Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 03:13

General

  • Target

    NF---710.msi

  • Size

    2.9MB

  • MD5

    98498752125993a3a0a6b02cfdd3d28e

  • SHA1

    7d1747d94950df564da98ef4dae8128fb1399a7a

  • SHA256

    30bfe9326b0554c6cd73359084ba1218d26e587542c1e2216e201b4c62a7fb71

  • SHA512

    4e271945c4ee0d65855d03a0ad5437f05e44fc00dedf2a9c38e2e534ac45253aa0b2ad6e51d6e3d13df9f7250714ef1b7be0e898fef9e8ec2b17940ac16c5a6b

  • SSDEEP

    49152:W+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:W+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\NF---710.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2208
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 9617DF0E9FD9DED0CEBAFCA7C9245F8F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI38C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259523871 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2168
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB0B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259525400 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1976
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI7775.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259553293 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1672
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8E37.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259559237 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1164
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D0C634F1B203A8AD24223C815E5299B1 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1856
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2628
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="0013z00002SMHs1AAH" /AgentId="c3412bdc-c916-417a-bedc-e1aa767323e2"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2908
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2772
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E0" "000000000000005C"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2996
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2244
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" c3412bdc-c916-417a-bedc-e1aa767323e2 "f63b4a3e-080b-46a7-b535-bb3180320df6" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 0013z00002SMHs1AAH
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f780263.rbs

    Filesize

    8KB

    MD5

    51c957d2fdc2b013b5fe4bc0715cd4a7

    SHA1

    61a8f6b8f37c145882e07a3711064c2ddf98dca5

    SHA256

    7a93366d46181d5c2cf315c1ba144537a593fe171229350bcdb04e449fa54432

    SHA512

    e5d81a964f51f5e8ca3679be921000a01f6c2ec3df801e019f8d19b2dd94f573b48d727fb8904294fc9889e470a55e93e439f5c200f667ec01656b09ca5f5904

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    6b3d4ed4b3e2c7654ff57951e1e7df9d

    SHA1

    6ecba57de28a6fcee474f03d10131cc553dda2a4

    SHA256

    95206e82fd7ad222f7fbb4a7e9ac60bf11340f9ad24050417ce39565fde21872

    SHA512

    03c27622be0f4c1deaca3bc447891fdf534fbc0de0ed9898c3d10ab7f7613cc08cd3dfc292da56c9f45f252d30d978955c7c65b50e3078631df42f4cc04c3ff3

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    219B

    MD5

    715050b43eaf85c322e8f74c6c3f319c

    SHA1

    7b7de3877461d6864b600fcb9a9ffab2d0ceb385

    SHA256

    c69fa53f7699e7ba7e871e70c491d4326abf533470b0c87434743e8530135516

    SHA512

    f2562e883a40991a110bda9188b155a25bc17c865789a7b1173c506bbba02a51635d72164bc792a89d99e1490f2ffd366a66d0c60f77d5eccd76edbca5643ac8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    9b211057a04e0b18bf0040b5892ab8c8

    SHA1

    67bdb1f2ee9f3d27f2d1c4867b8d9b99ecfa7399

    SHA256

    8a9bb90e00e3cbc4b7978fedc7bd2313e5068924e0081205194d48a0fc2d6dc9

    SHA512

    b51d11824321cc0e3a876f1fa7923d0bb4d43a9df95bc4de71c66309aca24fd175b8b67738b3cf0e7c5a590a8639de4ebb80b7138ec7aa960569b64da4ab007d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    e7be7791d0c1baf7ab7110f5deac570e

    SHA1

    5eba5cde83647884b6f570bd39bbf0810493652e

    SHA256

    78ccc2eb627dfdf47fd133265205a563aa1b2557c986398bcb8cdad68a6964e4

    SHA512

    fd74f32588706358c5d226e38fc02a3cfdd1d22085fc75e35659ab2dd412c984b5b77077b4986ab9a536699ddf8bace8cb0ee3719eb210d44aa8e983cd1f9e84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    5a9f34d0bd7074d978bca26efee83cea

