Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 02:05

General

  • Target

    06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d.msi

  • Size

    2.9MB

  • MD5

    37d7404f46d43eac22991c947cc7b1f0

  • SHA1

    abcc8525564e8264b539d685e826f957c12ef70d

  • SHA256

    06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d

  • SHA512

    17ba13c5306b76f41bf3467dd59d0de54c052789750efcf23f7e674f027fb53ccd1a1e5749be035f9a2c77dc8945ccc24444d20a838055daad611c578828263c

  • SSDEEP

    49152:++1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:++lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2856
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A551857112DF32C7719F4A76C1C42227
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE034.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259514714 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:764
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE6E9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259516212 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:964
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIFF0B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259522498 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2832
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1B59.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259529581 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2288
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 60424D00A7291757AD15D951DC33153C M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2984
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:3036
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000O3Ui7IAF" /AgentId="99e5e048-756c-4a4d-b41b-19717ec5583d"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1688
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2688
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D8" "000000000000005C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2396
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f77de40.rbs

    Filesize

    8KB

    MD5

    55ac49073eea8694319db485aa027614

    SHA1

    348468592a1473e81359c623ffaa73af99fad6aa

    SHA256

    3753539e81357718fb12cd9b280812453d1efc32d2a013bef637b19b2db20fc9

    SHA512

    93c17fc594688c8b128419d5bd28ce4ae4a46c91186d60b7da038ee44c1e7eacba2dbecc9592dfb6b8bd66cb893e5b70b7db5e019849ffb314c6d4b5ad821a56

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    b283f1881431549cdec7297bf0f1354c

    SHA1

    32e154f9121b02c137ea4f482c47b0108a066e28

    SHA256

    60cfa3eec8e4aff896e569e25ce1ab48463f9216f0af75c5db34b8a7fc769d7a

    SHA512

    0cca7a67ffd5a6d37e02426a5da043cec1f7ade2755d5814efdaa9efae98f243914eeed46124e6f9cd5b43ec53c5d6021d3f24ef970dd8109acc863c63ebb127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    441a4996e2ee86c4b588d8c0d407e7c2

    SHA1

    0987d79eaecf4afad0e5c6f7bd9bd0a90ceabbd4

    SHA256

    300cfa12d5560f2b04e870fe42e15b6a2007e8f53e4ce1329bd506382075e657

    SHA512

    8d6d5bd1ea7baafeb8ca750ce112ed7fad1477e1deef34994a145893eed217d1a9990a52d76790f8c00484378778504626e5c6a5f5193b8da661afdbd62600b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    34699602d75b10dbce241a132696577b

    SHA1

    25fceec0af670956baf529a601c7763b9aef5255

    SHA256

    27322120c7f1a140b6351735b767a9af123735c6b16b6deb09cf6845d7e4ca91

    SHA512

    bd768818e61a4d19f5ea3522e1868f3e3f02f2d615d597010f761d435b98c5a7411ff5a659acd4f52be79e31a5bd8a34ebe958f273913789c59d13b9e545baf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    77dc165607ca29cc17a6cb8886ddee1d

    SHA1

    b3d53dc9f033a30f4ab5dbe1aceabf5bd1bae9ff

    SHA256

    180c329dcd3274d56c35604379c04599ac94a373aec5dcd1525f21cdc178f757

    SHA512

    ebfeea3c9f349769fc6aedcdaa0951901470b162b07581d0e48ccef7d76c576ac6bb1ae2fc915469102650edb745f3e7fbe64a07498a169462cf0000fd9b54bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    da59c29b1fedd1b7bcbca22f025dff23

    SHA1

    a253dc955794af9901723b7d910e65b3f5623230

    SHA256

    1bd67478a7d9c7a8703ea5056b907846ed8ea22f896ca161c39a0431d0654543

    SHA512

    306a15a7b30ac85a31576ca9e384f72b56f53b25ce7c2807511c68c5e2df58ba6e7edf413e5947ed282b0f6e6a7e2153cbcee10cdf7a983d3b7ec530b7f95bc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    814c2d64c83c3cad82156cca028d5c68

    SHA1

    2f4e7e16e9e379105e2e03cc8fe849dd90f9cf38

    SHA256

    df3fe13fd440214878e37cda82bf05940f95148bb3945451c76791d4aff2af0a

    SHA512

    f6947323c4e274153a0c23c500126c91b8ac085cb66ac04e94df687e408c31ffdea685f0082ca24780c4ffa1a8f5f48839bceb861a782e74b20df6256e5af1d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d55d3ff85c4c5235fa1412fa605881d7

    SHA1

    d1b21465673dcb5e454f0a04b68a7894b8f04077

    SHA256

    073740188a6a6ae5faca904aabe25fb75dff086b0ddb1ae9f0134a7318df9079

    SHA512

    ae3d183c8887560f4392ef6ee77863ef019da3db0915065dcd10719889b5f7a5e7c9e8d551b89341f837f09b1a7a5e9eecfc65de09abe689d1e24efe585dfdf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d92ce7f7691f59d0a969b0c38998b207

