Analysis

  • max time kernel
    73s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2025, 20:32

General

  • Target

    acrobat.msi

  • Size

    2.9MB

  • MD5

    c23d2701fc5830505ea5396018b22cd7

  • SHA1

    d1a34893e880cc7553a2d46473f713620ea40455

  • SHA256

    95f69504eecf1d05ec672e8fe8c0f83ab276c98f2a6af700be2351c0d32b63f3

  • SHA512

    96c3f53c867b62013539ce2420e88aab48024621c82a2003aa558eb3ab115f0950e6b8efa35d1af291ad1a4054706663bc3b52c037c06407ed2e22199a32a92b

  • SSDEEP

    49152:k+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:k+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\acrobat.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1892
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91FC810E292717DCC4590EF3D08C4D5C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIBC8D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259439911 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1284
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIC111.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259440972 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2148
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSID1D4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259445262 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1452
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIDE97.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259448476 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:808
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2E693C9FB22946C20F8E42DBAD684785 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2884
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2640
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000PryxLIAR" /AgentId="716ac99b-a987-4df1-a855-87dcedee4a1f"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1312
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2580
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004C4" "0000000000000570"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2220
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1980
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 716ac99b-a987-4df1-a855-87dcedee4a1f "e83e0088-8d13-4a56-8090-b43e3c32ba65" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PryxLIAR
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76bc20.rbs

    Filesize

    8KB

    MD5

    ad7cb602acd9ebf0529d7ebcba7b16bd

    SHA1

    8d0da234b23e34892a0cab7e7a9fc5447b4a7042

    SHA256

    b5e65948016db4e3d377cd92b5a5a387b2df4bf0d077e134f27ad14bcf26d580

    SHA512

    92521105729d1048a512b3543a091de5d2265975d6d398f58cbc0f631df93e0fb212de8c877ff9c1c9ed81c1955e126ad1eb9b42037e657cc99516d3856ccd02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    1e065e191e89cc811ff49c96fa8fa5e6

    SHA1

    bc50ff2a20a8b83683583684fcac640a91689ed4

    SHA256

    d88faf6d47342587ea5fbcaf2ef88fb403f7fcdc08fcab67d4f4f381c237a61e

    SHA512

    5a710e168316c30ca10f7b126e870621f46cca6200e206a9984d144abd11fea045bc475599b18597bbed1e4f00e832d94576837f643b22ffaee56871629290dd

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    247KB

    MD5

    aa5cf64d575b7544eefd77f256c4dc57

    SHA1

    bd23989db4f9af0aae34d032e817d802c06ca5a9

    SHA256

    79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

    SHA512

    774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    111e2e63bccead95bb5ffc53c9282070

    SHA1

    eaae7df21e291aa089bc101b1e265ca202be1225

    SHA256

    9615fe5fe63c48b13ffd8c9bc76170a9ed1cfea6a3d0901e857a1c6c6edaea76

    SHA512

    ffc818615fb30e24633c90b8f5a55c100b5f307414ec54e5a2914bb4ea36d3fb3aa6ed0e5815976a2f6d1b7f056e7da1f108a8eed81b458decebe721ad30b920

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    ba8d2cfc3668f320f418e50d84ef67d6

    SHA1

    41f996b316733fdf980ae4ef8f682efe16bc2441

    SHA256

    6f5c93695e7938af383c97c71daa8efce88050c38f59b0a36a7921278e5e2c43

    SHA512

    29aee046af0ce16b6f64d4c9a1b052165ab067f7abbfa2ba961fb1db96bf1c7dfaa819026859f4c429bd0e7ed1c48683345d6de427f42580bd8efc76e051f10d

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    228B

    MD5

    31c865d7c9fc0db90ab4598e7f0de052

    SHA1

    c39f3e241811ef91ba808a712242b8c44383a2d4

    SHA256

    29d9a19a8c856f57dc54b6845a04cb65463668950dc6401a3f6e871e257aabf5

    SHA512

    8ba8a65cf1effb24fc9c10e0271417ce861a3213648b758548b61b5609da98cfdc13685755dac5f35ebe13375ccb1345eb675d13abe86adbeffaf9750cd50e38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    4baa10270f5eda4deb77ac3d8b18ca9a

