Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 17:24

General

  • Target

    fc706bcf6b6c9c787c723bd168c74ca7ebc228962f78b6f57225b7a45c2dc5e7.msi

  • Size

    2.9MB

  • MD5

    61b54e1bd417282f38e537804fd1d1db

  • SHA1

    e74d97884bc23404c5860e5f58b5d57242c9c4bc

  • SHA256

    fc706bcf6b6c9c787c723bd168c74ca7ebc228962f78b6f57225b7a45c2dc5e7

  • SHA512

    6d6118c470549949a32885a749e38085f619ae64d68b473ec9bcb13007d25606df78ef67072bad46606fc90fe5c89488b52df64c6401656fac4f432e51b4217b

  • SSDEEP

    49152:j+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:j+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fc706bcf6b6c9c787c723bd168c74ca7ebc228962f78b6f57225b7a45c2dc5e7.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2016
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A7AD5C1B5FDEDBD7A122765AB60386DF
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA40.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259459864 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1780
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSICEF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259460379 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI28C9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259467524 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1864
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI331D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259470113 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1008
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5609A899E1C1050F7BD4C9242489AD57 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2528
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2504
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000N8afVIAR" /AgentId="983a7076-1d35-474f-bd48-1b098363332d"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:696
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2568
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E4" "00000000000005D4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1112
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2720
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 983a7076-1d35-474f-bd48-1b098363332d "61d62ddb-0382-40c5-8b3a-1258135f1789" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000N8afVIAR
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7709a4.rbs

    Filesize

    8KB

    MD5

    abc78ade7a295d525859a882b0f31a3f

    SHA1

    2b92639c3a3519fad62a126e9b0e3e57f6fccafa

    SHA256

    5c0be92e88f18821ade33cecfbfa9db8a1bc2422e634201bd58d26ff541059df

    SHA512

    1a2e8fbd83f94091a407311b7681628337d9b6b7bd27790a7c997b2f1ce4813df152507b60d61d11c3f66df8290fafef7e63e56e83106ef7a1a5f49da957e75a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    e2a9291940753244c88cb68d28612996

    SHA1

    bad8529a85c32e5c26c907cfb2fb0da8461407ae

    SHA256

    6565e67d5db582b3de0b266eb59a8acec7cdf9943c020cb6879833d8bd784378

    SHA512

    f07669a3939e3e6b5a4d90c3a5b09ca2448e8e43af23c08f7a8621817a49f7b0f5956d0539333a6df334cc3e517255242e572eaef02a7bbf4bc141a438bf9eb9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    c100ac0f3a560c91922d3acf51cdf2f1

    SHA1

    cb34bf9e78418bbb4176f240d1364a5567c871fa

    SHA256

    3db047065226db222e4a871e36d37b75ae6b2759e9a0242078138b8145b97e65

    SHA512

    587157dc81d151123daebbe0ae0f3a6406140e95a1e7c24d479c61534f5d35d10199be455056d69cf9be4f65042ba7826392210239b717385cc877cdf5b7bef2

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    222B

    MD5

    9b5b438e8f6f7ce66900352dfd23d2c1

    SHA1

    3ed0c597122a4ab8c083acb1e487d12f6680dbf0

    SHA256

    fb2c6d029b7c96d9dd4c04bddca9cb65155ca1e3bd7cb429f97e8835ca1e6192

    SHA512

    714ab510323f650a0c64343778308c78cf020f56747c8e4be63a7bafe44c79cdf3978f3659b22db8fcd51f17d7df4543535e21fb0c370440e17b186a8a41f1a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    f3c6f090f58cee21def3cd3334cfa542

    SHA1

    d6fc5e0ee2c3a5433a5d8bf1c76ba14c26fac55f

    SHA256

    9e2ebb439e6a8e0bb85607310b7f5d6f296db6d569298ce00863d33586c610df

    SHA512

    96ee1c1301710a00dfea11fb90ebb4a3b841d6d1172b26edbb9e6dfa2056a9cbac4cb1fdf9e31a98b431a9c4df50aecca798a5a485a32d46fc8bc20c0a51a170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    3d68335565b19f8928f8a9147890344b

    SHA1

    ed6483c411360019dc2796b55b1e85b57cfd0d9d

    SHA256

    14ae2cba9450d35be5ece603b032b8278c6a347ecf10674ad47b245575294b42

    SHA512

    8b70ec16a7c842100c39e76407353405e4ec0b67bdff9b64337a89ced807fb80dc705e99b1f5ccda14e7d5242b10c9fca11ca97f5ce13d84f5b07e9a8a2fcd70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    9dc681719141d6285e1a886a66fdbb0d

