Resubmissions

12-01-2025 13:14

250112-qgl6estlet 10

12-01-2025 11:16

250112-nc4tkasncl 10

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 11:16

General

  • Target

    PDF-523.msi

  • Size

    2.9MB

  • MD5

    156ff43b54310c6f8eb4d1a7fda1a90f

  • SHA1

    1f00b3e593a63abb8dc0e6aec58fc41f40a0a977

  • SHA256

    9f38e1f504a6dfdbe946619e02696c34ec37e4ee9cb992281f05d8bb103246f3

  • SHA512

    bf57a64120e3d026b5112706a3e1e7c11718f1a9aca61a301334a917de41b1b979bdea29710ebea6b1b13aa300baf5972dd21d12e34daf99566657553cf0bd64

  • SSDEEP

    49152:C+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:C+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\PDF-523.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2632
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2EF1C7964DCE7163993CAA51A8B25F54
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI6D55.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259419709 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1644
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI7043.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259420224 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI81A2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259424670 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2348
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI8C92.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259427478 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1572
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F32403DED081869185FC34ADC1FBD0E9 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2580
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:304
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q3000008BLFqIAO" /AgentId="4baedaa8-3a0c-44ed-8971-40a5451c3f34"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1520
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1092
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000494" "0000000000000498"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:3040
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:3056
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 4baedaa8-3a0c-44ed-8971-40a5451c3f34 "2ea188db-b774-4bd3-8d71-ab1ac788e602" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q3000008BLFqIAO
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f766caa.rbs

    Filesize

    8KB

    MD5

    73b9e810374030e74895884fb3b9d506

    SHA1

    54c8ff4fa7007549bd8893a8ee4f4468eeecd52c

    SHA256

    71406a34aef4ed0a718559187608cf832677a0501f88ab1eb58c99475afbb9b9

    SHA512

    13378ab8ba67f12c57cf3847eaa478793e0b986966a2defc7866ec59ccf2cb6133882a9dea2fd4b95af0f4504381f0dc8c0016521255c1bda41925f77501a7d8

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    3fa173e4e1e00396a06e409935a1e7f9

    SHA1

    089b85e04c266edd6dbb678ee91da656b19674b3

    SHA256

    297a53db6da22aa3ee4ce849c9952f08bb7296303a170c9ddc7acede10b64c25

    SHA512

    d0c34b51e5599c01edf4ca6acc89186bcea5b97a598c4f120b3063c171b9a1668ba5ff87014565360471973b30733a5521783fa3446bf376332aad23a4325d26

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    182KB

    MD5

    9d8d50d2789c2a8d847d7953518a96f6

    SHA1

    42621852b40f3f068da5494c9879f846b4869399

    SHA256

    76aefe9205bce78d4533500e6839e892b7d80edc39abcd30ca67952925302b29

    SHA512

    91ea7152762f00fdfbc6cb8d5d15c2e07bc298af8958406b0b0fb652ee3d4a4da9d79ca7dde47dc7700285b20cba089f35745c2b3b84b9dc0d258bd9bdc89f56

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    93d5e2aafbe16cada057bf880002b2f7

    SHA1

    095832afb05852d692bd40d5f77ebbdd339bc545

    SHA256

    83333ce938e943ac54ea0428722d8f9d64d2be993502cd0e95b39e2d78956484

    SHA512

    2e2391c315fd173634f262011a25c9e397bc8a1dac8e86a039f52ff733534f57f2e00adc995900823448a45933864e814e89549f41271fc9d7effd116bbf3854

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    50e3f5a0e04cbd99d4be8cfe914c7bbe

    SHA1

    19d99ae964f490e055942d516c60dfdedc585825

    SHA256

    89ed8cbc24723d67ac7e47d0d018ea293f15fc210d9b3e26dc555f464e9b15cd

    SHA512

    2f67dbb41631b6134414d1685815daea7f38120d88f83cb8f83763cf18b1f6aa2b9a5a7eaef816eb8a24998536556128c15128b4e301b765c859a9741d69ba25

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    bfe1b7477504084db0d61dec068e7fd9

    SHA1

    17d38a8a5b1b9d460453706dbc1d55411ae519c8

    SHA256

    85a16bdacb177ebedb357c7dd40ea6e572c71fcd6a04c6481d7d2b251bc8b655

    SHA512

    d5d21dd00ae72a208f51b0f9da514606a1608f306c6f32f8c11ef41245c4a6bb7653a90087a841ccabf8f0c17b41447743ddfcbffc12c8542f4975bec3841101

