Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 16:34

General

  • Target

    66ea27e2e043adcfca5352089e2cbe7d4349f1f7e78dd4acefaf451b8c9585c4.msi

  • Size

    2.9MB

  • MD5

    4786b508296d522bde9b35893599f677

  • SHA1

    a05b7bb3931533e0aeeaa4eb48e43befd095b4fb

  • SHA256

    66ea27e2e043adcfca5352089e2cbe7d4349f1f7e78dd4acefaf451b8c9585c4

  • SHA512

    27487b36cc8d62bbbbcc4d2fcefed7ddd8ea8d376e291b744f694e46c97595613da2ec36dbcb644920d435c9866b5fc136c5e726082bba4f7615e518f6e59451

  • SSDEEP

    49152:h+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:h+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\66ea27e2e043adcfca5352089e2cbe7d4349f1f7e78dd4acefaf451b8c9585c4.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2384
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24DF27007185A7B2E94763D9D976C159
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEE09.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259452657 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2276
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF135.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259453234 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI37E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259457930 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:880
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI10DD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259461346 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2492
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding AD7481B124C124DB56C7C7C26E5E0FD4 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2660
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2016
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000AVzB7IAL" /AgentId="2a16707b-2962-4d4e-8206-09942c552205"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:624
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2904
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "00000000000005C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:340
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:980
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 2a16707b-2962-4d4e-8206-09942c552205 "78781f37-cdc4-440f-b356-4835781525e1" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000AVzB7IAL
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76ed0f.rbs

    Filesize

    8KB

    MD5

    145b16e62954bf1022061ab01729df6a

    SHA1

    40af3167fc8a133470e69afd8ed203e8b33feb03

    SHA256

    f4725b23baa5f37afa673b62b5f351f8a766dc60d3c3ea4f5e55b37c010801cd

    SHA512

    d97ae5a98b3e5b384cb859b33454ec91595c97b69083d9657582ccf49e8aaf42f68b6733701dc6499e4cd0daff9ba3d42e555f1e9f0a6f04f2fe55c07e030f15

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    e2a9291940753244c88cb68d28612996

    SHA1

    bad8529a85c32e5c26c907cfb2fb0da8461407ae

    SHA256

    6565e67d5db582b3de0b266eb59a8acec7cdf9943c020cb6879833d8bd784378

    SHA512

    f07669a3939e3e6b5a4d90c3a5b09ca2448e8e43af23c08f7a8621817a49f7b0f5956d0539333a6df334cc3e517255242e572eaef02a7bbf4bc141a438bf9eb9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    e8fd3b882e6fe278e9ec8f2a91796bbe

    SHA1

    54c486f19d7ac4d2e03e616d87550d4271cdedbc

    SHA256

    8b0a170933df5e9dfc4e9a1ff94ef20f3ab6eb46e59f75534971c87201f68aca

    SHA512

    105cddc000f534da67eb09906b8b94de96aedd3c7306adbee0e4e9d4042871885a0c4c5d861de52b32af8d83e87c22d116927482172135c4a2fb4dce50c0029d

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    222B

    MD5

    c1da63041b9d8ab1ad1f3a57a1bc015d

    SHA1

    251cfb942c796d8f32586d12d7fde148cade34c7

    SHA256

    96bf0d467b8a089dee9c17fd7619e55a4b8395eef2d086decea2af199be6f10a

    SHA512

    ad693325228c163aafc259b9f2ed9ee2bf386a69563379134aa24d7f6405926a8a0647bb17984355fb328bd748e9191867f846fe0bc9cf109f14ed2d484006d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    b6102b47f3d2450f02c1167e5b337e9b

    SHA1

    91a6e5d7b3540556c971bcd6cdf52abd2cffcbfe

    SHA256

    e0c2d57c8661d444666ae009725ee84cd33a29ac48738277ea37bfd56b3cf8c4

    SHA512

    62bb67b325b56c41544956928ef0991262df019a470fc5792ba5abb7096e419f7ea3c8326560ffbe2b50ed0612fbc968fdf7564793a4d550b2465b799cbfcedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    a433d0bd40ae75fbd372efe3fd3e2bc6

