Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 17:01

General

  • Target

    setup_fud.msi

  • Size

    2.9MB

  • MD5

    dc58a4a73b4a34ecd7d08707b636b1d7

  • SHA1

    82945fcb61fda0e3f4249bf5b0543ce29aea15e4

  • SHA256

    331b07061ddbf912f002da62c9c456287f8f2afa9221a3069c7262554ae653c6

  • SHA512

    838f040936240cce94943e2e6f9cac763b75eb61491c4813e48d2179c6a00282d91980eeffbfcdc1ce8f3a7661961ee4776643067f1b23cb665ad2cd66e8f057

  • SSDEEP

    49152:T+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:T+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 18 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup_fud.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1620
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADC0BBDC5FDB03B2DD05912459A02773
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE17B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259449412 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2928
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE515.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259450301 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2304
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF616.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259454591 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1036
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI5C6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259458507 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:900
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C1A7B6726374D0D0814ED7C251B6E981 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1804
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:1512
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="2" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000LYyQnIAL" /AgentId="85466413-7f62-4aca-9c5a-8a4a53c5ae78"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2332
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2812
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "0000000000000560"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:568
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1328
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 85466413-7f62-4aca-9c5a-8a4a53c5ae78 "9b2ce3d2-128f-49b8-81bc-f9f562aac7ca" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000LYyQnIAL
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e0d0.rbs

    Filesize

    8KB

    MD5

    8e1a6c712551d4c3bcc47e8f07d26ca3

    SHA1

    97339f5ff0084cb487d39c549898929fcd31ae5f

    SHA256

    a6289a2dcc1de8bbbaebcce9ade829c2de2f61e11b7d7b7e6ff89a7327cf6afa

    SHA512

    dbd153f109f2a3b9351afc30cb0a39436553d864c77e9c4acdbe191127f76cb07e588202735109e83e1b5fb2583b20705113f4016713d87e420774a4a6bf62cd

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    eb053699fc80499a7185f6d5f7d55bfe

    SHA1

    9700472d22b1995c320507917fa35088ae4e5f05

    SHA256

    bce3dfdca8f0b57846e914d497f4bb262e3275f05ea761d0b4f4b778974e6967

    SHA512

    d66fa39c69d9c6448518cb9f98cbdad4ce5e93ceef8d20ce0deef91fb3e512b5d5a9458f7b8a53d4b68d693107872c5445e99f87c948878f712f8a79bc761dbf

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    173KB

    MD5

    fd9df72620bca7c4d48bc105c89dffd2

    SHA1

    2e537e504704670b52ce775943f14bfbaf175c1b

    SHA256

    847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

    SHA512

    47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    3ef8d12aa1d48dec3ac19a0ceabd4fd8

    SHA1

    c81b7229a9bd55185a0edccb7e6df3b8e25791cf

    SHA256

    18c1ddbdbf47370cc85fa2cf7ba043711ab3eadbd8da367638686dfd6b735c85

    SHA512

    0ff2e8dbfef7164b22f9ae9865e83154096971c3f0b236d988ab947e803c1ed03d86529ab80d2be9ff33af305d34c9b30082f8c26e575f0979ca9287b415f9f9

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    798a205510e964326da94516381aedd8

    SHA1

    bca3b1a437a3deec1628b4c9318ec5d5f4367c1a

    SHA256

    a338b50bdcb1989e35dc28a355d9a7fb114172424d3f7cd30aa112164c391658

    SHA512

    7beb5ce7d996af17fdbcefbf19ffc49e09137833ecaff4449b7ad08d8ab7b899e776d75044beafb4894b545b5bf69d60932756b507ef45ce5e6c80e97a10c568

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    212B

    MD5

    02ea7a98b301fd9e8f76f476fef2cdaa

    SHA1

    f6e0139e3155a28c16df2564f3fedad5fcccae02

    SHA256

    c7fd3f1d3b6b75de0b054032795554ef6ac44477c345a8e4b1cec7cb4a415de4

    SHA512

    349bb54e950deafa252946827cdf344bccee91908841202c8abb4e12058c2adf84e6cbeeffd710006fd8d3a4ea7caab79b90b948821bab6f310c7f44ab8017e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    b6102b47f3d2450f02c1167e5b337e9b

    SHA1

    91a6e5d7b3540556c971bcd6cdf52abd2cffcbfe

    SHA256

    e0c2d57c8661d444666ae009725ee84cd33a29ac48738277ea37bfd56b3cf8c4

    SHA512

    62bb67b325b56c41544956928ef0991262df019a470fc5792ba5abb7096e419f7ea3c8326560ffbe2b50ed0612fbc968fdf7564793a4d550b2465b799cbfcedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    a433d0bd40ae75fbd372efe3fd3e2bc6

