Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 01:59

General

  • Target

    fab822cc1d5b10a959de748250badb0f1244964942814046b74c41b8887c8c00.msi

  • Size

    2.9MB

  • MD5

    305302b116cf1affd6662385b845fad7

  • SHA1

    de4d88c3f376f749b21a8eeb572a80bc481637b0

  • SHA256

    fab822cc1d5b10a959de748250badb0f1244964942814046b74c41b8887c8c00

  • SHA512

    a43452440d5b37176bba6e61c5c58e33dcf881c08cd7275826e6213bb8a39efdff2def3e95770c41ce1445692d55cb8665c0fd00d77808ec99574ba17624725a

  • SSDEEP

    49152:P+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:P+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fab822cc1d5b10a959de748250badb0f1244964942814046b74c41b8887c8c00.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:488
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 561C74525CB1A0D99BFC4D46DE6A5EA4
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI64AE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259548629 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1964
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI6C1E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259550267 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1044
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI88C3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259557630 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:684
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA752.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259565414 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:956
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F3A7F4B6DF85A3AD866622B271516E1B M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1152
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:1132
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="4" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000GIFLyIAP" /AgentId="0ef847c5-db40-4753-ab2c-018395263732"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1668
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2848
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C0" "00000000000005D0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2544
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2032
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 0ef847c5-db40-4753-ab2c-018395263732 "38ad993e-1dcb-4565-b9dc-a3d7cd4f993b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000GIFLyIAP
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7862ab.rbs

    Filesize

    8KB

    MD5

    bd1e291b0a117f1545be4c3bd69149eb

    SHA1

    6759c1254db52fab5c4a44986624d8cc89714362

    SHA256

    f33d7fca0a4ce023eb6ac68406327d85d001ed891dc130d0f506b3c0dcb160f5

    SHA512

    e13fca3b1c9833b2d57b82f0da21eac65e6a4e98d585cf74131c2c183eb775265fc76ab9b3a36a57bb462df2a2bc50e5a0ab4ff474c8d36c667f9d01e76cc997

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    5114ae785bdc99e7a17bf2cda7d29a72

    SHA1

    3de3b2f755c832b8d5e6c0ec409448e2f559ffd6

    SHA256

    69dffbbca4b0d194104af8f2e0fcf2b8019be844149151b35ac0777a26fda2db

    SHA512

    87243f0b4b8e45408b39d209fa7aaff2a844d58e73c431f7887c90b000fd19b12048987218598945d4faa0fa75fdaea83fc50583175143df737134a2bdd27d03

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    172KB

    MD5

    acce8b17de63299aa4d5cb7d709beedc

    SHA1

    f0ec4bb9be94ee250ed38e88a87b65e727a9a058

    SHA256

    c46a613d72f89b5886a79b742aa845152505734642188ea710716f63fb775c77

    SHA512

    1fd0eadd36d9058e7bc4ac06108b0430abd5d43bc14100593352fd2f5639547b92bd7ae9691e219a26a90a80e4427dae687a2312dca0a48f71dd3acff9494752

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    d5ed45def82f4a80c4d109cb9fcf39ce

    SHA1

    a808b0107c2a61e1ccf570ec81e82e756bdecdbf

    SHA256

    8462f6bd66306d958bff3d06f5a1fd8dc2fcbacbd851e07e3e13f62292343c7e

    SHA512

    5fc1d9110defbc24280431522ad22596be72db730dffd178c370f28bb734853a2c33c2de27ebf72bb74ba870d0025a9c1389103d1f9b9af54f13e2c64043fb4a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    215B

    MD5

    9d2acb5bf6c99f528add1c258e58d719

    SHA1

    c43c9a7e046b34897ab9b36a7402ea2b2152d7f7

    SHA256

    966eefb39197ab6ce4e52a871bc26f5eb09599dacd6d4cb54daa28a7fb0c67b8

    SHA512

    7ee0a2d1ecf92df142daef43205abf42a4471f967cfa25e73f8ef91c0efe6442474b3a35a57ff0f8d03c90f690482a8e9d3f6e27f61200255d577814ecce299f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    20069500756a1a645a477c9e9d57e4d0

    SHA1

    7d5d14a9feec763954a936318f1d9890b728622a

    SHA256

    0b9c59cbdac33da5e2b39a0be1bf9d5861e0188c0442cf300fcdc70cbf9a3cb7

    SHA512

    29ee4033c4552dde83f70d5038593efb9eb5f1afd19edbf003d3996f0615552189f9f9d08ad36628a0da1e82a10efc82233f543a0bc4d622923632228854f91a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    b92aa610f8c73ca117e1d577a237542a