    SHA1

    ea74177ba4a9b12793dbbb410ae50020cd7eacee

    SHA256

    266cf7f825c8eca0893d2b344853f0a4fe06a48bf76fd2ed9b5c4ccfe9ab69bd

    SHA512

    e220822af425d92a377c1ad644754809e31a3426040473f7fd9b8d99a6db8a0a3238193d38be912bfdacd231f8485161c5d64c41f4b3ae76beeec734a294f6be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    f7616c281bb73b80cf063602405cbadf

    SHA1

    860c1e6a95f39d20db846a21eb4d81d97211a787

    SHA256

    fc851ca9e02b92d21b67b2b21df60fccc9c235f192b026fddba474b1d57ebf0e

    SHA512

    bd9e18da33ad6f63b719f1d2dd300a5c092060c67ae8807cfc0cabec992d436cf37eb5adac64c181af85d4fd96b3b674f6e6ec578b8871ca2afdff347db75260

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    110b869ad33c643fdb838998fc42b90c

    SHA1

    b0c712a8ca318cda52b3ab2f18450cba395f98e9

    SHA256

    fde83736f4dca104d3b287aa5c1e3041ac8a37d0a23490534a691afe81a5615a

    SHA512

    4e4513bfff28931f954f4dc1d696cf94229e76f1e453aa1d155a3c26aaffc6dd2dd36dcef4ec8bd5499432c34417b2c75d426e3845518df458f3fc9041980686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a4748656382ad1f5eb58b5bb6d2ee96

    SHA1

    44e81d259950ffb8b8622ecac796040a1d4f3279

    SHA256

    035211d786ec3a9b9925158f9a2ba0ef3879e4535ce882574bd4bada3d64ade7

    SHA512

    668947e633f08d482ea58e8167b30075aeb95acf5c83d4f3c800b92938c8aa2bf811bff6d61925ac372ad12d52948cb3fac1e6e090d9a54ecb7acde1e7b255bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    5cafc31de9eff2ed68098dd7138270ca

    SHA1

    79f2316cbc5bf1bfe355af185ca32d82435f2830

    SHA256

    9112ec93e4ee370a39a15d339aa8ae1f489401eeb42120b57e7e516c7a3c78d6

    SHA512

    0340f43d3930407922b49b1a8e266ab1f9f47caa873441342ddd1bbcded2702a491b6d9830a9742eec0c20c48797fc6a1aea3c9d2d24765617553e5e3bda6ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    214d885a5a35c5b214e17384a9dca768

    SHA1

    6d02df2db0b5e33f3b49a60bc096882d5b4aab17

    SHA256

    d41b311fe7657382f378d5f560bff0bd29ec0c277a63e1b7dd76639af2a510bf

    SHA512

    7126f46940b696d598dc8aabc7d2299007c6288c91b2858aa75f605a93acfa844f6eff0250d76d05eb0b5352e752a057a271b3d89b72bd183dad6e63df459557

  • C:\Users\Admin\AppData\Local\Temp\Cab8845.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA4AD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI38C.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI7B3E.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIB0B.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\f780261.msi

    Filesize

    2.9MB

    MD5

    98498752125993a3a0a6b02cfdd3d28e

    SHA1

    7d1747d94950df564da98ef4dae8128fb1399a7a

    SHA256

    30bfe9326b0554c6cd73359084ba1218d26e587542c1e2216e201b4c62a7fb71

    SHA512

    4e271945c4ee0d65855d03a0ad5437f05e44fc00dedf2a9c38e2e534ac45253aa0b2ad6e51d6e3d13df9f7250714ef1b7be0e898fef9e8ec2b17940ac16c5a6b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ef76632cb280c588c4b5861d948869e

    SHA1

    74b52ea275924c648c436576cfd1fc0106dd4950

    SHA256

    a8cb8909dd18ab4a8f94dc82827b036acf4853d555a1c8242555f5e5ba4a2c3c

    SHA512

    3decab406be8aec2a68931e218023a3696fbc8aeff5553a2dcb0bbc477733c405b2951585a1026b0720e327e972f824cb08c4d2d3d777de094a555ae83dd8f53

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a975619fdc788f8678e8e222e7932b81

    SHA1

    32b976e3962fea6ef5d4d2a5724f55a6d6276a99

    SHA256

    4aa74fc0420d09825d8a93f66ab55c99b3921a3aaca394a6a38bc0ebabb3ec9f

    SHA512

    2032659f4fc418e7b0d33e928f226f7edc19172f6a0e84aa2332ceb8343e1397c61b37818deb60eca4414431a0ab79138add84e67027d0ad2249de2428699510

