Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 02:05

General

  • Target

    יישום הזמנה מקוונת.msi

  • Size

    2.9MB

  • MD5

    37d7404f46d43eac22991c947cc7b1f0

  • SHA1

    abcc8525564e8264b539d685e826f957c12ef70d

  • SHA256

    06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d

  • SHA512

    17ba13c5306b76f41bf3467dd59d0de54c052789750efcf23f7e674f027fb53ccd1a1e5749be035f9a2c77dc8945ccc24444d20a838055daad611c578828263c

  • SSDEEP

    49152:++1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:++lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\יישום הזמנה מקוונת.msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2400
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E9DDF8D0D42700D7DC544627DE5C03DC
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8C5A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259493170 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:376
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8F96.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259493903 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1280
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA393.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259498895 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2052
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB4BA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259503295 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2004
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7DE99F1503DF0EAA898681B434515EBA M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2780
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2996
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000O3Ui7IAF" /AgentId="c6d4013d-1f2c-4d28-9abc-87bbd15e99dc"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2368
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1708
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004BC" "00000000000005D8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2160
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f778b9f.rbs

    Filesize

    8KB

    MD5

    5c6f010fcdddce96f8050ed9cbf8540c

    SHA1

    9263bf549739ccce49cf9ff0a3865518c061f410

    SHA256

    d920eabd7549574e5c44483b280f7c1416b03f26cdf2e119c4ba639d1218b1b1

    SHA512

    d8c0b0b2057e00c0502452b63cf3f1a2d7718136929a97e24d59b1dc59d4b565513e5ba633c285350976ab567bc5361667717e52e92a9462e2bc760e09a7f540

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    23081513f81a0ea5933fa34fe3cf669b

    SHA1

    ced1cec1a44beec00c6bf0100c708aff51d06bd2

    SHA256

    cc01b6f9bf19425d6e1a5d19e6f10ab36cbb8d219c47bb218973ea2fa4612b20

    SHA512

    7d7b68d38334cf839ec6263bfacb974887f843d38c165bc10537a6808ea145ed0e955b70035b8e1e8d140e24aa4668cf22b63cfc42094ec2a8a16856a6932268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    4302ac33571a665623f83caa83e9d7b7

    SHA1

    38e4b1f7626af38f558f00b7585a8821a3ef371e

    SHA256

    85d864fdf43320e3535ad37f3d946a3bd648df66622cbbcb079b976abfa7ff41

    SHA512

    cc7530d96b6cf2d390a660fccd64170b6a32fb4ed777f3369ef92180abcaabfd94f74ba0ba8730084510fdeb42ded2a9b799d14c787424d3d11d2f2043642c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    35c4db15ae8134b1a3c98ea826093e05

    SHA1

    e29e4bc58c86c0afbb1ed0ca27ffeddd5d4e0723

    SHA256

    881e48818c3b760cd417c3f4bd5c267c882688dd97623c02bb9480468f224a1e

    SHA512

    7362fb4193aa2c8de0c8f89de8e1ad74fc218b8e82633cfd73d2066659d50ae2e4bed648a9d553a121048e19cb07ce9e222ee22b302b3dc99b56fd7d79cc4b54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    2234a2da0c7ba427c516a7ba532be7f4

    SHA1

    71bbac1f00303abebe6b8ee9f8cb1ec3f72e1e83

    SHA256

    a7c433170beb0d6d06d2b3e12790688c320e911d1217ec0eb90c6d46a28a5abb

    SHA512

    fdf3757943c042323652f78bb3135032c7268f61d6ec11317316768cde45527846de1e2c4bdeac2add5ccc8fa1548a8a53c514573eb07637669380e4d493790d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    b7f13dc1818fe477c7a6677e1b927739

    SHA1

    4d943bacd762efbee504f56eb29a29ade22f8c5b

    SHA256

    2f7f7c78e992bb96e2cc32a323bc881708e3fa160ff76ddad2703cf6933c9867

    SHA512

    efa8b3b369a8dbd90b2370552e30ccec2f3dcd7e3dafd89a238ae0a2b3c3d4da93f53701cc74328d816ce4e3a25d6baa1b3e9a377ca75b17565a388096be2039

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    ac4d3be86d673e934cb03c589570ce35

    SHA1

    daccd59a143dca972d97a4315e6452ddc7531f87

    SHA256

    c472baa1206d736a0bd93cbba4905faeb46ae89cc6bb407842c04f8db2033ab1

    SHA512

    e58a47f342303edfe4cd1feb038585f3c2637e2d8b2fc3a4698b6f28a7f456a88f08d074ff9f659edf41eae947d146a210b754ce1f9bbaea2a46c25dd5a4411b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e75fa9c1cf05d053c86634e46f1d4a7a