    SHA1

    7c2120aa6819ae2e65085c333dc8a0d1a090f610

    SHA256

    1ea55bf0375c0bf1de623a165ef099c20b407a2fef923c8bd42bce03361fd989

    SHA512

    2f4752ee13ce897f6532935dacee382549fbc17bffab7d86e496b48380c4006a4098be89fb1765d6fc79d90fee03d6ced52cb02928272dbeb57d2588ef14aa63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    8182fb8b11b0fe377a97166e3207f4d3

    SHA1

    06d72d45a7f0460c6cae6223b51e2239620c47de

    SHA256

    4edcc97d6c64253962c194a1ab4d8f6d33d076c8290ee4ce5c271ab4221c17f2

    SHA512

    38cad98ffb68d66447b58beb9c5e1ba500768d8e623e43ef5e9a9a3cc9cc057245f7488bb1df0c9593677befe15f65b0b16aa7b4e7db262c7c80dbe7bb2e0151

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    6bcdfb246105a10218cae3baddc0aabf

    SHA1

    3a272f9c8c115277d163a976d27ee93aade88b15

    SHA256

    b58c261385a7fc50f2fad9c084b87227071c822f9616960c9e99335b1b0f339d

    SHA512

    a4053bf744cc85b344a889b19f75bc9845374367c7e22ca1cb0bfd55239f65c574b1abf68593f6df831008678bfb73628b8f2c43fb4a51c362000c444e640762

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7c91c191ec51ea37be6a4a6e49a7186

    SHA1

    50dbf1b47abdb80e444b27097aa5c767fd9f013d

    SHA256

    85c3c0cfd5acbdfa603bf5fc29c3b07863f04ebf7a888ed0f4f34ab78b83e169

    SHA512

    3cd959dbd0a61eebf9c5fa302b5b02129c434a3b43bb8f77483df8789740ce6b283d123a8c40d93abebe3dbd496a67e5ce45f0f6cd2984af58357c4dece27fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02bd6d7726d6b84fc9643eb5796d73d8

    SHA1

    f0a554b2909929e15a409c713e0d99dfec3f3d18

    SHA256

    f3cdbc18a6b16e9cd5a426bdd623a073e36bde085aefc98fc99d2a3ab2961350

    SHA512

    a12fa3ce6703a5f2d8c00cd28808b7720eb54da765f3ad32411da10b85c6be88a6446665f24121792452df66b6e863efa67263365545691066effc8bd89e915a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    3b343c966e9b0835124db35f2412f173

    SHA1

    22ec06fe0c2b23dbdaee7d81f35716c1e4097e3d

    SHA256

    b9a4cf94c21d2fcea662928f4f3a146a7ef1d5fa5a4f5daed11ab37c0f9b48b3

    SHA512

    b5483a22db971641f0093c5674f6ae83cfb195a49f8ebf2617f93a23e56635e0cd4ff3cc6906f8b54fff875f89663f337647700463b6b9d4b3e2ab2487768a83

  • C:\Users\Admin\AppData\Local\Temp\CabE8DB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEB6D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI2A03.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIA40.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSICEF.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSICEF.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\f7709a2.msi

    Filesize

    2.9MB

    MD5

    61b54e1bd417282f38e537804fd1d1db

    SHA1

    e74d97884bc23404c5860e5f58b5d57242c9c4bc

    SHA256

    fc706bcf6b6c9c787c723bd168c74ca7ebc228962f78b6f57225b7a45c2dc5e7

    SHA512

    6d6118c470549949a32885a749e38085f619ae64d68b473ec9bcb13007d25606df78ef67072bad46606fc90fe5c89488b52df64c6401656fac4f432e51b4217b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    767d88321d4c68ad0f11dda20c2b5adf

    SHA1

    38d288003499437da2de0c52c3ae5b0a075fe2a5

    SHA256

    96218c70760eeebce09a46f6005bb48e89a0f153653f879aa6c86b6432ca69f4

    SHA512

    25669b10515537b2687b992d62f783869d589ea2dc5611007ccb94487f5905f5fd47fdc1075761f34405a4737de0c90f07a5fec7c94116d4bb9f3e31504a7cbe

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb308472ff4d6cf40c7c2f72c72e4f48

