54420948FD56}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BFE0D397-2D6A-3C22-84F1-87743440409F}\InprocServer32\8.10.24.0 adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2F7917BB-0574-3DAE-9867-533AD1401E5E}\InprocServer32 adxregistrator.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4B0B8337-20E6-4AF8-91AD-C317D13B2E10}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{72F3B72A-8363-3111-B5AD-A3BADCCCB483}\InprocServer32\Class = "XamlGeneratedNamespace.GeneratedInternalTypeHelper" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6868E632-57CD-3A6D-8AEF-8AA0B43A68F3}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2496F995-4A5D-3FD5-BDBB-20B42F7D8C24}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{16422E9D-CD28-328F-BDCE-B3D121A15C04}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C357D30B-84B8-3931-9ADD-E30FE8A4E981}\InprocServer32\8.10.24.0\Class = "mio.empower.Features.MasterCorrector.Views.MasterCorrectorSettingsView" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{86F42BB6-6D2E-32E4-919D-ADC7197164C8}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DFD439E8-0FFC-3E50-851D-84A0ADFF2F5F}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B678EBB3-B81F-341A-B231-4647951CE290}\InprocServer32\Class = "mio.empower.Features.CRElements.Agenda.Model.AgendaContainer" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{432D2C30-388B-3193-B733-B1BEB09F7463}\InprocServer32\8.10.24.0\Class = "mio.empower.Features.ChartsProxyFunctions.ProxyFunctionsProvider" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1EEFA694-970B-37EE-97B5-23309A10706B}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6EAC3D6-1940-4212-A97F-D6CBD7628C9C}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA19FAC1-DF7F-3234-A198-78BDED92D2D1}\InprocServer32\8.10.24.0\Class = "mio.empower.Features.MasterSettings.Views.MasterSettingsView" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{22BC2695-9395-37E7-9224-F681CDA1C1F3}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A1986E63-AB45-337D-9FAA-AEF39615FDC7}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6868E632-57CD-3A6D-8AEF-8AA0B43A68F3}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D00C04B6-0940-3737-B57C-C2CE851D9EBA}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2530747C-0EDF-32C0-95CC-E6EBA40C205B}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{86F42BB6-6D2E-32E4-919D-ADC7197164C8}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4DC90ABF-DB0C-3405-A13B-D12AD985298E}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6EAC3D6-1940-4212-A97F-D6CBD7628C9C}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962943AD-70F5-38FE-9F36-03E2F4646E2F}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF888B76-5A85-349C-8350-9CA61425869B}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{90280983-2BBC-30AE-BAA4-A7890282D910}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E6BCB4C-F003-3DB2-AE43-A309326F093E}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3BC61299-3C32-36C4-97B6-104406B69FD5}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{258112FE-A2BB-3049-B869-4E46B3681F17}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B63FD7F0-9F88-3A5E-842C-79AD25FFC396}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962943AD-70F5-38FE-9F36-03E2F4646E2F}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2530747C-0EDF-32C0-95CC-E6EBA40C205B}\InprocServer32\8.10.24.0\Class = "mio.empower.Features.Library.Cropping.Views.ImagePlaceholderOverlayView" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3C4CC1A1-19DE-318D-93B4-6631A1B89346}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{66BBEE52-AD0C-3A82-A8F8-E6DAA6FAF350}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B678EBB3-B81F-341A-B231-4647951CE290}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03709F2F-6B7D-318F-8048-073663224DB1}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03709F2F-6B7D-318F-8048-073663224DB1}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4084B490-9BFF-33A9-8CBA-572EEAB6BD5F}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2F3C1D14-6DCF-3937-8359-32B90727DCC2}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AB7549D6-0434-3506-9FB3-85652C11CBF6}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3BC61299-3C32-36C4-97B6-104406B69FD5}\InprocServer32\Class = "mio.empower.COM.LogoNameProvider" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B2CFCAD6-401E-3A46-A51E-FA0BD1542084}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3EEE422-392E-3EBF-BB0A-92B582D7AC69}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{412B5F7D-942A-33BE-ADF4-891C30AD6720}\InprocServer32\8.10.24.0\Class = "mio.empower.NumberingFormatter" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{76ABBF47-338A-3864-8A3E-BF7416D6E58C}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D8A13FA3-CC24-36D9-B277-8E2307F3A0A1}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AB7549D6-0434-3506-9FB3-85652C11CBF6}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68939693-7934-3C5D-8DDE-2A2D8626FDAE}\InprocServer32\8.10.24.0 adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3BC61299-3C32-36C4-97B6-104406B69FD5}\InprocServer32\8.10.24.0 adxregistrator.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation SPCapIQProOffice-1.0.22211.1.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rundll32.exe -
Loads dropped DLL 64 IoCs
pid Process 3208 SPCapIQProOffice-1.0.22211.1.exe 3208 SPCapIQProOffice-1.0.22211.1.exe 2740 Setup.exe 2740 Setup.exe 4328 install.exe 4328 install.exe 1724 MsiExec.exe 2528 MsiExec.exe 920 MsiExec.exe 32 MsiExec.exe 32 MsiExec.exe 920 MsiExec.exe 920 MsiExec.exe 920 MsiExec.exe 4412 MsiExec.exe 4412 MsiExec.exe 4412 MsiExec.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4412 MsiExec.exe 4252 rundll32.exe 4252 rundll32.exe 4252 rundll32.exe 4252 rundll32.exe 4252 rundll32.exe 4412 MsiExec.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2100 rundll32.exe 2284 empower-1.0.22211.1.exe 2284 empower-1.0.22211.1.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe 4848 adxregistrator.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce SPCapIQProOffice-1.0.22211.1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{1f9d8fb6-329b-495a-b21e-651e0f09301f} = "\"C:\\ProgramData\\Package Cache\\{1f9d8fb6-329b-495a-b21e-651e0f09301f}\\SPCapIQProOffice-1.0.22211.1.exe\" /burn.runonce" SPCapIQProOffice-1.0.22211.1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run empower-1.0.22211.1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Sync = "C:\\Program Files\\SP Global Market Intelligence\\SP Capital IQ Office\\Empower\\empower\\sync\\empowerSync.exe" empower-1.0.22211.1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA adxregistrator.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification \??\c:\Windows\SysWOW64\mfc100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\vcomp100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100rus.