    SHA1

    3768c40aad4ef942d9723e27930829a314168560

    SHA256

    2f0c4a8e9b5f8b26dcba865d73d46b76016e81b81023c70baad8530a3ab1b774

    SHA512

    218d963d56bbcd556b3d93602ee8c0027ebe8277a7c28b4c89b7bdf5af413a3ab823e53d7bbd07e6ac6a1b9d887edd43fc785bc4be221180d8c7e5e355b4a56d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8df55bbd255b77eda04f4b1b58a1d98

    SHA1

    884b6c868c7962b7273ea67a84871edb3a6a5b07

    SHA256

    c029fa1df1332b1114a422740e3b4c07695fd480e0b32a61b2cbc913bd49e340

    SHA512

    4411458158eb2dc536e19630f6f82ca1da953a35f07807889e9c3e56c71eb269266af4423529176580d2d9c8dcf2f7445072693495a93349779094a2b812f027

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    1c25800fa5d5391208174cd7cee4c270

    SHA1

    e1221d8308a67f7fc4a914d95b688135f074b10a

    SHA256

    0b04c5cf4e08489d9ebde0568ae4a4092f4e335e98d5f8564fb80d36b2b6677a

    SHA512

    00a98a2c8193d8757bde18d4ae2f97b4a6fc017cb2b0b66d304003a4b03838ee05fd66e876784a06a29a5a505ac69f8c28c26c6a7152e707907a67a888f0ca7b

  • C:\Users\Admin\AppData\Local\Temp\Cab5B6B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5C77.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI8C5A.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI8F96.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIA644.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f778b9d.msi

    Filesize

    2.9MB

    MD5

    37d7404f46d43eac22991c947cc7b1f0

    SHA1

    abcc8525564e8264b539d685e826f957c12ef70d

    SHA256

    06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d

    SHA512

    17ba13c5306b76f41bf3467dd59d0de54c052789750efcf23f7e674f027fb53ccd1a1e5749be035f9a2c77dc8945ccc24444d20a838055daad611c578828263c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1defc669a446a97c02ae8894cd3705aa

    SHA1

    a91698ebefc06619421149b2814f39a16a6ef06f

    SHA256

    9e5a10a21c9a632d8fa4c9e703a13b3d7afcc702ea71f79324405b4f3187b218

    SHA512

    98993a764f982709cd9184521232bb83c762af6a384ae3bdcedde61938479869e215c6b96da39ba6522a5608de0991462bb4ae0120c1f5779e4edb798869a11d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b9b8eb7232480f7ed348c9251c86fe0

    SHA1

    d3b27023e8c8c842039cd5d56c4bfdefcc0f449d

    SHA256

    e5ac676216066069bf3c0a726c9df5f0a341e06e84119980e2ce4fce8f47d77a

    SHA512

    9a41d28791684f75e22b10dfb579727582e997bf565cc22362b0efbae4345c3d5fcd9759b61397f1c5944068cb20a4b73e275277e434ebe43d5ee3a8e3c79c84

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61469d1cc8ff644865afc1c97713a383

    SHA1

    e5746ab187edce683ea11061d148a8ee420f331e

    SHA256

    99e5c91aa5d20ba51ba0bf200013a37537aa3a0e92b500580eec32d3696c2182

    SHA512

    518f37b05dfe577d049d28a06206b8f4d94edb854d9db026bbe8f940631bdaf14c2a10ac537d381ac516dfb55f4321993d00c39d31d6d2a67271cb01594eaa1e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19f0348477551c4c01ad0eeefd28023a

    SHA1

    bc01ab8bfff752112c206a2fcbd69c2d61b2a24a

    SHA256

    a098c1156d9179d34ce0849e718247e1992443508a60c4769b2220764d0998ea

    SHA512

    303a01bfab088e7adffd48db86af4d07fc5e1001922449143cf94b30fce729f6ff46fbb898d4bda7a10d676e1de7f17b0bd53d17596aeaf32be83a95a02654a2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5b31e239dfb212bc6cdc9fa796c09ad

    SHA1

    af9882114f54cc29569608b7d4ca5476f2d3d687

    SHA256

    2c5380dabcb97104a365a1f8361ffaa0242eea1f19604806ae59b8d4bf1da0a2

    SHA512

    d21ae80b9c4c4d5c80ca4e371718da06baea693aa594df1258cdccd17adf6a25287b93ba0716795b888b428dbe00525a1482f4f25707b867d27ff3aad2803401

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec38a78f47e1ab384747196e53c250d9