    SHA1

    f8698a86ea07e942161a0b0473ae558ea32009bb

    SHA256

    b4ec7141fe020ca9c5576c6474028d8c7741c76260f0133d41f3b0ab981bc77b

    SHA512

    3602d4e0ae157f7668440abf4a2b41d1e18bc36133b171fd54f0fbbf6cd579154df7a17d28df234b8e432581fb56d6352f0bd6afa640ca13109b406f116b090c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f1e76d1224f6d4f1f05b2723b3ff662

    SHA1

    7fc7078b50fb3c765cb366cbb628237b6e31937a

    SHA256

    bcb0ee3d0ba5621ec5220dcdf8c6038b98efb85c79a40f78046a7740d5578fa4

    SHA512

    4ae9a6c12e41b04db8deae8c099de28d1c5ab2da1018dc6b336ba991f5575780b98f6de340b33e67792f7c80af2c7b12b7ce92338c87319f5bb05959be453ef0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5537cbd807e28b795dc9cdfd35531ab6

    SHA1

    a23a11bd16fbf2f8d3dce55976e8de512bb938e2

    SHA256

    34ea5f8cb064b58733a6bba9d025a172743a93a4cb625d4ce9b4250bb00a18aa

    SHA512

    6d382bc85be4c0fd97c416741e684342219f957b21f60cf8e4b56637b0df33210f8771c669751c610d3978ad2056ef400d33e314706f2ca2e52ef9b6f6057fdb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad97173bfdee0d04a6eb68790e3b1c60

    SHA1

    fa0c57b0ddfb7bbc10e987c7f930c49c1fcda95e

    SHA256

    1274bc765b140d2216c8004d4a2b59fa5b9f3cd4e29f58bd8aa47c7c1a37a73d

    SHA512

    6acc3d0b15014365352b6d00e783e30682e1549fa13cb55175706f41b128a4d06ae54d45adebe2ec2a2692db3ad1eccc55cb5f44a2fbe2f3850ab6abee22a442

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0802d378c7e5bdd3ada4da806fbde5c4

    SHA1

    e124d2f67c12760bafd835d72d326ed152601276

    SHA256

    f534e9d1971889f0cb011d05d40eac29e77f794dd6865d027febc6ac2853ac09

    SHA512

    5b809b3852f8e7cb4a4bd27553849099cf44702cdca9b3ae02e3e4754481892aabd08229b1cd6a144f76b6c07b44079f9c101c4a5b16b0b6572d47c4da6a6556

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0d2b1b5b986300f62881cbcde947a59

    SHA1

    95c7bd0692c85ab87427e16b7981bb8049113f70

    SHA256

    a1b0068db614d97c6f11433daa36af2129d1f1952aa2352f720f8977925a6221

    SHA512

    06fd2d32a04ec601c851d5c70e0c2f757a1bca20bfda2d1657df68f43e87b1872bbf4ae799146f9e408dad45b0f9226d85816abfc2659858a1527e0d3dfea2a0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d62002c40892f1a7dea3402122b0cd4b

    SHA1

    b174afc2fbd556f78469ba43a03f93787c805235

    SHA256

    fe22c2894c751db64cad75593d33dc011cd367183c30bd5933e8024a9380fc67

    SHA512

    a1e59ea30b653f448078a0c98d5d519501099dd55245f2bece2f1a040ad222cc2f4c02807204ff0aa9b342fffc548a546dab5bd793065d8ceba64ddea10de714

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfdf8f0b9a50416d3b895b3ff02f06ae

    SHA1

    8e90f6f364af0d681219e07ab3ecc892d35f0595

    SHA256

    28553a2db444b8cbd264024611f4ffb617863d21df375f70164b234e149419a2

    SHA512

    720feba0af6a440d492c3a4a6ecc4b756f023ac57214fbe4e72d5753ebc7a7da26c890985d38401843f15b3357039d6f7a70f81815fd8f0a353c31107374aef7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5ca99a700c826558ef79264e16ac9b7

    SHA1

    bc324182ec82a0eb643d501e3d26a71850d1099f

    SHA256

    859c1f9e5fa5a625a5d7a2ffdbd13d2f9558b2f173c79b5c20cb3831ad14569a

    SHA512

    b7f34dcd99c4db6b9228e2f65c8e95ea184c9e090cbc330562098338bd0ec1ed0c2b4a5020cb3a70027994874fb0d22cbadc5473c1a44abd87080e90f7dc7922