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19286b51c14a7fba7c4e37f2cd3f37ac

    SHA1

    a6fbf655cf5a2d4abe54a2afadc00a6f5cea98c2

    SHA256

    56d2af718ba1b3fa50b3c3acde819f5a12184b33452867dc9615a29ffea84647

    SHA512

    ea812797514f5c6d213922cc5613f22b5f3c9efffe0cd0d85b686d57effae655ef8b690fd13586b997e0e022acf9e22bb33a8bd28ab57ecc6befdb1956d7e685

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c5bc599058703f2f86e858af6f06aed

    SHA1

    b5c5cdaaee8313e36583e474ed212738ced74c91

    SHA256

    4edf8705c58f78c7b69f1d4d12d61b9e2a9e1d9f2ac2d8aa86d3dbed9f17a471

    SHA512

    70a47a5ce9baf65b951a783f0cf02223697f151aa7f949932301b79d09294ec06dcafe0ea975647c5a83b26ac1268bbf36d94d02530270ec1bcff7e1b2bf2274

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42f09349c87b25b5681d74130b1280cc

    SHA1

    d91c73bbdfa100d4917fc03c4baf9ef90f1a8270

    SHA256

    c097f86ff6a8c135f5faf38dfe5963bdbcd17e29a44feea9b4fa880273100b06

    SHA512

    0b5e99661767ab53c312e79aca3a892842714931178c019d92fa10c8d96e4047425919b8492d7415a41fac39628fc50a2d3e5b722ea5dfead14e95e0cad07ec3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4315489c3b809dfa911fc0759ca631b

    SHA1

    bb99f8c6f4e0f5e7576c69205dee160f433e322c

    SHA256

    77a48fe19a283c6101081d0947ed80f74700708d15f5aeadfc294341cf1f1773

    SHA512

    3d6c7f972a9395b7c173697b12bb97941611ab998caea7f423b5ad95229ed430cb58c49ef65eb211c8d95355160e01599b3d5e22a4a5a24fc76ff411c4d74340

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8b25b21f4182da63e7906feffe261c5

    SHA1

    c7257eb7115f50599526bc3592c4533de960500e

    SHA256

    d4995b77df60e26dd76e46623d99e4eb1e1de6624cf1057105d9a44daaff331e

    SHA512

    358da92cf900ff343b26332c0001e99b8a29a33d1d1179555abb1170839385ea19f78c0b9c3db7aeee347bba7beb98e7a7b66fed53f993063a40d89dcaa27316

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b9c500ff11b66e861e5335b66a6f81

    SHA1

    f03ef2e6ddd72f486003f22e8447021e26d7ad3d

    SHA256

    16fc7e1723c84a9811adc3d01442b2097552ac41d77b43d314be2940d9c6c0dd

    SHA512

    55ace90a4c55c2064a596803718cc434b4419aa1abeb4df02ae6237c088ae2361870e77e470b78174425581c87296dcafe208614e7fd7d383d5a87d02aa31cd6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9bf2a87279afdc4035716b35891c0d3

    SHA1

    8e74b09e1f18302f5e31a09743e25e0e610d7f71

    SHA256

    d3e682eed5c3d92560487f3f574e2181f7945d0676239b963395227b6c9d975c

    SHA512

    01c10b13cffd3d255391e542518e6f06470eddd75c92169a609520b2919f5384efdb9524b7ace1719c8faa53d785a9226b8a795c25c0da0240178321e804707e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27aa35ea1ee5ed22e530fe3795716805

    SHA1

    e2f782cd42c04827b9d1ae33f1f45e47b47b66ef

    SHA256

    09848774f517dd22d7c598d2a5f53a054487fb5815990164515016a2697a353d

    SHA512

    03e3588048967508cb79081d9fc99375424cee649b46b0a1d67981071044f19800bb4653e4aba738953f911d616e4ba69248d5e97d493693cae544dc4b58541c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc5cc7eefae398ee66f498752349b8be