    SHA1

    e68b161005cc00daba683e3fecfdc20162619e3e

    SHA256

    84acb90a50b5e306d45da36c0f242e0614b4a7b376253895b5af76da64ddb782

    SHA512

    3fa3aa2d085a87da60d05a5986126d942cf82725681dc06fe611a8e0f4e6984984feb40b1ba60f8ba4b9f88fac370ae75f6da5e194e4d0315e163ec8428f7056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    c210f6689aca680446c0d8ecdef2e46b

    SHA1

    66cba496d984f92fed05f77101c45734f193e211

    SHA256

    8f8540c24fcc6ddfddbcabf8f028f8052addf41601d5226ffe378a6e7d4caf5d

    SHA512

    9c62a6b2a129a50e2094566d88acd7c25ee29600ed1596e6972f684edd48d11366605dca0d90133d489b51eb38bbb6c1a5ad68d0ec9f81c8d23055d03e9540b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    5c749f5abb74fa910bf04ce94cc4b3c4

    SHA1

    ea0ca896764906107f2caa02dd97624f7fea79bb

    SHA256

    3ddfc85184821dc792668cfb6bd9e586faa0a26e493af20ac4a8ff76dc165de6

    SHA512

    6358a2dc4109f259c01d75359bba65ae24bd71d6804dd5f8adabd892de569e1166de6e71da0fb0d528f76136a6ef0d8b2a49fd1a10bd06596779232e5a441ef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    4b09ecf5a0562961aefde7e9a94da766

    SHA1

    d7b192bc432db74273018083a8f221d442e88c34

    SHA256

    4761839e3a62cd76b0c43b82d3168b545b3f8bee30c1e6cbe16bdeac8e1ba78d

    SHA512

    63c282140113de06b8e2f5609dd73d41fa5f6052ae03d49830e5490d6f4baeb3e1905d848ac5b02bb54110cddeb5cb8639b3e0d0394a3a185fc8d9c7809769a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e431f10f8b3ea2589825bdf2a75f5cb8

    SHA1

    a2b0fee085339134a409dc1fb25a21c8dc193a4c

    SHA256

    39145e2632d38ce215b276b8ab4556a06f40739c4a1ef624b594b454fc0cac8e

    SHA512

    ea24f2486d42b8166818487e180e496df2b381b1ff6a8cf92ac94b3b359aa629e32e0e2f50f2bfe7d05f5dd3ea91da63d879e17e1f4e57aae41d2bef99993651

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be7a9a09cdf068206055106fff65ed71

    SHA1

    11eddf82506d9da39d496f729eede2336b55cd84

    SHA256

    1044900111e8899a5a8b07f47234c38a4c048f34103f89380c4220b65440a1f6

    SHA512

    49d8865d793b88ed0e760698e8a846505aba00f4b39a964df9a8eb1d30d0e3dcc6b2b62de47b94b23602acf9483c33c65ea0c562b4988f59e7b1b291808b6b52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    8c1aa5aa446d0f79cfab5f76aeebddc2

    SHA1

    95f3a63d55e8500b49ad935b791065ce0aeebb40

    SHA256

    12c752dac17abfd05a5fd4448e419a91df0173d89a423e6eb291335c59085558

    SHA512

    6384ba4036a63f80129304fbc51da5ed4b8ca9f4b7ced8dd90c03f3eca64279f3d648445c8cd80cde5fe82aac29c5ac5d2a12a0c5730e5732c602d61f2cbb392

  • C:\Users\Admin\AppData\Local\Temp\CabFAB6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFCFA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI6C1E.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI8E8F.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f7862a9.msi

    Filesize

    2.9MB

    MD5

    305302b116cf1affd6662385b845fad7

    SHA1

    de4d88c3f376f749b21a8eeb572a80bc481637b0

    SHA256

    fab822cc1d5b10a959de748250badb0f1244964942814046b74c41b8887c8c00

    SHA512

    a43452440d5b37176bba6e61c5c58e33dcf881c08cd7275826e6213bb8a39efdff2def3e95770c41ce1445692d55cb8665c0fd00d77808ec99574ba17624725a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ccd563e03cdd3f56c723dcbfe2a493a

    SHA1

    80d695b95461c333497653f8f5279039483829e7

    SHA256

    80a553907776f066328ebc8e31a34dc3d86aeab1edca44e83de5316286345434

    SHA512

    9a4811751aec5a53cfd6385edbb185ec6f33e9bdac194743544630a0e1b2ada1172550807702be17c917e27eb81b9dfabbaa2744f3c6e4970f5ec38f6df716ef

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c7781636c14b0d39e8c7d7dfbf59427

