Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 20:04

General

  • Target

    533becd0cc4cf29897da93ef4c5cedfedcfde7649e69d387e614bd30798db0fc.msi

  • Size

    2.9MB

  • MD5

    72108ae3791d6199697c5447ff2ffc6b

  • SHA1

    2ac85588e9b673881a827bebdfa1eb6e9bed15ff

  • SHA256

    533becd0cc4cf29897da93ef4c5cedfedcfde7649e69d387e614bd30798db0fc

  • SHA512

    45f411856a0c711071247d02d913b405f8b47900cd1e80ca568baf0f8a3f908a90f6d5c207642498af1eed25af8bfa92db865f9e1724e0aeeeab1c65f5cb9591

  • SSDEEP

    49152:K+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:K+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\533becd0cc4cf29897da93ef4c5cedfedcfde7649e69d387e614bd30798db0fc.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:812
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 89C0C4F1245E549981E1A7227351AA29
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSID0C9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259445091 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1996
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSID3B6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259445730 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:984
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI793.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259458959 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1796
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1235.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259461689 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1844
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B6AD595234A4A4FCA37D86C324DC19D0 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2268
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:1328
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000MwPsfIAF" /AgentId="012a7dda-b842-4a59-9daa-19dd81d1d853"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2680
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2944
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000324" "0000000000000318"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1632
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76d06b.rbs

    Filesize

    8KB

    MD5

    9fcf27f0d70d27ac6d6efc25ff66c437

    SHA1

    1df0323f2c82f1d00256dff4e8ad12ad6cd1e82d

    SHA256

    d182118933fb007172ab83306ed9a35f91d7e03fcfbdac976556232b911e57a1

    SHA512

    e7fcc192bb4969397abf71c27077e4ba6fc01faa042198f22f3936b5aad7e1b8c8020735043788517dec7664f86d908fc2608d2a8517cb2ca98d41c7caf3cf09

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    220B

    MD5

    db7e7f6be6400c9f9ce68ef47fb43567

    SHA1

    b26d461183c3e7b3635c87d84cedd49caf3ccc20

    SHA256

    a559b8aee84b2d800b7044de7179ef5b3e497e76f8876efaa162b16d99c8862b

    SHA512

    3cd2ce48b83f0bb3385fbfd5e6d6500b213a4e60f45e63f8c53fa4d840f842af27e24950b931dc663f2dc59e32ae182b77db6465118b415bf1c1afaad37e1df0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    abf6d3b39c04a2fa148e4243c584374f

    SHA1

    f939bf87ab2bba2cd7aed17097f9cbbf071b97eb

    SHA256

    3107e866d8e370539bcc2ca163863786bb85a93ff16df8d33d781c1e9754b86c

    SHA512

    9e051b91df49f2871761430229bcb700482dd56a5fb5e3403eb39a5934a9f2ab2509c6b93a60d442e4b11f5bbff7a17caadf61630c19153a2c03538f01747ab8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    8bdebd93ec988865e599b1d688e43076

    SHA1

    7075487ffb6979163d8597eacb4560b612f36057

    SHA256

    342601b53dfb59bac280943d1271d1881ff6644a34eebb67d668a7ba98fd6ed6

    SHA512

    da5788d3a58655597c3f94a67cf159a29a91821af41988e90992046272acdfb941cb4f520024bca31b0683904282b88894926473551164bff5664c1bd5d0b806

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    3aa154c597f0d3ef221b82298ce04f78

    SHA1

    c15d53176e903bfab12665b3e42d1b9eccfb54d0

    SHA256

    b75a76c1c71e981d5299e2a8f85d317d14da91fd79a615c70ef14876ebc9557d

    SHA512

    b9b93ed7f99e8b96efb85a4dc9a8cee9f7057b87da9c2a1fe82fe8cd308f89c42e76e9170bb429999e1d985af7847463b8c60173c44413685472e0b5e2306324

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    098346027ae487c2b36ffb814fff26d6

    SHA1

    aa55e312749a7710d0f2f77ac335348574ea69dc

    SHA256

    30befe2a4b97a9eb4c6d41e516164dcd64c33fd42c1415a39856b0bd965f5e87

    SHA512

    f1ec6b9e31289852dd9e25f374520f13d131bd49f6781b476e105101de57771b253a9ef37a18e246d1419993e1f3a59fa1c6bb9da4f576ad12ea488f5277472d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    8fb5eae42aa66a467ceddc9c91ad876b

    SHA1

    43c97b91251a49019328cded3199832471293ccd

    SHA256

    17fc8a7bdc1efa90572e67f573664aa67e5b6f8475ebba28c1c0b2cbe5f2182f

    SHA512

    f93d323edcbe575feba28e18b066dfbf70d9e91f39cd2db402651c721e8b7b6d696d9c87edaa9bb096867f2de2059b32719927e4273c4e22a613065fb1d2bff3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d0d1c453756f1396fa83765d2cb5d47