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100chs.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100esn.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100ita.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100jpn.dll msiexec.exe File opened for modification \??\c:\Windows\system32\vcomp100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\msvcp100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100deu.dll msiexec.exe File opened for modification \??\c:\Windows\system32\atl100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfcm100u.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100kor.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfcm100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100esn.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100jpn.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100enu.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100fra.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100rus.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100ita.dll msiexec.exe File opened for modification \??\c:\Windows\system32\msvcp100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100fra.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\msvcr100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100u.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100chs.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100deu.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100u.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfcm100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100cht.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100kor.dll msiexec.exe File opened for modification \??\c:\Windows\system32\msvcr100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100.dll msiexec.exe File opened for modification \??\c:\Windows\system32\mfc100enu.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\atl100.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfcm100u.dll msiexec.exe File opened for modification \??\c:\Windows\SysWOW64\mfc100cht.dll msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created \??\c:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.exe msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\nl\mio.Empower.Resources.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Reflection.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.AspNetCore.Server.Kestrel.Transport.Sockets.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\SNL.Clients.Office.Common.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\ja\mio.empower.UI.Styles.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\System.Collections.Immutable.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\pt\mio.empower.UI.Controls.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\EasyHook32Svc.exe empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\Microsoft.AspNetCore.Connections.Abstractions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\Microsoft.AspNetCore.Http.Features.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\Microsoft.Extensions.FileProviders.Abstractions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\ProductLibrary.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\MLModels\autofill_labeling_features.txt msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\EBWebView\x86\EmbeddedBrowserWebView.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Microsoft.OData.Client.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\netstandard.dll empower-1.0.22211.1.exe File created C:\Program Files (x86)\SP Global Market Intelligence\SP Capital IQ Plugin Manager\stdole.dll msiexec.exe File created \??\c:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime (x64)\install.res.1041.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\empower.Slides.LayoutTools.Core.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\empowerStartMenuEntry.exe.config empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.AspNetCore.Mvc.Localization.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\SNL.Clients.Office.Common.pdb msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.empower.Core.Mvvm.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Diagnostics.Contracts.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.DiaSymReader.Native.x86.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.Extensions.Options.ConfigurationExtensions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\empowerSync.exe empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\mip_core.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\Locales\am.pak msiexec.exe File created C:\Program Files (x86)\SP Global Market Intelligence\SP Capital IQ Plugin Manager\zh\SPGMI.Localization.resources.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\fr\mio.empower.Core.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\hu\Humanizer.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\pt\mio.empower.Common.UIResources.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Collections.Concurrent.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\de\mio.empower.UI.Styles.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.AspNetCore.Server.Kestrel.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\System.Text.RegularExpressions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\Locales\bn-IN.pak msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\Trust Protection Lists\Mu\LICENSE msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\MSEdge\Microsoft.WebView2.FixedVersionRuntime.88.0.705.81.x64\Locales\cy.pak msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\id\Humanizer.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\Microsoft.Extensions.WebEncoders.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Runtime.InteropServices.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.empower.Theming.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\System.Security.Cryptography.Cng.dll empower-1.0.22211.1.exe File created C:\Program Files (x86)\SP Global Market Intelligence\SP Capital IQ Plugin Manager\SPGMI.Utilities.dll msiexec.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\Svg.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Xml.XmlDocument.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.Common.PowerPoint.OpenXmlInterop.Staging.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\plugins\Sharepoint\RestSharp.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\System.Runtime.Handles.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\System.Runtime.InteropServices.RuntimeInformation.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\es\mio.empower.Core.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.DiaSymReader.Native.arm.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\CheckIfEmpowerIsInstalled.exe empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.empower.ConsistencyCheck.Rules.Shared.