Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 17:25

General

  • Target

    תוכנית חדשה.msi

  • Size

    2.9MB

  • MD5

    c4e4332cf78e92bef45cab4d8d9a29a8

  • SHA1

    e6f5aae7f231f9f108f0bbcc5c7240bee17a180e

  • SHA256

    63f2e49bd14880bed0033cbf0878ee50f18555432d3ad1439b304e6a2dc00fc6

  • SHA512

    7a486e162560c736533d23cf7863eda03f822aff0411fab40d70518026a5c7bb765990139f37bae416cfad05b700756521e165f07b951041e5fb806644a54c63

  • SSDEEP

    49152:4+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:4+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\תוכנית חדשה.msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1964
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91C75E49DC43810EB12E710E89D4B757
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI256D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259466744 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1060
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI280D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259467290 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2300
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3B50.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259472235 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2924
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI463F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259475027 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1972
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 31A70056C03CB2DEDB17FC594E16F847 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2624
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2440
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000MFxEPIA1" /AgentId="57d6ed4c-40a2-40ef-ac28-c60da4659a55"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1244
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2480
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004D8" "0000000000000060"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1492
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2988
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 57d6ed4c-40a2-40ef-ac28-c60da4659a55 "877992f3-6fc0-4113-ba32-d3f1695af8e5" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f7724f0.rbs

    Filesize

    8KB

    MD5

    7bfa14478cafa2c00012d40e685055ac

    SHA1

    74bf6e5faeed84db974b0bd1ee50bf2fe9dc36dd

    SHA256

    2fde737e0c0f2b2fe056cbb567e564dcefd3d19e92f67bd89d0aaa33d3e93dce

    SHA512

    ba1a4b3535ba31a3e7fabe9c33848219de184ddb9adea0a8670f51e78633e94a3353552c99f12e06daa1f03e0351f71d4b0531828f1c97c9eb88a2328e0b8df8

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    1d8a08b930f859b464d12092474a2e9f

    SHA1

    698d901da7f5db319f1d9905d0abc3f62b5cdec0

    SHA256

    c8934aba2cc43b26f41bc60f04212015487d97663807df5f03781807988ab7f7

    SHA512

    3829e075615381718e78f9f0808ed0dc903ab64852d71a6f1c85626dec23020a0505fe1a8ca8b2983b7e1391bc4bdbfca76d1e206939f02ca2762209547705f1

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    207B

    MD5

    79b9fe3ab126f40aa471a3130d617b5e

    SHA1

    876fb6a9926232b4c0f868f99d257cda2c6d9136

    SHA256

    bb5b6b3da3744b9c578052e234d7c3cbde87ef0bbb32a807b9cab9550569851d

    SHA512

    d6b4409be53fd6951e3bf32f5f17d7977e34050d8b4d21f33dd2aea17a73bfb717b2ecef1799a524306497a8dde053b3a423f02cd259e5a061f14d7562aff789

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    f3c6f090f58cee21def3cd3334cfa542

    SHA1

    d6fc5e0ee2c3a5433a5d8bf1c76ba14c26fac55f

    SHA256

    9e2ebb439e6a8e0bb85607310b7f5d6f296db6d569298ce00863d33586c610df

    SHA512

    96ee1c1301710a00dfea11fb90ebb4a3b841d6d1172b26edbb9e6dfa2056a9cbac4cb1fdf9e31a98b431a9c4df50aecca798a5a485a32d46fc8bc20c0a51a170

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    3d68335565b19f8928f8a9147890344b

    SHA1

    ed6483c411360019dc2796b55b1e85b57cfd0d9d

    SHA256

    14ae2cba9450d35be5ece603b032b8278c6a347ecf10674ad47b245575294b42

    SHA512

    8b70ec16a7c842100c39e76407353405e4ec0b67bdff9b64337a89ced807fb80dc705e99b1f5ccda14e7d5242b10c9fca11ca97f5ce13d84f5b07e9a8a2fcd70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    9dc681719141d6285e1a886a66fdbb0d