    SHA1

    4cab6664dddcbecd8f87ab4c6693114b75f6939b

    SHA256

    f9659c9aa86f7244c28e48c85bf474c1a82e7a9de4be7a34d26e88c4ce76c2f9

    SHA512

    f8ba0365673d687ef50877d9aa7007f8119ba76e393fec87b49e306eea11f0134c3360ac5d7fb2299aeb6d7de7d7317d4d441120bae9a65248cbe60948f4e23a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40fd7ee8f5a439f0e75d3faaf086dc16

    SHA1

    8a37db5694c535d580b3f2034745faf0da5c7cfb

    SHA256

    e686abdcd20f0e3720de52383aacf6874320c2d4261a769975908769ae2d58f9

    SHA512

    16a82e4db3d1b74c40f9a81eb8501580eb18a5b83d0f929acf1eee006426230e8488175f12d6a8fb91c3f1616733f016cc401b87ff88070e7754cf23672e8397

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4145b40264a639e53f511d8dfaa0fd43

    SHA1

    1e4e0df9217ee5d4e095a73ad5e1a125ce65ddd5

    SHA256

    0bfeb46061969007c976a199533c672d748c2bb626b051ef93698d831058812a

    SHA512

    d01b56eabb5831def3ab872260d927c2c76ec2b58bc187ef6c4db7fc33c006a08ebb2efbc9ad351ae426c92400014ba21e3822655f9b1ef6d3ca87e93411d827

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d89ddeb791fea47b7770073a666d6e88

    SHA1

    76eb99fde868d61908e3e52b561a52587c544302

    SHA256

    1727f98c6c21d4479e34685e160c7dc052235311617fd0934e8819ad0c261cd4

    SHA512

    b1f21f71a8477ceff753e84665537b33bf63608330ad6e1fbb2465a3d56608281a9f68296bd044f3e114cdba1a7338c3f016eabfbd436d23beee94fbe776f2ea

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fd0821e9447bea24497046bbcf2158c

    SHA1

    17a57d8841544a6d249764fbc33486f6b6b4833c

    SHA256

    8b3b2d7854d2f443a5b4aa53d712e96c1081e88c540c3e467e37f1152ccafd95

    SHA512

    dd88036d2387ac3b19d9c18d26ac92e736c3361cfc99963a8a083124dfd6d9a4b2f61e3dce0f41201e16ea3bd0b840bca8aae3b02d6b6c1bc2b0559cf59363f9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba6276ab00a980db5de7cd1f2310f8e3

    SHA1

    e25d3ac265b8beaf3c3c251aae5f5261312c4b90

    SHA256

    f1a7687b310bd3739a069904a496bcca657623cd7e976381e17b4b4b0b17647e

    SHA512

    ec2a8200e116f807125226b022c7dcdf71070c520a2923844790171b020ac0f25be89f47ebaea39256b230555ccd605d5988a6a33dad37f5234968757b2a89aa

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    4caf01dad3ec14d02fbfa8cf92692ab6

    SHA1

    130c60a943a0e4248f3a14d73880b5a0a4ebbaa1

    SHA256

    6c7e158c8c54aa4c031aa3d32f49f492275f732a3aec14246ed374c7e7ed4087

    SHA512

    3b695ceccab707210715392fe63dac7d2ad338ddd4c39628d80ee5d5f3b89baeb9dc529f6e3806017820e176852aec03121b3f49a9b7344c9cf797a5edaf8a14

  • C:\Windows\Temp\CabC34F.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarC362.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI8C5A.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI8C5A.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI8F96.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/376-72-0x0000000000940000-0x000000000096E000-memory.dmp

    Filesize

    184KB

  • memory/376-76-0x00000000008B0000-0x00000000008BC000-memory.dmp

    Filesize

    48KB

  • memory/1280-109-0x0000000004980000-0x0000000004A32000-memory.dmp

    Filesize

    712KB

  • memory/1280-105-0x0000000000A50000-0x0000000000A5C000-memory.dmp

    Filesize

    48KB

  • memory/1280-101-0x00000000009E0000-0x0000000000A0E000-memory.dmp

    Filesize

    184KB

  • memory/2004-305-0x0000000000820000-0x000000000084E000-memory.dmp

    Filesize

    184KB

  • memory/2004-309-0x0000000000BB0000-0x0000000000BBC000-memory.dmp

    Filesize

    48KB

  • memory/2004-313-0x00000000047F0000-0x00000000048A2000-memory.dmp

    Filesize

    712KB

  • memory/2368-233-0x0000000001150000-0x0000000001178000-memory.dmp

    Filesize

    160KB

  • memory/2368-245-0x0000000001070000-0x0000000001108000-memory.dmp

    Filesize

    608KB

  • memory/2404-294-0x000000001A540000-0x000000001A5F2000-memory.dmp

    Filesize

    712KB