    SHA1

    91d2402461106264ff2cb5ac878fc51b60f4bf64

    SHA256

    68f34dc20586badb0bdaac09507657905d1bf58e4f43c9a04cbea8e5c3f7f4e5

    SHA512

    95e3a98da670be2cdaa6df9545457e3b21b4e1c58168b7f982f9b476eb44b04ec9fc527c2611b3ec519816053c18468bda26330a7eca96f42478d03173253d3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    bd1debba88d033375f8d7585cddd2792

    SHA1

    bfd496b8d60a98d2359cbc901ad9734bcd11fd3f

    SHA256

    cd988405416924e82347dfd8b0fb4ec293ac591fcefd5059054f673442623963

    SHA512

    9ef20e15b183d3ba30a20a7bdae65a2f3a425b83f1579ef0edb2e45e8cccc3159a1ee517f45bff1abc622ef9edfae045562daca8e27c00d7634ea7c1db67c0d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    89daee5ebc3c014d0f256a3f30c582b9

    SHA1

    d4d6e0c11f56f6ffe44969d64083ebd76615e6e5

    SHA256

    ebc7f30c2c3ae32be08ec25566dd989a1d6f346b0562b2ad14ddc7eacbf69b18

    SHA512

    ac0e04ffeed3182e0b30cac0f271751373ad26dbc41a8bdfbcd630de30466736d8a6234014e0af181c91e0d71c67be5ac2522cb623b763b0624183d80035efce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    92bb8bb0a2fb3ee7db609fe17ed1e7d5

    SHA1

    60e86f262826ad765d1317b129b418aeb1ff31a7

    SHA256

    cc94889bf99867be1979ce110bc6bf573420f2cde81aedff2eb2c470aa167cff

    SHA512

    a29e535a763d90257f7e16424cefeaa06bf92a9173ea65ea45f0349846b11a957e398777293676d73829e85eead18fcd13c0fc25a224ed78f5ab4a8693f4e3c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    3ac16608bf447b35033c66d819a5d81f

    SHA1

    d0900202b703f03c1d21d8cb7dc2cbc407761038

    SHA256

    01620df6943b8c965b17c034046f0c72b4aa4921fa6c05452fa6ea75d9977f4e

    SHA512

    97836de9b947482e397bd5c4ba7b7e2ffb74ef2ac52a06999a8f301899745933f7037b45b6cfd14a4ee4bcc6ed1c84628843ab4fa4661d3f1f0435890f9fa1eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    373d4b5727f4ea5289fe751f46500b28

    SHA1

    c4312bb4864c8d447c30ebd88734c7f85f7cef6a

    SHA256

    3fe927787dcf7738d0ab6609c39c9f41d220a8e8f92944e39b3b38f897aebf29

    SHA512

    db7cbca4d4f38c30c171a57490ae06780bd785ee3d077e014e96b04efe77cce628243edd2b20f9d71a1d7bf8af2a09dfee744b064a20286da9da7694d51b4cb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37445d0e69b5293276efca74d8c286dc

    SHA1

    c59b7a46fb5db623106af4d552ac9f6e0ab64c85

    SHA256

    08fd214fac34cf91ef7421475fd362ec1eaf1d918d05b6f2b61544e5dfcc0dd2

    SHA512

    9216e6e13ef8f3628937d0a1193242770f179ca29aef1b13f91111d8c5c43bd4ce8f5b902bda80a7fdfc92a6729d3a9de76efccc9615149318c8627c958476d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    2fdfc568e1cc5a14d9360a2a736477a4

    SHA1

    37f6a36d10a0c394663071107c2067e64f5423af

    SHA256

    2fbefade676c0cc177dd96b215e2a5d90353cf5c63a695528eac753617970c11

    SHA512

    21ec18f05ab499b9dcd8b491fe59eefbe1775afc8078cd95a1d01f633f27c36f3709dbf67a28516311b84e6e23229a2874fee13e535d1d527b0351c6100ac9c3

  • C:\Users\Admin\AppData\Local\Temp\Cab9159.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar92F2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIBC8D.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIC111.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSID37B.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76bc1e.msi

    Filesize

    2.9MB

    MD5

    c23d2701fc5830505ea5396018b22cd7

    SHA1

    d1a34893e880cc7553a2d46473f713620ea40455

    SHA256

    95f69504eecf1d05ec672e8fe8c0f83ab276c98f2a6af700be2351c0d32b63f3

    SHA512

    96c3f53c867b62013539ce2420e88aab48024621c82a2003aa558eb3ab115f0950e6b8efa35d1af291ad1a4054706663bc3b52c037c06407ed2e22199a32a92b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b8b7d833883e6f156e351ecbba17b7f

