Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 02:43

General

  • Target

    40c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216.msi

  • Size

    2.9MB

  • MD5

    30c87bf81a6b9da8c2d2196d4471f056

  • SHA1

    a8c45bd3cb66256a07ba8c4047aa88db5c72c50b

  • SHA256

    40c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216

  • SHA512

    066c4c9922994259cdb62d9cbc21fa6e63b1c765a18a1c4e94b1741e60b580ddb132134f13d6ad0f86285c618243ca6849dc5aac92fb8b8be014610a6159bf06

  • SSDEEP

    49152:N+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:N+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\40c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2700
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8981596E96B61BC1FCF1DCBAB76AA7DF
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI4D09.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259476852 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:784
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI4F3C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259477320 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1876
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI5F44.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259481423 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2424
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI69E5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259484138 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2432
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F824B15C85D7432438EC818CC7D43446 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2720
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2564
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000PPiXTIA1" /AgentId="a878ee6d-5647-4f37-b2c3-1766a079b486"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2648
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2176
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000574" "00000000000004C4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2648
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1192
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" a878ee6d-5647-4f37-b2c3-1766a079b486 "393b0d7b-dcb7-4c08-94aa-38aab7f5e606" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PPiXTIA1
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f774cac.rbs

    Filesize

    8KB

    MD5

    a2362cdbdb6aa46b27f2367eb1059984

    SHA1

    a1eb686fe9e23faad3e4ff90a197ac11665b0755

    SHA256

    e71c6961f44a57f64ec95601a05880a9ee7c53deba3a925897ae8b0c682348e4

    SHA512

    82d8bed70817b0cb9ceec99c223c35e6a26af89ff114a50b677efaeb4497081b1af344d15b4c818ab1b2e61f2eac0c0142bf3da033aed7bbc3b413c909f46e01

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    e7d76972b7bcee4b8e7ff558c4b5332f

    SHA1

    6925ef528563be830aa054df66fb5359aa5e1442

    SHA256

    39d7fb8d9cdf74d5b1fec800b082936486ce182fffc619f1bb7176611b1a1336

    SHA512

    f3eff8f7e02374f100db3148952c4d145b56686057af20aa989311958ed03db2c12da038db12be02aca6430812eb4474c704cb65a39b5566c972c33d0a6b6251

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    248KB

    MD5

    02c5e1d68418152679c58cd3c8130aeb

    SHA1

    ba1e87324cd9ce568584ded884be8967311495d6

    SHA256

    8d21a793b93af34f0de79094be326e543e7a2a18aed77e4e12f0fe5969b9868d

    SHA512

    0aee6baf3a77341b0c111137f81215b481bd7a0e9f6ba871941bf3cf547e9f66adf61cf781d46c04a773eee5762f73221d3094f64d3470d49e7eabf1f774ce08

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    c63e1d81d747a07f62c914fe92e7e62b

    SHA1

    793dce4607d78d95df754f57c6857e80adb4d1fe

    SHA256

    a7b3fc2f4aac37f80052515b92e514210920adf05c096a7bd85af51b0c3ebe66

    SHA512

    d3cb63dc5699e8c775fcd82de6d19cdeabf7aae39f040ad477995945a3e4cee5c34a07d5f1b0b884de6180e84a576366b1a9af7deb6aaec929ea5ee2e810f1a0

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    215673b7df59e9c1ffa9f46819ff5cd1

    SHA1

    1dbcd0a49f663c1eb32653aa4eda90be817f8d8d

    SHA256

    a3d7c1d52f3f0f2bb6126832d0a92860152f8782b44d0c691c069fda699afda2

    SHA512

    1ec286889e8bb4757c588479b4237b8c9cdc47bc7065921d2053de3e02c77fe0bd6432054cb8ccf9f3a91b742f7f2f70f434055a5c1a59718af143fa2cd8cf4b

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    229B

    MD5

    d10d9b416d0859749b40756c1a61c762

    SHA1

    7c64dba8996fce9315d8448c2bcb2c249adec4f7

    SHA256

    e12d2f4b3cd093caadbd16a40f351916e2baadb71bb37c1b3d0f015110f8056e

    SHA512

    f55bcef3dc51b41cb679fcbc23f1d63ec419154f85e1e4ac99df8d74bbd0b32eb032c19261a7ade483f5fdc9a1fed787867c4a24ba6c833442935c39a944f8c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    71bd195d7c58500ba8a871cf9308a385