    SHA1

    137005873f5a1d269a7047adbcd08f5d204a323b

    SHA256

    83599ee2c90c3ef5da0f1d87bb6155bdcd2e70b97ad2163e4247f74f0925e1ec

    SHA512

    dca032c59d56db32821d19d913cb7519fbc0545bdc5b19cc6ca9eebf2faa8dca9739d4190b269c34438bca85879a271108f0641c2b653df37f08bfb9224150cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    dd4a6de11c5aca03831ce2c397816af4

    SHA1

    98aa2153abf98ed443bb2214471fad28f61db070

    SHA256

    49f3eb5a31dc7c52694a2baa6defe57f668a679c3fc5cc736162b6e1e2cf4bb3

    SHA512

    8c0de17a3838d920121901226aa8d72b8434b8ea00f6d9a0e354d05049b5cb56c6bb7f9f9325e882077cbfb43f8da5f71b8f50675569c9a3a163c20a457c9694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    1432cdf1ad34f89f69371639118791f7

    SHA1

    c8a0006a09096988660a51a4a43f82652edfd927

    SHA256

    e5efe492394d28296622b7a61ab70a9c13058cb82a19eb274c3d174b601f04a2

    SHA512

    304df5497bddb5c0f7a752986dfa295b9674e116ea8e619dd310a3c9004109c6364dad87daaefca47fd885b6ea70583502efeb56462089af6347d519746406d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    229d8e2a8f5a66af12b885b4e7031d9a

    SHA1

    94649eed41d25a1795cce2846719a8a86cfd31d4

    SHA256

    c1f2d0adbdeb76b28ff8b339d369a3c9c2450daee5d840a229f9a1359970b641

    SHA512

    7dd01c87efa34228cf75f3cf0090b83f169e60aee2a901602891449411774685a43765c32032a23bcf9a313c576d2bcb9f3292830cecdb0ac09aa423af40ad66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad95e9db34a6c5c22cfec05d9640dc07

    SHA1

    73c24a3c21f38b6ba4aa0d4d90c5f9f0d47468ea

    SHA256

    5aec6fa481aa0b6ef62a0fb3973b7d726dc4b69b0dc9f3490bce73319e44fa1c

    SHA512

    04a061b9b69bbea17ab419c9ed2ebdd610a501df3ab71c2596b1ad5375654131b19a0f5831895169a5f3ab9dd5a03f216e16b656c3fac69aabbe56310c07fa91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4edc0911ee28e7407fc4ade3ca7335f2

    SHA1

    1693b69f77f59b72b2a6a4c21c13f18801b303f2

    SHA256

    78c35b543cd9497285418bbda9d5eea21547124759c675d6d2e0887d36a7e71b

    SHA512

    362433b5548ecfb68ff4af73e876a506de100aa6271fdee017bb15f53d1ffbcc9bf2b6d506640196c802c96dc6f91055dbeda88c969213396103888dc71fe23a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    570e91b0cc1e3e610dc784f4b273be2e

    SHA1

    a1a1d611df599bef0f7b18d0dd8fd79e0fd1adfc

    SHA256

    57c7ce5f4ccb89bfa28b2c8aa1a3fa6ca0d6ce2b37c3c428bff766b329dc79bc

    SHA512

    b311622401fd1399e6584be030ecb48b18b663c2ada5369fbabdf38bd7c810ea2a36a5d61e039ee3d89711aa5d17003621fb90f0dddd1db71f21be726dcfc60a

  • C:\Users\Admin\AppData\Local\Temp\CabB991.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBAEB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE17B.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIE515.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIE515.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSIF914.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76e0ce.msi

    Filesize

    2.9MB

    MD5

    dc58a4a73b4a34ecd7d08707b636b1d7

    SHA1

    82945fcb61fda0e3f4249bf5b0543ce29aea15e4

    SHA256

    331b07061ddbf912f002da62c9c456287f8f2afa9221a3069c7262554ae653c6

    SHA512

    838f040936240cce94943e2e6f9cac763b75eb61491c4813e48d2179c6a00282d91980eeffbfcdc1ce8f3a7661961ee4776643067f1b23cb665ad2cd66e8f057

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f761bfca071370bd41d6774bc8888b5f

    SHA1

    2d2e0e2660965773ea2a350cdd061de83d5641f8

    SHA256

    1bc1688e86c021186dcf8afd1ad33e70d28207597e29e36f0786c4035c6cca31

    SHA512

    ffe1de11327e22bb41f653f1c9d18bc66946060f273de1e8152330e5c2f76cdd06d922a2fab18228d56a2a224efd9e44fe1a3f33a881f54a4110c546fdf36a71

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    957c21591cf20864ea9ff11fb349536b

