Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 04:19

General

  • Target

    f681328a883ca5f414f92c49dbe20d06d6f65d5f45dac594de9af983908174e1.msi

  • Size

    2.9MB

  • MD5

    666994c1545b1e6b686ccd8668df24a4

  • SHA1

    5f38a286fcd1c675a23ec0d67bab426d48065911

  • SHA256

    f681328a883ca5f414f92c49dbe20d06d6f65d5f45dac594de9af983908174e1

  • SHA512

    2a4355f962ceb82827c044fddc581e02a15ec10f8f78a322ea19ab4a131f948a91716f1294979b50a0934b64173a37e1329e69612d43aa29d1d2823e5c393497

  • SSDEEP

    49152:7+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:7+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f681328a883ca5f414f92c49dbe20d06d6f65d5f45dac594de9af983908174e1.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1792
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ADC0A4FC15E15EB138A7F16371174E0F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE3FB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259450052 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1276
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE65C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259450504 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIF77D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259454903 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3052
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI23D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259457586 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1576
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 7DC774D0B600F79FB1D9B7AD76D78EA0 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1364
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2608
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000PPiXTIA1" /AgentId="aadbb5ad-ec54-463c-a2a1-691b556b8d6c"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:1608
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2792
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003CC" "00000000000005D8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2364
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:604
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" aadbb5ad-ec54-463c-a2a1-691b556b8d6c "a5b6f9a1-169d-487f-95e7-08945cb7c912" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PPiXTIA1
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:1384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e35f.rbs

    Filesize

    8KB

    MD5

    cf748f7c120f21395cc7ff27acb93d28

    SHA1

    d2dfc49cf1a5155c1c2288efc564c790e4ecca9e

    SHA256

    d053dbbf9aa827d8e25b86a18fdbe66ebf7fe3a3337da952c99f3f041b6e0a37

    SHA512

    aa845f87f8dc9c2de2ed17fdc3ae85c4002075477e920727aa101d608558a36fdda619bdea2dfabf0e065c059e7505ad0a54bcebec98c8e5e254bf83b96f7c02

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    e7d76972b7bcee4b8e7ff558c4b5332f

    SHA1

    6925ef528563be830aa054df66fb5359aa5e1442

    SHA256

    39d7fb8d9cdf74d5b1fec800b082936486ce182fffc619f1bb7176611b1a1336

    SHA512

    f3eff8f7e02374f100db3148952c4d145b56686057af20aa989311958ed03db2c12da038db12be02aca6430812eb4474c704cb65a39b5566c972c33d0a6b6251

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    248KB

    MD5

    02c5e1d68418152679c58cd3c8130aeb

    SHA1

    ba1e87324cd9ce568584ded884be8967311495d6

    SHA256

    8d21a793b93af34f0de79094be326e543e7a2a18aed77e4e12f0fe5969b9868d

    SHA512

    0aee6baf3a77341b0c111137f81215b481bd7a0e9f6ba871941bf3cf547e9f66adf61cf781d46c04a773eee5762f73221d3094f64d3470d49e7eabf1f774ce08

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    f977354e21bdb4228b63ad325c02c119

    SHA1

    ecce513c771270ea12fa9b0b227da60b27e1b0b1

    SHA256

    bfbbc685d243980818a9d9b4b8eb7f70901f4b6d388a8843b70cafc17bab6ca8

    SHA512

    25db5161079cb5e5b6774b3936a389a06720ac4b0f9899ddac6bbcc705c626b100df249f4f386894443047db19851363d36659c56b73419e388fc3ff984d58e3

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    c63e1d81d747a07f62c914fe92e7e62b

    SHA1

    793dce4607d78d95df754f57c6857e80adb4d1fe

    SHA256

    a7b3fc2f4aac37f80052515b92e514210920adf05c096a7bd85af51b0c3ebe66

    SHA512

    d3cb63dc5699e8c775fcd82de6d19cdeabf7aae39f040ad477995945a3e4cee5c34a07d5f1b0b884de6180e84a576366b1a9af7deb6aaec929ea5ee2e810f1a0

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    d780568a03724cce7a65306e51627f92

    SHA1

    6acb5cfa9df9a9e8d56474086dbc80cd7103e9f4

    SHA256

    6d1836ce65f2783ae6c2daec25d19427973d83f94f28b83e04f07855d2e46775

    SHA512

    19cdefdee8b81e51a534121726d6e57cfcd1ca4eca19b75789e84f1a4462d07c98d2ae3e641567e301a54e603fae8a7f3913debd2f41af47bcd6a60023028503

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    229B

    MD5

    997ffb3f6376b63940b1a1a260d99fd1

    SHA1

    5296bd187d36ef3a327b71762f472d436a051e90

    SHA256

    e92db60a63d205a2ae33085e8d5c0582447839bced3a2990340c3901082ec172

    SHA512

    3e7f1291d649798cad950cfb72e4ba4cecca87678ff92d4ce8fb943bc7ba1c45aef90ef0e7aec80edb3eb2d25547d29699ea4214ca9ba99126b62b1adf291c52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    71bd195d7c58500ba8a871cf9308a385

