Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 21:05

General

  • Target

    setup.msi

  • Size

    2.9MB

  • MD5

    83f1ae63be7d1bd93e1eac2adcd33298

  • SHA1

    730f2aca867722e775f7177798cb7508f9f76a4d

  • SHA256

    a4a7e335b5f9590e38f44050cabfebee6f64a2c4b626027f3b7c750e14f5d7fa

  • SHA512

    9ad6e20312f8f41cfeaf6243ec4b0b8b501947abc8b74f4e203734ea05eb52a276dab5ab5a9b133061b5066c9bad0d8fd7a422e39b32c3e0799f9fb9641a5a55

  • SSDEEP

    49152:i+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:i+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 14 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\setup.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2148
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADC05742CF29D003A5F54D0E4E59E16E
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSID6E1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259446666 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1056
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIDAB8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259447493 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2232
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEA53.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259451596 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2116
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF571.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259454310 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1792
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 24DF27007185A7B2E94763D9D976C1D4 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2800
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2756
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="19" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="" /AgentId="a6182251-72b0-42b7-b326-dc9bddb08ee5"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1848
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2604
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000049C" "00000000000003E0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2284
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:304
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76d673.rbs

    Filesize

    8KB

    MD5

    f6b313aa526e213b7db2cd156f227f69

    SHA1

    86fd59926d6f65d440330e5d7f2252d7504bf211

    SHA256

    af194ded872fb36c3c2faff7fdd6730b5d1eba9e3a3e292c99affa3a1bd0da7b

    SHA512

    e1797ef61a8c89ab235adee69755e8c8db653218383d33430f0f6118b090a40d98e703abc6ed0525a6f683e0b4be2f07a56340a81c8376fafd86a84bdedf0f7d

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    196B

    MD5

    6439108650afd6eee3d442764581c366

    SHA1

    693456757275300b888895922c81c7d3549e3de6

    SHA256

    56b62b9d8c92ef352aee291478adf9887068d20fd52da9985746d339678b2d70

    SHA512

    d84455e890d280abff377213aeb3a7b5b8081653f956fcad562c293bbdc9d966cc3833f94e1a2074ebfd370a2c7a3d577b05010ee33d30cba802af3c92cd7c8d

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    983B

    MD5

    5253ef3412bb19ce3251f1e60abf1002

    SHA1

    ab226df9f219fa01ec26a4f99bbc46da42b7d835

    SHA256

    9bf4edb7df4c705eb4632e3236343367e4cf4ff7a30b65797a0b2ba2ede21f5b

    SHA512

    9eac19a49f9d52567a6d755255e0338bffe5b7dbe4480d44c31a22088bc6b7bc7e5fe46bc57d2d3f931fa6a7949116cec9a42aa5cfab124e55f9a89aec876edc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    b6102b47f3d2450f02c1167e5b337e9b

    SHA1

    91a6e5d7b3540556c971bcd6cdf52abd2cffcbfe

    SHA256

    e0c2d57c8661d444666ae009725ee84cd33a29ac48738277ea37bfd56b3cf8c4

    SHA512

    62bb67b325b56c41544956928ef0991262df019a470fc5792ba5abb7096e419f7ea3c8326560ffbe2b50ed0612fbc968fdf7564793a4d550b2465b799cbfcedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    a433d0bd40ae75fbd372efe3fd3e2bc6

    SHA1

    137005873f5a1d269a7047adbcd08f5d204a323b

    SHA256

    83599ee2c90c3ef5da0f1d87bb6155bdcd2e70b97ad2163e4247f74f0925e1ec

    SHA512

    dca032c59d56db32821d19d913cb7519fbc0545bdc5b19cc6ca9eebf2faa8dca9739d4190b269c34438bca85879a271108f0641c2b653df37f08bfb9224150cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    1dc1121e24814ab2e9102c631f6368e5

    SHA1

    55f7935319102e893d0df7ba28c35343456300ee

    SHA256

    8ed09687565336351ef88085dcf6cfc841af12a63433ecc12c2f13a9557c3c59

    SHA512

    132158f8f2bdf5d66cd4f3fed37405027d4233c79a365027e5d8d0ea20c5d23805bd298358df371b625486282867ba93a3ff5945dddf3ae8d91dd2630e477df4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    4a9929b237a097db157683297375c804

    SHA1

    0546f55b5e373bc061751e4e06cc62f44bea4c55

    SHA256

    563ce5b3fc7a37c2c465e7b7ca14183c6f66cb579dd2c25a2011c5d608d04fcb

    SHA512

    7245c98a07ad31635c8b55fdc0700abb62b0055cf54fc672add1603f05a9571fcdb2de7507abbf58a394798ef110accf0d74339bd5ffd4e8b835f0d2c7d98269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    d2b0d94d04377e51b502dac67ef41297