    SHA1

    7c2120aa6819ae2e65085c333dc8a0d1a090f610

    SHA256

    1ea55bf0375c0bf1de623a165ef099c20b407a2fef923c8bd42bce03361fd989

    SHA512

    2f4752ee13ce897f6532935dacee382549fbc17bffab7d86e496b48380c4006a4098be89fb1765d6fc79d90fee03d6ced52cb02928272dbeb57d2588ef14aa63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    4c6aeb1d04997ccb63965bba862dd63b

    SHA1

    c25555071dc4f50f15bdcfe2ac4c062949b398f2

    SHA256

    7ee7dc04d4a826915b991d0cbf3ef4586cc6d3f57c038210a01c435ea6300871

    SHA512

    00149afa853a7922ee7adc2236aab72be95c947185d7481f6e57003b104aa6b50c85a1e4e95eb222ff5223f375abb89fdfc68a85d367886fbfc3cea0225a156c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    b9b9f24d481b7c6792402cc33beeee91

    SHA1

    41215ed3b2b07a106e72e7f2b957dc4d72c77430

    SHA256

    862c98c9602371c830d6d725a49fb538b7c64d82b394efeb34500fddf10da5a7

    SHA512

    673ac2d40e80a8c9e2e2720e0a1f771ddadd0b954884814eb8944670a861623bbbcc79687a66c202843f52b9e566a440291ab9c274d5b4dbd46073a65289e86e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1a9a3419f1ab2b9e55bd4b21ffb78be

    SHA1

    22710d0f3d98d2b379611d091803bd13cd7086e8

    SHA256

    6746296f033ba1e6abecf1236e296b3a78c3b31d8206640e3fabd954c9ba06dc

    SHA512

    83dac5f603131005ac33121c031286b30f90e91437147a85104677739eb3768411753178a0000da56bcde208a278d7f21198f3dd8ab0078934b623a34830f81a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07aeeb225b41e61ee35bf53b433c3969

    SHA1

    d421c9bb4c3b058b490a17839ae63a097df62bd3

    SHA256

    de838753d612c8b01138b68a7bebc45fa1482fc2035cfc883262a2949324da62

    SHA512

    89dc0dd51dd2c9ab1b168bf8b1dd60f4e67a78ecd5f745fe6924d7356477a9b0bb18938609d569589bb092bfbff7471fbec068f2011099ac1557d9c535c89465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    2c9ed55844b30b8d95be4374edffa7e0

    SHA1

    2ade1084cc595d000319668627c703069949fd6e

    SHA256

    27516b893d0b45b3489e56fc715b74496896fe661fef6048ba092bba3c625f3f

    SHA512

    db00a21f147315c681f712f8036b564b8c0be11936739785065533feb67c36745d8ac39a020f7daa6098d598d95d4b77532de96b396dac2bb6a07645d240f9dc

  • C:\Users\Admin\AppData\Local\Temp\Cab2A2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar85F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI256D.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI280D.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI280D.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSI3C99.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f7724ee.msi

    Filesize

    2.9MB

    MD5

    c4e4332cf78e92bef45cab4d8d9a29a8

    SHA1

    e6f5aae7f231f9f108f0bbcc5c7240bee17a180e

    SHA256

    63f2e49bd14880bed0033cbf0878ee50f18555432d3ad1439b304e6a2dc00fc6

    SHA512

    7a486e162560c736533d23cf7863eda03f822aff0411fab40d70518026a5c7bb765990139f37bae416cfad05b700756521e165f07b951041e5fb806644a54c63

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3397a075dbbf8447fa5371d146ca01b1

    SHA1

    17208677021bcfaca59fba2a27258709ac790c5b

    SHA256

    0cf3c324bde6486e022eee02640af226804f81dc24aed985730862bd33645958

    SHA512

    95e97f577e388efb86fa748486a0ba9fab5b1be2878bdf37c304ba71bf98d69dfd12cf45cdf338722cb267078ec5dd25f21e9157b9a1f444ad9a998dcab84847

