Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 16:30

General

  • Target

    c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4.msi

  • Size

    2.6MB

  • MD5

    1e9a4e774b61acc8a6b35ee50417e661

  • SHA1

    b7522d2f1fb7b9b92348b4d88c62480683d3485c

  • SHA256

    c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4

  • SHA512

    e41ddf5aae8d4354773a7787344c6e4c4b229e39664d10eb4e9ac5c325ab92f716663c841d782a98b93e7a6cb5f236c84a6d503d6a5e33071aefd0996faa836c

  • SSDEEP

    49152:d51VAM5R2KAHlcp8qFmmzDza2Rqr+kMdPTEe/pjO8xn+ch/TlOFNOnUI:dPCMr2NMRmk/XeM9TEeRvx+ch/TlAr

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 18 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2100
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 71C02281ADAA81C103E953DF03A5D796
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE919.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259451346 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:336
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding CC3900A12E7F27DF8E76A7475918A40E M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:444
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:396
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:968
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q3000008cfLjIAI"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1536
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2760
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005A4" "00000000000003EC"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1736
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2900
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 18b8e789-bdb7-4766-9aea-f7b0f91c266b "8c7bc41e-3138-4f59-88b8-b9ae118acae9" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e85e.rbs

    Filesize

    8KB

    MD5

    145143e44fa1ad97bec6428b2a724dd9

    SHA1

    45f01e36bf36312e0348af516de8a5f7b152debc

    SHA256

    6bdd254b7cca173d82b1e2f055085817846142aac006c707381a7afa03e18bc1

    SHA512

    3818e051cd2e7d74c5c596af26bab545cc9c01c2112641f3e02aac2b13cda8c2bcfc87d8d18d51ddb4d3fad2f94d22394408086e8e76ae22fe370782cb2ba5d1

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    140KB

    MD5

    2899046a979bf463b612b5a80defe438

    SHA1

    21feaa6f3fbb1afa7096c155d6b1908abf4ea3b9

    SHA256

    486b2c2b0ca934ab63a9cf9f4b660768ad34c8df85e6f070aec0b6a63f09b0d8

    SHA512

    8c60eb0d9e82326543f2fbcd08783e041a7f5598723666b1c9ea5df7808d0c4947e8e64c2dcd46331bc3dbc38c6ec8b85ed2fcc5b97eaf0465ea624167829368

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    209KB

    MD5

    a41c23558b3c07f8c749844bb553d545

    SHA1

    8473013cf5f2be8158c13f1056675d1cbd10586f

    SHA256

    a6193fc0a09ad7145fe38494bcf67fecbc10c07a5f3936e419895b018e85a766

    SHA512

    5930f14f3be4aed70a1ff93dbb75022c2d947a0a2344031992167d72192e0a51d207fc2255cb0ca1fb21b20b1277a528bbf739bbdf8676f7a0786efd132b436f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    64e122b28a1e548c1cca376e32cdd248

    SHA1

    4506de40b8422c9be58333f35325a86674ca650c

    SHA256

    0ee2dd095b1cc4c3cda44a237a188e16c8614c107ad9d37ad8a581473ad42215

    SHA512

    36fc7dd056303822b23f9173b43522dee23431a419bdbae43a850e87f37b936b34ed2ef5013997d6d8b59d74627d55b0cc622da751d3ed828c850c7982a0d8fa

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    e2a9291940753244c88cb68d28612996

    SHA1

    bad8529a85c32e5c26c907cfb2fb0da8461407ae

    SHA256

    6565e67d5db582b3de0b266eb59a8acec7cdf9943c020cb6879833d8bd784378

    SHA512

    f07669a3939e3e6b5a4d90c3a5b09ca2448e8e43af23c08f7a8621817a49f7b0f5956d0539333a6df334cc3e517255242e572eaef02a7bbf4bc141a438bf9eb9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    fe4fb7b13f28bb9a875fb0e4c5739f86

    SHA1

    5cb2d8f337b47d2b51d280db414f244b3e13572d

    SHA256

    325c14a01bc3bc26d74d081ac1784f9a10af6ef577d5cf1e7cd421d0e4709ede

    SHA512

    a0b6fcac52e52cb00cc0f47243bc834901ffe97dac4e465da9fdb3265ca58c9c0a947e953f0409522b4e769311aa4fc5331899d764ed3ea2d14ea5718fb60af0