    SHA1

    4ccbbd6d61a80f21a86adb44adbe9018fcc0d09a

    SHA256

    adea38b7c56668aaf6e0536f8aa40de32e398d248a975b573becfdbf880499ae

    SHA512

    9b230b2a5073903847e17c5835f7ffba35647925e742a4e82dbac36e22fe6d74ebe3c686e38c1c8762db82c034480be83202f58424515603c572551e3b93ef02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    d67fdd580bd145b76a8f83dd774ab70d

    SHA1

    12915b1143c9e9dac224c2ea04c9f72fa5740604

    SHA256

    f67e7df704b8bef35c0a8a2262748acf50d6535fdcfeb5491df175f17887b4aa

    SHA512

    d772faf89a1399692c7d38cb70f2c56b3574f93fcad82f33259523ea8f3789c5433d2d3130bc643757f5fb1afc9f986bba33971bcb189f7e7da3eba148ddf8e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    16c24216150e1a905e10b2e8d548347c

    SHA1

    5c4368666496e27bd6d6bd0d8f272cb4ffb49782

    SHA256

    d2a211d804241dbd3bb351b41b439f024aa630aab63ccba213147264d5da8a64

    SHA512

    f06d505c516c76a3d4a16d908d7603cebb6c78ea58b75d1d5b44a252a0866a80968786b00b85ac23045921e8f561b64ea4be00793ea27c770da4e4c3ede65af8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    25c1b2b156e4ffdd04b83085579c5891

    SHA1

    a47acdd921306cbfc3060cda2a9cd19827454cba

    SHA256

    f7a8999a3a23ba18285b4da72f53f11aaf95b2bd230ba2e8702400bff60850e7

    SHA512

    521ae9e9c86a63a297dd4e094ab30bff6ba3d9d2a9cef42ce64917699e1657a7962d6b6db7af820e89f69a94a782f4f6a06335baa631ca5662193bc628b17836

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    6ffc9b6bf2b156b9dc46fca76b73eac9

    SHA1

    a0cf4928010689f94c8c4b95e231f6dfb960f7dc

    SHA256

    ed1939ae1fccb213a96ead4fc0e2525c83f087516824b77a01ad7220d3938b80

    SHA512

    ad7aa7b76e0d054fb33fc7522af03160e0003b9a118fc3f900bb3915570a3ed6faaa22eb68b89daf23923f5f7765f1de446de445a209eee630aa877f98437c14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    474ada0a6c947c791a2222f9859a78a5

    SHA1

    876a641361e5bf709cc538466fea70f502a93833

    SHA256

    32fa4ef52e1effb4e283b6b0d803a30e243e9a12f64eb910d8155f74657a307a

    SHA512

    bc43109fe911196418fa22e3bdbb8b9444df2dac71a5a55c27b35d35b51b858a8a8eae586472cb0560c76c3dc6aa962a5f7322e79c9b64afca05d2dd52100c5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1488d774c0ceea65d552976c6b8d5e03

    SHA1

    7ae3645397bd4dff86579dc92e1a6abbeeaafcb6

    SHA256

    cc8cd6e71af78798694962fc37cb16ec90a3ca8ddd82a2f0b67089cdbd5e1af9

    SHA512

    a356d8d6e1664648d43e35fb6164e9eee57f35c2d6cc0abd8d7edfeccc701f6f35919311726b4badfc2a28e254fac0b1b12ecb2667bb72a3e74280410c0c875f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    1ab5ab858f87f1d5f5b9d484c8594d71

    SHA1

    75d92f388b4794b6d560a65eb0c51f81d3f6cb19

    SHA256

    6326e471131c534f9b0b32b890abbeeda3a59cbf836305a854c58d675e74adfb

    SHA512

    238dae0152a39fedd8efa87522bfd86d1af8aa4e9220aba1f82dfc476cb751a30d8827b74da05804fd5b0c95b8d790fa5e5202ab028f7e114129c08d2dde7463

  • C:\Users\Admin\AppData\Local\Temp\Cab2E05.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2EF2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI4D09.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI4F3C.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI4F3C.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSI60DB.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f774caa.msi

    Filesize

    2.9MB

    MD5

    30c87bf81a6b9da8c2d2196d4471f056

    SHA1

    a8c45bd3cb66256a07ba8c4047aa88db5c72c50b

    SHA256

    40c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216

    SHA512

    066c4c9922994259cdb62d9cbc21fa6e63b1c765a18a1c4e94b1741e60b580ddb132134f13d6ad0f86285c618243ca6849dc5aac92fb8b8be014610a6159bf06

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    8c371a73ae65577bfdf551540cd1d6c8