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.AspNetCore.Routing.Abstractions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\mio.empower.DataClient.Plugins.Contracts.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\KillSync.exe empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\zh-CHS\empower.Slides.Licensing.resources.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\System.Diagnostics.Process.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\Microsoft.Extensions.Configuration.FileExtensions.dll empower-1.0.22211.1.exe File created C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\mio.Common.Core.dll empower-1.0.22211.1.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_vstoee_amd64.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File opened for modification C:\Windows\Installer\MSID81.tmp-\SPGMI.Logging.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI1032.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordHostAdapter_GAC_v10_amd64 msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAHosting_GAC_nomaf_runtime_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOContainerControl_GAC_nomaf_runtime_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOExcelInterfaces_GAC_nomaf_runtime_amd64 msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10_Pipeline.amd64.enu msiexec.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log ngen.exe File opened for modification C:\Windows\Installer\MSI850.tmp-\CustomAction.config rundll32.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Applications.Contract.v10_Pipeline_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAAddInAdapter_GAC_v10_enu_amd64 msiexec.exe File opened for modification C:\Windows\Installer\MSIB8A3.tmp-\CustomAction.config rundll32.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Office.AddInHostAdapter.v10_Pipeline.amd64.enu msiexec.exe File created C:\Windows\assembly\GACLock.dat msiexec.exe File opened for modification C:\Windows\Installer\MSIB63C.tmp-\log4net.dll rundll32.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Applications.ServerDocument.v10_GAC_amd64.enu msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOInstallerUI_enu_amd64.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File opened for modification C:\Windows\Installer\MSIBBE0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBBE0.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\SourceHash{FD9D64F4-CAF5-3D23-845A-B843C78CC1A5} msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft_VisualStudio_Tools_Applications_Hosting_v10_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Office.AddInHostAdapter.v10_GAC.amd64.enu msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\AF4078B788E5D76469C1C05C1177637E\1.0.22211 msiexec.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log ngen.exe File created C:\Windows\Installer\SourceHash{7B8704FA-5E88-467D-961C-0CC5117736E7} msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordInterfaces_GAC_nomaf_runtime_amd64 msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File opened for modification C:\Windows\Installer\MSIB8A3.tmp-\SPGMI.WixCustomActions.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIB8A3.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.log ngen.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOLoaderUI_dll_amd64_ln.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.HostAdapter.v10_Pipeline.amd64.enu msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_vstoee_x86.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAServerDocument_GAC_nomaf_runtime_amd64 msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_VSTOLoaderUI_dll_x86_ln.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOCoreInterfaces_GAC_nomaf_runtime_amd64 msiexec.exe File created C:\Windows\Microsoft.NET\ngenserviceclientlock.dat ngen.exe File opened for modification C:\Windows\Installer\MSIB63C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAD72.tmp msiexec.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAAddInAdapter_Pipeline_v10_enu_amd64 msiexec.exe File created C:\Windows\Microsoft.NET\ngenserviceclientlock.dat ngen.exe File opened for modification C:\Windows\Installer\MSI850.tmp-\log4net.dll rundll32.exe File opened for modification \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.VisualStudio.Tools.Applications.Runtime.v10_GAC.amd64.enu msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\VSTOLoader_dll_amd64.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOCommonImpl_GAC_nomaf_runtime_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\vsto_shared_typelib100_x86.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File opened for modification C:\Windows\Installer\MSI9320.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\AF4078B788E5D76469C1C05C1177637E\1.0.22211\msvcp140.dll.8A193A94_BCB6_303B_8ED1_C099302B9194 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_Microsoft.VisualStudio.Tools.Office.Contract.v10.0.dll_GAC_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAHosting_GAC_nomaf_runtime_amd64 msiexec.exe File created C:\Windows\Installer\e589f19.msi msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTAAddInAdapter_Pipeline_v10_enu_amd64 msiexec.exe File opened for modification C:\Windows\Installer\MSID81.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\FL_MSVSTOWordHostAdapter_GAC_v10_amd64 msiexec.exe File created \??\c:\Windows\Installer\$PatchCache$\Managed\4F46D9DF5FAC32D348A58B347CC81C5A\10.0.60830\Microsoft.Office.Tools.Outlook.Adapter_Pipeline.v10.amd64.enu msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA}\CLSID = "{EC04D82C-AA59-4ba4-96B1-27BE3FF05E00}" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA}\Policy = "3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA}\CLSID = "{EC04D82C-AA59-4ba4-96B1-27BE3FF05E00}" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5054EC7-B9CB-4ad5-9F95-D8171A6D6BFA}\Policy = "3" msiexec.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\21 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\20 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\21 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A3EEE422-392E-3EBF-BB0A-92B582D7AC69}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{374D475D-EBFD-31CA-AC8F-F95C9B7F43FE}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B53F67CD2119B24459C2D6044A15BE3E\Version = "16799427" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EC04D82C-AA59-4ba4-96B1-27BE3FF05E00}\ = "VSTO Mime Handler" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global\Microsoft.VisualStudio.Tools.Office.Excel.HostAdapter.v10.0,version="10.0.0.0",publicKeyToken="b03f5f7f11d50a3a",processorArchitecture="MSIL",fileVersion="10.0.60825.0",culture="neutral" = 73005200500053007a0049002e003f00600037005800430026006a00390035002e003f003f005e005600530054004f005f00520075006e00740069006d0065005f0043004c005200330035003e0062006a0071005d00730040004f002e002500400078002a007e005f00760044004d0031004b00630000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA19FAC1-DF7F-3234-A198-78BDED92D2D1} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B678EBB3-B81F-341A-B231-4647951CE290}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D9568733-14DB-387D-91FB-EA1220B68FE3}\ = "mio.empower.Features.CRElements.Agenda.Model.Drawing.AgendaPointVisibilityCalculator" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79313688-CF2F-31F6-A5B2-17B2AB77E83A}\Implemented Categories adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8448F7F-80ED-3D5E-B111-851AE717B91F}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68A2E7E0-02F9-36C4-AA8F-237B751D329D}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3EEE422-392E-3EBF-BB0A-92B582D7AC69}\ = "mio.empower.ADX.Taskpanes.ADXPPTaskPaneRight" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{258112FE-A2BB-3049-B869-4E46B3681F17}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44AC7571-D388-341B-ABD9-91C57FEBD73C}\InprocServer32\8.10.24.0\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5BD75A9A-2710-32E2-A09F-3E8DC17193C6}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D6A9C7F3-A481-347A-8B3B-BE3E45608762} adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82F54FFA-892C-3637-ADF8-68B45B0FE474}\Implemented Categories adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{79313688-CF2F-31F6-A5B2-17B2AB77E83A}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mio.empower.Features.QuickAccessMenus.ViewModels.CloseTemplateRibbonWindowNotification\ = "mio.empower.Features.QuickAccessMenus.ViewModels.CloseTemplateRibbonWindowNotification" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{568C31BB-4CFD-3F6F-A723-DADFD386C095}\ = "mio.empower.Features.CRElements.Agenda.Model.AutoUpdate.AgendaUpdateParameter" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26E6A413-3B22-31BE-A1B1-D96DF3F8DF5A}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C5D58814-637A-3052-94AF-7691ED60D10C}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4DC90ABF-DB0C-3405-A13B-D12AD985298E}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{99FCDBFB-257D-326C-B7ED-E053D5596ED2}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DFD439E8-0FFC-3E50-851D-84A0ADFF2F5F}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9BB0F3D-6173-302C-9ED8-25CF6D776B48} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{48B311AC-DFAB-3E03-A053-C41FEF79BC03}\InprocServer32\8.10.24.0\Class = "mio.empower.Quarantine.GlobalConstants" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1E5F63A-C557-38F2-9FF0-22B0EAFC2326}\Implemented Categories adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D8A13FA3-CC24-36D9-B277-8E2307F3A0A1}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5CA01978-43F6-4D42-ACBE-D0F8A16BBC58}\1.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mio.empower.UI.Behaviors.FocusOnMouseScrollBehavior\CLSID\ = "{258112FE-A2BB-3049-B869-4E46B3681F17}" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03709F2F-6B7D-318F-8048-073663224DB1}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{90280983-2BBC-30AE-BAA4-A7890282D910}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4C484775-3AC2-3E5F-89D0-E7853E50EDDC}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D00C04B6-0940-3737-B57C-C2CE851D9EBA}\InprocServer32\Class = "mio.empower.Features.Library.SaveAs.Views.SaveAsTypeSelectionView" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72F3B72A-8363-3111-B5AD-A3BADCCCB483}\ProgId\ = "XamlGeneratedNamespace.GeneratedInternalTypeHelper" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C357D30B-84B8-3931-9ADD-E30FE8A4E981}\ProgId\ = "mio.empower.Features.MasterCorrector.Views.MasterCorrectorSettingsView" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{07CA3703-6F72-35F0-8777-33F00E933F0F}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{68A2E7E0-02F9-36C4-AA8F-237B751D329D}\InprocServer32 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D1E5F63A-C557-38F2-9FF0-22B0EAFC2326}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{926F719E-7880-375F-A80C-675B749C79BD}\InprocServer32\ = "mscoree.dll" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45F7874B-B793-335A-8A59-3896DEE98A07}\InprocServer32\8.10.24.0 adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ADB101BA-2478-3570-B053-4425ABE843DF}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BE903548-3A1F-3491-AB2A-5EEB98B06BDB}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1EEFA694-970B-37EE-97B5-23309A10706B}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E6BCB4C-F003-3DB2-AE43-A309326F093E}\InprocServer32\Class = "mio.empower.Features.CDCheck.Exceptions.CdValidationInterruptedException" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{658709C7-9532-3F1E-B359-CD569E98EE81}\InprocServer32\Class = "mio.empower.Features.QuickAccessMenus.Views.ShapeQuickAccessOverlayView" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4C6357D-4829-3939-8384-E7A0B245F18D}\InprocServer32\CodeBase = "file:///C:/Program Files/SP Global Market Intelligence/SP Capital IQ Office/Empower/empower/slides/empower.DLL" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6908791-177A-3D17-B360-A876C0785C14}\InprocServer32\Class = "mio.empower.Features.EmpowerLinks.RestoreStates" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D6A9C7F3-A481-347A-8B3B-BE3E45608762}\InprocServer32\8.10.24.0\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82F54FFA-892C-3637-ADF8-68B45B0FE474}\InprocServer32\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6775B6EF-86C4-32DC-B969-CDE9F8438AA3}\InprocServer32\RuntimeVersion = "v4.0.30319" adxregistrator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\Global\Microsoft.VisualStudio.Tools.Office.Runtime.Internal,version="10.0.0.0",publicKeyToken="b03f5f7f11d50a3a",processorArchitecture="MSIL",fileVersion="10.0.60825.0",culture="neutral" = 73005200500053007a0049002e003f00600037005800430026006a00390035002e003f003f005e005600530054004f005f00520075006e00740069006d0065005f0043004c005200340030003e00300029006f003d0066006500350044005f003900510050007800370034004d002e005b004b00310000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2F3C1D14-6DCF-3937-8359-32B90727DCC2}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ADB101BA-2478-3570-B053-4425ABE843DF}\ProgId adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E5F63A-C557-38F2-9FF0-22B0EAFC2326}\InprocServer32\8.10.24.0\Assembly = "empower, Version=8.10.24.0, Culture=neutral, PublicKeyToken=null" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FDB3A2D8-5ED3-302C-9A12-F2CCD3C34684}\InprocServer32\Class = "mio.empower.Features.MasterCorrector.Model.MasterCorrectorSettingsAccessor" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A6EAC3D6-1940-4212-A97F-D6CBD7628C9C}\ProgId adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{44AC7571-D388-341B-ABD9-91C57FEBD73C}\ = "mio.empower.Features.QuickAccessMenus.Ribbon.CloseTemplateRibbonWindowNotificationHandler" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DFD439E8-0FFC-3E50-851D-84A0ADFF2F5F}\InprocServer32\ThreadingModel = "Both" adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{45F7874B-B793-335A-8A59-3896DEE98A07}\ = "mio.empower.Features.Library.SaveAs.Services.LibrarySaveStatusProvider" adxregistrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{68A2E7E0-02F9-36C4-AA8F-237B751D329D} adxregistrator.