Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 03:57

General

  • Target

    e7d97013314341bbdb5abd3bdade00039a87ec865efc3df4a72feab27f82bf52.msi

  • Size

    2.9MB

  • MD5

    d3fe8c624c5cf20711ca3d62c66d208c

  • SHA1

    d831219e226b63d4a9394d26333151356539c000

  • SHA256

    e7d97013314341bbdb5abd3bdade00039a87ec865efc3df4a72feab27f82bf52

  • SHA512

    bbb0f11d69d9c5750a469618cb6aab065bc0ec74bd46d2ebc1bb0ba52e44a62a77436173835e580f70a1de62aa9b58c9d4902a969fca5449acb5d5f708833473

  • SSDEEP

    49152:F+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:F+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\e7d97013314341bbdb5abd3bdade00039a87ec865efc3df4a72feab27f82bf52.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2796
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A585E133DE0027C129465CEB56A7D4B1
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI2223.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259465917 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1056
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI24F1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259466478 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:448
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3509.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259470612 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1168
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3F5C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259473249 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3060
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1A748194EA8D95E57DF4D892417A0E5 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2580
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2452
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000M0aRpIAJ" /AgentId="8cae7d70-80c8-4075-80f5-4f01f0006857"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2152
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2444
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003E8" "00000000000005C4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1916
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1364
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 8cae7d70-80c8-4075-80f5-4f01f0006857 "5ad2cb2e-bdc8-4a83-97fa-36cbb77f003d" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000M0aRpIAJ
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f772196.rbs

    Filesize

    8KB

    MD5

    c61ca862e87c5fc1af803b199d6a8bd3

    SHA1

    ed490967d21ed6221f956382b0c548e825700f2d

    SHA256

    b8be6eb50d176801d8083d3846b3c6f42279e8cc2fa8af9b4dd6aff8919bae9e

    SHA512

    3e5d4858fe435444e58560707939dfbf74d3fa89231c2097d0aae1fbefb894c75b7ab422c09cb81a57f2a5f789dc09ae9775514a6f5aa245ec32aa9194ae8f51

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    dc63026e80d2bb04f71e41916f807e33

    SHA1

    6cda386d2c365f94ea3de41e2390fd916622eb51

    SHA256

    3b54d00f00aa80384de88e4f4005e9d4d889a2ccf64b56e0c29d274352495c85

    SHA512

    61da550efd55187978872f5d8e88164a6181a11c8a720684eaa737e0846fe20b9e82b73e1f689a6585834b84c4cee8dd949af43e76fd0158f6cafa704ab25183

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    31def444e6135301ea3c38a985341837

    SHA1

    f135be75c721af2d5291cb463cbc22a32467084a

    SHA256

    36704967877e4117405bde5ec30beaf31e7492166714f3ffb2ceb262bf2fb571

    SHA512

    bd654388202cb5090c860a7229950b1184620746f4c584ab864eade831168bc7fae0b5e59b90165b1a9e4ba2bd154f235749718ae2df35d3dd10403092185ed1

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    ba66874c510645c1fb5fe74f85b32e98

    SHA1

    e33c7e6991a25cc40d9e0dcc260b5a27f4a34e6c

    SHA256

    12d64550cb536a067d8afff42864836f6d41566e18f46d3ca92cb68726bdd4e9

    SHA512

    44e8caa916ab98da36af02b84ac944fbf0a65c80b0adbdc1a087f8ed3eff71c750fb6116f2c12034f9f9b429d6915db8f88511b79507cc4d063bab40c4eaa568

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    99a7b221a29a388e59561e774cc8bc24

    SHA1

    783a7e036f03f9ef744cb905f9ab3572ac8bc607

    SHA256

    f632d94f5b8c006ba165ca2e63c213449b8fb939e336ac36e7e834378fb0fc59

    SHA512

    aae547b8ed2df6312a16afc3d30a17f73af5e230eefaacbe270dd2aa235b8bf856eeeb20e879d7af258d412e3e030c56e89dad8c26e8513ea73fa9a1c49c0fa5

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    4dfd7727fe2f21c4a06b6cf7c84e5c2f

    SHA1

    8913a73ae5be2c0bd872f472b76c62dc09f95aa6

    SHA256

    08e967aec8b8b5727b9e68679f456f3e4ca2537b3b679249ab15d800dff5f79c

    SHA512

    3066ac95d75ee98c3680bbea2a64fd7b307d52eaeab7e669ade7a5ee72f24373b159203533f62dc1b0bb19c46811571e5c5748195648e9ba628add3a935e54f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    7795df33fc7dd3aa62e0bc052f9dfbad