    SHA1

    575c59efcb0a6c214b4ad4c1a1772f4f57b353ba

    SHA256

    aaeef21c6be2303e12a40913214b491e6ed1c996eb1f490ec8282a110a03b848

    SHA512

    ea1aacb36d0a2864fa132ac5152be14506da0c013a95fc4db828899be68370d76f9ba8c4829be26572a5ea71157b43254d8c05a64e4ff0e805bfc6d673bf2ef9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b975e385b5f464fd97951ec30de87466

    SHA1

    38c61488bafdb33ea9a4d90f6025b7f994eb018a

    SHA256

    e624ff7829a12fac7e94c5442b4bfdd23059ce7734170ca388c3ec3f8073e44a

    SHA512

    898266ef08e4afb3845dad7106e8f3be38a7e651e4022aaf58ab91d0196841df00ad2e2b928a1c4e96c9a84d46a37690d3485fa79eec80a43944939cbfa6ae17

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdbddf949688d183fb489a1d38d3b5cb

    SHA1

    81b0ebde9d6116a2e3f9c3127ed8cfdcbe321638

    SHA256

    17b24a258434e7ab16bed97a7d2ade629d5164e73d81b62cf83ec92cea383e37

    SHA512

    d9b62239556221b1009a44be0bd6da3dbae0f1a0d2f8940be03a2e13ca7ccc29a3f8ce182904cdd5afcf0ea98e98e498ecfca41c3bc805255b2fb331b0951d9e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    731765baad3cfd746545d61d7256cc5a

    SHA1

    9f07e72ac14bafdb07cd39404acd01ad651208fc

    SHA256

    c656cc413dabea929ec441acd3ad68cb1541dec8c100e3a57699c498c21e925b

    SHA512

    afe338b91d3629c5aadea2137a1d12d4f91300e1f5c26dbfcc142d633a57b0a22335563ee68382617573fb27bdf0abe049dedaf552d772540fcb2d2037c4b2d8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b1872dc11f0869a0fdf3e1a52e5644e

    SHA1

    9a7dd82f55ade541770e9398c91fef27697c4329

    SHA256

    5286ed4514e6bb9c328164760512ae656d066d814109ea5516c4c5d07e8511f9

    SHA512

    06d5fc099b499f58032b2bd33126e89a459c74b3af3f9aee7f5873f5e312a479fb5bc8f4cdd4dc3bb6d306340685a92ca40b955dfd8f501d39ddd1f17ea1127b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98b9afa9dd4cd44869a9c96b8976e080

    SHA1

    8307923eac81d9966de3771b5545e73aa133ed32

    SHA256

    d3bc52977ad21168c73e7b8d680d127c9961866410da58ea4baa9692dc9efa78

    SHA512

    07fdf88e49b9ff67a94086fcd370261966b06928383706334d60139138131d462b6346df6fcc65e46a7ac43a36ca2613de83831e6bb8bf58b74fac3e28827327

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bce6bb91291421939aa16e6e283e5b9e

    SHA1

    253840baf9549d87e70e2151813f5f3e83c2c06c

    SHA256

    5f30bc370f7627188022f6b19cd0cc6f4ff2d361f142cdd3e2a5d36de6b5d383

    SHA512

    691e0ff56cb3637da12fa82945748bf4c1bf954164ced2bb17ad9e968c63790e5e55c416511b2b3347743588f07981bd7ee2e9d5526cf1d495c6a41e3afd0d66

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f16e339d9983dca9beaf2daae00cf06

    SHA1

    2faa387c151246ca593efd2626185ce114ea06da

    SHA256

    3a5e5da3e0239fe4fd18ff70ab4a8f4b5e35d4dba2480b77ba11c7384c7e3ce1

    SHA512

    49ff3dff580e960281651fd437eae6085feefd870350c10cfffb493f00502e6e9c82064ce90c681b5f22c6238188f82847f90f66066c2752c2524fe3bd70afaf

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5726c925b3c9e4b28c8fef9afc6c72db

    SHA1

    ed87d1828f40e11018f44b76611586618304d780

    SHA256

    40bd75aabd753e95ebe402fe3e4b4a4d82d022e0c82cc25bfabfedf34e830860

    SHA512

    978d574c3927f10c035c99be961b58969a27bc907b236eb5347a673fb4cf7765117a4b76e97fa6cc30f868a07dc24114770956d25932a4a3558dc71d24f0ec57

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e2ffc61c4529fe3826161a67d7e8ee3