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e3d9601c54ea60dd627cad5b8147b52

    SHA1

    466d441fb5286385a8abc3114191ab4e80e7af9a

    SHA256

    4e69cee8cabff0e3abab8d098adea5ae01949661313e6bd48f17f218a267b0b8

    SHA512

    674a994b35e2ce4c5a7bdd81bf65ccd185ae14a98325e4ec955fae64ea6780605277753f11b4bc494280635caf2d89ffa5d02967f282c441ca900f4ae7714265

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7d13d23b623e7677f363ffabb82f6fe

    SHA1

    6414c742aa8085897d9f698e7d58c10fd9dda2c2

    SHA256

    50dbe879c0fd3a8b07bc86bfff4ff3b97f3497ba4d74f8b6ae4c11af2589a5fa

    SHA512

    af01af0eb5ec39ef55af2178d5e3e72f2b44055a2c1c2908f8bef4e1819c17172f0515d9d029e6982efdece18d2f5a593a86f826abff4c5ec2fd890b0a999e0f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e5f4cd8089042ba0f2ec8f1a6d6c0bd

    SHA1

    bc4eaf1083363113bdf0b2331916e0e77867f536

    SHA256

    1cf3e9c4fc7e67b684328a7f2cc7f995f2bdba17a1a169fb39ebd33ee684fa0d

    SHA512

    ea2bcd483dd6d843bc1ffe61db024aea364fa4c8596c332d4ac2c394301fc7fa1d8e9cf3d6ac418befaf8f9a05506624c947ff0b7692c56695d64c1544a26f85

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdb0891c4ddbb0a299feb46618717ced

    SHA1

    4dcbfb287e062a8883e2b5608895a19164cf1c70

    SHA256

    1d609991a693452ae029d49bdfd5bef5e309f375e570d1d06503a68938abc28e

    SHA512

    151e414c2689dbe2d0c2cca5783bfc5cf4867cd20cc9a57fe7ccb00fc86cb4c04b63e3bf50fdb49bc4a68fe9afb38f1fbef58fa8288761284600bac788ff9544

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67fa3c53cd2cd1e9343744c97e847942

    SHA1

    a6f66504a9da2199488a2b628144e5090115c6c1

    SHA256

    593562ce14f088734ac502d1cca28e0045c11a23aa6320cf7cd13814dfecee52

    SHA512

    ff7d49d725c611c7517ac8207db5020809d9eb753af3b9fd969e51442871ee0147183ca85e6cd8252ef813c61e84fa35036e2462609522b906e9a5bf1a708268

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9de56cda11ab1572ec398cb5eab416bd

    SHA1

    c8aafe089dce406a9e8743c1aca800c432fb8f34

    SHA256

    94338449bde1dfae0ed9020bd0ef92604ce0c17e8cbbfbe0b63336050266d477

    SHA512

    9dd9a43da1672d943466ca8d4145e5fdd2f09f6adf35b5f0ea5706149d25ba86842b36d16b9fa10ec8f7a5786cc3d64cfc2c0db5cebafc39fd0955ac6ef670d0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc676df2050da2d7f90c0bf99b9c877b

    SHA1

    80b397edbc5e0d3af396ea2d5c3485ec90d6185d

    SHA256

    b8b33d04b28a062982b8b5a74fdb7e40d569bbb16f6f8afda6b196be12a71ae3

    SHA512

    d9f8b9fb44d204cfda88aaaa91e67e82c3162fa3724a94341c5f3929eab8e0a6215548d14a666ddfc1d9cfe6835d53d948fa13364adb93bab6f88cae2b82a722

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f14d5274ea937bbeffa0c0800818e0f

    SHA1

    af9241125aeb30168b3f87df0a2882d218d0df09

    SHA256

    e89d002c78b5f88f74e33389c5c3c85d957ab0b9f679bf1e44288aee60b99e2d

    SHA512

    56441ccf8c6f657a100b2d9dd99f1457ace7bab3f7ffdc955c1347365c0b64fc55fe1ee3df2b3440a7306afac658e1010cc3eab011299928aefea6a36094902e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39859e91d18c7b7f86eab2c84d14cf49