    SHA1

    6866e3c89e2f3e49091a77d50aa69e6e5a87d456

    SHA256

    727fd7c53d411f5b7ef6302fd76f4891fabe26999f1cf081ff8c6d9fb48baf59

    SHA512

    721ad5f5efb15e994d3331870505b58bc6aa28757e954d733f58f00be02b73bf6026323d2efb7b5a562979f6a59778456705fda82030fab9153f9f11a468abb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a312fade4feddfa084859dc935db1187

    SHA1

    1ac8974948ab0f7f2cf2a05f6170d402b53bc6dd

    SHA256

    a70b9f732e63a1714db73f0bcc64fe535113866c69a5cc3d36bfd4a8de1d38fc

    SHA512

    784dcb855e81a86296b456bffd9ac8fe1cdfe6f5e4e11030795ad30e6a52c419521b6c788f2b473b410d7a0e1d79a9d9c73e468e9e05b6fb206605582ef68437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46c24b957465192e6fdc53c339b6a208

    SHA1

    544d1630b902ccf4b9e2cd4452cfd11e5cbd200a

    SHA256

    3097ab5222461add65cdbb3d32d18b659facba3962266b8eb6c7c8dbcd801703

    SHA512

    ed64d76c086cc2e6c3e4b4d91ce7231826619313bf6df6617109aa92f3e9ec5f5cdf06d87f8ee2596bf1df89b1945d79e8629b3a50af3857a3cfdaaee7258483

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    a1d59bfcec4f2441254fae8b6ee12147

    SHA1

    da7876d0a8c9ad572b8887ec650105df50dda44c

    SHA256

    afabab1f299af197bb34ade7efc1fac077db137e22784199459629fa9f597c89

    SHA512

    2dc676d13c5dc5d9b3e0f57c5cd10796e4e63ff719e698e2bbc47cab55dc6c4f91ce964ab7176b78dcc404877277d890fded26c7f43c5717d124b0054d1da694

  • C:\Users\Admin\AppData\Local\Temp\CabB405.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB560.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSID6E1.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIDAB8.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIDAB8.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSIEDBF.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76d671.msi

    Filesize

    2.9MB

    MD5

    83f1ae63be7d1bd93e1eac2adcd33298

    SHA1

    730f2aca867722e775f7177798cb7508f9f76a4d

    SHA256

    a4a7e335b5f9590e38f44050cabfebee6f64a2c4b626027f3b7c750e14f5d7fa

    SHA512

    9ad6e20312f8f41cfeaf6243ec4b0b8b501947abc8b74f4e203734ea05eb52a276dab5ab5a9b133061b5066c9bad0d8fd7a422e39b32c3e0799f9fb9641a5a55

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f6db62aaca1193ca75aab569860c7b6

    SHA1

    8c9cb0719feb3d53334a65acba66e3dfce76f500

    SHA256

    03965ea1025d467808d496b00b01d646e640c9fcbb4dd6d42fb65436ec58ab22

    SHA512

    94431e5ac9920272a576b0c663ac4dae8366bd3487dbd5bf52d239c2ca3dfea7a87bd289b327c4174c997b1fe64852590b6b4d05be4a8dd7502a8dc93a9f5233

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    feb119b7b56c1f72d9701509f27487ae

    SHA1

    3c688607d5b9cdc8792d4ada6062c71f4f85b2f2

    SHA256

    16160da7571436ebac8fe523eaf09993a1c0987e35a0e3361b925cd180e088bb

    SHA512

    77da4cd612a8e98954f0fcad129a170e043e8f717ac603e9aac22066595d8b7e3829638e1aabaf8b6581958dece000fd6241be7cd255dff18bc1eb6b1bf2c401

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d013b09792f97bb0bbbcde7a0481738d

    SHA1

    01020a8456697b79d2661b185d3f9c6b0ff52178

    SHA256

    8bcf48443085168c876ebf7cd936e40b2b647802e25f71ab999e765c455e5f2d

    SHA512

    78967173023d5dbe59f345eb84ac43c0005e9f9919caddffd7bcd2f9f6bc9e6b50450d293ab5dee26628ee43e8d4e82fba061d004205bff19f4881e7e7ee7fe3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24efd319b733bccba7ca4fa303e09ab7

    SHA1

    8cf350eca7522f773908eff323915ce555912383

    SHA256

    d3b6779b05660da1c0fca88a939b38a93f6ad609e86e9fc0764dae933c8f8965

    SHA512

    9f22c75f1b35e811fb77b8e841cbf04579abcf0b8f61ec570a5a30a5f75760b6cda6c966ad2efa2c44b5295b02ae917b9f1724f66a2e9f0dbbc9302854eb9b73

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca87708f4a47d03c53cb538151e8b1b6

    SHA1

    4c26d0d310abf064be975612cd0dbd170aa80a05

    SHA256

    292ef2e024a2988cd819c76a883e63a1b28781a624d926e34254f945d750d093

    SHA512

    b39255ee6ef8bdfd656d2285bc40f8c89ccd017fb8902d72e0f04b2bfb9d5d3a8ae2dfd4459016b189da11cecc4188cf6e75edf3557b792b4ca4cae5c6b25f65