    SHA1

    5915fdc1f35d8a2943a004c308e013c37f36fa8c

    SHA256

    74706ccacd28c87385b86a11cd11a60b75cf825bf0c78b2491cee4265ff764ff

    SHA512

    059d89feb8f2787d702923c94e8efba6fee31e43d2adb755c427a9cbb98107e54f199862d0cd3ebc3e609bf04e1219bcb37564eb007b121e70c1b895131de2c8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19f5b343e9dd4401afc2dec100bf455f

    SHA1

    5ea4c2892669143d67105251fcb08371199e5c6c

    SHA256

    db650bbeb58756aa9708423bffcbe481c6fa0b1eeb5212ecfae9ec616858fe23

    SHA512

    81272f40157c5ee4208a5353ae06117b6cfade528213e32aa44d32bfe06c7c902ce180c4ce3699e52da5d1053d8927f2233e0c51bce0fb6fff484f601fe41d2d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95ca5f32231d124132aa7e29e970b2d3

    SHA1

    424490f4196d9af5ae0282bfe6ab26ad7de921fa

    SHA256

    74fc53bacb8fcdeffd84980d5bd356d2f66d3a0961065b57b8a4280d350ed766

    SHA512

    76b0fbba6312e2c30412f5358dddd17855965ed14880400eaf349c19f3bfaf2c397e415da0b96b8a66231457a3eb524d2860967fa4e6bb34e6c7c67cb03c0690

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9c8ff726a1be78eef0c885f0d5a661d

    SHA1

    c71cdfe8228af46ce3288f0c9f880cada136ecd2

    SHA256

    43968bca55dfb10e55c0a871ecdceca62030e2a15deb9883eae1ecf80de183f4

    SHA512

    3c665e04d07885b5d2eb87dfde861c9c49e9b6a6e58fdc873578e05106280f4905a92badd39b833cca6cb6e0fe4135e40e08053ed9ec72a7f816e66f89628583

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03921b013059f4b333a1a955c61a9c4e

    SHA1

    a923c5e41b5dff857407b34616f5b1f5a396a9b9

    SHA256

    47d708ebece544418f7b8432d36d140e89f4a1a90ddf48bfc6c4857c5fe93ac2

    SHA512

    208d212768eba6cafa20fd376eed99d23c930b34ae99b6e9ad69b1a0cecf585d66349895cbd1747ee35d68b80d671bd0095eb00e292d4e35a0578e29fa031397

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    725700a4086982bc37b620d33f30eca4

    SHA1

    a8baf38f69d8df8644b304e4dd926cc593902a0a

    SHA256

    0bc51e85db095fe2adccd1293fd9ecaab4df0c9a77b841173b574a1089dd5992

    SHA512

    4de6fdec3a6022daf2f6006ae903d836cf452033b13b049427c62dd502986daceb7ac298157a68afd0ee2fc5bcd0b2d48b6640f8e22940b9e05f6acea33788ca

  • C:\Windows\Temp\Cab7677.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar767A.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI4D09.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI4D09.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/444-1433-0x00000000192C0000-0x0000000019370000-memory.dmp

    Filesize

    704KB

  • memory/444-1430-0x0000000000060000-0x00000000000A2000-memory.dmp

    Filesize

    264KB

  • memory/444-1434-0x0000000000330000-0x000000000034C000-memory.dmp

    Filesize

    112KB

  • memory/784-76-0x00000000004E0000-0x00000000004EC000-memory.dmp

    Filesize

    48KB

  • memory/784-72-0x00000000004B0000-0x00000000004DE000-memory.dmp

    Filesize

    184KB

  • memory/952-296-0x0000000019590000-0x0000000019642000-memory.dmp

    Filesize

    712KB

  • memory/952-1297-0x0000000000DB0000-0x0000000000DE8000-memory.dmp

    Filesize

    224KB

  • memory/1876-105-0x0000000000440000-0x000000000044C000-memory.dmp

    Filesize

    48KB

  • memory/1876-109-0x00000000025F0000-0x00000000026A2000-memory.dmp

    Filesize

    712KB

  • memory/1876-101-0x00000000002D0000-0x00000000002FE000-memory.dmp

    Filesize

    184KB

  • memory/2432-313-0x0000000004CD0000-0x0000000004D82000-memory.dmp

    Filesize

    712KB

  • memory/2432-309-0x0000000000A50000-0x0000000000A5C000-memory.dmp

    Filesize

    48KB

  • memory/2432-305-0x00000000009C0000-0x00000000009EE000-memory.dmp

    Filesize

    184KB

  • memory/2648-245-0x000000001AA90000-0x000000001AB28000-memory.dmp

    Filesize

    608KB

  • memory/2648-233-0x0000000000250000-0x0000000000278000-memory.dmp

    Filesize

    160KB