    SHA1

    137005873f5a1d269a7047adbcd08f5d204a323b

    SHA256

    83599ee2c90c3ef5da0f1d87bb6155bdcd2e70b97ad2163e4247f74f0925e1ec

    SHA512

    dca032c59d56db32821d19d913cb7519fbc0545bdc5b19cc6ca9eebf2faa8dca9739d4190b269c34438bca85879a271108f0641c2b653df37f08bfb9224150cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    dd4a6de11c5aca03831ce2c397816af4

    SHA1

    98aa2153abf98ed443bb2214471fad28f61db070

    SHA256

    49f3eb5a31dc7c52694a2baa6defe57f668a679c3fc5cc736162b6e1e2cf4bb3

    SHA512

    8c0de17a3838d920121901226aa8d72b8434b8ea00f6d9a0e354d05049b5cb56c6bb7f9f9325e882077cbfb43f8da5f71b8f50675569c9a3a163c20a457c9694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    3705824aca33237c06f7abe11091f146

    SHA1

    55bd478095aa45efccab012246542d63ce2eab56

    SHA256

    7dc16f7aa9d0c05fa426ced5f2da7ed1fecc38acca8777744673634abd36dd0e

    SHA512

    94e510c031b2eabf53ad94ff01bae7936d740dd9554122edd843876d4a48bcfda34248492a0fe1bf3eeeab28cb73d6e4740d2950c79a97e5c7ab33becc0f40fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    a54288935d90966c9b98bd56b9fd6d70

    SHA1

    857f100817570837567cfff6e34736bc5540c1c5

    SHA256

    dbc9958aedc2f68b5eac81093a384444f95461804ae56c9414fd72c4a5341ffa

    SHA512

    7a50053adab83e4da0842b91b0a6d580d88ce75a55e80765be5251861e3aa12f108cb77f7782e703fabf105855b6bc5b489b3fc74baa7d83ce2a1e5b56b5c808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d00e9d92d23bccb67c4168391085b52

    SHA1

    bfbc74e1cab65e15672642f4b5a2a437f7f61dc5

    SHA256

    a0bdbdd3945126c4d5da01d5589005af275865e004c76583e695d3308b551d62

    SHA512

    ed13d235efac51c89e926905837e304f542d913f264a76e24e419afed90aec602e6b9b01bcf08a77f7b2286286f0a7a34c6a1075acf40c9b136c563164d0706d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40669078a4fc6fc9758e0da35e481ae0

    SHA1

    8e049fdfa562cde0f7e1720fd7eff9dfb1168b25

    SHA256

    3f8965c29f3afe3c055323358aae9034cb9d1cc26c889da3fcd32fe629b4da77

    SHA512

    eaab06bac4295da58a7afcab7d235b7d8426101e7a4909795b3e43e7e0b9dd19fd20980bec4aeff4f516fb789a9b7f4531989eb643ffa19f722afa4fd3d1fe31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    62a93fa61b29a951a8135e2ccbc4550a

    SHA1

    911dd9b54472d96a29dc7bd152ea7673736c1b7b

    SHA256

    f413da54b526cd9c07e1873437b2b8815244181bcd6da0f84ab0e10095ab704d

    SHA512

    86a7fa87ed708ea43349b17b8a033dba6f845cdb11bc1fd7d9485eb7f26da3771c90fd801e12273afaf653e16f145334205dff43fc58542145c4953f8d48b053

  • C:\Users\Admin\AppData\Local\Temp\CabB9FE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBB39.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI583.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\MSIEE09.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIF135.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\f76ed0d.msi

    Filesize

    2.9MB

    MD5

    4786b508296d522bde9b35893599f677

    SHA1

    a05b7bb3931533e0aeeaa4eb48e43befd095b4fb

    SHA256

    66ea27e2e043adcfca5352089e2cbe7d4349f1f7e78dd4acefaf451b8c9585c4

    SHA512

    27487b36cc8d62bbbbcc4d2fcefed7ddd8ea8d376e291b744f694e46c97595613da2ec36dbcb644920d435c9866b5fc136c5e726082bba4f7615e518f6e59451

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db4c8d75d458e69c54a8e96c138bc57c