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    222B

    MD5

    235719ba300470ebcf015d02c025402f

    SHA1

    06e8d37f5576fde93b9a15fdc9627c99892f4221

    SHA256

    4a5b7b29e15f460d942c7f90315c91d1af31e7feb245be8ccd8b6135ba1824c7

    SHA512

    c47af3ef485cec44a01798fc17bb493b25a11737cc84fd8ec27da65839ef41be0849d65c514078ebce8e7ec753987ef18776bcfe880bc56d0ddb4bef538be5a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    01469d86975d80da48c7adbe1c3727cf

    SHA1

    7d4d07f80a88928d7b8e54ba6fb59e9b7e3d5c1c

    SHA256

    902833a88c63bf18bc32baebf9f2f987380a740f21a6e1f7ea60d0ff0554638b

    SHA512

    c4e27e3dbcd463969a2793736a9126c8910e40556151f30d890b7f6c4422344f65e98c127c4113608fa5e3e7d0f06505772c11085e8e3c6ae9b45910d3fe451c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    cb77da1a8d1d7c8badda6a840695c0ac

    SHA1

    c92973c3f996af5ecf80a86cf66058cffe7f57c5

    SHA256

    6f5e29604b09f2e1ca21de6d6550551970d7a5e317bd081bb2a054310f96dd54

    SHA512

    e12da22c99afae6e728c77670c6d8a1aa93033e4f64d594af8f61f980faa8e3c01b91997e66f0860205fb7e1ce62cb70e804e060ea44c53e1405e2a1bc35763f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    760573ce1a12683f473b76bfe22c6b43

    SHA1

    aed150af5b6cb595cb9a29b7148115212b2c8d5e

    SHA256

    0d861e3ab4e6f20c901785f10e14617841f665c8eb36ef2ed5cba6dce364683f

    SHA512

    6685d42a75a1b7b8fb94ea739b184728fb1b38afbdc2e5ead35838a3e3d7532678c162f20d8338875c8c679c6b76129b277887edc2d6ef4504a9a3526e93dfc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    8be0d48f4f11726ddb18bb37d44b899a

    SHA1

    ab910f195805d698d3a940bb1b8c47cc2f6146d4

    SHA256

    058fbc9e17f606b5168e30faf046c10cfd55cae47184c1678a08c31974651116

    SHA512

    db359860ea1c10ed999d26dd25489ce148992857f2a99c13b5ec6169e0b706fbfce80b140d164260d534553d6925c0e3092560d36307e2288d3b5a903687c9b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    1d3487fb9314f1e3c976cd0f124ebd2e

    SHA1

    bab6caaa0ffa6ec3dfa8cc4b9739d0a85799ff52

    SHA256

    674ce46f7563eb639edd806092171fe1b1adf4477fd529beb25b3596e207d741

    SHA512

    334c1e3eac8ebbcb8dbd9a8cba5d00588e078e8e883a80072a2bf0369a13d50de0a3c714eb0f3da16feaf3ecb2a05339e03ad994c5bca65fed940c8dafdf9dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    182b31c5b845010d4b2e40b5c308e2f4

    SHA1

    c564ace124b0a1500fe3435ebab82c45a98da553

    SHA256

    4773b5fb6fd39ed3bf719f1b6825500cb4c03c201ca05d9578a95eaeeed1bd3f

    SHA512

    28a203bf62da1670c5b403bc63eccd44e0e6d35457e68b27fcb242b991b83265a891713dea6de318f251215c524d05886278f372597803c7ab8dc1b997494919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f829afdf784cf42c2591b6caa0484a27

    SHA1

    5087d2fa67e34bc3bec4b7995acf1769017e482d

    SHA256

    01b2b3727eb4d954c4a53151ff1df94fbedc6403d3d8df27607ecd5e6d0e74f4

    SHA512

    cf4a0093ce4ff485af03846a8b461f60bdf72017d514925e1d1239ae2c1c9aa533317f01a617f6ca048a7b760a74a4951516e3ffb45e37cb045df6c18cf527c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    7b0476d6d8988a058c43ce9f2f9be387

    SHA1

    61aeab35b7abaeb1270e1ea0003a372a43940112

    SHA256

    383aff4e567b0bdec657b88ee9c991da2ba8c25ff1411a900a0a2d00dbff3881

    SHA512

    312d3cc6b13da7f1b9ca9d21821a7ed08bbbac1d5c0f09c4147a9d976d3cdc8e63493af4d44189221a04a29f8c0d2e442e97d51c78ce225e355e3798cb5dbdfb