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4B0B8337-20E6-4AF8-91AD-C317D13B2E10} msiexec.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 2740 Setup.exe 884 msiexec.exe 884 msiexec.exe 884 msiexec.exe 884 msiexec.exe 884 msiexec.exe 884 msiexec.exe 4212 rundll32.exe 4212 rundll32.exe 4212 rundll32.exe 4252 rundll32.exe 4284 CheckIfApplicationIsRunning.exe 4284 CheckIfApplicationIsRunning.exe 1744 KillSync.exe 4848 adxregistrator.exe 884 msiexec.exe 884 msiexec.exe 4532 rundll32.exe 884 msiexec.exe 884 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 3696 vssvc.exe Token: SeRestorePrivilege 3696 vssvc.exe Token: SeAuditPrivilege 3696 vssvc.exe Token: SeBackupPrivilege 4124 srtasks.exe Token: SeRestorePrivilege 4124 srtasks.exe Token: SeSecurityPrivilege 4124 srtasks.exe Token: SeTakeOwnershipPrivilege 4124 srtasks.exe Token: SeBackupPrivilege 4124 srtasks.exe Token: SeRestorePrivilege 4124 srtasks.exe Token: SeSecurityPrivilege 4124 srtasks.exe Token: SeTakeOwnershipPrivilege 4124 srtasks.exe Token: SeShutdownPrivilege 2740 Setup.exe Token: SeIncreaseQuotaPrivilege 2740 Setup.exe Token: SeSecurityPrivilege 884 msiexec.exe Token: SeCreateTokenPrivilege 2740 Setup.exe Token: SeAssignPrimaryTokenPrivilege 2740 Setup.exe Token: SeLockMemoryPrivilege 2740 Setup.exe Token: SeIncreaseQuotaPrivilege 2740 Setup.exe Token: SeMachineAccountPrivilege 2740 Setup.exe Token: SeTcbPrivilege 2740 Setup.exe Token: SeSecurityPrivilege 2740 Setup.exe Token: SeTakeOwnershipPrivilege 2740 Setup.exe Token: SeLoadDriverPrivilege 2740 Setup.exe Token: SeSystemProfilePrivilege 2740 Setup.exe Token: SeSystemtimePrivilege 2740 Setup.exe Token: SeProfSingleProcessPrivilege 2740 Setup.exe Token: SeIncBasePriorityPrivilege 2740 Setup.exe Token: SeCreatePagefilePrivilege 2740 Setup.exe Token: SeCreatePermanentPrivilege 2740 Setup.exe Token: SeBackupPrivilege 2740 Setup.exe Token: SeRestorePrivilege 2740 Setup.exe Token: SeShutdownPrivilege 2740 Setup.exe Token: SeDebugPrivilege 2740 Setup.exe Token: SeAuditPrivilege 2740 Setup.exe Token: SeSystemEnvironmentPrivilege 2740 Setup.exe Token: SeChangeNotifyPrivilege 2740 Setup.exe Token: SeRemoteShutdownPrivilege 2740 Setup.exe Token: SeUndockPrivilege 2740 Setup.exe Token: SeSyncAgentPrivilege 2740 Setup.exe Token: SeEnableDelegationPrivilege 2740 Setup.exe Token: SeManageVolumePrivilege 2740 Setup.exe Token: SeImpersonatePrivilege 2740 Setup.exe Token: SeCreateGlobalPrivilege 2740 Setup.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe Token: SeTakeOwnershipPrivilege 884 msiexec.exe Token: SeRestorePrivilege 884 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3208 SPCapIQProOffice-1.0.22211.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3208 4584 SPCapIQProOffice-1.0.22211.1.exe 79 PID 4584 wrote to memory of 3208 4584 SPCapIQProOffice-1.0.22211.1.exe 79 PID 4584 wrote to memory of 3208 4584 SPCapIQProOffice-1.0.22211.1.exe 79 PID 3208 wrote to memory of 3244 3208 SPCapIQProOffice-1.0.22211.1.exe 85 PID 3208 wrote to memory of 3244 3208 SPCapIQProOffice-1.0.22211.1.exe 85 PID 3208 wrote to memory of 3244 3208 SPCapIQProOffice-1.0.22211.1.exe 85 PID 3244 wrote to memory of 4100 3244 SPCapIQProOffice-1.0.22211.1.exe 100 PID 3244 wrote to memory of 4100 3244 SPCapIQProOffice-1.0.22211.1.exe 100 PID 3244 wrote to memory of 4100 3244 SPCapIQProOffice-1.0.22211.1.exe 100 PID 4100 wrote to memory of 2740 4100 vstor_redist.exe 101 PID 4100 wrote to memory of 2740 4100 vstor_redist.exe 101 PID 4100 wrote to memory of 2740 4100 vstor_redist.exe 101 PID 2740 wrote to memory of 4128 2740 Setup.exe 104 PID 2740 wrote to memory of 4128 2740 Setup.exe 104 PID 2740 wrote to memory of 4128 2740 Setup.exe 104 PID 4128 wrote to memory of 4328 4128 vstor40_x64.exe 105 PID 4128 wrote to memory of 4328 4128 vstor40_x64.exe 105 PID 884 wrote to memory of 1724 884 msiexec.exe 106 PID 884 wrote to memory of 1724 884 msiexec.exe 106 PID 884 wrote to memory of 1724 884 msiexec.exe 106 PID 884 wrote to memory of 2528 884 msiexec.exe 107 PID 884 wrote to memory of 2528 884 msiexec.exe 107 PID 884 wrote to memory of 4440 884 msiexec.exe 108 PID 884 wrote to memory of 4440 884 msiexec.exe 108 PID 884 wrote to memory of 4440 884 msiexec.exe 108 PID 884 wrote to memory of 920 884 msiexec.exe 109 PID 884 wrote to memory of 920 884 msiexec.exe 109 PID 884 wrote to memory of 32 884 msiexec.exe 110 PID 884 wrote to memory of 32 884 msiexec.exe 110 PID 884 wrote to memory of 32 884 msiexec.exe 110 PID 32 wrote to memory of 3080 32 MsiExec.exe 111 PID 32 wrote to memory of 3080 32 MsiExec.exe 111 PID 32 wrote to memory of 3080 32 MsiExec.exe 111 PID 32 wrote to memory of 1236 32 MsiExec.exe 113 PID 32 wrote to memory of 1236 32 MsiExec.exe 113 PID 32 wrote to memory of 1744 32 MsiExec.exe 115 PID 32 wrote to memory of 1744 32 MsiExec.exe 115 PID 32 wrote to memory of 1744 32 MsiExec.exe 115 PID 32 wrote to memory of 4108 32 MsiExec.exe 117 PID 32 wrote to memory of 4108 32 MsiExec.exe 117 PID 32 wrote to memory of 4940 32 MsiExec.exe 119 PID 32 wrote to memory of 4940 32 MsiExec.exe 119 PID 32 wrote to memory of 4940 32 MsiExec.exe 119 PID 32 wrote to memory of 2416 32 MsiExec.exe 121 PID 32 wrote to memory of 2416 32 MsiExec.exe 121 PID 32 wrote to memory of 2436 32 MsiExec.exe 123 PID 32 wrote to memory of 2436 32 MsiExec.exe 123 PID 32 wrote to memory of 2436 32 MsiExec.exe 123 PID 32 wrote to memory of 2972 32 MsiExec.exe 125 PID 32 wrote to memory of 2972 32 MsiExec.exe 125 PID 32 wrote to memory of 4064 32 MsiExec.exe 127 PID 32 wrote to memory of 4064 32 MsiExec.exe 127 PID 32 wrote to memory of 4064 32 MsiExec.exe 127 PID 32 wrote to memory of 4004 32 MsiExec.exe 129 PID 32 wrote to memory of 4004 32 MsiExec.exe 129 PID 32 wrote to memory of 4424 32 MsiExec.exe 131 PID 32 wrote to memory of 4424 32 MsiExec.exe 131 PID 32 wrote to memory of 4424 32 MsiExec.exe 131 PID 32 wrote to memory of 4708 32 MsiExec.exe 133 PID 32 wrote to memory of 4708 32 MsiExec.exe 133 PID 32 wrote to memory of 2244 32 MsiExec.exe 135 PID 32 wrote to memory of 2244 32 MsiExec.exe 135 PID 32 wrote to memory of 2244 32 MsiExec.exe 135 PID 32 wrote to memory of 1760 32 MsiExec.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPCapIQProOffice-1.0.22211.1.exe"C:\Users\Admin\AppData\Local\Temp\SPCapIQProOffice-1.0.22211.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\Temp\{0CC810D7-0BEA-4CCF-BB4F-058650DF363C}\.cr\SPCapIQProOffice-1.0.22211.1.exe"C:\Windows\Temp\{0CC810D7-0BEA-4CCF-BB4F-058650DF363C}\.cr\SPCapIQProOffice-1.0.22211.1.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\SPCapIQProOffice-1.0.22211.1.exe" -burn.filehandle.attached=544 -burn.filehandle.self=6522⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Temp\{4DCFBBB2-2463-4CC7-88E8-75A537D0669D}\.be\SPCapIQProOffice-1.0.22211.1.exe"C:\Windows\Temp\{4DCFBBB2-2463-4CC7-88E8-75A537D0669D}\.be\SPCapIQProOffice-1.0.22211.1.exe" -q -burn.elevated BurnPipe.{78C5585A-9D5D-4D0D-9A56-E30DD56640A0} {03612783-63C1-4F8B-A9FD-8EBA336C0EB5} 32083⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe"C:\ProgramData\Package Cache\56704865939C2388913D05724632D7B3B67D3CD9\vstor_redist.exe" /i /q /norestart4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\82944ea8868f5bc906ac16\Setup.exec:\82944ea8868f5bc906ac16\Setup.exe /i /q /norestart5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\82944ea8868f5bc906ac16\vstor40\vstor40_x64.exevstor40_x64.exe /q6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\0b1278910e236eae8c4dd937\install.exec:\0b1278910e236eae8c4dd937\install.exe /q7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4328
