Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 02:09

General

  • Target

    1484770b005cef914a0710b85d2c57ad96c1c48abbeb0f3c4055b19c1299d12e.msi

  • Size

    2.9MB

  • MD5

    8a685b955bed68d969ddea75d5ce51bf

  • SHA1

    2c66035dda36813b6d139c228148ce3a7faca9c2

  • SHA256

    1484770b005cef914a0710b85d2c57ad96c1c48abbeb0f3c4055b19c1299d12e

  • SHA512

    a9c50d981e62d7da7a7926265b16213cb990e203eccb46f2d2f9df0c20fdbb792099a36359b845a9073e19fc8fdb6318d9e3da812cbc6160be41b7caa72a91e5

  • SSDEEP

    49152:B+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:B+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1484770b005cef914a0710b85d2c57ad96c1c48abbeb0f3c4055b19c1299d12e.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2316
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 33DFD7DCA486FC63473C4E5C5F5EFCA7
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEF41.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259453109 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2776
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF2AB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259453608 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1604
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI217.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259457618 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1652
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSICF7.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259460348 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2220
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1CDB855E0396F92771548EB2C5C34FA3 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2980
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2596
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:1804
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q3000006YrPqIAK" /AgentId="1a1a3c0a-9928-49f3-889f-2b4ffeac2c31"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1732
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2788
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005AC" "000000000000055C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:320
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76ee86.rbs

    Filesize

    8KB

    MD5

    4978c71a10a5caa7af748568e8e950a1

    SHA1

    fbe2eddcac4b9db9aa2e6776f0d353d5b2fbe77b

    SHA256

    16886b45478df59dd2653ba1d85e7a3f49ee630e6898735664fc0b51c792b3d5

    SHA512

    71aec4d23c7243bee74f426048359c0d96624525ca23b577047fe5b12d59d5944d16e42882e62218ea9680ed0a0fa9a98aba83162f5c7ff3633836219ebaf6fe

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    226B

    MD5

    da892742bb502e79ec665f1845ccbd33

    SHA1

    73138db1c233a81883a8428696b9b2b24b09a0fa

    SHA256

    c4712446bf1e720b31869ed7b133fb104f27459734ce268db65ce9f0095722d6

    SHA512

    91360018dd7641da1883f266044a86d0f32101364f9e9e1e438ff819dbdc8a1f30c5075de6fc56b9c5248cd95d82087f072ee4610c3fc74e006d8dac5fa96555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    441a4996e2ee86c4b588d8c0d407e7c2

    SHA1

    0987d79eaecf4afad0e5c6f7bd9bd0a90ceabbd4

    SHA256

    300cfa12d5560f2b04e870fe42e15b6a2007e8f53e4ce1329bd506382075e657

    SHA512

    8d6d5bd1ea7baafeb8ca750ce112ed7fad1477e1deef34994a145893eed217d1a9990a52d76790f8c00484378778504626e5c6a5f5193b8da661afdbd62600b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    34699602d75b10dbce241a132696577b

    SHA1

    25fceec0af670956baf529a601c7763b9aef5255

    SHA256

    27322120c7f1a140b6351735b767a9af123735c6b16b6deb09cf6845d7e4ca91

    SHA512

    bd768818e61a4d19f5ea3522e1868f3e3f02f2d615d597010f761d435b98c5a7411ff5a659acd4f52be79e31a5bd8a34ebe958f273913789c59d13b9e545baf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    77dc165607ca29cc17a6cb8886ddee1d

    SHA1

    b3d53dc9f033a30f4ab5dbe1aceabf5bd1bae9ff

    SHA256

    180c329dcd3274d56c35604379c04599ac94a373aec5dcd1525f21cdc178f757

    SHA512

    ebfeea3c9f349769fc6aedcdaa0951901470b162b07581d0e48ccef7d76c576ac6bb1ae2fc915469102650edb745f3e7fbe64a07498a169462cf0000fd9b54bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    f20546b2fb0d13085a8e9382a7929ddc

    SHA1

    9c50c9cf529dc8b6e05eb0f9e3f26a0ad64696c3

    SHA256

    13d7b7725ae402ec7564d1896df7d783788866af678f4c0e39c7bf011511a305

    SHA512

    e0a87f7283889373aba4e61e9d755ecc2791e8b56f537d539c033fd96496608a1907bebdcecac74fdaffcec0505610d10a32db5f6a38caf6851c330431927ddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    9a6b6c6a0afa92d9cda0521e82cbdc45

    SHA1

    0b79f0076eb1ebe8eb888e396cd32227049df54e

    SHA256

    98c22ed85a9a9d252e194b15718b3da885cc88ee3004a344f2f728b1fe952995

    SHA512

    cb23c67407abbca59ceb463382c1e8cd85f1ec1aa7d01f8f8cda772acafffc1cf4bea7c9546411e6538acb32fc78a71fddd211a59aaa346e6585c5e97b9f3f55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8935165d25902bd88771dc9e2de74f4e