    SHA1

    4270fa8fb459017939d0144e05d29f03416e0a03

    SHA256

    a7f31d53cb6e3976664e7adf17cc7ee312df3ab59c55fa2a8f0c275280eecbc6

    SHA512

    cf1b0f0e8d2ca0af9be95356b7399aee3fa0ede1966ee9281f228607fb288a907d7ba5b6c1e3464a5c2356d435e6de712fdfa82ea7f7e6a43a1429ce4d4ac8e6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b6e894063bfa97e2957e2d1081ac804

    SHA1

    4e2827d222dd350764c1ca888edaf0284bbf169c

    SHA256

    dd08560cf12fe9fe34d1b7720ee0b7a37750aea46a5d0d297e1b293b67dda9a8

    SHA512

    dfd62da5b05eb0fb176e9e63b63120993fb9d57f4a6a701dc78be249313a9d5bce67b7d9ad621a633d08a27c36cb657e168e028f54858ab1bb59438522d6e37f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    350e5ac1cb96b483216d5823ff1d12e4

    SHA1

    9e1529291fb337a0bc788c00f27e3a8dc42db437

    SHA256

    847c4cf0b10d3258b1bd041385ee2dfc5ac5e6233a61541126c9a8e2d7f09f55

    SHA512

    b9f788c91a4ec07afda5557b53d4bfd34927a5b68297d3a4e857407775317c1dbfb84592fa795e23d937db65480a4b389d697fe1da1d33ca264160e81de81c05

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b36f626470b40cff78fffcd5cbde0c9c

    SHA1

    4668026f95ecc330d9edc1a5bcc008909b8c0e21

    SHA256

    5770996f57e3702d37f6bc14705bf5c257cc2c66a06ff49e7c275c33b65903bc

    SHA512

    e6b9e1c0e98255b7b674029b8e5bb57068f97ea27466b62970999d87366c27cb5e5d7d4f972960efa450d6ec1bc792e3b8756d9b32006482cd46d608845c39cc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    651ba1089149b99cc8504cadd8b9047e

    SHA1

    20390266a9ea9cd5ae1598c97d80080dc62f68bb

    SHA256

    75995f285ba8e6f97d593ae46dd4009f3403653a61e985ffd2f0c45328d79461

    SHA512

    dd136152e4b4a6f8262f5c2d9cdc5fd5988ec6f174e92cff6ec80709a4a629c422cd8aa9c07ddcca654ca5d3b1460825cf93690b1ea13f2c58a89f0a89b8bf71

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b08656ac35c4979c324b7fcb37f0db6

    SHA1

    b9aebd43e6c4bd622375720454b2a52fcc8ad803

    SHA256

    f2b76b6dad0ad50bad3713a7935bd829c328a56ad63e588f9d6bfded7a216c5f

    SHA512

    e63a43b2b54a5b16364f2880369c1662936e09abdd3ef7b1247f98dcbad589883ea042da046e29ce4dffeeea8065447f4bf7448cf46426ac7b298aae083d365b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    952cc903d9f37483b33ec280ead921d4

    SHA1

    ef0e7e9a15581abdba214d85888863837070980c

    SHA256

    74e35bc0bc67db2c359f9fe835d446f6b5d7bd6e59e6a452d0444e005cc954bb

    SHA512

    4e5539380cbf41a52ae8c9252f5f50b555c279551b3ea6676727fc386fb67408f14071a2d1530da1edbfa781c95ce03ac6607f3e2984ba6d69a7c3f82b6f6ccc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33143f35e126517cff4cc5847796501a

    SHA1

    1dc5c8151b4251fb779092db259afc4aeed6622d

    SHA256

    4613d043ec6f882821f56a558e53da5056d1c9311f3c4067215187743a2cb700

    SHA512

    b6cc69f39585003ed42bed7bdb799f6227a8cb0bec3c842c0e4d1dc46ae331b2cdb26a62881487c2571e52e7630d5503206f6590b27a369c55082f13357920df

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fa49a19f313651747b9456331b1786c

    SHA1

    b54eafcb9175a87ea55bb46d26451af1c67222e4

    SHA256

    63d855e4de75cc97a2e84843c77752e71fd03034ec4896aca683799a4a5316bb

    SHA512

    76ef5a5c9c2e3cdc1d39885154ca85de96064640d6d0b3d4deb422d6633f2868fceea6d5d30ceaae63a728274ba1b76ebcb6906aa3cfc3504d5f25bafb8057f3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eea6ae189c0d1a39ce233f5b8b0e4ec