    SHA1

    0e782234bd3ff441ec4046e8407f7a3ac761d59c

    SHA256

    027b490c248d9178734da8b82ae2815867dbb5e7073441a2caf0be27223744cb

    SHA512

    b8f9a349dcd9e7fda3d88d4d276c6043addb8ff646ef5a5220ee4b81181b5d17e41f591260fe2f1a4170cfba357f922249bca99baaaf24bdb15d853d3f07a844

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aeecf78af4fb52e8e6bc5a24f139171

    SHA1

    69339666ef5fa06672949b6a5247279588f1ae3a

    SHA256

    2d603839f5670071eafbca088dc65fa4f0397c77b945b0ec6b74509cfc7b059f

    SHA512

    70126b82d9d54fbace5a573d7527eb4541bdb4580ae3ee8e8965c144edb5596dbbaa023b16e73b02659666a35e9915f971f7de62d28b2fadd86c4b8319688f6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    20806e9e872fa2f3f35703475df03560

    SHA1

    3921acce4aa9ab41ec7ef40ee051ea3853d47427

    SHA256

    778e308feb8610c1d71b4d3c37355b003ec34c2265552d5f4afe47dd214bca64

    SHA512

    a19d446cefbf7d7923d9c772294ea1ef4bb60cf3a17965e820654c8fd431f7ced49a5523baafebaab57baedadc6475cacec15bde6fe5d611bde79a0d822d4bc0

  • C:\Users\Admin\AppData\Local\Temp\CabADDE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAF28.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI8EC.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSID0C9.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSID3B6.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\f76d069.msi

    Filesize

    2.9MB

    MD5

    72108ae3791d6199697c5447ff2ffc6b

    SHA1

    2ac85588e9b673881a827bebdfa1eb6e9bed15ff

    SHA256

    533becd0cc4cf29897da93ef4c5cedfedcfde7649e69d387e614bd30798db0fc

    SHA512

    45f411856a0c711071247d02d913b405f8b47900cd1e80ca568baf0f8a3f908a90f6d5c207642498af1eed25af8bfa92db865f9e1724e0aeeeab1c65f5cb9591

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03818804ea3abf941bee4b51bf0e320a

    SHA1

    9edf622704999bd74e056a825d543cebee878cde

    SHA256

    cff9d3dc366a8b7c00b4a61261d61dd0ad4207060c99398e206b4f946ab92a82

    SHA512

    5a6f4dbe3dde2214848b722c583d215a3d6a4137f364d9144add61a5ce10c27bec220e23b29d47386274d109101ed201f8eeb2a747a0ad2e3846597d29b2014c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c6817c4533ecffd69608baf7e861489

    SHA1

    cd5cd67ee6278d7984715ece4186fdae0a36daac

    SHA256

    2382682b04381bd5f4c8afe0cef005a0961e3a3c4d78fb9e5c93cc150ed1d7e4

    SHA512

    636f6e59d259bdc67fe27610281934fc07a328aecd976700f9310a9e08adbe48ee83e957d451b8713a65e8559b917d74d692ea2ac657cfa8457a62636513dffb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51e89b6b01cf0063bdeeef0f2b0b9a9b

    SHA1

    e5ba50b4ee97d6af0fff4be8c7bc46e5d092dee2

    SHA256

    7391f0385f05cb4e4894108b9756d5d0798d64359d732d5851e834a5924b6de0

    SHA512

    5bb2988942ef12cb5eedaad2cdc80bb5de50cd9ebf2865170a18e7caabf8df73a78d88b19e88e64195b36ae2c1ff026acb18d8949f13dc8b33ab06985a816974

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc30ced1aaec7170a8ad7fe741c76d1d

    SHA1

    29df3cff106a68dddace8d3acab4231477a56cb0

    SHA256

    5966987b2f1afe22d99c2ef4dbbc5b215173b7bf3c697f45860441ba668bb34d

    SHA512

    f7208f98257256894ef507e142ce3f3fd718673f0a0bfccf43975efab8324020948700df8295efab3027d07b92bf9a36e6f56f610252601410a978c30f463159

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57e52ce38277dcf527ac638bcf4d6b3b

    SHA1

    7fb496767e7d0a2d983e8efc69fe78ba3380abb6

    SHA256

    33c8fa089fceda01884dd32b9d95b88d10484927d75b9cfad21de7492c3cd95e

    SHA512

    1e1ad24477fa0c4a13a68a75eed4ccdae0cdcbc68724f75fa818dfab23b96e5e8264c459bccaf03a4214e11b024b9b6a288b87c30059eaa88fd66afd32106f8e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5519649f50b2fadb9b1c9506fd49f42

    SHA1

    afb3c8d0b0615871759a968fe5dd920138a42fd4

    SHA256

    bccc6d06da48aa261c9f8ab4e0fa2cdaa070f76ea483f9aa489990b1a8e85121

    SHA512

    b618e445991d2f1d89b6541f8c656faa4b35e28d879a87fa40d2dba8e3612363afcc27091594e24bee12d26b58131dd66b18c2a833dfd70898e4b9e94fa1cc61

