Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 12:38

General

  • Target

    5c13e6.msi

  • Size

    2.9MB

  • MD5

    0220a7d4b82136a3c7973a627e4b5f50

  • SHA1

    0358023548ea3d3dd86de19abb7c2ddb15010736

  • SHA256

    0ef72d3570f61432dcb4f1afbb64c54775d497feaa127e5771dd550f245fd28e

  • SHA512

    b9522525ee505bada8fa4061722471abbba69940d44e9e244f492bbd4d9e2af4b5f3bb69ca397526f3283a73ec5e361106b8d202b4e9287c1b1670ea0027ca66

  • SSDEEP

    49152:N+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:N+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\5c13e6.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1728
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADC0A4FC15E15EB138A7F16371174E0F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE3FB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259449989 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1472
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE737.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259450676 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF867.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259455090 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1604
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI578.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259458429 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1640
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 99B60EDDDFD0425752CF81B2295E4589 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2748
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2736
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000NxmUvIAJ" /AgentId="1222d440-c864-4493-95ad-0df9a5d24d7a"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2244
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2612
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000003B4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1320
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:888
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 1222d440-c864-4493-95ad-0df9a5d24d7a "7ee791a1-3442-42c6-a00e-bb4a62808ab6" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000NxmUvIAJ
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e36e.rbs

    Filesize

    8KB

    MD5

    e58d55d5a8f7f615d66d2784e76b8ad3

    SHA1

    152ea17b15f7ab5d953f2cbbfbb078ed465eccb3

    SHA256

    d3374ace81256a45b03cb501e7f79ffb90b31eea2ae9b0a304034e5671f6b42a

    SHA512

    8deffeb68980dd8a078d4ea5f55e0679d60147dd0479e41bb60bc0885c85d724c8fc5b7c801b1c1144027f27e1896485addb025b6e85d67cf4f3dfb0dca7249f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    93461823ced984a55b9c35560ff59f02

    SHA1

    9d980bf7750ce0f0d3027f6379dc986f21dba300

    SHA256

    eb4969a40dfb67fc92d6dfa4d20d03c726d0318d989d3df46090926bcb925a21

    SHA512

    4f38673fff9312542bf153563d20f358c4fcd6a57dd43d624bb5cd810a59e6abc65beda44eca73d63379fa9946943d157f91fb83d04fd9956a86834306739401

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    225B

    MD5

    1014eeb64bf43fdcdc5de786bbc2f007

    SHA1

    86d159a14fc0252ae38585d01ee933ebfb2c7e98

    SHA256

    dd13c55661fd41cf54be047610a504a31096614cdadbced9a2bb119f12425556

    SHA512

    fac0be5f299eccad223eed868a5cb573f57793fb4d30ec291b52a62b7ed35470267ed5cfefd4c53b4e6e44d71e0447b12f68ba631aadb3be350fe59987354b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    4dffcaea598ca9a7ac90c4ac4d896fce

    SHA1

    fb2a9089cacc45b01b8ec8073ce56542c3372162

    SHA256

    d2493f2955428ce9d1e90ead6467e43f57ac55d5db6b61f3ce5276025b73f9b9

    SHA512

    8d172aa0e7d56bcc253d6491f2982630bddea87a289fb492e57db93efb56f06e35897228ce23264913522f8d6fe7390f934f7d96afd41369a892c00adf9521d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    e7be7791d0c1baf7ab7110f5deac570e

    SHA1

    5eba5cde83647884b6f570bd39bbf0810493652e

    SHA256

    78ccc2eb627dfdf47fd133265205a563aa1b2557c986398bcb8cdad68a6964e4

    SHA512

    fd74f32588706358c5d226e38fc02a3cfdd1d22085fc75e35659ab2dd412c984b5b77077b4986ab9a536699ddf8bace8cb0ee3719eb210d44aa8e983cd1f9e84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    5a9f34d0bd7074d978bca26efee83cea

    SHA1

    ea74177ba4a9b12793dbbb410ae50020cd7eacee

    SHA256

    266cf7f825c8eca0893d2b344853f0a4fe06a48bf76fd2ed9b5c4ccfe9ab69bd

    SHA512

    e220822af425d92a377c1ad644754809e31a3426040473f7fd9b8d99a6db8a0a3238193d38be912bfdacd231f8485161c5d64c41f4b3ae76beeec734a294f6be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    419f0d5991111916dbf713a490bfc3b0