    SHA1

    ea227ec994561b5bce01c5228f9c337286fbec9c

    SHA256

    6ad47d714f3dd55b2fe9072e829542851d2ecf60cb88254002c60449e8aca736

    SHA512

    de11027f0ca32119ebbb17976ecbe6582ab6af8caa7ce522d75c4185da722550f1f981064db9be6074eb1c6c096c933c2de7ee42b1f31b4fedc9982f87157f9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    2a98ceecefb9f6844026540ae1b998a7

    SHA1

    4772a0e71f59385f9e527b8d320e192731c20db5

    SHA256

    7d1a90367c7942850083e30715173daf58eef172176871649b6d2e7a9e0c3727

    SHA512

    6eb16bded3d769ea3a4742cc89b24b810764ce2c0db8bf76eae5dfac92910a37b4dfa4c0ec494c7430c6a8a6cbb17b8e56b6ecfe9029e9d078b2f50dd2338925

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    f0339c0506fe0b51215f7227b14e656f

    SHA1

    cf937eeed1483e23e81244baa03d5e8f112c56d5

    SHA256

    47bf8749c1ac54c6586d625c99219f03c6a073f3b3f5689444985aae85a3e5b1

    SHA512

    afb55465411bce78b7453e17aca382e0add24a1b0dd7f116cb077a2641abcbde8684e076d69ca6a3a61a3e47d156f85c80621082ab1a80f4a5b3b1b75f20d5bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    7ae43eb904b842c3be77c428be2c05e8

    SHA1

    16ef31624aef897fb541038bd5e8db583b086b2b

    SHA256

    d12407a93150539c10866c035a766a52170ffcb70c518b83c2277461bebb0098

    SHA512

    0aa343a9d1949bfe4518ce0df0e09ca7e373f5caed6c2a17135da722c1279f472da50dedd01c6552632000e9d4e41ec0bbc059ecac3a1bc6f1de1dfb13ab924f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    c59373843f123130f7fe668894409c91

    SHA1

    0b80d7ec904bc7d7959ad018ce788c99bbc1c238

    SHA256

    7085b97b971fd940af15a15ad68895dcd1e832454b9ef86846803aad8a72b4c4

    SHA512

    ea0d1bcfb5f72037ca43a76d01b600683079d66ff6b3f701df7d3a7239c1f30bbf3c38e17f289d4913c66af7b8a7943dd3423605dfd02bfdd9a682375b3e783c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28b50fd20227b71478523df190d17936

    SHA1

    7042b258d71a901a8b207dc025c07f83a0ffc78b

    SHA256

    7dd8977c73697386b30823e91ccc1706ae8081e3d521877429cf78d18e6fbe4c

    SHA512

    d6316dee1e202762317985953f6576c3e015e8700cc0a0f31e98406368a4b2be0adecc4812de7f67d1a3300983edfb62d785054091786599daf53d97404c1dd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42c42d00dfffce0a87b3afd438890035

    SHA1

    86c2db407471c60294df389e5b924bc68ddf3170

    SHA256

    feec122970cd6ffcb6b0965888a67716552eef782f01dc8afd4c0090dfa5a126

    SHA512

    59e257cd7fd452d926a53a1746ec1e0f7e99027ae61063291a52b41e5b3b2679d864b696d03db4993baf0832729e7debe2c088f050469b915463c13ea2e91b44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    efed7d2d0bfc95c33bb3ecf731b933e2

    SHA1

    cb3c9bad63c1f8c7a3af307ae83ffc92889527b9

    SHA256

    b72dad34e1f8b3201010ada7deb4ff4751b06f5810da1be10718b10602597b94

    SHA512

    70db59dad33de34b600aa7e25b7f4c7edf2f4e010bae1ea6ea98373f4ff8d1499b36ff0caf7d7c42d0bcafcd4d57995de72dc817b1f8c9bb11e1d1d0b37d46c8

  • C:\Users\Admin\AppData\Local\Temp\Cab15A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar247.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI2223.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI24F1.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI24F1.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSI3691.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f772194.msi

    Filesize

    2.9MB

    MD5

    d3fe8c624c5cf20711ca3d62c66d208c

    SHA1

    d831219e226b63d4a9394d26333151356539c000

    SHA256

    e7d97013314341bbdb5abd3bdade00039a87ec865efc3df4a72feab27f82bf52

    SHA512

    bbb0f11d69d9c5750a469618cb6aab065bc0ec74bd46d2ebc1bb0ba52e44a62a77436173835e580f70a1de62aa9b58c9d4902a969fca5449acb5d5f708833473

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    a4837461b82fc60afdf54b09bfef0f4a