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    82b17dc9838e1e21e5c6f53d2867e94a

    SHA1

    a09bfe6582bff9193337cc7dbab79d0b6b723205

    SHA256

    8e7210c1cd0955aeb4cbbdce362d4c450e0bf1be47bdf263fbf2789a4d98fd00

    SHA512

    c1b259655e2514449366f2d150d020a1eabb0e67af29c5e26c3a00f1d84d805216016c306d48e37354de09d4a056dc071c0d0d0d36f8ec9775843e6ae2712430

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    170B

    MD5

    b3a33442b9ade5e347d82ded04f0c923

    SHA1

    18ea3f616e38da3811710b548179cd2a0034f0a5

    SHA256

    b2c590eb119e5f42793a5cd2db47e2aaef79a36da9fdd5a8f2df0d7e260a60ea

    SHA512

    5679aff31db84e1e914ea1bd6aadcf23582e3d4edf089b44e674972fd842df276aedabdb83ff919babe095a9fbf3203223ef345e80a5a4e0dd2b878fc09b95c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    b6102b47f3d2450f02c1167e5b337e9b

    SHA1

    91a6e5d7b3540556c971bcd6cdf52abd2cffcbfe

    SHA256

    e0c2d57c8661d444666ae009725ee84cd33a29ac48738277ea37bfd56b3cf8c4

    SHA512

    62bb67b325b56c41544956928ef0991262df019a470fc5792ba5abb7096e419f7ea3c8326560ffbe2b50ed0612fbc968fdf7564793a4d550b2465b799cbfcedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    a433d0bd40ae75fbd372efe3fd3e2bc6

    SHA1

    137005873f5a1d269a7047adbcd08f5d204a323b

    SHA256

    83599ee2c90c3ef5da0f1d87bb6155bdcd2e70b97ad2163e4247f74f0925e1ec

    SHA512

    dca032c59d56db32821d19d913cb7519fbc0545bdc5b19cc6ca9eebf2faa8dca9739d4190b269c34438bca85879a271108f0641c2b653df37f08bfb9224150cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    dd4a6de11c5aca03831ce2c397816af4

    SHA1

    98aa2153abf98ed443bb2214471fad28f61db070

    SHA256

    49f3eb5a31dc7c52694a2baa6defe57f668a679c3fc5cc736162b6e1e2cf4bb3

    SHA512

    8c0de17a3838d920121901226aa8d72b8434b8ea00f6d9a0e354d05049b5cb56c6bb7f9f9325e882077cbfb43f8da5f71b8f50675569c9a3a163c20a457c9694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    650123a2be2955d5d5595b0dab81d9d6

    SHA1

    3d68bcd4543a93d3081b85388593b7b30d737d48

    SHA256

    f55206c9c38cd28cf58d35269d258721899e96b971cb19ed3cd81f464720cdc7

    SHA512

    4755b569d967c5ab657b02578a32d693f9c01ee1783df0772a87f87ab9ed6393c82b1c56ec8cff820d1e9f1525096e7d3f83dca1f2b27847126a3772074e1fef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    6da0ccf2bc78e5cc9e9d4d79e4321f21

    SHA1

    f0e1ec257423094779aa28f264bae7870307d903

    SHA256

    a799fe6e8ff5e59158cf16e72d9fd37a6147d4cc8ec32c146de2e03c5f8f0982

    SHA512

    e0c7cc7a54d6cd20166477dadc8b08ce932a01e5a27c1fab3bca420190cfebccca3b4529727cb16fc02a50dda73fec7f5ea51ac3e8340496c4a8b5faabfda512

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acdcba24990fe2fdc7ad7475804d2175

    SHA1

    3f463f3dd52bce7458cc6a4f2853b867bf62d472

    SHA256

    c62699f14113fea27dfd7e739deb7bf4667008b36b3bda8cb90f060abe29bb59

    SHA512

    72bdf755a4571d0a47915c3caeff4644b54f0f2e7de4cd69d347fdb30373b42da86d0c9e911dcb69ca0b5258644fc2b9ec3eec19f20053cd403a034a4c6c08ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    4ef38d187e94f8dcdedb8440eae3d6e4