    SHA1

    54221286fabefc8a964f4d9bd6344d1fbc4c90b5

    SHA256

    7c2064651c8897af653afb7a0f2201fa5bfd359607a532d1b27dc3043b0f37ea

    SHA512

    606ddc0cc09e2a3bf2550a37a92c3b2988a18bc52d5069be6f3718d375ad15921802f7f45c12493de06a24e7c1e495bed386eed46ddfc94283091017f5c28493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    dbb7ee4e7f9d095426f327b05e550b1f

    SHA1

    9bbc050d17211f98f6279cd2b6caa15343e29aee

    SHA256

    8bb4db041e1df98690f519a571eec2129f54ff4c62e2c6673fc0e0a4f2b3075b

    SHA512

    8f9f39f13cc1d7759b4a51d58128c82e1e0c2e891ec48993dad1d5366078c1b3b2cdc926d7dd06ed6c0f07a106b0b5461a780c9f1b495700ce471f65dbbaaddf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8fe1143f198244485867259059b54d3

    SHA1

    04fc788af448b15bbdfd4803897969c5e671f0ee

    SHA256

    c2781f5e83052ece976e786a62976da6c37a2417f4cae7986a714a3729f08406

    SHA512

    7e2e049a2b98281a7751e3370428814ebd1ae55f11c79e69b6deb11397ead954c8bb40a5edb9baa5695652c6680bc5508b3984914e96f5bda3697cba644ed56c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    804147954e76070f4e9c3477e2bf8a41

    SHA1

    164ba97aeafe6d431d90b479a66650e8581f13b7

    SHA256

    d59d0e53aa8e15d06257d5660777b7acbf0ef7d9eafbab84bdf0872357a72f16

    SHA512

    bac23be0364c10565367a86502fbd61dc882c93e1c371363db351215c1d69ed78c9930cd9e30a6e751e5438411e68fa24c11b7452b9757ff5a6ec95c079b332b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    007131ef8634a75f0fe40355c09b8b04

    SHA1

    0efa1630ad1d3a14eaf04b3b1b0baacb96d1f38c

    SHA256

    ad8a01599f5fba1738673fb3c5c6aed34d7d8df66d24979d898b76dba5b41397

    SHA512

    5bfaca3d7a7a5474a5cfda02f6ac4a8308858a5bf4f543fe8322d97cfdcbd4caa9727cbd821cc76f96f74581aebf3357e68631ed489bc483dccd2023d4b91919

  • C:\Users\Admin\AppData\Local\Temp\CabB8F5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBA9D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE3FB.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIE737.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIE737.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSIFA5C.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76e36c.msi

    Filesize

    2.9MB

    MD5

    0220a7d4b82136a3c7973a627e4b5f50

    SHA1

    0358023548ea3d3dd86de19abb7c2ddb15010736

    SHA256

    0ef72d3570f61432dcb4f1afbb64c54775d497feaa127e5771dd550f245fd28e

    SHA512

    b9522525ee505bada8fa4061722471abbba69940d44e9e244f492bbd4d9e2af4b5f3bb69ca397526f3283a73ec5e361106b8d202b4e9287c1b1670ea0027ca66

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89450b5e26eae1d8a2232a9b20edcceb

    SHA1

    1abb3aaef6515c336eecc9d44aa90f5accc09764

    SHA256

    ba531749b44f13d6186174af6a042fecc06498a3ce856a9f109cc5cf09543fbc

    SHA512

    a0eafe05cda7c372df838ba42788f8b8d012f2643241e5ebab9532046df6fe08a5bf1b2ac0fbb7167a3fa308d64a1d545947e656d86cc5029c17563071445aaa

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a4317973babf2dddb5f86b28b7d74a

    SHA1

    159c71eda2b5ad86b3ccda26d39dcc9befb31894

    SHA256

    c773f89085017962d0dc4a309d8f8c846227389e7f6e406dc63381710e2a1a62

    SHA512

    88e3f39658b2672e58f44ea4f5cefc18c06d708c87f1f9af336565e06af05b8f4d7397242e62a71dedc92f8768d8e52e3bec12c4c7bb44afc02a8fb77ff3eff9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39e6fc16fe5ca11c8d3e7f9db359c81c