    SHA1

    e2b17380629e81b8547e8edced93972e9cdec04d

    SHA256

    d612da32bc41ace9151b652f53c91c62bfa278e66cf3eb45b7e80b81651e1dfc

    SHA512

    dbce380b837abf3606a75bb53c2bd836eecf97df7e47ce5ccb24df6e0167e011c169b3f633b2c38dc36314eab95fe41825f84a6c8af7ce3e20894b86c5811f01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a074b8732b62f44a995af4c1f36293b

    SHA1

    6b7988eb7200a2c60c2984a0f124d0e642806ceb

    SHA256

    f7f5029ab8b053bf8c0d3fd3cdd6735bab5cf0e59039cee85f236f9c44511785

    SHA512

    d1bfd00c421ba86e3391d5fd611c119c448a48026fbd6faa52ace55d18dbd7c0d3191cc57597b5ead89eb6e17f1a76522d92506808ce725cfaf02d4fab52cb91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    52268dfa6e2fe3f54f535dac0c15c968

    SHA1

    e0b30c49e2af8b814d47e2beee10e0cbb9b7d2f8

    SHA256

    5918d7ad66b2552c1e22ddb01ffb27478da80f33397bfed638dbd0f77d69637c

    SHA512

    caeacd57aa32493a6be60ad7ca5c2635d186d0d9c2bfb8fe9a2788dbeb674439c0fa5a508e17dfc3d3a8586cce91fead2d7edeed8e1baa8eadd84544b58d3cf8

  • C:\Users\Admin\AppData\Local\Temp\CabD2FA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD3E7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIEF41.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIF2AB.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIF2AB.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\f76ee84.msi

    Filesize

    2.9MB

    MD5

    8a685b955bed68d969ddea75d5ce51bf

    SHA1

    2c66035dda36813b6d139c228148ce3a7faca9c2

    SHA256

    1484770b005cef914a0710b85d2c57ad96c1c48abbeb0f3c4055b19c1299d12e

    SHA512

    a9c50d981e62d7da7a7926265b16213cb990e203eccb46f2d2f9df0c20fdbb792099a36359b845a9073e19fc8fdb6318d9e3da812cbc6160be41b7caa72a91e5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a82e3da088057cc65f8cd806a4751c40

    SHA1

    48ea23bc93a47c55905cbd42c1da45a587ab4002

    SHA256

    a30052c238f049fac77541928231d73c5b0bef27322622bb3f524423d07bcda0

    SHA512

    8ca76f2b67da63c09bc2f5b7d3222ea3e844ea2aa499dbfe1afbb17870eaa049ac12d303c8f58fdf41851e2b0fda8ce381b9ad28d0877c80e4a317a3eb08191e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    20ef9754fe7135944126b5e3f93ca0d9

    SHA1

    d36434fe761224a32e186227ea85ddffb0ba49d9

    SHA256

    371c02d6dcf58919d0c12c0683c5a29a3f8e9da6c1dc253cc313a9a34ed3c692

    SHA512

    d7b5e077f1798cc2cfb10fe20820c8163c285fca31d64e1d326ce707df6b6bfa4133d6e00404ef91eb5d5fc7a93a215e8095871a3db52aa8d4dbeb7f8dd4d525

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    98c6ae8e9c74bb8025bd0762cb6b9f1b

    SHA1

    6d7c9993b4aac3ec0fb70f4b0db8d05aa1fea8e2

    SHA256

    df5edcc3d11d01719a84b496ca49b77dd438053dc3a5429041ac28ec4523ff5a

    SHA512

    7912de2ecf61e40e4a90e89f5ee09cc8f618b27c93ee2ac73b12f29997b216a0e755e772cc93a2b638e0abf1d82d6a6d05f032b2594f49a1fde6b4a2c3548a99

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fae85eee64cd42d4f92707af36d33d4c

    SHA1

    2af14795e23766c229d99028799d40fcb7ba8bc2

    SHA256

    6c0fb2e0d84cdb6cd9c8c54643f422e13125f6aba825d57881f479ada0815173

    SHA512

    68f4ed9d89f7bd4565fd4d4b7c2b3c710d886f8c5a901f3ea4aad72603af1bb159bd8f5b958b73280a495ae1a19dd0f9b22eae33869e0b6518941a949d92d290

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c2b63cf98bba7f09a04c6c193f9061e6

    SHA1

    fc2d48e579a818931000913eb4096137c041c535

    SHA256

    0aafc2101300236a33cb03542ea26543f9692420b72c1087d8ca1f2a1e5e64b9

    SHA512

    626a8543add3f1da6c212d8b66c5a50f5b08c2e03163875ee816e0036f8f124433e9e4899da4adee66d2d806d8f45631e5571a0bf878e9dd0031f2f5675c8489

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ac2da1065462f83d158cbe73b1624a6b

    SHA1

    bb550159fbc259b3dad3f58fd0b28ddb1d270132

    SHA256

    848864de7d64292ca11b7007c1ac2b3a70d96b7fe3664314e4a818862f53f0de

    SHA512

    f7382380175711c5d9c38de24c14c2199a11769acf4259b61c70cb5baec7bb52a985ecc58a8cae5c595e352f69eb34d864f5b494493ae81ad4d0224701cfb3f5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5e5cbd9fcd3e7d78ee1cac7d3572fabc