    SHA1

    8e66e51dcfd139f0d84a220202cbf76d78c0d612

    SHA256

    53ee371178ec8ad8a68640234949d46268707615f0a9bb63d9247c44a7bb4518

    SHA512

    63cb809a75b924f6796dce5c5b8496541ef8bf67c99355e3af37f3aa7e033523dede89bf013777c4398dc6be4798da9f21084b8b5a661866431579eedae67a83

  • C:\Users\Admin\AppData\Local\Temp\CabC7A5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC8EF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE919.tmp

    Filesize

    275KB

    MD5

    672e03b9d7a2d50f3e935909a198928b

    SHA1

    6cc8a45126243c6ad8a6336ef1789e6a8b5dd33f

    SHA256

    c4772f8a8761f052bd0336923539699ba2f358ac203beb197cda576146e05a0d

    SHA512

    bf5833ea48942319d560fb4dad62997fa5495e0d9c634361d919d3328364d0f4a999dfb56590d48227c3690d8a867b022f6d5fd01c46f27d2ad6421d88380372

  • C:\Windows\Installer\MSIED02.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76e85c.msi

    Filesize

    2.6MB

    MD5

    1e9a4e774b61acc8a6b35ee50417e661

    SHA1

    b7522d2f1fb7b9b92348b4d88c62480683d3485c

    SHA256

    c6128f222f844e699760e32695d405bd5931635ec38ae50eddc17a0976ccefb4

    SHA512

    e41ddf5aae8d4354773a7787344c6e4c4b229e39664d10eb4e9ac5c325ab92f716663c841d782a98b93e7a6cb5f236c84a6d503d6a5e33071aefd0996faa836c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dec509a15dbc6c8ee7b280a33b8c6048

    SHA1

    f41dc5ea25497bb295dbf55874639165211ec68f

    SHA256

    4f4e96dfcdd21279584a2f2cb70a88b1358bd21187c686f9595211b9b69fc781

    SHA512

    222945f11c06cffdb017c7a8b690ad0f8631005f481ef8d0b3fdd06e07fef99888c040f3121ca5faa6cf9b84993397ab687b3f7bad8402981eedd587825e49f5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fe592ff19e59bf549fd71b3df377911

    SHA1

    6ea53be1ad6817d5dedc625c86c087847496ad2c

    SHA256

    278305f7389ffb6c3b65dc9b6889c03742da6bb2b8001bda027da03292180681

    SHA512

    8d17fbb29e4f5b3da629e71608f0f46d85c8c7a0b7c0a38ba2381e85046d74dd0280affbc2b63cebb4cb06346ebedb1e13a65dc481b661a10f5d1f1ff852ee39

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfb1e3c87f930719898a72ea7dfa214b

    SHA1

    b2dec9db832e673b038f87f14435f651d353ce13

    SHA256

    9a6a9ad958a03198efc55423fd06eb6d5f316eb0f7ed6f2524051f860c741554

    SHA512

    81fc459739d22d5e78e43f1f0f3ce0217e0acade60e11a95612075139ec71d7d6d8e5002dd88ab412b1f998910976ad1c99c90416a7464749784d9dcc305639f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aec5f72b4888867a3f28c17392eef6d1

    SHA1

    4ff12ef4208706bd70d2153a0dac0ee2917bf558

    SHA256

    b519cff39030ee87cd14eef6c161fd0cc1956bb8ce63a9fe2e8b5a93d06b627e

    SHA512

    4c56113d49d9869df11e1bbe2b4bbde19ed708d11e5f76a53a05f5b1f8153f131ad34cd37c19b32a94d6a42e1a5df0f82ae5040f164bed6bdee85f8668375f19

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e3cfccadb4f611c0d0f90ec8dd1b178

    SHA1

    fbb5060540ed6398dfebb5d4b69548ad9690acc0

    SHA256

    252254f25924dd203ba98fd69d14fd2c9f9a3b13587a7db699699d2c6229d152

    SHA512

    d833da6de76f2c3317a0589e6cd1f2d9f5ca50bb9be804dfdab0fdd8eb3464ff034095c551aaa14d2f48da18e493f58421a39661c4c4962392139981f6577736

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    532fcda9676e03385e72713856dacba4