    SHA1

    a26063ef388243886e8c1ff9d1317833d7b1cc37

    SHA256

    90d912804d68fe3b7b39275158ad8e0792b02d177e15bfc5abb5452463e698ad

    SHA512

    e65cc92035612d6c2daa8b14198744486967a1f3013c4909239ea2ca03525c8a6c3a1fd943f63d06260e0ddd5763d2cfa788f62456f81b0ef379ed366ad43aac

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11ba70ead790c14cb38fa9f956c2c3bd

    SHA1

    05b8999a586226311122e5e381a8aad2d6957c9a

    SHA256

    a41f2317dae80009baa89e98d648e3b11cf69f33705d94394d56491fda820e72

    SHA512

    ab99a33f63b2c2a14f9fffc6887791bea1aeb451d20e57cbbed840e3928e4efbf6b15cb8173a0b68393b1edd6a52a7b886651d652277d5247769caf4f865a823

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b8f85b95434b106b0e6dde40712459c

    SHA1

    391c4cb341ed58fa07409daebe7dc9f94eddfcf7

    SHA256

    347835fb4915a95b5a8bf4a277e542432b142a97ca3512af73b124c9f6a811c4

    SHA512

    35efb5b4544f4943e699a10616ed62cd69c96f40e61b84767c49b2a01c91c9643a5a1639dcee2060ed336a9776060d41dc8b7a57d2930d71295efd5f8de6ec72

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b894816ed0432a3e0eb73f333780eb8

    SHA1

    5f02d51f48616d3ccaa6611a317baa819ee53e03

    SHA256

    a117725b9f72787aabddd130280e634ab1a78ed9c388c5e09e8d8b2f9627d6ec

    SHA512

    b93d4844c62ec1b2b3d99494d9c43e05b906223cd4a47f13947607462606d1e31bfdb5f3302aace68601c14e78f6d81d6f3cf4ef7106e883193e3c3eb596da48

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c36a1036b6bdfaba94685a4c320ee87

    SHA1

    a6aec1a1782ec2590f7187adb8d8edd880ad7a84

    SHA256

    039518a2d5d07f619d1da5b9f878648caf4d69c1af1ec7a1c5b53b109bbbdfc5

    SHA512

    2ac8ceaa8245ceea22490c4772c13d696ae2ca6e21270b1a67f39b8cda8cc6f060eff502b9dcd4b5077c1387b77c991e71be694df453bdb7a28cd531bdbff0ee

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7ce13638efb58a53f9732305180256d

    SHA1

    abb5589a4e904832ea88e5b12b3b82c7b4d20127

    SHA256

    2be41a14fa5a4148c98245a2f25ba86655e18bdb497702d6a35b9e34bfea8c0e

    SHA512

    dafa088cc4f86e570bf4587eeddbaa31401d1b41f153cae13ce72a023b4aef33642d3ea98c40387461cfa23644b53f130359522819bd7bd2fd78b92e0b975c61

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0be6da0ca70cebd534f53005571951a7

    SHA1

    71d86448601c2cde129361a6bf9cdd1bc9b71596

    SHA256

    470bfff466982f437a9915c7dfaeb434ef002a9a1f5201bf9923ffe74574a3ab

    SHA512

    69f63358b41b7a8472bc30f42be63f4deebaca96b325263205fc34160735c1ae9cd12bccff8519cd0e2c1c508f9e8b4c9a6609db6cb089eeaba432847386ac0c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29b96aa8ae6feec2e6148ea40eaea46f

    SHA1

    e107a78ec6dc48e97a52144c6ba57e2d0ad0af49

    SHA256

    736a4dcef087e7146dc07470e0d40c308cd835ce1b306e413c20e0804574a5a9

    SHA512

    90fa6ca2018624dfca857726420f15304ac2ccb026b171d5ec0911dcfb9f0d403f78c85f3249fc8a163fab5b3ea9ac3dba725c63b6d162c9564aeeefd79f6270

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2589d9d11f63134597e2b6a4928bead