    SHA1

    2ded07a34bbcb435999d41d801500fe82c7d4105

    SHA256

    4be2d44dea316d03ce5efbfe4d299b799bbd406348822dadd52450e133e8cde0

    SHA512

    de80f4a589a84d8f2d3e86553b74d2800f414048473f2c25c3576aa0c54f33c7b916458b23c13322cd7d6387b7e36aa761c79bab03128047440c822fe3c4b46e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d2932253ce760b78c804b923b7a3817

    SHA1

    4d2cca1bc163e0d18ff57199fd78783887b382a0

    SHA256

    5261a161ca0ffacd862bafae1b8408bc77ce4f418057bb047ea5549d78a333c4

    SHA512

    069c83818dd47405d5de5b169729a6683d5968d146276fc601617a33270b85939e9d48eee92d7a8ebc1b15626e271632900ec2bcf222b5e28ac21ecd96074723

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15d3dab9d8ebeee453f6dfcda423c092

    SHA1

    0a6d4246ec5bc125c9b1cd72add9b7e5fc24cf1e

    SHA256

    4b6933bfc6cf9f1a692b59426357c350bc2fd51fbe2be107ba873f958864ea2b

    SHA512

    03730817d9d9c9aa17364c901265aaee5082a6304c24e3d2d118348d0af0c845ac2dcb000eb3963afb3504cae6c62b0a0cd04b22092ba3cec03204b6071eb3ac

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb87045102b1bcded82d035beddaa013

    SHA1

    e239b635e9954efa9dead18a43dadfc571cf0612

    SHA256

    46cf0a529179bd18b412937ba9a577aee4c98a329408d1f4fbc703faa234db87

    SHA512

    0389c6af7e93d572962393da54d79000abe234d4d2a363dbbf7a3db7cbbeff0f745384c51b22bc7e48537fbf961b2baf67282e9d4f5eed610849d828ad7da9ac

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a102d07ef089b00c74f689ba88e0eb23

    SHA1

    a6bc2123eb10c24de25b0dd88f7b08f99f4d8a60

    SHA256

    ab2e2c48228e3a8a0452f1fe10b7baeb60d9c875f1faef4e2433c6ed4fb3f897

    SHA512

    2c4aa11ddf9018a316fd2159975e2989d6c598f189a39e56eb863f4336a37cfd9a0579528158a2feb4135933127d3fca52f8edce9e4f19ae6738192ee2c5e403

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88da566e30c251b7ca4b8cd91565d673

    SHA1

    2632fcb82d76bccb980a03e6a38c9a89caaeba9b

    SHA256

    944cfe06d38080c8e78a51ba24869b97b5875f5a1fe93e66f345f225443e1f0b

    SHA512

    bf0a65589bedcb4e9efd9f99de63bd7178dca6a51042b1d6f9b8c420eb0789713f542b22bbcad04b4231428b4324e162c59c183c43ba00ce4d0d7665dea5b4e4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ef8ab71dfe52e780907066c73020442

    SHA1

    0b4d31da0e8297a62613ef26d73978efc8a83f90

    SHA256

    f120496ecdffc17a4a69079d36616f5265fbae54eb32ae64cad384ac2d161a1f

    SHA512

    2c865b905e1f83e9f534862993fc79cdec55552cc4dca820961580ace58c7f246129c66a4be785c6d0dc19e508ce346f4c4f1163de1ad2b17a0c079fffb955cb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cec772c01d8e9dd08c4c9d49c49e526

    SHA1

    0c0be540d02d4342e5cc6705fee1cc3cafef40da

    SHA256

    4f4ed6cc45a801aa4882c9bf7ba33660bdc50dc7a24f8a32a31b5af7c1df6cb1

    SHA512

    3f607166da89ea4c7fe8f1f14b878e79f639ba4bcbd04ecab07c02d63389ba8d2857266af6e199c75b94c7326046de799212d794a9a4642cdc667e32e1ca885b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96ea5fdadc1350efd1f8cb0d8bff00bc