    SHA1

    26ca052ca213220889eb0a899ecdec3cf3d01918

    SHA256

    3f879906dcc705f3553420d3eef1bad017e9d7641aa758e1578a0fa489e51a82

    SHA512

    ed7b0c43c0b59b6e7a2bd8fffc59afe5f52f35c96896f066474650148d97b8403aed481c2cfad5ecaabd917474cd26723d1b1319d184e3723a11b58204b35666

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e9c2c51eaacfcee351937c72196366b

    SHA1

    e611a1c736cb80f245e91abd3c6bc77e4162c1f9

    SHA256

    dfa037ff2fab6309f726d07c20a12ad64a1e737415f1397a6fb9b395f37e0866

    SHA512

    a79a7e99131a83ae2bfee2027744b048873f75765499105ff8edcb044ae23d7e2025e76bace3acb6810af9abb6036894ed49d18552a576d46ad070f8088445f5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05df7831094ee8e02a36b6c6c449afee

    SHA1

    9956ab8b1e2b79d0c597875adff1412b5429ca88

    SHA256

    6e93c5c1daf7cc67aa2c4e1c09f61f35d0c140841d1efdad2d336a21bc7d8bf0

    SHA512

    ddb990473a0b47bc290376212ecc393dcd0c20d6e89ba636883fbc9125b0795e8f0d201df5b187bb0c9f05812e5fbccb19a2cc4177b66c2cb08d940d76da2f23

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac79c73c180b756fe25b21304049b64a

    SHA1

    f23c2e41b62f4cc5a5f206e0da9ccf98e09818a4

    SHA256

    3124052c38b6d7630b932a43680e916c93a1c7473e8c4206f90f39f82a945397

    SHA512

    1af1ff04e966d88a42942b1d7c42625c35ea00f95d6adaa53c9a9503416626a266fac900dc86aa8f357fb970fa8ec1c89a38e600bc7ab7070660e379d31ff6a3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14400c9c5f130615eda7780af11bac92

    SHA1

    ad7cea6a2dda5702606f89196a546d6372b44aac

    SHA256

    706662e21918f0ff3a8fc7af84180abb928b19f939b04f39df0dd8628fb10868

    SHA512

    a8e1052ad831f4365579b68f5c7ec2ec6a5d97b7938f883c2c0d53137745035c48c9661624c28951a98c97163df3041eff320673d1315727cab9c46be0f9918d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1317fcc03e62d2058655e177bfa39f39

    SHA1

    7607141136ca86e721f902cf382c0e564e24893d

    SHA256

    344e26152842b7a1b510e259629082baf5caaf8487b28028c1403771d25b0303

    SHA512

    f475ff3b360a6266c1c6b1e44d3f448567c94d64df2372806edcdabbbda94307129234544075d9c126baaf0817faadf157a2b767b9688775885f0b10d0c6ced7

  • C:\Windows\Temp\CabFF36.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarFF49.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49a0895c665332e0d0789e15b60d2a52

    SHA1

    d03b89e8d7898e5fde093cf78baa968dd978ab84

    SHA256

    f8158386a5abeefffc966f26e6ef7f92fb117f39517c1d09c403d9398af6ae99

    SHA512

    bf8f31df9bfe2fc9dccb0d8eab18c5e84300a4cf535b982ddaf36ec8ba7b1bf40cb72970096659cdb5863243934d2fd564372b5fbbdc0dcc3ec3cf1d6d2808de

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    398a24d6251cb77146146d92be5390f5

    SHA1

    d9baddecdf456dbb21c1f38f14558d2d82dcaab2

    SHA256

    9d60c6668d147b046da14ebb7ed33bda582a61d1c189f663b52625457d25cd66

    SHA512

    8cffbfb630415a534bf7117a0fff4541e82198d1a50cb3b81da6bdb1fb42379988e66b61c755e5a725584eb75c70e3caf2711923c3165af4220ad4bd339c1e57

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d6e0b072cd81c8b7d2b05bd47b3f929

    SHA1

    8a2a34e620923f223b1f2466f6c764e4cfe3a483

    SHA256

    affd55e217c0a302d1a9df85cd07ed0248f329c358fc9e612b5c12a6118e1c1f

    SHA512

    91d1cdaf4a583541c68610d97214fc40d470e895dd18fc77a2f81090643d5c7eea449fce1d8d1b930cff779efdf383d88d44666eff92377ffb4eec287dca6e79

