Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 01:18

General

  • Target

    setup.msi

  • Size

    2.9MB

  • MD5

    18a5772db56b3349462519635c4f8e38

  • SHA1

    4a16a0309ff2ea5f3778bd7cb6e28d21704948a4

  • SHA256

    e086b1ca737d20deaef230f04f50f341eaa219807e4bb9255f3cf2ed2da7ed6a

  • SHA512

    102cfb228335535ed1ad6e9a36b73df337f66e9197efe96967ecd5c3980fa237d3542f5e1fbdc52126976043345e62174df4724cbac93dabcb1d6c9cd89393bc

  • SSDEEP

    49152:5+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:5+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2220
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8942C15CA4DB86D9E98C24FC4D225334
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI2D59.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259534604 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1444
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI343D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259535977 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2108
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI50A4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259543247 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:932
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI6F71.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259551125 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1512
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5C131DD2781B1DFA1D0854315BA17C9 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2864
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2968
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000NvnzdIAB" /AgentId="bb41a423-a2a5-4512-9a10-b09d1ad82103"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2240
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2668
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004DC" "000000000000059C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2948
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f782bd3.rbs

    Filesize

    8KB

    MD5

    f747840d78698d501df2b4c9f6b9e9da

    SHA1

    84901770861967eab851dbb63ec3f2ffed37e1f6

    SHA256

    9943dda1059bfceb3f6399e678ea30cd0e013c33aff59571245af874bfe31b7d

    SHA512

    742b50d85ea474b2f9db23e83cc16087ec6d8b4d1ee0cc19477a5373035e6f4a00ce89864178f1bddfca32a788aed879d88bcd0ca0c175ec302401045d879335

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    210B

    MD5

    20955c718b096826ff25a8ed8d67e7e4

    SHA1

    3548c7b19fd8a017dc80dea7284fa6dcd5946c93

    SHA256

    7d9f04d30fd86143d6d3435b0c205453a33140917c2fabb22e1974e2a9746904

    SHA512

    f2b4dcb57978ee755c5fb83c68acdb317f1152e75733302e0b165c52a50b5772c5ee7df6d8a3dfd05187f037a8ad8023e9fecdcfec3db16063ae204875d2059f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    f5e4c751668a377a295effbcc236323e

    SHA1

    a4377a42f0d65b1a05d6e9ea6ee96e9f4aa53712

    SHA256

    125c37f2e969506980f0aaea906f07a672255ad8b6be39c863992c36963cdaca

    SHA512

    f6a7c92040082f5ce73baa144c6f227bd55fdca48ff26a71580a70d11e09576bfe81e3704630299e78fb0d41488cdfcef2bbaebb95956b783fa7b8961917705c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    8867806bfaada61493bca4533c5dded6

    SHA1

    071c4a1b768636ddb18fe71705775dc5a4fcbb2f

    SHA256

    eff1fef87bc420c5ea6f980b4df717d2fdcc792a6643d9045de4410249faac6c

    SHA512

    b747232676a278f04316de07b44e2481b65740944301c616dd50d284a2560db0cb8a5e76c8aff547b33c285e5e21dfc2b33b9d462b53a7c90a84ea872d8b79ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    3ceba5b1867ba1c8854fc5c9f17a6d99

    SHA1

    c8fb2683eaa00e5535339ea3e29770866fc58323

    SHA256

    47560b04ddc4b6f90d718053359f8b64d114613a670f45d2f67cc0286e926949

    SHA512

    972e620010d687e0400ad604e2bd20ba5d3c11524cf5c3485e69b2612e53953775cec1fb068444c78c2a432488749e7a826bbb202d5ff5b50875362e21e6359c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    807ddb7d2224d52f753db3a714e2190c

    SHA1

    709af496db190891f2a3872c50e853da14fdae2b

    SHA256

    38347c9b5a709dd2ae2c7bcf2a98d87517bf8256bad9a08b1c969c375c33b794

    SHA512

    6583f9afe8272115912ca1250aaea82d4d4b33959f74f0276ff198840562f816dbaeffd8d7672823fe590f602463d0b1e35cb06fae4de84556ab5cc146a11ccf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    3a45fb9cbef1057ea2331f95b969f8f6

    SHA1

    28c236176f084807d52a3079bc7474614b4dcff2

    SHA256

    159e6ccb70ef8c8268ed7568d55b69d2a6ad1cb809f503864e7fbc858c0e969f

    SHA512

    88d3672754dc1df87aaccdc69b4242d70f6e2769fc9550228dd4db120babb1fc4f5a1bcc4b701997c270f915d538d9d8d85632f63ce98020c439e0fbeb0334b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8de9db4582585dad34c3caa5e96ab8b2