  • C:\Users\Admin\AppData\Local\Temp\Cab4CBB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4DA8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI6D55.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI7043.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI7043.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\f766ca8.msi

    Filesize

    2.9MB

    MD5

    156ff43b54310c6f8eb4d1a7fda1a90f

    SHA1

    1f00b3e593a63abb8dc0e6aec58fc41f40a0a977

    SHA256

    9f38e1f504a6dfdbe946619e02696c34ec37e4ee9cb992281f05d8bb103246f3

    SHA512

    bf57a64120e3d026b5112706a3e1e7c11718f1a9aca61a301334a917de41b1b979bdea29710ebea6b1b13aa300baf5972dd21d12e34daf99566657553cf0bd64

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    2c120b897b47321acd8f6993bcf7fe87

    SHA1

    c5343159a9c84508f3c67297acc804d94c670a89

    SHA256

    5ea8317555696031b4e22395ea87f644908cb2c6de08f4289258c3ddf439343b

    SHA512

    85262d316320812030fcf05df861704de3d9f74e8fcb783a30b526e0484f0ea6422cc8e923da01dfe3e8a9345f301032832259a526c8bc49ae1cb6785675ce33

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e06be4f0e4478094e175cfd619575b9c

    SHA1

    d92e7d342f6db9c78ecb848b3c42dcbc67930f02

    SHA256

    e13456cc7360d6f5080c9283ad7fc25b910a5bb9a6fcda650b3e92d4f34b2b43

    SHA512

    8fe8888e64f5a9272b7164552c8d14c3452e0516e4dd280223a2062815d6185691690ef9a56113245790c32b51c6b24c6d754ed6c471c03df82c42f4f5d89753

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3531d581e70bbb481a6c478a5dfd03c

    SHA1

    451e41e30042084a26add060337f498ddc288d18

    SHA256

    446c5441a473a914ed2b544da793afa475e6756bba10124ceebe0c51ba33390e

    SHA512

    3f37f166bc278cce130f8fc7124310b7330903a15ba82676679565d3d267e65ca52ca184bd6b4f64eda512e518a4c874ad18be51068a2e2358b885ba8fd42578

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4175b7a7e2abdc29b3ca41750ddbaadd

    SHA1

    dbfe62b30856078cff967bcb295e7be2eac8d2d6

    SHA256

    bd8270184ba4ee309b279412952f1144afe39aa1f07324216460e3210eaa442f

    SHA512

    6b14ce47554fc9928ff58979da080026f6c5c28910cdbb0e7814700d278bcc4d4ee36e4e86e5f2891c569893b390852df2399ab436431855122db127e3f6882e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8caf783aa115094cc04e5e574bcec4c6

    SHA1

    f5dc7f17b63305b27c46b22635546524d1fd6200

    SHA256

    4dcca51dca992a23c3a23d0cbffb4542a111821d36f2225e39b104b9b1b2b2b0

    SHA512

    cada98f04ae762f698f9adfb8d0add9442e41691688761524a447b3f9eb56994272084585423fe9b53f687a37eb4723b7efff43fe82f902462f1eb25ec376d1a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a62d482e78696a601b7baf79fdd408a

    SHA1

    d4e38d8a1135b785adc589f7f45084d78bf8d01c

    SHA256

    320b1f2ad3450acee74283ffe3de16aa1fac32473914c2b59f3c71010f4319ac

    SHA512

    c2b6106ee15aaa89bcc0df0ae281f2ed73065eec7b9408fbc763876fd696a9742bdd68fe9f72122b4a3d57f0d38ffd64db9e33881746e7d2ecb7e1a2b43f3dbc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0b14b0df7a77f8978a40f9909b21f08

    SHA1

    2033809b7391528e693cdc9a991601a93356c031

    SHA256

    969d066dd698d17166a9550f51c488260d7495f85777ef5599da5b7e4e8fd213

    SHA512

    be04b28091d1b07e680d1e6f62edec4cc18c0060f2c1d43ca719bbfc6550b7a9162b34cfb894298f0aca0ec692fe812e4e2928670dec6676bc3281f6dbe8fdeb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e975200182126740838b5ac070261bd2

    SHA1

    b642b281e87292200d2ac4dcb8603354452b41ab

    SHA256

    664f3cb6b87b82ca77038a61b2ce441399abb89ccbdce58b64c449a93207d5b1

    SHA512

    6cf48d8059d5a045ed7b225db3bd5f0b2cef2d0de8068e80ab21014e3d4c7e77acf7cacc49f6927d15bdd1be5fbba8a7540fde1750266cf865086ceda9c370b6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e42efc9ea6ebc190328c309bd2a03f69