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:844
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\Windows\syswow64\MsiExec.exec:\Windows\syswow64\MsiExec.exe -Embedding F735EC040F54CF91A3EBC4058B2439602⤵
- Loads dropped DLL
PID:1724
-
-
\??\c:\Windows\System32\MsiExec.exec:\Windows\System32\MsiExec.exe -Embedding A0B7780D659C6056B3BBB5E84A0C1A8D2⤵
- Loads dropped DLL
PID:2528
-
-
\??\c:\Windows\syswow64\MsiExec.exec:\Windows\syswow64\MsiExec.exe -Embedding 24BE70BC95409DAE86DCB7BC6EEACE92 M Global\MSI00002⤵PID:4440
-
-
\??\c:\Windows\System32\MsiExec.exec:\Windows\System32\MsiExec.exe -Embedding BDF1E6D28391D8FD217363A8891E2205 E Global\MSI00002⤵
- Loads dropped DLL
PID:920 -
\??\c:\Windows\Microsoft.NET\Framework64\v3.5\addinutil.exe"c:\Windows\Microsoft.NET\Framework64\v3.5\addinutil.exe" -PipelineRoot:"c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\." -Rebuild3⤵PID:388
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v3.5\addinutil.exe"c:\Windows\Microsoft.NET\Framework64\v3.5\addinutil.exe" -AddInRoot:"c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\." -Rebuild3⤵PID:4648
-
-
-
\??\c:\Windows\syswow64\MsiExec.exec:\Windows\syswow64\MsiExec.exe -Embedding D7A70E6831210B5D31122F0108431FA0 E Global\MSI00002⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:32 -
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:3080
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵PID:1236
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll" /queue:3 /NoDependencies3⤵PID:1744
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.VisualStudio.Tools.Applications.Runtime.v9.0.dll" /queue:3 /NoDependencies3⤵PID:4108
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:4940
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Applications.Contract.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:2416
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:2436
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:2972
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll" /queue:3 /NoDependencies3⤵PID:4064
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\Microsoft.VisualStudio.Tools.Office.Contract.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:4004
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵PID:4424
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.Excel.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:4708
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:2244
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\Microsoft.VisualStudio.Tools.Office.Word.AddInAdapter.v9.0.dll" /queue:3 /NoDependencies3⤵PID:1760
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.Office.Tools.v9.0.dll" /queue:3 /NoDependencies3⤵PID:2772
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe install "c:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInViews\Microsoft.Office.Tools.v9.0.dll" /queue:3 /NoDependencies3⤵
- Drops file in Windows directory
PID:5052
-
-
\??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe update /queue3⤵PID:4588
-
-
\??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exec:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe update /queue3⤵
- Drops file in Windows directory
PID:3788
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 849C55D0B050C06560DA3AF8812AA2CA2⤵
- Loads dropped DLL
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI850.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240715859 901 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CAOfficeApplicationRunning3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSID81.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240717171 906 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CAOfficeHostRunning3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI1032.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240717875 911 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CAInstallEmpower3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\empower-1.0.22211.1.exe"C:\Users\Admin\AppData\Local\Temp\empower-1.0.22211.1.exe" /S /D=C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
PID:2284 -
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\CheckIfEmpowerIsInstalled.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\CheckIfEmpowerIsInstalled.exe"5⤵
- Executes dropped EXE
PID:2648
-
-
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\CheckIfApplicationIsRunning.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\CheckIfApplicationIsRunning.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\KillSync.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\KillSync.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.empower.Sync.Setup.SetAclOnDirectory.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\mio.empower.Sync.Setup.SetAclOnDirectory.exe" "%programdata%\empower" "data\Branding"5⤵
- Executes dropped EXE
PID:5008
-
-
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\adxregistrator.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\adxregistrator.exe" /install=C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\slides\empower.dll /privileges=admin /returnExitCode=false /log=C:\Temp\adxregistrator.log5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\empowerSync.exe"C:\Program Files\SP Global Market Intelligence\SP Capital IQ Office\Empower\empower\sync\empowerSync.exe"5⤵
- Executes dropped EXE
PID:4708
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI8BCC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240749515 921 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CARemoveCapitalIQProComAddinRegistryKeys3⤵PID:1244
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIB63C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240760375 963 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CAClearDisabledItemsFromRegistry3⤵
- Drops file in Windows directory
PID:3936
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIB8A3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240760984 1017 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CARenameIsolatedStorageInternalFolder3⤵
- Drops file in Windows directory