    SHA1

    4d140d5b4d2c82577276e2f37cc92047cd447a6b

    SHA256

    5b22d4de43c1c05705d544cb571561deba29ab94bfdea21c019cddeda48c8da3

    SHA512

    9e24347296cc05c0fe36b26265d1a7ecb5123311d75317d7248df84b30456f9e1e7caca6e9dcbd2c61771d829d8189c4fd2a737b0dae70ff25e8a9ac1ef702cf

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d01b302c4f3f9b8eba642406fe099cbd

    SHA1

    2f792cd9adfe8bb9b868c0b503d6a39b5e7f25b3

    SHA256

    c266945ad654e7e336bddbbcd57f979d7aa2e5c5aac5881dbbf05368c7d2ff6f

    SHA512

    321e68fe5d82b4251a2035484e95ea2c77632e03ef74d35e37847cf039bf55f6449bd50188ec19b488f1699cad31439220c1734824725b892a35c10f3fb5cca0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbaf8bd6c23fcfa19e6a5ae9a5fd2955

    SHA1

    8d866c7ecd549403a4c6ef96e8499cddc554c617

    SHA256

    43f3fcc3f1167b89dbacfeae3c1a71cacc3a7ccae357e22f6b2f390500dffe6b

    SHA512

    f8e93feda3b8c9d8b5256f00878f760bb4a758017bdd8e5cc6ea57cfd7d40d5936060c882c476865f17e258e48255b5c083735a95f91de740f3fa276708fda9e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c29dbdf49c6b4541ad236ffb39ad9e8

    SHA1

    90b0606c4d0f6a4e10ce2a46810e4c27b10a14cc

    SHA256

    4e34cfcc011bf0dd51b1192418fb333616edb40452273f3b2bea453d2cac6bca

    SHA512

    30abe0fe46211cdf0496fb05ac9d887e4f31a8863d2ae7249b51e762ec7c850eefd228302281907fb9eb7bce058efacfb4544dfc22d3056559513151b7adcb16

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45299248c82824c9ff7936ef65a26327

    SHA1

    3f1e75e261b186c0dc425d0cee7657e92771e3ce

    SHA256

    0ae782cba83e90ce8b0c767600e0a27c7867d1bf2ab4a3ebcbe3711e7739ddb7

    SHA512

    eae6e924215b76a7edd955df4efb696fbe1816cb52ad0c1ff100bc3ee3f145568b882db3bd9619959c4ca16d77370d6bba5de59d893e2234089d46822b285cf3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9e01c8e7c8e3c1f0f76453f1c461dd2

    SHA1

    4c020589ad1081a4924a7aecc45c6f1350434d9d

    SHA256

    5ff0ebde17ca5e2a95ac08bcaa51a4f73bdc19cca1418ba33256e7cca11fef66

    SHA512

    98366f6673b9593636b0e87d390919ac7b5583bfeb4f05debae0792506cbf0cbf748f0f251fb25e159f129ca91bc786424c301b2ce36d7271e5d4bb929cba89b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8a5108846fd9e6b49a328261f4fac75

    SHA1

    e3eff35078014abdc2db8eb84f271713a86acd2a

    SHA256

    e8831ccdaaf2e68236607cabca10cde930a5fbf961684ccc8e68b87360a113df

    SHA512

    596e23bf2837b23fbcf3b75a8a991f29d302c144929d727876a8c030cb21f3787fc768ff977cd0026c0f413268ddcb71de29926acecef7b298af63953d9bdc54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    739f302980dc748452f16d6d3de3e2c1

    SHA1

    cdeccd1d807f32631cd454d8e99e12fa296377dd

    SHA256

    74b67f54ef3ea635d827280100aed4981f0c501c0c15cdc6106b75b6628aa059

    SHA512

    37454a89d5d3d494c6174529d62a7f6e75349a3d182eb86bde49fe7d5ce066bee340204b382520efba5df66f77593df4018ebc5383d14ff0950f4827a933e870

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cd1c285d8dc9eb994b082e78e0f3c19

    SHA1

    73e39819865e384246ce207f37845e3c9a0d40b0

    SHA256

    bfb8e4d802c9eaec7fb1b84793293ff0d05e944d256d23f75372f0bbaf2fe47b

    SHA512

    e05b84736d0c3a1aa95516e6f861d78c33c81de6f40c8ddf4aa952c4510d238aa8e77accdd7a2e8d3d711e8632b38bd9986adc1571808990b25b63e6e5c585f7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3defce8f1f821bb6715f9fca5bbcced

    SHA1

    392ba08c48d07ac0552bccec202720d84a806dd2

    SHA256

    0dbe9b21bccdbc830d079dde355cfcad8b319cb6c5b20031485beabe8bf0d660

    SHA512

    bb4eda32adea922cecbc53b90d954bab20a7b7a4a67ca72777dcb1dfd6a3113ac666f4bb52b87c336f8e590b32ffc398c80ec71db36cf6ca8d849cccaa072a8b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fb879b380c950bcf8136c70a265f132