    SHA1

    ff9b93a10a33478a66599dcba512afc004a28259

    SHA256

    c01aa085d3dc38a946664d9f2ec66ab65cca40272096797de631a99c844517c0

    SHA512

    5a3c733d5656c3e9c82d8635d319dbf1f1b6fe257d725b4b243ce62c1695a496ec33206af8adf0d249c06e488bfe429557695951d1241021e5843b6ce72711f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1932da9f75b0e01caf89fd482c5854eb

    SHA1

    0001444a9b78ff5abdc121651c1d9f0423a38905

    SHA256

    34d2fc720c9f2c3a1703b4d773a737feeb42578e83f1c2e32616bcda40d58f2a

    SHA512

    261b78cdaa573fc1d8be6f4136b51910fbc9229a2201991f940579fb930c8e1df5d82fdac652494dbef8e5bfd997f68cc452cddbfae70c83ef8b5893046a7e59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    6d77e723228b8cd3a1b604777e708925

    SHA1

    10df4746910572daf13b9c38629bfa95449acd7b

    SHA256

    1bea1de6035115ed228268805384e570ce6e4046b1b360152c5efd00a8fe7c3c

    SHA512

    c4a1e5c85a29e383763279f11344b892d668bb6e8d27a854c273412b6f05e56a60b34b421414d3aeb383c526771edf96be7b13f4189fbe65c88404053777c919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    305f163bb98785a933e19cc90f3fe169

    SHA1

    59f6a00cc97f3c182ebaa0791cac796ca16e4809

    SHA256

    981feaf8a8a886bb0c8300a0a057ba0f463dc2b994b2bf9b10fc3e959b3d1325

    SHA512

    dc014e1640800520785e9b48e9f5126b28431a28bf25bc641be64fee39d49946e996b98561fb568e5752707c2cfb887860907c7a1cde97155af02735e013aef3

  • C:\Users\Admin\AppData\Local\Temp\CabC7D3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCAF2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI2D59.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI343D.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI573B.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f782bd1.msi

    Filesize

    2.9MB

    MD5

    18a5772db56b3349462519635c4f8e38

    SHA1

    4a16a0309ff2ea5f3778bd7cb6e28d21704948a4

    SHA256

    e086b1ca737d20deaef230f04f50f341eaa219807e4bb9255f3cf2ed2da7ed6a

    SHA512

    102cfb228335535ed1ad6e9a36b73df337f66e9197efe96967ecd5c3980fa237d3542f5e1fbdc52126976043345e62174df4724cbac93dabcb1d6c9cd89393bc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dea02735ff62fec489c50b82967a50c6

    SHA1

    115771afa12679475dd3efee643000137d6eb234

    SHA256

    f30a8042a9283288a9c4f18dff487046b86f57d15770a1cfa7f303485e6107cf

    SHA512

    3e4a8f25b2ec4ff62f13b0504a00b17147d1854a5134662755c56d573964cb4c69ca27b8789a0a6b15140c26a474dfb75e620791497b0d6e539e31335bbba83b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c88bce3410afc5d254b00e925fb37099

    SHA1

    e9b7c4210e345b270b54d61b05b1b4b902b19f72

    SHA256

    e243cbc1dd844042485ee20044894692aff9f7a5e76fc08f903db7b9c706372e

    SHA512

    74aaa44e5a5240fca264ae0317a8f1c4140566adc87cf453a7b81d7037542d53a6399b7cb4c2c0ad1a26905e814632a104ad6c5de1c5d962b94908e2014d4b28

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8aa6d962d61c2c69aa824d92aca900bd

    SHA1

    7ff904f0d19d19eb0a086e1431e263c399af2312

    SHA256

    ff42eeb46b5e182532ce8105774aecb8fc028a0f83c37d8cc9d2a2110c257a30

    SHA512

    0659f478dc051be1ee2e2467c04aa22ef0c63ed1c22385e4059a11412ed23678db2c73c8570a893b8339c4bf9a60c91fa91cb7d68cf942e0fef40bf9bf40550f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bebc68b02f221885813a6c9c87562060

    SHA1

    9f2417a1e2abb4fa4253f62b7b9f1821cb8d3a6d

    SHA256

    c151218f8cbbc7fa906f9c23fca21027ac80cfe73a54fd0931ac83df48005a67

    SHA512

    a7ee9a11127c46b9496a4e05ad2ae842a0108dd360126f07a22baa22323acec777500cfc7deb0e7898ea1e7d12169e682dbb03a1df242df82f03fd6d6db2174c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2c43ef4d8658407ebd99b116e9e449b