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2db2627fd04a3b4800a17bffd4191cd8

    SHA1

    c0ae2e63d1038ae7ac190678e1ea21250888b314

    SHA256

    2321349cf75c22dd0f783aa260aa5f95f5ef9f2aec2d6f141d3ed24a0326300b

    SHA512

    3ee76a05f6b030d2b534c565ef3dc81fca9c55926071f2cb1674e54dee4aec4fb2139fa0c1f4a0b1eaa1edea70cc2e85483304b705428f0bc9a5f3fc9a8d8c24

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05ada29999ef68f2a9d29270028e8bfa

    SHA1

    330ae562eb7e0061b3e3e7721389e0baaa98ec22

    SHA256

    43955bcb613a413f51380e1b5c0089ff91e4fc9d745aaf736c755cdc2fe9e643

    SHA512

    44cf2a0d1d7893381ef605776c1bf4eae47b428d634399722eac4b987cba61a19c2ad93ed3178c1f4a6d5cea397346948ff4ac34140d23c77b0081f1d13cb047

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e7b33603354e9fb6add9b9cc0699d8b

    SHA1

    c9cc92c1cc0365dabb08105ce614020032889429

    SHA256

    4ae0e0929b706c7a8618b3f39a4f8abd620b3297a35e6c6dbb136b32bdaef686

    SHA512

    c66dbe1ef7fc0c0506d7a7ec35b92bdefdff8763ca083befa440d01a3b1c837c16ef2935d267ecf30101cf2805c51cc167ec6cb8fd2e022e6dccb6e60adb4f17

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dd94081d63d645a8b35440b17326e5e

    SHA1

    a4670e119ce92da491b2c6d4d0d52ea0fe0195a2

    SHA256

    154dd1cb28bb0ae282809458c9e92f890f8caad4c3609938db760cd4cfd42862

    SHA512

    4cc04eaa7efabcfee8042fd595d3644a2b51f75208418a1d30f933ea113cfd65fbe8241c5258e87cb58eaf96895adcee5d78164ba24a4b0577289a0a07221405

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3e0c4872dcd82addcc9f38f18da6df2

    SHA1

    a231e9572d71084e6266b07e2f5f837ff115db9c

    SHA256

    c89c1de3a47d89737e1b46255d8a7aaa5af8f08080458667b6015af253a68521

    SHA512

    ae731782f2c3e8a60ef51a1c016b59b8be98bbed420f77a3262ccd109c2194311108ca315542f1b425571c688956db8ff0b0802b82533544ccddfd7f30fa102e

  • \Windows\Installer\MSIE919.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    19KB

    MD5

    4db38e9e80632af71e1842422d4b1873

    SHA1

    84fe0d85c263168487b4125e70cd698920f44c53

    SHA256

    4924aad650fa0f88c6fc6ca77068d73f70f0d0866a98212b615290ffb0b04efa

    SHA512

    9ce1e75b11e43369fe2320cf52bef856170385a8e898a934c735cb92a8399e5e612a54b248579687c372dae58e47e05d9095116313aea9555cf2358944252d77

  • \Windows\Installer\MSIE919.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/336-75-0x00000000003C0000-0x00000000003CC000-memory.dmp

    Filesize

    48KB

  • memory/336-71-0x0000000000320000-0x000000000034E000-memory.dmp

    Filesize

    184KB

  • memory/1536-112-0x0000000000AC0000-0x0000000000AE6000-memory.dmp

    Filesize

    152KB

  • memory/1536-124-0x0000000000580000-0x0000000000618000-memory.dmp

    Filesize

    608KB

  • memory/2232-931-0x0000000000470000-0x000000000048C000-memory.dmp

    Filesize

    112KB

  • memory/2232-929-0x0000000000510000-0x00000000005C0000-memory.dmp

    Filesize

    704KB

  • memory/2232-926-0x0000000000160000-0x0000000000190000-memory.dmp

    Filesize

    192KB

  • memory/2432-829-0x000000001A580000-0x000000001A5B8000-memory.dmp

    Filesize

    224KB

  • memory/2432-168-0x0000000000BF0000-0x0000000000CA2000-memory.dmp

    Filesize

    712KB