    SHA1

    8b4676a8ba4a76ee680d9ac86dd13ad2c9572ab4

    SHA256

    7087e2f46d6b0daddf24d25f6de349796634e07d446c6ec0ab0de29c8d025791

    SHA512

    bfbced33abd5b6e151fe364170bdba0734f2f57873a7a1a11bf216411934e137d16b9ba2634eb1ad309e52eeed918b1788f331a4e045e251cf43e45481b2a92f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96d7f9d6ba5b9481a02ffca569aeb7a9

    SHA1

    2cfd361a7f8036e89903943371194fba670d8f98

    SHA256

    c8e535e7b9a709b028eca5cdebc279ddf3aa7fa4f3a94e0cb0b8b4093b06e4c1

    SHA512

    166fe8902f51ff02e54851ca9314d7be526e8ef4699dc5c6bc49af8256318adb24b99f89a4275f8958b34c754f45743ed1709906abc6356d215e085d00ca2623

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5355d2e2c3f38126a4613cd597de8400

    SHA1

    83a289d4173655ab0a1de28dde852bb7e44d3b67

    SHA256

    9b9bfd466b98c6335c80e539999f44051867e0896fe4373593aed05e1332ab7f

    SHA512

    4246dfc164a038c51eb2d845b604b7b661c11b3e679831c71c44acf864d9f073860647b624c2d4a2d77190a7ea01e47183cd57fb2bbc81953caff78908790232

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfd9a531e9036de5e1a759827d3b69a9

    SHA1

    4200050cebe95cc711da0fb46b6738ccc52bc589

    SHA256

    764f78f2b5ed7e7e8621a5871ca7ed4f64fb026b222df478983134eddf8d0e10

    SHA512

    50738ff42020191f5510b152642998798e6c73a833640b621b94b9ae1f79be3c5689340e15ffb5e328e028ee5116e0a354268dc3e60f7961254b6d50391afd88

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    172bd20f588fb7aebd15d332c97c33d3

    SHA1

    c5c316c86849268175a629c2f3536f466d4185f0

    SHA256

    106a2f701d3f6dec7806b9b9d782ad2a6289ebb6f24c98cba30eb1bc271d6984

    SHA512

    66f9201c725f5939d43c5e80cdcfc0186b0a0af17e46f40ac0ba7064529c5509fed47f0c028dda17b8120a2cb7eba72e4aacdef644bc9b833f5484c03151ec87

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    03a03636bfabb150f337d499f1106287

    SHA1

    0e0b771f7e7dd9c443ef97ac6361a5ab6086a68c

    SHA256

    42dfffc6f962a435e8feeca4d8888f830bacdb6220d8983245ab7ce8b7337463

    SHA512

    e6d0702817d68e09498e2d2689fc4d73c1826105e5f26cda0581395d7d57ae8b1b0750111040e51c6aa38c5217fa667def5721fd99ef05a2dadfbe74a763c241

  • C:\Windows\Temp\Cab13B0.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar13C2.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIE17B.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIE17B.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/900-309-0x0000000000900000-0x000000000090C000-memory.dmp

    Filesize

    48KB

  • memory/900-313-0x0000000004BA0000-0x0000000004C52000-memory.dmp

    Filesize

    712KB

  • memory/900-305-0x0000000000950000-0x000000000097E000-memory.dmp

    Filesize

    184KB

  • memory/2040-1639-0x00000000004E0000-0x00000000004FC000-memory.dmp

    Filesize

    112KB

  • memory/2040-1638-0x0000000019320000-0x00000000193D0000-memory.dmp

    Filesize

    704KB

  • memory/2040-1635-0x00000000001E0000-0x0000000000210000-memory.dmp

    Filesize

    192KB

  • memory/2304-109-0x0000000004C60000-0x0000000004D12000-memory.dmp

    Filesize

    712KB

  • memory/2304-101-0x00000000008F0000-0x000000000091E000-memory.dmp

    Filesize

    184KB

  • memory/2304-105-0x0000000000930000-0x000000000093C000-memory.dmp

    Filesize

    48KB

  • memory/2332-233-0x0000000000EF0000-0x0000000000F18000-memory.dmp

    Filesize

    160KB

  • memory/2332-245-0x000000001A6A0000-0x000000001A738000-memory.dmp

    Filesize

    608KB

  • memory/2928-76-0x0000000000690000-0x000000000069C000-memory.dmp

    Filesize

    48KB

  • memory/2928-72-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

    Filesize

    184KB

  • memory/3044-1514-0x0000000000EA0000-0x0000000000ED8000-memory.dmp

    Filesize

    224KB

  • memory/3044-301-0x000000001A960000-0x000000001AA12000-memory.dmp

    Filesize

    712KB