    SHA1

    35c2c11b5d69299392e105e9f8a29d356cbd0724

    SHA256

    61a318ddd4dcb8765a448b444a9e786c31e9bc6eff55c304804118d225d6656a

    SHA512

    2776ed5aa40fcd284d47439dfb63b182539c249151d4b8d14b7c2e04eeb499f3cda35109819b44bb028fe89593ffb17f5f6a6c9e744da93e04b16328703b19bf

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec07ba8390a4987b14793bd85bd4ee72

    SHA1

    97d507c05d3c5649605dc1fb7b369e1b5e18b91a

    SHA256

    8ad153336a78a898382382ab5246fe010bec3f9b959e9507d28c48efd29a1e0b

    SHA512

    4a7db12098c325935f7309593899aa1c3e33956e7ed7fe2955633c31b1160a4a4ede106983024942f3a2b40a33b0af731aecaba7af78f347cc516d0ec87c36d7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14afdb84f9a118336e532eb161073690

    SHA1

    8ae7eb3c00624042995cca6e75f1d304e052e86a

    SHA256

    64fdc14d996bed5707d4d8441febadb7fcc6d8dae4a66f0cd2679a3bdefa77a3

    SHA512

    3ac909392dc10a6cfaf788547c5a1bd93a5799a717572aca24dd34d2e459232848bfd425707b9e45505e30a722b349778fb12896ef3636b96ba9acb0779eabb7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b176a23ef4627bf6da39603a9ffd984

    SHA1

    0a06b97b24e4b622997b820dffcab7695b101d2c

    SHA256

    ffd43f7d2d1b92d7e0bfbd6479bde1b061de5fdba8b68a558a4ffd4d2d8451c7

    SHA512

    3246454aa45d090623435d7dcf0a17b237f5ace916405c77f8d613d55c1c7db9b870156177ff7b40548e0b90944c135c7b75b9a04c332a01af5f0aab65cd595e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    fe24964cbb62aaad577502841882dfe7

    SHA1

    f473b0faf2cfab4d073578d3d4ff530fd5c639b1

    SHA256

    5dce0734a6f8dbe4d88c6ec5d79612a1855f07635a24209f4c46f1289340327f

    SHA512

    a2b59b4cf77cd21051ee4e21c6ea887dd7bb0a83351b7cfc06563d25ce5ab4271f04bcd7a1244ffea59169e978e2f27db02d60f8567aabc7e38a992624a02448

  • C:\Windows\Temp\Cab9FB9.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar9FCB.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI38C.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI38C.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIB0B.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/1060-1235-0x00000000001A0000-0x00000000001BC000-memory.dmp

    Filesize

    112KB

  • memory/1060-1218-0x0000000000050000-0x0000000000080000-memory.dmp

    Filesize

    192KB

  • memory/1060-1222-0x0000000019290000-0x0000000019340000-memory.dmp

    Filesize

    704KB

  • memory/1164-264-0x0000000000880000-0x000000000088C000-memory.dmp

    Filesize

    48KB

  • memory/1164-268-0x0000000004890000-0x0000000004942000-memory.dmp

    Filesize

    712KB

  • memory/1164-260-0x0000000000850000-0x000000000087E000-memory.dmp

    Filesize

    184KB

  • memory/1976-110-0x00000000048A0000-0x0000000004952000-memory.dmp

    Filesize

    712KB

  • memory/1976-106-0x0000000001ED0000-0x0000000001EDC000-memory.dmp

    Filesize

    48KB

  • memory/1976-102-0x0000000001DF0000-0x0000000001E1E000-memory.dmp

    Filesize

    184KB

  • memory/2156-1002-0x00000000011E0000-0x0000000001218000-memory.dmp

    Filesize

    224KB

  • memory/2156-242-0x000000001A260000-0x000000001A312000-memory.dmp

    Filesize

    712KB

  • memory/2168-77-0x0000000001D90000-0x0000000001D9C000-memory.dmp

    Filesize

    48KB

  • memory/2168-73-0x0000000001F30000-0x0000000001F5E000-memory.dmp

    Filesize

    184KB

  • memory/2908-194-0x0000000000DE0000-0x0000000000E78000-memory.dmp

    Filesize

    608KB

  • memory/2908-182-0x0000000001230000-0x0000000001258000-memory.dmp

    Filesize

    160KB