PID:2360
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BB3B11794393BB1905C26E815A2AC41D E Global\MSI00002⤵PID:4128
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8F7C1FCC9D6AA9FEEC17EA0530A70FC72⤵PID:876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIBBE0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240761843 1024 SPGMI.WixCustomActions!SPGMI.WixCustomActions.CustomActions.CAPluginManagerRunning3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD5d2ac2d95581db0d6b52757c2ed839e85
SHA1e592b595b74955a58f2f871cf90cfc686dcd871b
SHA25614fce0e16af46f78ff399c98f2b937d40b3c3e6d8ad9ac9d5773bfceb3049bbe
SHA512df8f2ec89abcd246ed13f6e61e859c253416c48bf8a1d860a9875bfe1af3a2296f2bc7079b05653240a41cefe9affe8d5a14fb83790664da58200f3ce351d0c4
-
Filesize
47KB
MD58c83df42af6c850f758d8b43d8a058fe
SHA15b775ace433db2f270c0ee798e7dbd3da337deea
SHA256968ba1f17d1155f69e2717001eb820c506a981e8e26654d6e5edb08b48ee8123
SHA512409df7dd28ce137b8ccc132cbada901fdb4aeeb5e7d0c59098b0be286034fb07c91108635b88ab44c8c76887c108551990f136aea2e3f3ec0f0b2a973d52c8a3
-
Filesize
47KB
MD58c83df42af6c850f758d8b43d8a058fe
SHA15b775ace433db2f270c0ee798e7dbd3da337deea
SHA256968ba1f17d1155f69e2717001eb820c506a981e8e26654d6e5edb08b48ee8123
SHA512409df7dd28ce137b8ccc132cbada901fdb4aeeb5e7d0c59098b0be286034fb07c91108635b88ab44c8c76887c108551990f136aea2e3f3ec0f0b2a973d52c8a3
-
Filesize
77KB
MD5dc0e68d2f5c7894259fe7b78d6336cd8
SHA1f7e243b3b850eb3c2197127ba2ccc64847ea71e0
SHA2567a4ac2d2f3a3a482e1da90b368da1412695d3497c5c887ece5019190bb9e1e7f
SHA5128733d7ed09428577dd02278de64a7a3625b5fce0c425cc09f73311cc16ba41ecd0cd2f1a1c42886e2f4389fe7ef6d5161174207bf290b55a5d4a59fbee321672
-
Filesize
791KB
MD51afb14f57ae1c831f989db780de809b8
SHA17c7cee33aa85285b98bc62f93b2e693b4d7f956c
SHA256828a30d690cc3f4b8c9b7ed839fa9a567dae6379afb868303b7432303a2c006f
SHA5122e094e5dc939b399d00833c57c520f9e218885c54c77121f522daada37e8e0f1f2bcb510440385b75783626face099b6c0564c6d8a16727e799b25a2d121607b
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
2.6MB
MD5299a451e3da67d8e661ae2f22f1abc5b
SHA1b88b1d7c7e4fb23ab02425d5a98a2facaa20bea5
SHA2565794ba20826200174ba3b38fdcead8e82e9b094798f99bd2f524e55b16dea2b2
SHA512d567860b0815f1583aef24d4bc79fd37d9df227b5414f5fb4c6ec641fd8faff9567f87471de4f3620cfda9b8a806bc88d25235f1f8ca91bf1e392472dd2f91e3
-
Filesize
38.4MB
MD572f6a267de1fa813073ded67d952fd40
SHA156704865939c2388913d05724632d7b3b67d3cd9
SHA256729e347df0d99c3d40ed2ac5026f2d629fa001b4c13be57b56e96591ec0116bc
SHA512c0389abe583f4d86b0e8bb518684095af08de595e7dfab440180786def223dea78e98c809ffcef6b6457c9f07eefb735fc595192c7c37dfd31b2f67d4e9cf33f
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual Studio Tools for Office Runtime 2010 Setup_20220927_181051101-Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219-MSP0.txt
Filesize1KB
MD51852734ad3bedb4b46acae6f9c070fa0
SHA130b6f79d51883427fc875ef5a440093928b801c8
SHA256bfc15ee3a29b652293e61e54f3931e61e079c63b671a6bdf74be75edd1e38b7d
SHA512d451b00fa0b8a3971be0e251fda9e57dd4e0900a056345acc01fdeec01ec4e9931e3009a5145a74e211ea5df9e955f8bba9e0e5ee2423460b595cb8d2f3c3ad6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual Studio Tools for Office Runtime 2010 Setup_20220927_181051101-Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219-MSP0.txt
Filesize1KB
MD5cdfa5029aed372962350f9aa66720db6
SHA1f3afa87c965c9e92027ce798bd0d30c703fe82ed
SHA2564755e5d85bbb94f20b24541fb480791bd402ad236ace4de8e48535e44d8f0132
SHA5128b81c37bfe2b2e9555f9c51b2c9bca56217e9dd425c11e05f0e08d27f8b9f01fa6a4a21c1b81a89b6b8b9d3aa407a737885a691728064d370f37b9ff415fdd5f
-
Filesize
1KB
MD51e6417d7837d3c5181931e79884d3704
SHA171e804b9f310cda25282bcd17792d3c0010a8b7f
SHA2562f2ae16978c261ed2d9762286275e88ce7788f999237084eb884a53754b4adb1
SHA51283f8fd3787aea51beff0a9d9652811a6e17852aa1e49bbd7a08bfcb7625cc02e55c860a5c54a0cebacd9bcdca85e772b9c87c5a387d3ee2e127fcf96a98b3e0c
-
Filesize
673KB
MD543a7f7024eb8795b902b4ba14b600840
SHA1b7a192a8dc5470e1195d129bb760c971ee2ba202
SHA256dc5cebf756baf365971ac3ff0655a40d4b57fe115a762c90d0f41897a7bfb609
SHA512492c88910a0731045df2aa54b6bd0011055533ec437d9c762e21a1c6aaaf7d7e8c8f11f3e6e462a05684e76a58b71aa6c5934cf6e06d40492c06832c1396985a
-
Filesize
673KB
MD543a7f7024eb8795b902b4ba14b600840
SHA1b7a192a8dc5470e1195d129bb760c971ee2ba202
SHA256dc5cebf756baf365971ac3ff0655a40d4b57fe115a762c90d0f41897a7bfb609
SHA512492c88910a0731045df2aa54b6bd0011055533ec437d9c762e21a1c6aaaf7d7e8c8f11f3e6e462a05684e76a58b71aa6c5934cf6e06d40492c06832c1396985a
-
Filesize
116KB
MD5e2eac75615e26cc7fad10a841b8f24c0
SHA1c1ee6e7a9015453f77de1283f71be53a8cc1d45f
SHA25680a0b4e9f6c140c1fe178b5214352298ee47e6f839688b2f9cc098e3df5bc41c
SHA512980379563f17e5867e658153506551340ba2b44502aa83a1b19e58a26bae50168ab50e685b7e9f7b3413138136310f151c82f3499be6810ec36de3d6843f9da9
-
Filesize
175KB
MD58ca04519005ad03b4d9e062b97d7f79d
SHA1df53ed9440d027401d502f3297668009030350a7
SHA2567b9f919a3d1974fd8fa35ad189edc8bf287f476bd377e713e616b26864a4b0d3
SHA5121a29e9e9bd798c892a7cd3cd4ff259195e4a92e26f53e8f1a86c75c5eb8fdda58ceba312cd791651fad5ce04529696195815a4ba5c143ad52a5ea0d7c539bb77
-
Filesize
673KB
MD543a7f7024eb8795b902b4ba14b600840
SHA1b7a192a8dc5470e1195d129bb760c971ee2ba202
SHA256dc5cebf756baf365971ac3ff0655a40d4b57fe115a762c90d0f41897a7bfb609
SHA512492c88910a0731045df2aa54b6bd0011055533ec437d9c762e21a1c6aaaf7d7e8c8f11f3e6e462a05684e76a58b71aa6c5934cf6e06d40492c06832c1396985a
-
Filesize
673KB
MD543a7f7024eb8795b902b4ba14b600840
SHA1b7a192a8dc5470e1195d129bb760c971ee2ba202
SHA256dc5cebf756baf365971ac3ff0655a40d4b57fe115a762c90d0f41897a7bfb609
SHA512492c88910a0731045df2aa54b6bd0011055533ec437d9c762e21a1c6aaaf7d7e8c8f11f3e6e462a05684e76a58b71aa6c5934cf6e06d40492c06832c1396985a
-
Filesize
4.2MB
MD5b5ac6d25c9d30a3d74f78a030349dcde
SHA199f2eb8c69666b7fdeb42167dea2fbd0009eb3f9
SHA256549ed04aab3b6ff3f82c1d7d687f691ac73ca1238319a8133e73d5faeb36e27c
SHA512c43935572eb0225464758d7b961e58a627f93605e749fbf86a7798be4ea2ff2f8d3bf2bf473ba37a99cca44c9c25859828ecd47a44f99eb2fca0e4a9a5a66829
-
Filesize
126.9MB
MD53a0660f6d3313073c56d600a6e363ccd
SHA18937f2d98e85697e72ac01c04608b2710d163346
SHA256fb033b94f7a332bdaba45128baef27b632994fbc61221de5ad87de0e983c7037
SHA5123dae919b894b50bc0a41c8d5b03ab224d839692376961ddf842d2da3ed89993fb1ec0f7e250f23760d524fd2d2f38b47a451fe41f50b6b0f9656d4c6870a0bef
-
Filesize
38.4MB
MD572f6a267de1fa813073ded67d952fd40
SHA156704865939c2388913d05724632d7b3b67d3cd9
SHA256729e347df0d99c3d40ed2ac5026f2d629fa001b4c13be57b56e96591ec0116bc
SHA512c0389abe583f4d86b0e8bb518684095af08de595e7dfab440180786def223dea78e98c809ffcef6b6457c9f07eefb735fc595192c7c37dfd31b2f67d4e9cf33f
-
Filesize
9KB
MD537bf48382dfa5f1d0d847f6ac2334527
SHA14e8bee51c6d71d297a9b19e42af822d9e33d6e88
SHA2560915a72556674a3635af7137cc6c092e8f7b058984a6c8aaf301c05f0930aeab
SHA512f62fcbca6692f1603f8f71bf06a0f25bc16b979ff947dbdf4646899f7798e8da8513d52e59af1df774bfd77d666b3dcef0ab9993cd0534aa511483f25c3c62c5
-
Filesize
3KB
MD514cae1b34cc20375ee409f72103b60e6
SHA15b5c2506e31a05d39186836df7e7620fe3ecc935