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c31926075056dfe8316c11aa2e5ffd4c

    SHA1

    427bfadb629d65ebbadf2758a6f9804f39c43f24

    SHA256

    9d2be54fe10fbefddc8a82b44bd0249015f5db7043de36895005131677e69773

    SHA512

    9a8e500797661bae1be39c3141e2795e494dc2bbf48939ac22de2a9dd58dd3fb5dadd69aff0bc9b845524328fa58a734aec19879a657cee7febe27b862c7badb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ce5049f989ae63a52cba0bc5b892aba

    SHA1

    dbc3ad086e6d79ac3af0a15148358cc7c9ceb463

    SHA256

    4314f075e5de5a494621747a7be1259c47176c33ebf0e4f56bcee382573394f2

    SHA512

    42e0fa74b08bc10dff67643fdaff38608d54070e57b63c51b6f2b01ace4a13715ad2f78d352b9ebf5ed0df8f1676b607806cdc4c396cdf95c76fea34c4d10b76

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    655343ebcb05d4bb0269f79503d1344d

    SHA1

    56fc1b56f70f9cb64fcef14e01bd5ef122f2404d

    SHA256

    f97acea3b20bad32c40559d4741fb63b7e982deb97b2f325808a9fa32ee58ab6

    SHA512

    e27406f71b95555ec59b7354f0d8e1d8aaa27d04a53083b6835285c30b909f2670ba20fb98f8f44b9f31d900a7901b66ad5d2ee63a59ea4302bd616e629e48ca

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0db5f17eb4c544579673633062512335

    SHA1

    0d1f771cfd6c9b81a0834c45d9cbbad84080b4b5

    SHA256

    fb569ed5d6cb075d834b81b78b39de4c55b3b268a6f5afa6c7b2843c385711dd

    SHA512

    9923ee132d6ea2efa510dfc35affc6f4735ef19f0b1172254072fde8f4cc2f1248a17f7e7989fe5d05d4f7b23e9e3296db346daaf64d765ff2264367dc03bd36

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    ee2f545963479b94f87500fd47cd9c5d

    SHA1

    53e76d87599ae0f5bbd4d24e0bad5e778334c23e

    SHA256

    16e7535751a4f5c1ba5748457386e862b94a2f89f6352b043f739d8486f42893

    SHA512

    f324f6c924f0c838f7ffae089ddcce592215571c3b8420f816b2c36e1d507485a9fdb43c42ead6caacc262be176bc743b4e88c51f7da376e0371d08466a8c89f

  • C:\Windows\Temp\Cab40B8.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar40CB.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIA40.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIA40.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/696-245-0x0000000000430000-0x00000000004C8000-memory.dmp

    Filesize

    608KB

  • memory/696-233-0x00000000013D0000-0x00000000013F8000-memory.dmp

    Filesize

    160KB

  • memory/704-1226-0x0000000000B90000-0x0000000000C40000-memory.dmp

    Filesize

    704KB

  • memory/704-1228-0x00000000001F0000-0x000000000020C000-memory.dmp

    Filesize

    112KB

  • memory/704-1223-0x00000000009A0000-0x00000000009D0000-memory.dmp

    Filesize

    192KB

  • memory/1008-304-0x0000000000360000-0x000000000038E000-memory.dmp

    Filesize

    184KB

  • memory/1008-309-0x0000000000500000-0x000000000050C000-memory.dmp

    Filesize

    48KB

  • memory/1008-313-0x0000000004C00000-0x0000000004CB2000-memory.dmp

    Filesize

    712KB

  • memory/1236-1126-0x000000001A510000-0x000000001A548000-memory.dmp

    Filesize

    224KB

  • memory/1236-305-0x0000000019A60000-0x0000000019B12000-memory.dmp

    Filesize

    712KB

  • memory/1780-76-0x0000000000930000-0x000000000093C000-memory.dmp

    Filesize

    48KB

  • memory/1780-72-0x0000000000340000-0x000000000036E000-memory.dmp

    Filesize

    184KB

  • memory/2212-105-0x0000000000620000-0x000000000062C000-memory.dmp

    Filesize

    48KB

  • memory/2212-101-0x00000000005A0000-0x00000000005CE000-memory.dmp

    Filesize

    184KB

  • memory/2212-109-0x00000000047A0000-0x0000000004852000-memory.dmp

    Filesize

    712KB