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    428c8b2f5811f7d5cbe1fef9e536efc7

    SHA1

    568a3814f5dea19bb26f84618bfe4efaae2cca77

    SHA256

    8b07051e5cca455bebfa52560125063f0d84949bb0ea0f4cd57de069162f8f1f

    SHA512

    212a9be67e70c15c001e9d463b771b62d5e961e1d3b2cdb9093fa6320db5eff2e9acea55f3243a00b1da3f3daba098bb393025b7c85df9e8fa0231cb9caa29b0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf395d561a1debf2e0c6a63fb412d418

    SHA1

    9bf1ecf70fce4183f70e61e95f195e88c8b349ff

    SHA256

    b13034da10a45f726b429ec76ce96eab42df4d83abb522e3644c996cdb816ec5

    SHA512

    a28be74a2a64915ddb19d23fc7dbee179b52578ddcfa12dacd34fa0e48f7ba74621c59201a94f67728a3c49159351337756b11883d3779cf9cac0ec637eab892

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0913bbee60d70db94792b998c7f9e1a5

    SHA1

    b6019d22be65d209280a443e682ff0e451b73c94

    SHA256

    9de92a5755e0f803157211c2d1bed4f9f467576227430171647c55ee6be2d6c8

    SHA512

    820ae2aa075c7e35740d6ae2e3d28114f3b88e595dfb3d767d4cb9bab7a4786a7985327a85df83567c8f73df9aa53670912ef7afe8cce11b5d0deab41b9f73c5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdca682bee3311c2cbbc1a9d8846807d

    SHA1

    13d9d233f6eede1e9fefe5d612f48b991c7a0e20

    SHA256

    280c5e68fcb0ab1d7e4a59e4564c59ba0a8e6b564fb2a8e1854c2d0e5026e905

    SHA512

    18003c8be410bba13f991a8f20de01e929fd7c707d67ad2b6c4995931f98e76663be2928cc463f5ee83bc61d52b1b198cee1ae34f24f62166a16e389773e1e6e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35f0b11b4ff24201e9e81cd4a62bb4ef

    SHA1

    b91edb8253a26398dc972c1843df52b57f171c04

    SHA256

    23660197f77cb328eed3de01f252acc457fd4c6f655502f876cf22cf64d6481b

    SHA512

    b5ff9b7a2905e49538b4cf515fd2c929b2ecad2a0ec13dc8c2c635f56903cf9c5f4fc2f7871a763b45dd44b0446aa9dbeb6c72d137b87ae3c999589826720311

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    960fc6cc4548dd3b8bddd6542589d525

    SHA1

    a66c45e0f2ce3f6833a587f3080b2ba5a5a3ef11

    SHA256

    e422589dae031940057d2b7a452b1c8c227c3d7911a1bcee3224e434b64aab12

    SHA512

    b5bdbae38d6bcd658e5135db6ee4f464f3cea0a6bf60eb9994bae46a6d19a8e626e84e2d0bcf78d9105658b65ea18e841e0ad0e54b4574b414790d7f34142c34

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b874e4e8663ac2dedf69d7e0da0f4042

    SHA1

    0a880c3726d0c7cdab5d24d2aad84d6ab5cf4422

    SHA256

    93b27b31fe37feb9b952427a4ed23b3098b77e0537a97b663bd86b5f2887af29

    SHA512

    f56d50117929df397c63ec42054c1f09d5205a1b9f458ff78f4e7766e102048d0022ad383e5cc64557c96a6357d8d4eecc55d0392777330c341231a73067578c

  • C:\Windows\Temp\Cab1FA1.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar1FB4.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSID0C9.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSID0C9.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSID3B6.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/440-306-0x000000001A390000-0x000000001A442000-memory.dmp

    Filesize

    712KB

  • memory/984-109-0x0000000004BD0000-0x0000000004C82000-memory.dmp

    Filesize

    712KB

  • memory/984-101-0x00000000004C0000-0x00000000004EE000-memory.dmp

    Filesize

    184KB

  • memory/984-105-0x0000000000560000-0x000000000056C000-memory.dmp

    Filesize

    48KB

  • memory/1844-314-0x0000000002450000-0x0000000002502000-memory.dmp

    Filesize

    712KB

  • memory/1844-310-0x00000000004B0000-0x00000000004BC000-memory.dmp

    Filesize

    48KB

  • memory/1844-305-0x0000000000420000-0x000000000044E000-memory.dmp

    Filesize

    184KB

  • memory/1996-76-0x0000000002000000-0x000000000200C000-memory.dmp

    Filesize

    48KB

  • memory/1996-72-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

    Filesize

    184KB

  • memory/2680-245-0x0000000000B20000-0x0000000000BB8000-memory.dmp

    Filesize

    608KB

  • memory/2680-233-0x0000000001110000-0x0000000001138000-memory.dmp

    Filesize

    160KB