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ab469bc97304c24edae1a8d3babe497

    SHA1

    5d87d3f104900c748631529a38bac18b35a9747d

    SHA256

    39c273896bc7918d47ee2cb775c5c9a7cabe8b6bcd61f543b4dade2fdd58387e

    SHA512

    90d914b22d34d56e9f4f9c7032008d98852324a9afc6790cab0d7db7e9a27455c713d82a1ed3cfcfe1b495c4bebed2eb2984e6c27c19e345900cd5c3c8d11979

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e95d44ab667fa4d416e905011a2b4a3

    SHA1

    51e4e190f4e85f83e1ea0a5d248f7662f8a7a583

    SHA256

    7f037db68b9648a07866da094a0d72025d195751ec1bcdb22edb990fc5450dda

    SHA512

    03fef1ea882fb608ab124b23b041046e132ffa68538ab565c104fbb6a3e291cb5d91ddd70e2b6d8a22965502145877959b99c14915a84250f95012a5749b3526

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    962fa2cca9dead8551d255e280e1c1d4

    SHA1

    7cf6f00e9b4dadc541a5aca60281ebcffd7cab92

    SHA256

    f953b486233c993f81df8c3e52ce2a261c9026b4984aaae0086b4aa8295981e0

    SHA512

    066cab6301883b3134367ad87dac58fd10bbd7f684a0e64177fbb6d9d2a86a1d4496517d83a4fc95485fea63b1cc2eb47d9026c04995302616c2e5afdb6a3d2b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    235798f628b8032bd35517a53263259b

    SHA1

    7e6c4321c4b97623a981eb9034ddc80e03690ab3

    SHA256

    99918943d26d6388220c2b61949c57daa5b17854aad8303fae74e222464ba880

    SHA512

    9f4e7460a0f0c9a91a807367ed72f47a32321f2d0f4b681b2fe1df381f26f9c4c7523b2c56f8601523c183ae6c195db368b0e05c9479969cb99a8a6e54aeaf7a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    a14e30dbf8ccce33cc7af14d2107ee64

    SHA1

    eac1c07878d9bdcc53ec71c4d2ea64eb2d7f52a7

    SHA256

    5879fc8e9dee4a87b3311402e4312af922a6cb854661051f17a5d2c95fdac15c

    SHA512

    9e1bc2fc15f07943f8380405f665c03ce97c9a76d79ab565277af8edf42f6af994d592e71d9ee47cdce83bc8300f85787e74caa414ef5bf38f52873bdef68682

  • C:\Windows\Temp\Cab37A.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar38D.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    656938a3f5a6274bb8818113e1588498

    SHA1

    29c2cb6cfb4be8291715094425603b1af309777c

    SHA256

    5080e4dc215009267f2aba78be7e04d7a6731a0ebf593334c8e5bc81b4cac6ac

    SHA512

    8bba7664282c5bdce28c13b717316895d53cba1a9d968713f41b769ada8fd4cf863a3666f2f7908d50e79c29fa56e2051f2c4d72b22d62cb261b122d2d6e257b

  • \Windows\Installer\MSID6E1.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSID6E1.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/1056-72-0x00000000003C0000-0x00000000003EE000-memory.dmp

    Filesize

    184KB

  • memory/1056-76-0x0000000000420000-0x000000000042C000-memory.dmp

    Filesize

    48KB

  • memory/1792-313-0x00000000046D0000-0x0000000004782000-memory.dmp

    Filesize

    712KB

  • memory/1792-309-0x0000000000990000-0x000000000099C000-memory.dmp

    Filesize

    48KB

  • memory/1792-305-0x0000000000950000-0x000000000097E000-memory.dmp

    Filesize

    184KB

  • memory/1848-245-0x000000001A6F0000-0x000000001A788000-memory.dmp

    Filesize

    608KB

  • memory/1848-233-0x00000000008A0000-0x00000000008C8000-memory.dmp

    Filesize

    160KB

  • memory/2232-105-0x0000000000BB0000-0x0000000000BBC000-memory.dmp

    Filesize

    48KB

  • memory/2232-109-0x0000000004C20000-0x0000000004CD2000-memory.dmp

    Filesize

    712KB

  • memory/2232-101-0x00000000008A0000-0x00000000008CE000-memory.dmp

    Filesize

    184KB

  • memory/2968-300-0x000000001A760000-0x000000001A812000-memory.dmp

    Filesize

    712KB

  • memory/2996-470-0x0000000000EE0000-0x0000000000F08000-memory.dmp

    Filesize

    160KB

  • memory/2996-474-0x000000001A690000-0x000000001A742000-memory.dmp

    Filesize

    712KB

  • memory/2996-471-0x0000000000DE0000-0x0000000000E78000-memory.dmp

    Filesize

    608KB