    SHA1

    bb3b8b11a35177b0c960828532c9b772e4e65e45

    SHA256

    7674876d37f7accc04e1b07bba32e4340912571ddbf3f1a76b1fbd33f931110f

    SHA512

    3b7de3375c75120eaa92b83c83d51fac304761f60115e1b9f38b44de8002b4bcf6bbe847ae80ea8275f4022d44b3e02e738c90bbea24fb0281db4aba8d969c8e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f29ed4046d70c797cfec0db46781dc1

    SHA1

    76e6c6a5a6b5dc3a091a2694431ad66d1bb5de63

    SHA256

    aa708331cc3ca27820f424e49da72b439d975f0db4b344b30e8b78d0fa35c9a6

    SHA512

    2e8d724a07b64504faa6cb87591914c85a5978467e2e8e6060567359c3b7a9417d79cb7d346e29a55c4f3d44aab647eaa585d681096d86c4ef80190a8ac3a44b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c0c8b70b2241903f34026b25743e997

    SHA1

    58f25caa299e8a9e72a1857f37ab3a06d66280f2

    SHA256

    2dd7daeb0db76a8d0787d5ed4a57ca7aad8c905f61f38f0de2e3f9c831037279

    SHA512

    591a13c54b1ba489f260180dadc4adf5b01b54026e8a77d8a353a83519910b5e5ef41ec5771a052507baf18433cb674191f306691ea7056fcba9b9380bc5b00d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24c217e05d878e0f750c6f479f47642a

    SHA1

    8bb04ec786eba9f4e406517880b37e45e8260165

    SHA256

    484e5c085a9ea42d89577629d675ba68eb298a9768f99e4f517363d08f73f490

    SHA512

    5709a923b13819a683ceaa256726176511f8b51052711a556080a98694efee44083652ba63bf9fd81a588e7937ac52d6ed6a150f1fd6cea287f8dae6404a1ff3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    9c3e1d4f0d0780cfa14d5f49309317d5

    SHA1

    4e5cdba6cf71169e16dc2e07fd252a78135a6a40

    SHA256

    7833d9701506293a0e120553eadaf3179f14c3cb3e44134b571a835ddd48b4eb

    SHA512

    9f63fdf40de8ae6c13f43bad1365cf64e4ecc3c532d0432977da94745fce10e9d9917a16c9ffc0ad863369d2371148861acd770fa90f7ebe112d98e83f0c98f5

  • C:\Windows\Temp\Cab1F72.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar1F85.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIEE09.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIEE09.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIF135.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/624-233-0x0000000001180000-0x00000000011A8000-memory.dmp

    Filesize

    160KB

  • memory/624-245-0x0000000000F90000-0x0000000001028000-memory.dmp

    Filesize

    608KB

  • memory/1312-1151-0x0000000000BD0000-0x0000000000C08000-memory.dmp

    Filesize

    224KB

  • memory/1312-300-0x000000001A620000-0x000000001A6D2000-memory.dmp

    Filesize

    712KB

  • memory/1704-101-0x00000000003A0000-0x00000000003CE000-memory.dmp

    Filesize

    184KB

  • memory/1704-109-0x00000000026D0000-0x0000000002782000-memory.dmp

    Filesize

    712KB

  • memory/1704-105-0x0000000000480000-0x000000000048C000-memory.dmp

    Filesize

    48KB

  • memory/2008-1260-0x0000000000FA0000-0x0000000000FD0000-memory.dmp

    Filesize

    192KB

  • memory/2008-1263-0x0000000000D00000-0x0000000000DB0000-memory.dmp

    Filesize

    704KB

  • memory/2008-1265-0x0000000000370000-0x000000000038C000-memory.dmp

    Filesize

    112KB

  • memory/2276-76-0x00000000023D0000-0x00000000023DC000-memory.dmp

    Filesize

    48KB

  • memory/2276-72-0x0000000002380000-0x00000000023AE000-memory.dmp

    Filesize

    184KB

  • memory/2492-313-0x0000000004D20000-0x0000000004DD2000-memory.dmp

    Filesize

    712KB

  • memory/2492-309-0x00000000020B0000-0x00000000020BC000-memory.dmp

    Filesize

    48KB

  • memory/2492-305-0x0000000002010000-0x000000000203E000-memory.dmp

    Filesize

    184KB