    SHA1

    75e48ee6f29e6a45803f10425cc19b3780dfb7b1

    SHA256

    1f58ddd43df50ea9fe9e4d35968343cd4ba47ac199e72c80859e80cb201e052d

    SHA512

    69a4d7f4b72ebceda4a652b1b4c16d5d8c9d7815c8e626df234a844c636bb843469017ba78862d69475f2a10c7370e9d845b9c754bdbe691fc52f46b362ce1d9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25a9aa8d609f030310909d615ba6a899

    SHA1

    1b12d835d4382b44623e226fca0121ce49a5f855

    SHA256

    9d605e5743adc2f385e6034cd0253cb0722b9fe7051d9da9c3e50ace1e90bc34

    SHA512

    6ea755970bd44eced9ee26a1a245567fc47cb9a8281244dab8034de380cd89244f0d235c52f6265d5ba102624ea1428d8d7e292ed04e3beb0ed35666a427bd68

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72c189cf44f8ab1a13cd67465b62b1fd

    SHA1

    3c1986253498bf0b27bb15e345e6df77a93f1d93

    SHA256

    90dac9e015494e2601391266f81aaa8ce318724224b06b363571b553bfc2f745

    SHA512

    677c68b6d1ea03d0c78db5a71720621e3d3a1d4c16dc6072e627bd618f03f13add37f485cb293a0e7def60895bba4e00b397af2c5c592460e18c56649f5e9629

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5e79b55768a3c8e62e5594704aff69a

    SHA1

    a94e6f9b9e731158154bf81158abb45b9c5ff886

    SHA256

    7fd850ca9e3e3c9ced22bc221302ba6870f6e2a45e88be0c3afa4a5ffbbee8fd

    SHA512

    eac3e6225c0e9ff17e988d1338bd58fd29b1628d50030e1d0e9c7e596268a6c4e3d034cdfebd93f5fa37f7b844f27c77bf2a9c623cc1d5ad764c44d7e8205f8f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d12e59b1186ecfcb5beac625a256053c

    SHA1

    17223533686b14b1e5459e0a7e550042c2010e03

    SHA256

    338d2a9e88fe5a19112e4968037302d706f9843a5ede0b209989d2b7698a578d

    SHA512

    b319da7082d23efe2d2b6f71fee4d2f0d65f0446b658d2f0e729b645c8b14a6804811619a8f1ca7f2fdc24eda43683ddc10cebdbbf2eb30fb396ce2e32d7eb27

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4bf445f4586b890b3a3128897039e61

    SHA1

    7a3e8a725d03089c55bf64e358059e8ea74fb84c

    SHA256

    b847de063eace2b8f707babdee07de6c93ccbb4ec533ea0afb658ba4b638f6fc

    SHA512

    8c5080f3cf3b27f8b21bbdd55c9d51dd1cbc957d254fe454806ae4ad32ea3abae099a6823f724f1f7ff47ff03cc004f3405423e12f1cc91e49c614e022bdc467

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c6b9651cb88294af85410da4d47b262b

    SHA1

    fe416ad517ef0ab5f41b711793c9c00f6d6781c1

    SHA256

    5ca32d6852fbbf10503a4612a2514b5e3b1997be9c8567901f44cd0277923366

    SHA512

    b971621bc78a65359ca0fb78fa4d0ef426aa4fe7768aa3e9c9e1396671736349605b8b9b9d39d5f9d247bb34168aceb714d7bf6b1969904ec70fdc2c9367f985

  • C:\Windows\Temp\Cab81AE.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar81D0.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI2D59.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI2D59.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI343D.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/832-306-0x000000001A790000-0x000000001A842000-memory.dmp

    Filesize

    712KB

  • memory/1444-76-0x0000000000430000-0x000000000043C000-memory.dmp

    Filesize

    48KB

  • memory/1444-72-0x0000000000370000-0x000000000039E000-memory.dmp

    Filesize

    184KB

  • memory/1512-321-0x0000000000480000-0x000000000048C000-memory.dmp

    Filesize

    48KB

  • memory/1512-317-0x0000000000450000-0x000000000047E000-memory.dmp

    Filesize

    184KB

  • memory/1512-325-0x00000000048D0000-0x0000000004982000-memory.dmp

    Filesize

    712KB

  • memory/2108-105-0x00000000009B0000-0x00000000009BC000-memory.dmp

    Filesize

    48KB

  • memory/2108-101-0x0000000000980000-0x00000000009AE000-memory.dmp

    Filesize

    184KB

  • memory/2108-109-0x0000000004550000-0x0000000004602000-memory.dmp

    Filesize

    712KB

  • memory/2240-245-0x0000000000270000-0x0000000000298000-memory.dmp

    Filesize

    160KB

  • memory/2240-257-0x0000000000500000-0x0000000000598000-memory.dmp

    Filesize

    608KB