    SHA1

    f5afcdd5b810c6bf529b34c1bb8280e5ef732a99

    SHA256

    69e565ba7a45cf83c9f4a735282254a0b9aa529041d022b7e3a9d71564ef8116

    SHA512

    802be066aadfa93093d488ad88c1af63fce96476be8beb05616c88ee76344b8d8b3e823026b134fa1295bed6288b136e9b63ba4333c24c0eb23c6e07a3bdb284

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a28ce9d4368ee32dfef7190ea6af5cd

    SHA1

    87ff52ff0419b76d74fe976b84d2ae0ab57cd525

    SHA256

    058bbc124d70b22f42ca12a7570a5a108811dedc25c127dddbf2b172ab382ebc

    SHA512

    5a701fecbf5d4a621870105fb2b24a9b5991f047dd82e87ccafa0e26b76e6bed065c2254a585355c5f16b33dc19153452ebad92e82d34917e68a693d6be4dbb8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    814f0b2699af8f5028e1b0a5ea45bbd1

    SHA1

    d57b7007fa61bace4c02c3700d681114b57b9cd8

    SHA256

    83b392ff2a38c8e0c71cc8f8d67aeb6cb360811dfebeb1707fe6208ba3778480

    SHA512

    563ca10840bca4987fc83e6846ecda38f2d1dbf0fd091b518b340a1889a5d4378c602ede86986bdec468b598f1d816094dafd13b244e98206a81d30b81c88483

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fb490853cdd57a920890038ae9732eb

    SHA1

    0a7aea16696f76dae4a97ca62c9f699e8630c824

    SHA256

    2d520558cd3aa42e180fad1bae3eacca644787436ff5de0dbeadcb218f8d56af

    SHA512

    370eb267a526fac32402614d4bf7a627f2e150d6bf1622e3fc191740a2bec577b4b223a056dc9066d4d640451efc06a2c5e3de850577651a22acb19f8054246b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50731efb57d9a4cd441cfd950aadc8a0

    SHA1

    6a6876c1dac9c7c4e8cd5953b36d6e2ebd652c4b

    SHA256

    c8bc779db7ee901ec111034382f7a68c7f17a43879a510812bc7f3752f9709a8

    SHA512

    ccdffe6ef630d5ffd4101a71af487585d68e382490dc9ea45f5669d1617ea826c4cc0475eae757f961d0779743b7ea380ebce453a956f064e650580c08895526

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02ca1d224c2229b51995b31b74ec870f

    SHA1

    e87178b05677122a99f8cdb860cb4e4e488743a7

    SHA256

    101131dba2c02bc09d404b5ef84300788c869673147c45487f2845b6bc38a4fc

    SHA512

    3364d4a20fefd196468aff2c1ab1a88cfb881fe5499acb9314f8a9d8125443626d41ab16679be35790ffba451f6faca1fa08d02b583d1cb68f719519c6a0a66e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efb71a1ebe95c9658e349e665024c4d6

    SHA1

    40a0bd05571a7dc5e29df9e069e255929879dac4

    SHA256

    b6ea213c06cbbeda91068f9df9910c9eb1a7d4fa5d3e00bd43a201abd6743218

    SHA512

    43bde0e8eda9d19b325c43f5b6bcbe4a8d8673deaf7dc2cd6d50a2687a76c48e943939e4a8e6f59ca17044145d9e14ec17ac0ce027e3f00d3dcf8213961d7fc0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35a5a9f277adad9b5f905872ba3f2200

    SHA1

    58906418682e6fe688daef8379ef871bc85a1acd

    SHA256

    672c22e3d620032f429c697043d40429e03d8def88afafa0a10bc8077ed23362

    SHA512

    4e4c3e872ade83e8e05c86358b33c3b693d771555cf59f47b514bf36a341700508210a9b27bc8667e76b855f2ceb2e8b4fb6c7193e3ebc90c6385088ad2a74bb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70ed5aac97c05bfb3beb2b26636e147d