    SHA1

    1da352d7a2c84fddad31f4348224d4013f37059c

    SHA256

    b4a567ec61aba5b64c74005814d32822880ace3f8294b22c479ea1b2c17d7f0b

    SHA512

    f6fddd49079a7820849693228c4242fd0b290152bfc346a058c387d4279b1e422400dbf6db37d4641c309d1101e4c006b3449ca6f27ecedf956ad6c8eff37f95

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3824329a8c4302aee6ad23164e8512e9

    SHA1

    b1ca1bc793ce63199ef9957fde0d6b1d2e7d8a68

    SHA256

    0a913ef41e734ac9804dd9181e98cef4acc628724df7521abaf51578407dedc8

    SHA512

    c5dba3e8bb03264e058a743f70c9242fc529c3e935b870829d7880ec0b9f2083b0669b73cda31a1ea714e6248d2068c94b06b1bb8be69b3d40dd8eaacc349cd4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    453c9a380d8024f654d39615b64b794b

    SHA1

    d5beacc0eaaf2064f6f85463e064e475c2da5d8b

    SHA256

    5af9c38fedc3e5fb1d41d35e0cdccaa57c16bf5e0ccc3d4e0af8e7d9763c02e9

    SHA512

    567b4ad06e4ef64e314678149aa18af311a7ebc4afc85bb64a10db5d726a7b42d2f17acae3fd2051bd4a1fa0d0ea29c5499a2deaea9e30d704471a5ec30287c6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01fae01853632710ad7601b859a2a7fd

    SHA1

    891b1fda0dab655bfea6e7fa81a1030fa74467f4

    SHA256

    ba2ba93da0908464a99b533995b7aa764bf20e66a6990a4dd2ea83b192493314

    SHA512

    a62226c149da3b346cd18e9f24409a36d8c15a14cb9d4fc914f515a6e0ae7795c893a2e463b52cea63991722e12abf2e57a58042c890ff6e55231d8057cf4f6e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4bf1b1740acaa82033cd56354885331

    SHA1

    4e5fe0a68b0e0926549b2d5786f7f078a83575b8

    SHA256

    bc4e81a3dae0eb78965d1e3a14d257c1ecf90b1f9899f6800c8c6a4ea1d4d500

    SHA512

    7a733177080bce55d64009424430e35c78bf3181a70bb659a1ee37a4e781d1f2fed43e312de08c3f6d85bd45f2ea08678a454f25d124bb385e5701e87e730825

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4103b750553e2bb164cb3e3972849843

    SHA1

    d6e21a461d35e43e8b1f1af065c6b19e6302a0c2

    SHA256

    d3a34358ca893ae7356b950c4fa20788e0a08f2ee1831c56d3c43f343179acfb

    SHA512

    ff6df7c70e1d0b158b2facf7ff2bee443bdd484c42527f0bdd4ad6ef290388ad6ec6179fdc411fac4b2c3a14e59990987667e860cac2bca60263ac6afa49d31c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95fd06c96f76a3f78c3a800d10671e07

    SHA1

    d5f5df75d0c44343edd4cd1f07aee37dc84f77ca

    SHA256

    cbab9e7cad9c58767cd07d7e589302634181ebd43b531535555cc15c669f587b

    SHA512

    544040c34f3ec95fd132fd7dd3046f52616f7ba8cdc68104315ec7dccfab629e98e20e3065e9058d5dd8f0eb038e88887e5b1f94956faa31dc7f8508deb9d277

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70d0954124bcff84b9fea2ce7eb350fb

    SHA1

    eacbbf9b9ad946ba305e62e5f7461d00f385a6c2

    SHA256

    23379b59aa5b1a1b39c3e2ae29608a5f19dcfb80e8c9967eab16f46dbc0db770

    SHA512

    f9789fb8ec7411cfb1cb92993b316b3b9370308daae75a8f4a79780d0870784c883bdeffcdc5c04c86f21e4e432654b3bb877403e92f71bcf3f2eab174aa060b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82fb6f57c03d611e9932294fb564db4e

    SHA1

    1a870249092ea22e489b66893c214cb6946ddd3e

    SHA256

    4ce7d06db031e6a726d1050bdc0cbda0ba3a1b29df61fcc16ef564b143d0e781

    SHA512

    79aec48359ac4389e9f07fb052d8cf468dd41d33788394df42e841ea0b71655d246df774aa9026f4eb2b7290ec4f30c4c8bd885c0a585f64faa0189e9330ca83

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e652b4d3cbb5d630b0876ec686d5adbd

