Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 02:53

General

  • Target

    b285c120bd2b619c4326334f48a3b02696c4b9b54ed44027f9b8b99ef52bbef5.msi

  • Size

    2.9MB

  • MD5

    b03c2dc066f3726de8e77d626be0b08e

  • SHA1

    94c9a919f59ea07c160dec604e7a3b80455df6df

  • SHA256

    b285c120bd2b619c4326334f48a3b02696c4b9b54ed44027f9b8b99ef52bbef5

  • SHA512

    e118086e2368872e019717cc1c92ac929425de22d8eda1866c7b910427c6e1655c8e6df9fb9d6203f0da6b9365506d08d69f08c09da463881dbd600369f55ec9

  • SSDEEP

    49152:T+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:T+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b285c120bd2b619c4326334f48a3b02696c4b9b54ed44027f9b8b99ef52bbef5.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2340
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 86F1C7A5F3D9A399276E9634A1FCB1B6
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8D05.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259427681 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1512
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8F48.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259428180 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIABBE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259435465 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2628
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB7B6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259438507 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1496
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91A18621A418D9B22EE189C2C2B6A432 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1372
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2572
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Kc2ZxIAJ" /AgentId="18217d4d-02c7-49b1-bb3c-03870b44f1af"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2704
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:480
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C4" "0000000000000580"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2120
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f768c69.rbs

    Filesize

    8KB

    MD5

    e5d34c0ce62eb2c2f015e51bf59d3b86

    SHA1

    da6f4fb0e450b4d4941ce1cc31ce949e1fabd88b

    SHA256

    0fc98eff75276d7989e99691c63c166550ca8ceec0ec49edb279d468393e20cc

    SHA512

    5f686df4db8d14fcf2bc807ab7805745d2824ac442fe6beceb8ea9a85ad8dcfda655e64650e29913b8e1fbf57a3391ca19a7264fcbfc823b93a622ed6d1b014f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    208B

    MD5

    49876123d454b16405cd69a6764d2e28

    SHA1

    7557c497049ffc7f3da1125de81d627c17da36e7

    SHA256

    a7544b78e664a71540427aab8ab46e57b2562e357c9b5eb9d5afa52f000f0251

    SHA512

    07068a1719c6880bb4b336a070c5dc798b5a5a39c2991f6cd571adb21d36b67b1f5b052e410c52d4164579a6224874dd7fbcc53a176193fe3e8617a66ba6b466

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    441a4996e2ee86c4b588d8c0d407e7c2

    SHA1

    0987d79eaecf4afad0e5c6f7bd9bd0a90ceabbd4

    SHA256

    300cfa12d5560f2b04e870fe42e15b6a2007e8f53e4ce1329bd506382075e657

    SHA512

    8d6d5bd1ea7baafeb8ca750ce112ed7fad1477e1deef34994a145893eed217d1a9990a52d76790f8c00484378778504626e5c6a5f5193b8da661afdbd62600b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    34699602d75b10dbce241a132696577b

    SHA1

    25fceec0af670956baf529a601c7763b9aef5255

    SHA256

    27322120c7f1a140b6351735b767a9af123735c6b16b6deb09cf6845d7e4ca91

    SHA512

    bd768818e61a4d19f5ea3522e1868f3e3f02f2d615d597010f761d435b98c5a7411ff5a659acd4f52be79e31a5bd8a34ebe958f273913789c59d13b9e545baf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    77dc165607ca29cc17a6cb8886ddee1d

    SHA1

    b3d53dc9f033a30f4ab5dbe1aceabf5bd1bae9ff

    SHA256

    180c329dcd3274d56c35604379c04599ac94a373aec5dcd1525f21cdc178f757

    SHA512

    ebfeea3c9f349769fc6aedcdaa0951901470b162b07581d0e48ccef7d76c576ac6bb1ae2fc915469102650edb745f3e7fbe64a07498a169462cf0000fd9b54bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    5831501c0eaf4598a4d6a09cdcf4feb8

    SHA1

    8ec16846e4dc1e35f700d7cb38eec8591458ac65

    SHA256

    8b2c47caf0a6d8bea7fe24ba0daabadf11361eeaf56a0e081aed439eb387270b

    SHA512

    ff1cf143131580443c8165afc2136a4041263bdd9409e5f8c6187c2edabceffef81fe8bc582d8f63421421c9737d3438f69ad987d243ebb3e821a74e91c84c84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    c65e8e244c79d884509db0e2b64df64b