    SHA1

    27aba169a8734e42017a7359dcb94678617587df

    SHA256

    392d8c652a7214103784ebbd37bad24eb400fde7e7c461bf00a590a653fb7efe

    SHA512

    891c2376cda780e740a5742a3805290057a6ecde15bbf77114e37d40e96bc02a227a5043abcd76220f11fd340a84020fe6fc20f09bdebe5a63a76c7650530291

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    c7d0808fe688970f41e59137b48f11d6

    SHA1

    bd917e363ab28ac30960f5be435fe65a5864a5b7

    SHA256

    e57b8909ec332ff8c4ad0d61ba45fcdd79eb5d8e6af4379628ff13836adfc774

    SHA512

    f656efa04f7f4db0fa532ebd680823c1372c51ef9ae207d7e48204f76a212b8e077e9ecf926c0660f210158997b88bfa044fbb6975afab683b3e0b0e01178216

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    bd85d9c74ad66fae6a74508010c2d42d

    SHA1

    930f44d397cf635503e1058decd54ef9bb3cb997

    SHA256

    a1ca4dfb8fc599630e28077a8ba37c373370120d856d42a1797c9230dfa640cb

    SHA512

    4e6b5d21156dd8c5ab84d8e56ddcfea9883df24317ad0ab75f5e6fa4f0cbc50f253869ce105b3aedb8b672a28f51f78ff64cf484a7533bb5cbf35731607c07d7

  • C:\Users\Admin\AppData\Local\Temp\Cab7580.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar76EA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI5A2.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIE034.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIE6E9.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\f77de3e.msi

    Filesize

    2.9MB

    MD5

    37d7404f46d43eac22991c947cc7b1f0

    SHA1

    abcc8525564e8264b539d685e826f957c12ef70d

    SHA256

    06ffaabe4a1829177f078d1e6ad6bbc6af79d16729abcc8a21e4ec854448bb3d

    SHA512

    17ba13c5306b76f41bf3467dd59d0de54c052789750efcf23f7e674f027fb53ccd1a1e5749be035f9a2c77dc8945ccc24444d20a838055daad611c578828263c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    d04805ce21da18433dc67d04412227f7

    SHA1

    c44f924936d87b2c05e51bdb5909bab8327f8009

    SHA256

    cb70d67e3410269e95b95164e5dae7ba275aaf2ed1f8acbe531f97bb05eadb14

    SHA512

    223b76375c9c5499ed0f145bff8e601a86c0b1aaaff5da1d098188eb0130a5c78ef69ed278c30390db1fc5aa00e7426a02a286bdf7a7f338ffb0441a9f73bb5c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e813e6e10235960cc991d2a7ad5f9c70

    SHA1

    77483aea910a1715999d521ce7056bae5260d0cb

    SHA256

    76f905788de0e9e74d2caca48d593f3bf1793f87b5ba0e6ad6dc92e15bfe6289

    SHA512

    2e3bf7f605b4e0a5ae5acba5d3680a74f83ed75c4498dcac481aab92c5db4fa7d2b469b81b988add3ee174814d7d4be7a03ddb375e4c2fbe94014e471538219a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    129db3b1c8f9aaa12ee3d00b802e1b51

    SHA1

    11ade141cbceaa50cb9b7356c26777bf9a0a1e38

    SHA256

    8349855d5808a4418dfdb8da49fdbabf3a2568e744879641364503e73d7efe55

    SHA512

    1ed12eec15bd48dcf1784e7363214a43301f0874cfb24383d44e85025adf73288fe39a16f89135669d2e1bf48946b88eacde889b353ad85e29a9a5b079419179

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecf5f3c86ab4b431039de7adc1dc16df

    SHA1

    673e880fc3c944b67344887011f9cb8bd8d53d9c

    SHA256

    aeb4969c245861ddb9ef4cbc712b1bfadfbc076272b2e1866b53713d57788e7f

    SHA512

    685f6aac55b48b9420b9840fbb9873f62e77958ffddfaaa5a0d7fd4635569f36455aa1e6cb6ebc8ffc4b187bb9193a91efcd1d8603c1dded315bf31f8251fdf2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bde502f9319082f75ff6ac1bba33d474

    SHA1

    a27b12a92f27b7e75f2bcaea15af5ea1d409072a

    SHA256

    3d2b537a694cb8aa26af5703d26b73f6e83d013536783a2c7e9aeb914599d75d

    SHA512

    522103d623585527fe3daf1469332fb92f990b612070ad7e9f5f21d376193852640820a03cb39e23f502e5fcc9b72385d5890c22e930477d4bbd0f99eb2a07d7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3947ac4e40106064df8438bd15241bd7

    SHA1

    5412962ade85647e3e8039d26969f2bfee859bdc

    SHA256

    3a830b10d29d21b96b5b04080c5555fb12321cea2a2cf6af86d7a21088a4a73f

    SHA512

    339bdea440d098a9fc198b5bf20bd437dcd50bd1125c0ba85cca69f3dbc456b0794991f7d2478d439cd2e457c6c8f0da53ee8069e16b7e94b6f92562d5f12313