SHA256c393f75e8fe6a5a022dac4ed3ebe5955e93a294dae83657010165e63a781df44
SHA5122a4b83d3ac693c9e6f76ef949da23c4d46c89d21411587624910ec9bfc8abbdc12f8dee103da6c4025e4204bfc679a95c18ce463cf5a4d8537500b659051748e
-
Filesize
14KB
MD5f4a147b479b0d7f040af753cbb101ab7
SHA151ddc77f930486117fa018ad7143eb97b16cb9d5
SHA256a6133808d01961c10f30cd487dbee8f07c816ec774a83de27bd694148222a094
SHA512397d2997ec95f62fbfdc0ac177f0cb761f52c334c6c08374d16f13f9e156f5b4036927be696196354b23940bdb042467a8976e3b705830815d1c17723a476044
-
Filesize
9KB
MD5be6142e24326c7e3f1030b95bba80d1b
SHA142e5e22ddacd732754a88f345e08b10a84ab46ba
SHA256030b04ce7fadc9da232be9a76bf35d9eccce7eb8c37c5e238095d71397a5afd7
SHA5127e8b43a82c2abf2865e1c8e5526b370831d703a58c0ac07dbb0e3bb1a18685670024d81401639d1c3b42f8e809cf6b8a794d5872b083ac82deac281e5f38574f
-
Filesize
11KB
MD5050d6f6b4995e30f1efe96d4bb7d6695
SHA1823dbf75601238349e516e5a7da594c9c7ef8c55
SHA25699e0986d68b69e10c01c296abd599687209179c76a1614bf614121dbb9b0f595
SHA5126f95211ea9d38b2b062753811a5bf8e3e02ac58443ccdfeea379f4278dfbf2254be7b5ca9b31346bbf9f4af8537e1927070df49b2b3de539f334396cb41ca877
-
Filesize
13KB
MD5cb8b8b4f0670349c218881941da8921c
SHA1f9e91570b951f2b3257e0399e2b6353bddd4da77
SHA256fa591351700c4e1ff82bd4d8d0ed7b10c64157a79589eca2511dfd3f5530463d
SHA512d112277740bac01f96b1bd1b09d885be0f4ccb11d2baea7227c1bc63a28c712f7f681bea5809ce01125446df149265be4b54b059709b9b30fd345d9b503bf2fd
-
Filesize
5KB
MD573b71e95088dfff6cd4c02130fcbc631
SHA130273b373ee087bb052ea553a5b47c6b441a1fe5
SHA2564b8453e1db2094edf223e7e62b8da2b1eb761314a3b63b472e546ed82e9c5e44
SHA5123ce8a5214df78dab756e077172926521b1cf51801d8220845e27b4b712b7633fb44e7d11fa3732316d690cb4459bc15ef586788ba33df6a2ee33aa316006093b
-
Filesize
5KB
MD59566bbde8f9374b8b542dd73698621f0
SHA196b2ea1d13b1603d2dc4df72f79c8d83fbf831e8
SHA256ea4e4e4334f40280a4dee1a79d4757d4e6b18e188bc2b725c65859710b76a3be
SHA5121aa59eb6946767f17bf5612329a4ae2e97ebf43ca97435bcbd2e9997ef34ef2edc4bc83cc5e5da1662668eb75927c8d255bbe78d31e3eb4da5069d69418c64b4
-
Filesize
3KB
MD5e4f87c9574925a140374866a97985eb7
SHA1d75f7dcf66317650be2ac21b6af5d4d469e68a66
SHA256b7356fcb5deb6f7d592d9093949e9d958062a23660381fa7e3d4434bbdfb7f75
SHA5124624487d2e6ff574bade4dc642b2cdd4d8d3a2650bced2c4ab4db80d8f092d95b25ba5c6aaae3a4fd68fca2df5cc484181020b24a36ec4b10b37f447ece27c6f
-
Filesize
12KB
MD52d5e3482abdc63619421c9bd38e7ba5d
SHA16f5fd0fa20ef1b621cfee4257dc71e5967215633
SHA2568f8ab652d81d3142101177fdde9c02d8f0c00cc0e0deb75934785f592375f148
SHA5129939f85caf5dccfc224c281d970eee22c6182bf57761b98bdd4c3f74ffc0b7700da34e6cd497153aa878efb8d140aab06ad7a2eb7ba009c9629dfb65982e9fe2
-
Filesize
3KB
MD57e29745bb901daa24c6391f8da54b399
SHA1be24a497828a051c65e5eac58df36e45a0f30da1
SHA2560da855f1fff35ad6b627eb1c6d302d3db6960e5eb60dcd1065da187624d36af5
SHA51216a52f79c28963acc6fba9def64b912155847332717e3d6e13a0309623768c16712b3667346597efd720289fc144757768c60e0754f177c2cfc9554dcf039dae
-
Filesize
774KB
MD5d2ac2d95581db0d6b52757c2ed839e85
SHA1e592b595b74955a58f2f871cf90cfc686dcd871b
SHA25614fce0e16af46f78ff399c98f2b937d40b3c3e6d8ad9ac9d5773bfceb3049bbe
SHA512df8f2ec89abcd246ed13f6e61e859c253416c48bf8a1d860a9875bfe1af3a2296f2bc7079b05653240a41cefe9affe8d5a14fb83790664da58200f3ce351d0c4
-
Filesize
12KB
MD561ccee94b07c323a2befb2d107bf4309
SHA128a0579785ff62cfbeb0315f3042510b0292a776
SHA256021ed1ef592805805ae6e3f8301c7360b0be7634effedf51fa471bc0c8ccf93d
SHA512c52a68782fdd9e23bd2a3c25c727bb3b1feee87fad46f48c59633e4076df74aac19f84758128abb0584623c8881ab8167c1c9fbdf36bb0ea6dbf3c7a0c630b7d
-
Filesize
47KB
MD58c83df42af6c850f758d8b43d8a058fe
SHA15b775ace433db2f270c0ee798e7dbd3da337deea
SHA256968ba1f17d1155f69e2717001eb820c506a981e8e26654d6e5edb08b48ee8123
SHA512409df7dd28ce137b8ccc132cbada901fdb4aeeb5e7d0c59098b0be286034fb07c91108635b88ab44c8c76887c108551990f136aea2e3f3ec0f0b2a973d52c8a3
-
Filesize
552KB
MD5cb7df3525c2fbdb02adf3ccd4a4c9432
SHA1e070e83a52a4cd6f57e85f6cb3c52bfb82f68429
SHA2563789f88a27ebd9c8157bc40e8aacd64129efdf0354f5cdfc7c2212ef37251221
SHA51269ce2534802802337070ec96cf124488558878b8816c5584b03fb27cc568d7f6fb9001cb576f0e8583dd5578943823d2508cb14741d832dbb0b6f834f359080f
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5fe6f7c73707c607d9f520c17e73c6b5d
SHA14dab1fa7809bcafbabd9431702068a861e39f1c6
SHA2561e18479bca633d81ea61a4251986df8b801ed9327a2cd14c86093d7f9a774ac4
SHA512d4608b264771e99249c1b0250319deaf43cb40251c718b682f696f4e9ceb27ec23a0ca1969df4a6222ba48755bc6ed0680dd675b7215250b82462649b3fc24c0
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
39KB
MD5c535b0d3bad7cd3764e4a8c36d7cc511
SHA103b90f562d1bc51e10b25fa39f79e00bd5c43cb7
SHA25641d63b6a88de932dbcd7be2c3028cba9e2f7760da88068f0fe1a2553c8feb071
SHA512885247eb1ac9e98954c73c6139bc2382d8b28c06a6d4d782dc22efbaded7c7ee902adcfa258ab0a1388c45a87b54e4020bce7fb49b7f845baa415bc600125378
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
Filesize
112KB
MD5adaf11855c1463b8eb94c2f7bea6b523
SHA1f2ac6a6144afce683955b4831109889ad2fb1696
SHA256c0c342b39f7ec3f7174df12fdfde8d235707243c22f92367ba6c4f134522e3d2
SHA5123d9c8d2d6042e97dba0c3fb2d042562dc6cf9ad6551ea5bffc7eb2b1fd61b643cdd94fe351297da7ff03c95aa32dc76d5684437c0f614c959b77237ed66dfda6
-
Filesize
77KB
MD5dc0e68d2f5c7894259fe7b78d6336cd8
SHA1f7e243b3b850eb3c2197127ba2ccc64847ea71e0
SHA2567a4ac2d2f3a3a482e1da90b368da1412695d3497c5c887ece5019190bb9e1e7f
SHA5128733d7ed09428577dd02278de64a7a3625b5fce0c425cc09f73311cc16ba41ecd0cd2f1a1c42886e2f4389fe7ef6d5161174207bf290b55a5d4a59fbee321672
-
Filesize
791KB
MD51afb14f57ae1c831f989db780de809b8
SHA17c7cee33aa85285b98bc62f93b2e693b4d7f956c
SHA256828a30d690cc3f4b8c9b7ed839fa9a567dae6379afb868303b7432303a2c006f
SHA5122e094e5dc939b399d00833c57c520f9e218885c54c77121f522daada37e8e0f1f2bcb510440385b75783626face099b6c0564c6d8a16727e799b25a2d121607b
-
Filesize
35KB
MD5812f8d2e53f076366fa3a214bb4cf558
SHA135ae734cfb99bb139906b5f4e8efbf950762f6f0
SHA2560d36a884a8381778bea71f5f9f0fc60cacadebd3f814679cb13414b8e7dbc283
SHA5121dcc3ef8c390ca49fbcd50c02accd8cc5700db3594428e2129f79feb81e4cbbeef1b4a10628b2cd66edf31a69ed39ca2f4e252ad8aa13d2f793fca5b9a1eaf23
-
Filesize
4.4MB
MD5905fcc526204ddf1e6650212abc3d848
SHA1aded77f45b75d796cc4795263c826c822df5f0d9
SHA2564cd45cf57644d49b4c8f96e4a0efdc46a5ba196fa4f5a10190f790ccc74bb1bf
SHA5129470fcd540ea542936120782aa31abecaf5d20cadd13ff82ad346f78f95020958937beb2bfcf5ea4de92c978338f5a324e334229c79f8166c66a1465e191ba47
-
Filesize
3.8MB
MD59843dc93ea948cddc1f480e53bb80c2f
SHA1d6ec9db8b8802ec85dd0b793565401b67ad8e5e0
SHA2567c969fcda6ef09d2eb7bbbc8d81795eb60c9c69ed835fd16538369ad0a6e0f10
SHA51279008cfdd8ae1ea27675588e7ba8123d08ce14047e5f167b3b5f6fbcdadeb45515bd72e18e59abf632ecbfbb42243fbcbebe4cbe0ed6ba195d0b2ca6d88676f9
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
2.6MB
MD5299a451e3da67d8e661ae2f22f1abc5b
SHA1b88b1d7c7e4fb23ab02425d5a98a2facaa20bea5
SHA2565794ba20826200174ba3b38fdcead8e82e9b094798f99bd2f524e55b16dea2b2
SHA512d567860b0815f1583aef24d4bc79fd37d9df227b5414f5fb4c6ec641fd8faff9567f87471de4f3620cfda9b8a806bc88d25235f1f8ca91bf1e392472dd2f91e3