    SHA1

    5da9341466244ac219b09a774b40a152a7d2abd8

    SHA256

    8289538941ae2e4cffc3840e2e640f77575dcc7aab7d9a67bb8b20b344dfde3d

    SHA512

    401fb5b30ff448df9404d135bcdb7c5aebc50a73839f3a7f8d9d255992b5682462fdcb457be524dc0fb33ce66974b462522331fc6baef2def98ebce42bb0ac7c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95c51e93bb0a13c5a0c735e905e40f76

    SHA1

    33f8caaa48575c4dd610991153a70c37f67de988

    SHA256

    e772d0c527ff3dd7cc8cba8cc20020dc0b13cef107aa70faa006a49da9ecc76c

    SHA512

    ae728aae22ef05a709c1bb98419b0a6053068ecbc3065f0e8989967f9573aae8ed87d3c567152ab48b939128f3d2b021464788eaafb90f8f48a21a35cb2272b3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5080efbb4c8503cb7d0d61a2b44b52c0

    SHA1

    9d9ec6a57b846384a0cd58761308d26a3c8ce3de

    SHA256

    8e14f41fa745218e47927ef8f34365c12425ece42c508c0f94d395cdaf3600b7

    SHA512

    7428d49a7c759e4c035e088b43aa70e7ba91dd430facb62d054bc1680a9aa6ec3897e09a5744a3fd15bcb79a6fae25257833a3cc2a88b9cf9654b1d658cd2d3e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    9909ad3c6e53710cd122b35be719454f

    SHA1

    d5f634345d38593c0371f168e9124cedb5ba815b

    SHA256

    44553c1b620d878060acc87cfefc260e51eb702488dd9a4c49dda5481a4b8e73

    SHA512

    27d06d743d80980b9757a9ea7937abf3ce940216d198aff25ceb236cbd5fb19d5f297732a3c9099b7017674eebc4b033d663639cf50135d1287d988e176c2156

  • C:\Windows\Temp\Cab5419.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar541C.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI256D.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI256D.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/1060-76-0x0000000001FB0000-0x0000000001FBC000-memory.dmp

    Filesize

    48KB

  • memory/1060-72-0x00000000004C0000-0x00000000004EE000-memory.dmp

    Filesize

    184KB

  • memory/1244-233-0x0000000000BE0000-0x0000000000C08000-memory.dmp

    Filesize

    160KB

  • memory/1244-245-0x0000000002120000-0x00000000021B8000-memory.dmp

    Filesize

    608KB

  • memory/1624-1191-0x0000000000C50000-0x0000000000C6C000-memory.dmp

    Filesize

    112KB

  • memory/1624-1190-0x0000000000BA0000-0x0000000000C50000-memory.dmp

    Filesize

    704KB

  • memory/1624-1188-0x0000000000B60000-0x0000000000B90000-memory.dmp

    Filesize

    192KB

  • memory/1972-309-0x0000000000580000-0x000000000058C000-memory.dmp

    Filesize

    48KB

  • memory/1972-313-0x0000000004BB0000-0x0000000004C62000-memory.dmp

    Filesize

    712KB

  • memory/1972-305-0x0000000000530000-0x000000000055E000-memory.dmp

    Filesize

    184KB

  • memory/2300-109-0x0000000004870000-0x0000000004922000-memory.dmp

    Filesize

    712KB

  • memory/2300-105-0x00000000006C0000-0x00000000006CC000-memory.dmp

    Filesize

    48KB

  • memory/2300-101-0x00000000005A0000-0x00000000005CE000-memory.dmp

    Filesize

    184KB

  • memory/2956-1091-0x0000000000F70000-0x0000000000FA8000-memory.dmp

    Filesize

    224KB

  • memory/2956-295-0x000000001ACA0000-0x000000001AD52000-memory.dmp

    Filesize

    712KB