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e767ce9a1245680c2f5fc57aa31b5692

    SHA1

    c27c13583f93b236bc35200c31637f8cb77b210e

    SHA256

    cbeb69351728c26452a1763a4e6f89929d9412d9461b72f2b1f60ac33507c3ed

    SHA512

    e66c9f04d9d9e411306db6b55a7359a3fac91717e3611170b566f59d7e60d517e308537e76fcfe23220c758ae1993a8fadb49b98ace52aaef24fb50875f4b470

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b7c28f8558e0eb6bc1bf78d5b004eda

    SHA1

    94f7328088c808ae5d2fb0b813a1429e00db105d

    SHA256

    b433dc7f880a01c90e1614dbf7ba8431367349619ebdd243f63d25090524080b

    SHA512

    7ef64d3700253a3852bc50a85c17bf1503e7264b94036a2ef9451d06a66d0a56f7147116207e911b8022c9613e30b259df74ce251b9e3c6e74e416f21575c9b8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    180b91d0428c7baa5bb273671b64f68f

    SHA1

    42d63de81418a2a067ec5872dd4fee8dad37d5e8

    SHA256

    deef4ca8b50b1d02904dff67f456df6a2de4c9832db28b0b8bf0ba8a223348d0

    SHA512

    5464bc550d2cb07ee67701870f6f9333bf266398146001d6618330351788e2c673a33860df5d2b1cb7953eb2f284bf20b29010d498bace0b01e0a5b770ceddf2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75a640c0893d60e25ec80c80df99301c

    SHA1

    10156635f0105fb0cc49e0e5a355f5a313b57355

    SHA256

    b3eacb14c7023976ee03a1520904181944e40d9a01cb5739b06578c6b8343720

    SHA512

    9dc3005a9158f6f4e8e8246fec8b32f2199afda8e9ad1d7f2808d5056c141d8c43f240b07c2a02bc569a3ca89ab8e69fef6e5f65837647eaab939cad488d6075

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1ae78480ad11d0002e067df90c625ae

    SHA1

    ca9c91fc327bb361107a715546791bf214ff0d14

    SHA256

    66d6cb215bb7eba8f54126952218425c1f278dbc87d1829c6ba60fedb9f6b09d

    SHA512

    2b0be74942084a4156c92655c46bd32d7812d12c25cb5a629476cdcd0d1427258e0eb47dc35aa9d76f2264ab8d6d028da0907d7a6559fd45ab001a1daf84c369

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ae8f9922685f8a0d013fcad43c6b987

    SHA1

    751493a5c89f6de6a2e90407503afadba9701d75

    SHA256

    81bb8118aa8dd2c6fc8993adf24b248795d1e6cf3c69bdb857295a02cd263e6b

    SHA512

    3fe36b237d694d3d342db4574945d1fd975c1c42f3fb7e06180e11ca7e36d049b17aef06e614974e3ccdf3af88b0d465ee3ededadbc884d2adc4c06c8bcb52ce

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    cc8b97710047fe7da66b7b5edafac0d1

    SHA1

    ec1bea8daf67d43a379c6d3dac3199ab56725fa3

    SHA256

    3497d886c36d48ef3f800af836667f1b478a3f472b6d247e567b1f9acb78dba2

    SHA512

    a1ed2f4825fe230fc5cfaba791dac3f28584c265434bc2d3805980566f8e7a8122d8066aedf5dc8da4b390a46b57c97f87b616a70e3c54528d37bec6fd70ed45

  • C:\Windows\Temp\Cab2C6D.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar2C8F.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIE034.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIE034.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIE6E9.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/764-76-0x0000000000A30000-0x0000000000A3C000-memory.dmp

    Filesize

    48KB

  • memory/764-72-0x0000000000990000-0x00000000009BE000-memory.dmp

    Filesize

    184KB

  • memory/824-306-0x0000000019F00000-0x0000000019FB2000-memory.dmp

    Filesize

    712KB

  • memory/964-106-0x0000000000490000-0x000000000049C000-memory.dmp

    Filesize

    48KB

  • memory/964-102-0x0000000000420000-0x000000000044E000-memory.dmp

    Filesize

    184KB

  • memory/964-110-0x00000000046B0000-0x0000000004762000-memory.dmp

    Filesize

    712KB

  • memory/1688-258-0x00000000006D0000-0x0000000000768000-memory.dmp

    Filesize

    608KB

  • memory/1688-246-0x0000000000990000-0x00000000009B8000-memory.dmp

    Filesize

    160KB

  • memory/2288-318-0x00000000009A0000-0x00000000009CE000-memory.dmp

    Filesize

    184KB

  • memory/2288-322-0x0000000000980000-0x000000000098C000-memory.dmp

    Filesize

    48KB

  • memory/2288-326-0x00000000041A0000-0x0000000004252000-memory.dmp

    Filesize

    712KB