    SHA1

    ba87e454bee9e9e5c469dc769b1469ff06e991dd

    SHA256

    6424ae167cbf73ba714fb808e849dbfc2197f47551758d7c27872518744a0aa9

    SHA512

    ff82db3238c6015a81fe9ff98593833690fc01481fa1a7d991e09c2f0b3fc7b5db0bc022e1213f2a38eef8f3d0ac600fd95ac91754416e17a1f3815a07ccf824

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3edbf9eac8e1b48d255058783eff54f6

    SHA1

    d99a217da87ac2102dbe252ac42276ecfe73ed92

    SHA256

    c3ab639af20a2e649b235d6b5c8e4b630b145c239e6abc14be48eb6cc2ecc958

    SHA512

    000d3300f06a86901a2d2384583e5ac70d194df26f327c12f83667484b67ce424f0c186ddf9f78539148e9f9a4c16e1a7d19147c129ab2ce401750744b5bd48d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f15807f8ee7a82734185dd30184da56f

    SHA1

    908a37242302f4bc2b8df8280fb60825ccdfe5d4

    SHA256

    b4b96ac7efee07f5c884f29ff57fbddcb2790022c410a2e4db2aaa3b6ccada81

    SHA512

    7aceff17206cc625e778f1a0e7d82335d9b3d71f3e6f178094d5a260e6f408d8728c52d19d31292fc5ba1da8ca4f5065eb6e874c017b497b3dd9e9d772737ef8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b482f0def78eab523ba440d4117f1c9c

    SHA1

    680e2227dc06a094cd208cb6dd7b5c9a23b93185

    SHA256

    49637b7d8e139cd29665992c28f91a0228cc67bafad2c2809666df6ad0de6925

    SHA512

    b634dcea6b1d3de22cf3f64bbaa6c754768419e40f7fdb42c4b3033d5534eeb67d633731177933209b69b9bc531dff7b8b7b14ab84c1db312b082d610694fca9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5e6b75489d56a15cfe53d40c2f36e864

    SHA1

    2372e77e4d32c377cdf731a3f9c27cf64e889f1d

    SHA256

    e93dbb6876421e2493d954e584228a3d68215d64fe12c3cefa29069509f57564

    SHA512

    e4979a68f239f307bf7125eb6ee148176e44aca1440fa5c92d12d1fd9af978b5fb827772bfce2c94533f5fd1d4ef9131d43b3251aaa9f6b7e009759d9ec6c512

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7981d457f69b01cc636fec35a17ba49d

    SHA1

    1bd3bf135871bbf81881d4d1d80bdb0bfeb29d0f

    SHA256

    72cf5feee6de71f749640e8691c1495cf5d3d0a81c247b9cbbdd5dc9d468d8aa

    SHA512

    d4c5dfca3798dae8a21042b7546a488dc129fbf24cc5c1f7ff5716a7dfb7b9851169d0b7f79061055de5896aa026473d9ba88c21d37bfc26127e49947a8d31d2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    bc804381ef9dc9d879cdbde2f4ce1875

    SHA1

    2b2d664d19d209e601009d9c5f1b309c69397115

    SHA256

    2a23fee1ea1224164916e13e9d1415fcd86b292f4c177987dfe9b0692b89c0cf

    SHA512

    4819c555f91c657803f8e7f0968c8b4e015bbe49e62b7667e7779a7cd6f6210009610877c2a7ead810530d83b7af1d948f221c879ac9fd5c3c05f543f6bd3dee

  • C:\Windows\Temp\Cab19F6.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar19F9.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI390.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • \Windows\Installer\MSIEF41.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIEF41.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/376-300-0x0000000000EE0000-0x0000000000F92000-memory.dmp

    Filesize

    712KB

  • memory/1604-105-0x0000000000AD0000-0x0000000000ADC000-memory.dmp

    Filesize

    48KB

  • memory/1604-109-0x0000000004BA0000-0x0000000004C52000-memory.dmp

    Filesize

    712KB

  • memory/1604-101-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1732-245-0x0000000000640000-0x00000000006D8000-memory.dmp

    Filesize

    608KB

  • memory/1732-233-0x00000000009B0000-0x00000000009D8000-memory.dmp

    Filesize

    160KB

  • memory/2220-313-0x0000000004B50000-0x0000000004C02000-memory.dmp

    Filesize

    712KB

  • memory/2220-305-0x0000000000910000-0x000000000093E000-memory.dmp

    Filesize

    184KB

  • memory/2220-309-0x0000000000950000-0x000000000095C000-memory.dmp

    Filesize

    48KB

  • memory/2776-76-0x0000000000B30000-0x0000000000B3C000-memory.dmp

    Filesize

    48KB

  • memory/2776-72-0x00000000007B0000-0x00000000007DE000-memory.dmp

    Filesize

    184KB