    SHA1

    7aabee43cb1a7c51eb280f54ac8c2f8fff063726

    SHA256

    43b1eabcb2284c675f5db7d6472e9eba2675be5bf74aa8aed2ca677614b01b02

    SHA512

    5277956076e9d784bbbe9534408c4f2667c556d31e744edef5a79c76c5f41aab5d053ee1ca5836ceaf45c37ae513f135bbc474391645e43ddf1320250b8c3165

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a42cae3d28b9e5099bc620a0a9f5c6cb

    SHA1

    7390c50497eca461eb78da0599e842bea74f4308

    SHA256

    15182b324f68aec704aac26f12d3bbf3d5ae44389b4baea1494d14d678f1fcc3

    SHA512

    ab4dc31f1d42f3562ccae5b0668871d533b263b9025a4f40bc27d5e472e78cec70c9665ed99e12815fc2dc745f7fe8ba585f29bd181e92921bc47d7fc8b80ac4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fd58d43035e455ed944582f94d7d1f6

    SHA1

    572b97ab9eb35feb9badf6e08f19574cc295afc4

    SHA256

    15190612c650d2d38c3cab75c2aec427dfc78a2c29eb39501145a1490a2817f6

    SHA512

    ab3d2f5978640fc83e670f0d2634e8b39c736520d02a8194f5f4b801de518b0556cf4cb5d355d1f986df23c8b0b21540cb30a66f77a7e353090f831d43afd3f7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3800b78bb79316ccc1bed6dead302ec

    SHA1

    0628102a365e76a5dccfcde3a57c0ab1ba34d907

    SHA256

    22bd570df4ef9379654da1457510889766d386cce4dee4308a3518cf2d6cb51c

    SHA512

    94e1292cfc901b713d34b341c9a863cf51fa2887f8ae2e361de4407357a1d96cbedb3d1519fce7b7e9fb0a6bff0be24cd5bd6050eb54c5567556bd5e835426bc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    72de123a1ac702d20bab1d2e92b05044

    SHA1

    3b8a74ce46a17a8dde570dec25978cc675f6dd26

    SHA256

    f297ff1df6b3868eba30e332842df33ad6e139e54382b3f139be61e1b5038282

    SHA512

    5ac32424f16e21f1ae0d43b64df4ec0b0cc05533569ee390e8a8eeffc5d1463915e047b759ebc5048a798c672c6dbc310392b968f59f7089e43579bca219d69c

  • C:\Windows\Temp\Cab1390.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar13A3.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIE3FB.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIE3FB.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/1472-76-0x0000000000360000-0x000000000036C000-memory.dmp

    Filesize

    48KB

  • memory/1472-72-0x00000000002B0000-0x00000000002DE000-memory.dmp

    Filesize

    184KB

  • memory/1640-309-0x0000000000470000-0x000000000047C000-memory.dmp

    Filesize

    48KB

  • memory/1640-313-0x0000000004870000-0x0000000004922000-memory.dmp

    Filesize

    712KB

  • memory/1640-305-0x0000000000350000-0x000000000037E000-memory.dmp

    Filesize

    184KB

  • memory/1744-1256-0x0000000000140000-0x0000000000170000-memory.dmp

    Filesize

    192KB

  • memory/1744-1259-0x0000000000670000-0x0000000000720000-memory.dmp

    Filesize

    704KB

  • memory/1744-1260-0x00000000003A0000-0x00000000003BC000-memory.dmp

    Filesize

    112KB

  • memory/2024-101-0x0000000000890000-0x00000000008BE000-memory.dmp

    Filesize

    184KB

  • memory/2024-109-0x0000000004CF0000-0x0000000004DA2000-memory.dmp

    Filesize

    712KB

  • memory/2024-105-0x00000000008E0000-0x00000000008EC000-memory.dmp

    Filesize

    48KB

  • memory/2244-245-0x00000000006D0000-0x0000000000768000-memory.dmp

    Filesize

    608KB

  • memory/2244-233-0x0000000000320000-0x0000000000348000-memory.dmp

    Filesize

    160KB

  • memory/3024-1087-0x0000000000D80000-0x0000000000DB8000-memory.dmp

    Filesize

    224KB

  • memory/3024-294-0x000000001A820000-0x000000001A8D2000-memory.dmp

    Filesize

    712KB