    SHA1

    cd79041b707071044705da0fe771ba7f27c60f2f

    SHA256

    65ded99700cc2b41e2deac37d82a6ce533ff88d8dd2d6d60555b2941df1c8b4d

    SHA512

    0de947ac87a1f2d426162b0fd9e538f1db9919c4f14a5c9cec252167e2d8b1da925087ae23d7ae022625d09bf3f944854a5c74a13ed694e18273a4d32dda3079

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5438277fe22d9341d613c1e204cd33aa

    SHA1

    297448c3456c1f0cf6149e6c5be5f7c4cd94e221

    SHA256

    ce9bb8b52b7c2cbc214b2c1b82144a390b0806e47336c2e6317ca5fb607490f2

    SHA512

    af7d339173eb2875d7210a51635affd21c652162b5d9e81dd966862684bedeea27725169346aaa946b53a4340827c5c9739f3e27ad4d2b4a1f037307009372bb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df6fafa25e197b657315d6c9c1fa03f6

    SHA1

    46c8e921ed618c6587e3febc9f5cab750e3b10e0

    SHA256

    c7d82aeb50344eae6c2386c211b1c9f10f0e86517ee9c466c89fec97f0a7d275

    SHA512

    e0a5d108483d8d66a5d85c8665e0ed3dde100c6b5739d22c105941832e6d3a5b38dc6bf861568ab343e2392a8b5b9b0c42bc65970260bfa9af67def42d6f0e76

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c458636455a006d0c3b584e07b981495

    SHA1

    075ddbacf1f6cf5d46ca48f88faffec4cfe43ef3

    SHA256

    cd01e7296661752c47e3c21c7f6eb7fd5b124458f2ec7b6536c7e4b676799ee7

    SHA512

    f5aa566ab281b0f82f40d0e7dac3df3f93c9e11c2d20d34defe1999b7bef17efd4b6bfdad07de848e720aa36ed7efb23f141c13e90919a1ddf8e355d788e4ab6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    226ef2061d51d484b33bd9e475ca427a

    SHA1

    119c040e65f2d63f89c8fb69137f8ffab8fd57a6

    SHA256

    b6bb61d4ff81a1d64ba35def0cb59c66d0f67005c7794edb0c1ee28d5a775092

    SHA512

    51d67d267c922165d85faf88371683eb7d0c8ea8fd7eaf980f2a2694929e34d75106e42c5a8db5a2ac7537a92fda46ce767d63cb1a720a55b4df8d3f9de21a62

  • C:\Windows\Temp\CabEC90.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarECA3.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIBC8D.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIBC8D.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIC111.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/808-309-0x00000000008F0000-0x00000000008FC000-memory.dmp

    Filesize

    48KB

  • memory/808-305-0x0000000000800000-0x000000000082E000-memory.dmp

    Filesize

    184KB

  • memory/808-313-0x0000000004C20000-0x0000000004CD2000-memory.dmp

    Filesize

    712KB

  • memory/1284-76-0x0000000001F60000-0x0000000001F6C000-memory.dmp

    Filesize

    48KB

  • memory/1284-72-0x0000000002060000-0x000000000208E000-memory.dmp

    Filesize

    184KB

  • memory/1312-245-0x0000000000580000-0x0000000000618000-memory.dmp

    Filesize

    608KB

  • memory/1312-233-0x00000000009F0000-0x0000000000A18000-memory.dmp

    Filesize

    160KB

  • memory/2140-292-0x000000001A720000-0x000000001A7D2000-memory.dmp

    Filesize

    712KB

  • memory/2140-1129-0x000000001A490000-0x000000001A4C8000-memory.dmp

    Filesize

    224KB

  • memory/2148-109-0x0000000004B40000-0x0000000004BF2000-memory.dmp

    Filesize

    712KB

  • memory/2148-101-0x0000000001F90000-0x0000000001FBE000-memory.dmp

    Filesize

    184KB

  • memory/2148-105-0x0000000001FD0000-0x0000000001FDC000-memory.dmp

    Filesize

    48KB

  • memory/2700-1226-0x0000000000AC0000-0x0000000000B02000-memory.dmp

    Filesize

    264KB

  • memory/2700-1229-0x00000000192B0000-0x0000000019360000-memory.dmp

    Filesize

    704KB

  • memory/2700-1230-0x0000000000260000-0x000000000027C000-memory.dmp

    Filesize

    112KB