    SHA1

    f940f6db6e43b94141efc6226d4467584e282368

    SHA256

    61f2fb191525d20eb70a6b3f5b81e361bd18f0da2883bf7d1ff97675b39bea15

    SHA512

    1d5c39d755c2ba727316e78dc58218dbb2bdc1bf23bf1dd8118637b23e53c12f9e3e34e9e51ff74cfe29f9309251d5b25305881039a0d0fd107c5a281835d125

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7757803b4a5b2c94f17c5598e5ed7fb2

    SHA1

    07dac9e5e5def7916ad2700ff115eca05e61543a

    SHA256

    2c7e49ce9fa935a619416b53d75e32d7075d1fa7ded81001face91d48ddd077e

    SHA512

    5b2ed0bcd9d663215dbdd19a613b81f134922ec07dd50fa8d0c30968d6d06e76d1e393581d74a87da1e78768c5d68efe23c1f0a2137b92bb3755b1a6afd6be73

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95bc41d4e2059571658835ac47f85295

    SHA1

    e5bdb3088cbb0d5433328a656f4f26178bc6bc4d

    SHA256

    6c9ddde8b95a400e9d3e8d655708c5325299beb2943b37645d3b215975d607e4

    SHA512

    cc040f5676421b8aa4a3ee45d7050599ce99c878fdb6ee879d5cc20b58e60bb64959be625d284ffcf8de73012899f5d76941d942c3aa686939083b3b21d4db0b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a212744d81737f87bc8e7ff65ba0fb3

    SHA1

    8496bb2b1b2d1d3c16b5c7460b1dc80e7f0725a8

    SHA256

    e2c60d038310179ac93806ba6c73b4f3523b8f9ef73720dbf4be34f97aa2bdcf

    SHA512

    dca719de91237a399f9995809a5b8f064fa8a0dedf81817418c2a67451bbb311d2e502c70a51c54c6c1da8ad2af9c689a7b8f849b5508e8d925be4968e2aac2d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    187c8a77240cdd9613d19fe280861eca

    SHA1

    65681a0ed14236d7fb82d913878937585aa4c860

    SHA256

    8066f82985333bc6a4462c48c17b574c705e4204b391bdb1b9d433b77d5c1826

    SHA512

    c062a9626db7c43c1535605b5c746f424e6adcbdaea3aad970b3926c5a0b7938c6ef0c14a5bfc419017b16b32745e392d08c37feec495e30750773f7038eea60

  • C:\Windows\Temp\Cab9943.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar9946.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI6D55.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI6D55.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI8349.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • memory/444-1311-0x0000000001350000-0x0000000001382000-memory.dmp

    Filesize

    200KB

  • memory/444-1314-0x0000000001210000-0x00000000012C0000-memory.dmp

    Filesize

    704KB

  • memory/444-1316-0x0000000000630000-0x000000000064C000-memory.dmp

    Filesize

    112KB

  • memory/1312-296-0x0000000019630000-0x00000000196E2000-memory.dmp

    Filesize

    712KB

  • memory/1312-1202-0x0000000000C30000-0x0000000000C68000-memory.dmp

    Filesize

    224KB

  • memory/1520-233-0x0000000000D60000-0x0000000000D88000-memory.dmp

    Filesize

    160KB

  • memory/1520-245-0x000000001A8A0000-0x000000001A938000-memory.dmp

    Filesize

    608KB

  • memory/1572-309-0x0000000002050000-0x000000000205C000-memory.dmp

    Filesize

    48KB

  • memory/1572-313-0x0000000002280000-0x0000000002332000-memory.dmp

    Filesize

    712KB

  • memory/1572-305-0x00000000006A0000-0x00000000006CE000-memory.dmp

    Filesize

    184KB

  • memory/1644-76-0x0000000000970000-0x000000000097C000-memory.dmp

    Filesize

    48KB

  • memory/1644-72-0x0000000000990000-0x00000000009BE000-memory.dmp

    Filesize

    184KB

  • memory/1716-109-0x0000000004BC0000-0x0000000004C72000-memory.dmp

    Filesize

    712KB

  • memory/1716-105-0x00000000004A0000-0x00000000004AC000-memory.dmp

    Filesize

    48KB

  • memory/1716-101-0x0000000001F90000-0x0000000001FBE000-memory.dmp

    Filesize

    184KB