    SHA1

    61cd10fe6481cf988dc145021f971c84cac1abe7

    SHA256

    77bd87b1bfd78faa5dd402b90d06457fe742c8fa163c717ac264ed1189562f53

    SHA512

    695285cc012e551539728c01a70024c5219c41b376d5a0bf8ec99b23492992349aa16225b73135016d3272e8e51aa026d1b3ae5bbc65bb635b44e6547f1e8fb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0d36377f77017c41c200ec9eeb55467

    SHA1

    be5a20da5c426f1d1f05476667733b161676bebb

    SHA256

    0874a0a7b7e63cc1638b7c56f8b90441897d9cbdf0bd6486fef970efde589397

    SHA512

    726f3f41eefa78a9bbc0c49111c3a26e28408f68ef7115b7024e62b056dd3422a0dc521142063030be096d485ecbfc29da0e3424e035e2b593c4a6746fab539e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    b1016e471df88b6365d91b8b193e4b00

    SHA1

    e423840ac3e7e0c5391ed2115e5b5885a36158e0

    SHA256

    4f77e281fd56adaeaaf2eff136ddc3afe53c7b8dc725f429d59b0fc111a41927

    SHA512

    db2ea7464dad58da822bfae6780638017decd6e493712d7945437cb76a37d83a271004f6e4dc3c34d029392cadc4770e8ad80de24942c9bd78c41309be16396b

  • C:\Users\Admin\AppData\Local\Temp\Cab6F68.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar70D2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI8F48.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\f768c67.msi

    Filesize

    2.9MB

    MD5

    b03c2dc066f3726de8e77d626be0b08e

    SHA1

    94c9a919f59ea07c160dec604e7a3b80455df6df

    SHA256

    b285c120bd2b619c4326334f48a3b02696c4b9b54ed44027f9b8b99ef52bbef5

    SHA512

    e118086e2368872e019717cc1c92ac929425de22d8eda1866c7b910427c6e1655c8e6df9fb9d6203f0da6b9365506d08d69f08c09da463881dbd600369f55ec9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    0ee9ea3b86990d03836caf4bf59be622

    SHA1

    edb58e963f196f36e72c67eaf1cf20b35c9b0645

    SHA256

    f1e32cd3072c498ff3a9af0573246076a445fc070a6f1fba002dabadc7886130

    SHA512

    211e3769a8685fe77b187b606d0c1df74576a24c19a3b43c7d64a8e27cddea5a68cc73d92f25edd7fcdca20102f3d5565bcc42dcfb86a0d4a0e8c44941ec2f25

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd4614cc29e7adca3f6778ece9884d73

    SHA1

    830860f0a21d01a3520ede03d3342b664ebceda1

    SHA256

    647cd95e78332dabb0b776ccebade02cfa35af2acd4368df8e65427bc16a0006

    SHA512

    a69c4334e71c0cd009b7c4400dc19f378734b097a7b795c441a69456564fe393b93f5f84dfee345bb649e9f4db1d12db1d8b4339f25eb64546a8df120a34e709

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d57530ab536c822ee51097df47537fb8

    SHA1

    928e7bc1f769e923b5ed67a1d9cfbaddb6cf59b4

    SHA256

    b03a01bad70e6cc9a9dfa60c72a964cd2f1e4ec1cae8f6804b34fcc3edb412a0

    SHA512

    90fca6484cdcba63d083100e0fa9af2b6e89814bbc563537f8a1c4511946ab19a5e4d97263e047f748dfa97d4f4caacf0f6ee23bf4ca883fd7df9801145bd8bd

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19e089cc46db93871b827c8f4b6a06ea

    SHA1

    1b8536712a9be512ea3745ff7cd2697907dda83b

    SHA256

    02cd8c9879f9f3e5b1c440beb7726c09988ec7baf5c5b7e0971ccf329eff4eec

    SHA512

    6238cf4eddd573c004d81a254ab0a95a966f32fd4c41299dc110ef130c9e3b24092365de1b0e81976f2a47332fc3b9cdaaa5486bfed6b48741b13abbd847cc1a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07ebf66cb2a09d07bcb31dc36eca3472

    SHA1

    f964d27a661654353353caea837a3eb149f9fc88

    SHA256

    5f45672780c9532f33a8644a2555bd64d05be45cd8528bb240a88040da05017a

    SHA512

    18da2ec1c481d72a2f984a8049f412b6bdbdd79de2c94ff105811a8355ccb3a82900483431848cb467c11b9c133ac0b18826ad7b6cbbce8ad49e20a7fa834d0e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a444b613f41150a161f1259958473f09