    SHA1

    e9389d9655f0b4a68765ad46b39d1d61335dbb69

    SHA256

    a1dddef753941be82328328adc419618265073a7cd833a1a76121c60eb03d997

    SHA512

    a81b43409f1c11ed4612d1a6347c1f689dd040c2b4d1607b13c40cfbf53ab945092fa59d33e549c6bfdde853ff500f5f7d5be6ea886dbb12d655fd15525ba88b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae930f083752b4ba9db45bd3bf5b90b5

    SHA1

    51f2a4134620cfdc331a16807adf1757b85a0cce

    SHA256

    889f7045ba8199cf7e85bd011887e7067556fef9d2a7c00fdc7d61d81b31924f

    SHA512

    cd331a00e4e894c400309a0ed221aa20dc06fbfb5239225392bca0e0438d062158b027590cbd7b0f2fd6f9361ba5accb940f98cc359f7704032d3d353e35805c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0568ce563c33b2b93a9a02f638e221d

    SHA1

    8c533d58f0899212f0ef8927a99d604ca6d30122

    SHA256

    a1bf523257a2646b66c4663c7b21db18ea0b89762e56f6c80fbf2f1e798de6c6

    SHA512

    469eafba856842d60bce0de0b038b97b6c09bf27dc2bc4b1fc00c466082a18425e57fd931c89fa3122515b3cbdb56290dce1b5b8eedd053bc1b8d1d8cb6a481a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fcc93d14c0520e8a2c1cbd32fbe6b6f

    SHA1

    4773adef94761cfa6704f2efce67003fb967b003

    SHA256

    b868c3eaf76850c8d62d72fd1bb335310b2111b68d2309785da19d716fe565b4

    SHA512

    86cf0ec82dc3589e94573f6c6699777d35da376acf0c846cbf017372890318d0fb687fdeebeeeb7ae4008f2327f262b02845bb530b1a878f36fd31176b6eb00f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eaf935b024b79f75446559d28d82197

    SHA1

    2d365c0a542637a1497b3466ed14bb2610bc3a7c

    SHA256

    9b133650bf5a41541b1f0af387674c2f052e11b6a196620ab26333e72971c09c

    SHA512

    3276f905e4f5a4fda40fa6e08369b94269c6eb5aeecae74eaee048752579b3a22bcd79c8504c97671a3c1741444bfa9c4eed4733e3764af530fc57d281aa1551

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f5df17ffb0d55455a2cce485e971bfb7

    SHA1

    142ebfbf0d2922a0708d7ed00a73663ac53de314

    SHA256

    bc2b59786f975ee5418e2048feda302ecc9060c2d001750051a87187dd2a68a6

    SHA512

    63686e882289021bb12e67f35c905a5cf67e7361cd76bc847661e4e84f0d0d14b6ecf08a6e7a9a2800572f6de245cd9669ad750c00e6be8a22f154134cb8166d

  • C:\Windows\Temp\CabBAE6.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarBB08.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI64AE.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • \Windows\Installer\MSI64AE.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI64AE.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI6C1E.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/956-306-0x0000000000950000-0x000000000097E000-memory.dmp

    Filesize

    184KB

  • memory/956-310-0x0000000000A20000-0x0000000000A2C000-memory.dmp

    Filesize

    48KB

  • memory/956-314-0x0000000004970000-0x0000000004A22000-memory.dmp

    Filesize

    712KB

  • memory/1044-106-0x0000000000560000-0x000000000056C000-memory.dmp

    Filesize

    48KB

  • memory/1044-102-0x0000000000440000-0x000000000046E000-memory.dmp

    Filesize

    184KB

  • memory/1044-110-0x00000000046F0000-0x00000000047A2000-memory.dmp

    Filesize

    712KB

  • memory/1104-302-0x0000000001070000-0x0000000001122000-memory.dmp

    Filesize

    712KB

  • memory/1104-1128-0x0000000019FC0000-0x0000000019FF8000-memory.dmp

    Filesize

    224KB

  • memory/1668-246-0x0000000000530000-0x00000000005C8000-memory.dmp

    Filesize

    608KB

  • memory/1668-234-0x0000000001160000-0x0000000001188000-memory.dmp

    Filesize

    160KB

  • memory/1964-76-0x00000000009A0000-0x00000000009AC000-memory.dmp

    Filesize

    48KB

  • memory/1964-72-0x0000000000920000-0x000000000094E000-memory.dmp

    Filesize

    184KB

  • memory/2032-1301-0x0000000000BD0000-0x0000000000BFE000-memory.dmp

    Filesize

    184KB

  • memory/2032-1311-0x0000000000AF0000-0x0000000000BA0000-memory.dmp

    Filesize

    704KB

  • memory/2032-1323-0x0000000000BA0000-0x0000000000BBC000-memory.dmp

    Filesize

    112KB