    SHA1

    86f455f771a8786c938f5ecf875f6e45c32b4046

    SHA256

    15f790933d9a6db9bff30bc976b6591d9a483748296bd8be98c8d73ee98d7ecb

    SHA512

    aac6e0db5a077763f6348d866d7a42da35e780c676b2c13de797815b5ccaa11f93a05d7feaa43cc4719eced65c693b568b802b47e652c3bc94d87ee719645558

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    204b205db6ecc8c307f96572f9d25148

    SHA1

    d0b6b93670e8092b47cfcb854e74fb71ff28c004

    SHA256

    6c162a79f97399f0a560084412260044bde45ebc3f67df2ac655276db521f058

    SHA512

    48b0c65e9b47aecbc689bd7aa63986e7f2c18b8ab9b8562d5b0caa098a995f490757f51961e340e914de57c945c9285bfa73f4c403ebab939271156a340ab930

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    828ad5102d6ebc9c1b5319ce495bdffa

    SHA1

    4b696d934b0bb35857ec95bc06977051e50b1879

    SHA256

    cda7c592d79fa2b8b91186edbb94a6f61523941d40481d84f30e25455438ffc1

    SHA512

    f00d8cae5708171e382fbaf250838d292ac7148ca19931a2ea99812fadd30c293c09e03071c19da00bafc166953c425e324a02731e6ec5c514a9b27ab5e5c14f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    656753a7acb7592d848997b54a300350

    SHA1

    60fe852a903f651f18757529b77f87a4b2e8d342

    SHA256

    b189ecf8c5fb4973ceb4c9c6ee9b35916e42914d4d0a0619fce63f87fde90296

    SHA512

    3748b335984e2bf45052aa2d7a767e16b6e9d08db9ade7e2f40a6d34cc227c1f25044c8085b1c2982cd7005438678bd2e0c848d58ea56032e1d236765fca5a8c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c790e844c833979ebc93a4783c4b3e81

    SHA1

    717c53cfcdf05d2ca9957e22cc63bb14f17f68ab

    SHA256

    949aa72b55eb979d597af5294885f6ae3daac8dcd6c47abe8c8604e243ce68f7

    SHA512

    27b148f2baa66902115556bb533700c6363a42ee15a9495c246da762736e1b1e96de84083be71e2a3495cf71ca1ebfb1a192ce844196d7b9a08816b9b79042a6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    efcd0d325375295c7fc258e22e6481b7

    SHA1

    e2d6521717613354cb58b0b96bcef90672f1b1ac

    SHA256

    4911b5738ae42d003df79ba456d13e7785b42845a410bcbe17540218805d245b

    SHA512

    94fefe6859e63d6128e43ebea19fa203b2f35325ef169a1b09aa6acb58c9973dc88fd0463bddd8e9643ae46d2a9b44bd738be562768d7f8b60a999cdd44a0cb0

  • C:\Windows\Temp\Cab4BC0.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar4BC3.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI2223.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI2223.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/448-101-0x0000000000970000-0x000000000099E000-memory.dmp

    Filesize

    184KB

  • memory/448-105-0x00000000009A0000-0x00000000009AC000-memory.dmp

    Filesize

    48KB

  • memory/448-109-0x00000000025B0000-0x0000000002662000-memory.dmp

    Filesize

    712KB

  • memory/1056-72-0x0000000000490000-0x00000000004BE000-memory.dmp

    Filesize

    184KB

  • memory/1056-76-0x0000000000500000-0x000000000050C000-memory.dmp

    Filesize

    48KB

  • memory/2152-233-0x0000000000030000-0x0000000000058000-memory.dmp

    Filesize

    160KB

  • memory/2152-245-0x000000001AC20000-0x000000001ACB8000-memory.dmp

    Filesize

    608KB

  • memory/2504-1260-0x0000000000940000-0x0000000000970000-memory.dmp

    Filesize

    192KB

  • memory/2504-1263-0x0000000019890000-0x0000000019940000-memory.dmp

    Filesize

    704KB

  • memory/2504-1264-0x00000000006B0000-0x00000000006CC000-memory.dmp

    Filesize

    112KB

  • memory/2744-1151-0x0000000019C90000-0x0000000019CC8000-memory.dmp

    Filesize

    224KB

  • memory/2744-292-0x0000000000EC0000-0x0000000000F72000-memory.dmp

    Filesize

    712KB

  • memory/3060-313-0x0000000004C60000-0x0000000004D12000-memory.dmp

    Filesize

    712KB

  • memory/3060-305-0x0000000000C40000-0x0000000000C6E000-memory.dmp

    Filesize

    184KB

  • memory/3060-309-0x0000000000C70000-0x0000000000C7C000-memory.dmp

    Filesize

    48KB