    SHA1

    855cd586d90e777d5ffd70160919cee3b913af58

    SHA256

    32332810b3ec3ea708b5b0fff92392153d543f5ca250af368bdc60001ebdc53d

    SHA512

    46b0a313cab45d43db22119e8677e815b5c459c5e71c43b6876d43e190fd6c31e203adc5943650bbf7ede55383910b49ae36b2db5cf5c23f59f025805369f44b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c49f67cf1465179e81ec35e0620d3b7

    SHA1

    060bbe91ff5351120a9ce7d1f9df7a2f96bbbd31

    SHA256

    efbe1b57d80633a5edde2a88a1dac708d3abd7fc60cda563f8437743f6d67755

    SHA512

    160f3d41a0aa0e91bd9f13e575edbb841c9a44210e7edb3092f77ea347e5e96c1059759cef400c1f2ef92ab4951dfd6ef623d8f158c4b331904c4ba9d0e67a01

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    851aecd13554246600022e15a4552d13

    SHA1

    1bd05365fc70f6e3bca1891ff812fce6d9d0813a

    SHA256

    d020eac1697c11b82fcbc83204a23292c08dca3975090bd710610d40e39bfdf9

    SHA512

    37426facde4695f936dab93593803c0541893e61a235849faea81fdb43ef312dbf033f983ab6c0f75a3ba947eeb01b8bb502af59d957c4b6300c0b76111be3ff

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d856a044fdcb58b7eadb4ce7c24960af

    SHA1

    e8dad6de87a5a1bc625dc0d052a9f220159d1c1d

    SHA256

    4f9539b8a3f5887ceb4c082c07b542a654d74698b6022b94c86ad42d9f2cacb3

    SHA512

    0a96e3b92b4ee7af3a7a69db568b97de427ecbc09731e02c055639397cd8a9549c64752e6bae0fbe7f581e34b0c3c51b00c368983b41305995f5e95f21178656

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a7a3b4849965211bc0fac299adec56f

    SHA1

    1054ebadbff8737faa8baea3c31ca03bc9489c0b

    SHA256

    203ffe5d687181a708c93233ce43eb48b1d135582b646a2607030b2027fa370e

    SHA512

    2f2eab318ed701f4c279abeed2876da91d53582becf1cc5a72b4d0f2477155a017bda8e6f87438567459d3524df99c602e2e2f72c0f942d71666a46a3411ad30

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d267085f062bfcf8a282453e5af082b

    SHA1

    736e365fa7f169ecd82d35671323518c8bb6fc21

    SHA256

    3861614dbd153d55945de774ec7b279d8af823886a757dfa74b50ba50be868fd

    SHA512

    2dc24582348ec65146df4dc26db43b82dcc4b0cc4f029c95289cb9dcbdaa2bf4bb18fcfbddeea9d39c19be64eacca946d31174a87327d3e4baca4d4945c3d552

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    4fe3fd44ef2306d182930bb02204937c

    SHA1

    548b32c67e448171ab0c31666803f4a5ebb045e3

    SHA256

    31966f1788bbd7889300b8c73ee2e5fa9a7c69bf078c0fcd93d2f3429b97e997

    SHA512

    77fe527070fccfbeb1a15ad8a0e39df07662208233f363958de7c4249afafff92384d9d5522a2713230bfdaf347b1f3f8508e6d92e1aeb0c068e3bc9b3c34a87

  • C:\Windows\Temp\CabC68A.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarC69C.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI8D05.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • \Windows\Installer\MSI8D05.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI8D05.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI8F48.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • \Windows\Installer\MSIAD55.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • memory/1496-281-0x0000000004990000-0x0000000004A42000-memory.dmp

    Filesize

    712KB

  • memory/1496-277-0x0000000002100000-0x000000000210C000-memory.dmp

    Filesize

    48KB

  • memory/1496-273-0x0000000001F90000-0x0000000001FBE000-memory.dmp

    Filesize

    184KB

  • memory/1512-76-0x0000000000440000-0x000000000044C000-memory.dmp

    Filesize

    48KB

  • memory/1512-72-0x00000000002E0000-0x000000000030E000-memory.dmp

    Filesize

    184KB

  • memory/2056-104-0x0000000000390000-0x000000000039C000-memory.dmp

    Filesize

    48KB

  • memory/2056-108-0x0000000004CC0000-0x0000000004D72000-memory.dmp

    Filesize

    712KB

  • memory/2056-100-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/2476-268-0x000000001AE60000-0x000000001AF12000-memory.dmp

    Filesize

    712KB

  • memory/2704-213-0x00000000004C0000-0x0000000000558000-memory.dmp

    Filesize

    608KB

  • memory/2704-201-0x0000000000D90000-0x0000000000DB8000-memory.dmp

    Filesize

    160KB