    SHA1

    4ccbbd6d61a80f21a86adb44adbe9018fcc0d09a

    SHA256

    adea38b7c56668aaf6e0536f8aa40de32e398d248a975b573becfdbf880499ae

    SHA512

    9b230b2a5073903847e17c5835f7ffba35647925e742a4e82dbac36e22fe6d74ebe3c686e38c1c8762db82c034480be83202f58424515603c572551e3b93ef02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    d67fdd580bd145b76a8f83dd774ab70d

    SHA1

    12915b1143c9e9dac224c2ea04c9f72fa5740604

    SHA256

    f67e7df704b8bef35c0a8a2262748acf50d6535fdcfeb5491df175f17887b4aa

    SHA512

    d772faf89a1399692c7d38cb70f2c56b3574f93fcad82f33259523ea8f3789c5433d2d3130bc643757f5fb1afc9f986bba33971bcb189f7e7da3eba148ddf8e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    16c24216150e1a905e10b2e8d548347c

    SHA1

    5c4368666496e27bd6d6bd0d8f272cb4ffb49782

    SHA256

    d2a211d804241dbd3bb351b41b439f024aa630aab63ccba213147264d5da8a64

    SHA512

    f06d505c516c76a3d4a16d908d7603cebb6c78ea58b75d1d5b44a252a0866a80968786b00b85ac23045921e8f561b64ea4be00793ea27c770da4e4c3ede65af8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    0ff8a909af1795b1ad49b9771c23f803

    SHA1

    1b4d84ebea0bd99353acc333bbc5532f22215eb0

    SHA256

    1b254d505acc5a67ceeff6313919727b360c016d453d2aadd0700aac3b50ae5e

    SHA512

    64eacef318075cb13f8b71f2b442df28f4f28a8f8126c8bceef4792494b6109f211ecbf16a63fa0ed3c52bbf130a5181480d621ac2df113933bec8b248e7c2f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    ded7f0fac93d0691d38af30f99f44e2a

    SHA1

    80fee7765279d941631ad35d05fe1f83cf12d0aa

    SHA256

    d2bd41190f965f38f8eab07359f9eeb184a45282bbee40c0cdd3b2531b059d0a

    SHA512

    831557781a222ec9aecfc2453edd154bc3801f1b0caab8434ea27b55e6e11eab90ee1953ab12650921bd096d2e78a9c606a8f3d8f2a0b63419857c4a10183f24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aa38abd25c2da42ac4417bf086fd2e1

    SHA1

    1266db4d44386eb619dab4c053a8b4537b2e0d6e

    SHA256

    5363813eb2361a8f835629f6abdd37455a1d8e46cdeec5561dacc4aa5ef7f617

    SHA512

    31c2957e28660d4091c108d02514b9d77ff2ad306a36ae91633f531d76cfdee66109bda3a078fea69687d1a5d5398d5a9a605cb4cd9bd3ed04a35632825b0cfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b7ae0ca086d8e054694e4e75c98ff7f

    SHA1

    d4177a07ec98074ee9ff395acd5558b6ac35a841

    SHA256

    12d37cf1c0d2c1c17aad982218eec672622a12a773da90749869462c0cfb71a9

    SHA512

    e229d39228e2b4945a5a7e6a2b3237a891666b8934387c08ca3072790c58332557eb7bc1b025b0251757d93f968a8a083fe1e3113dabceee51e58fb1b6551a90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    f1fdf51e5337e9cf732da27936b4c962

    SHA1

    8a2492a0f9be44c915f6c405eef9548c005090e0

    SHA256

    78b68f5d19f7e8d14c9533c87121a49e676bfb8ae3d32a97508cf7c8878d9408

    SHA512

    f1934bf335afe57b8b49e7355957531585be42cf5e8ef72b8a99f44834b798f4c07bae735e85dbf07db954f57f3231b2587ff04ba09b64095f65411257420f9f

  • C:\Users\Admin\AppData\Local\Temp\CabC4E7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC5D4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE3FB.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIE65C.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIE65C.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSIF905.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76e35d.msi

    Filesize

    2.9MB

    MD5

    666994c1545b1e6b686ccd8668df24a4

    SHA1

    5f38a286fcd1c675a23ec0d67bab426d48065911

    SHA256

    f681328a883ca5f414f92c49dbe20d06d6f65d5f45dac594de9af983908174e1

    SHA512

    2a4355f962ceb82827c044fddc581e02a15ec10f8f78a322ea19ab4a131f948a91716f1294979b50a0934b64173a37e1329e69612d43aa29d1d2823e5c393497

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    9044447bad1adb457c51acb682d76a9f

    SHA1

    ebe8f79f44d5860f05f3a7704be3728ae97acfe7

    SHA256

    66a5bfde111261a8663a67b7489ddc4c09a666b521f55dbcf4e16250015a45d6

    SHA512

    8ca1c028abd561b18c8f660cdfa9ef2849f98da2ddb2e3a96d60f6f5389bf1365c6ddf18b173e4623454eec96835cb2f116120135140d2b86c4017b379dbbc5e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f14a14911a163e663166efe68b4e45a

    SHA1

    3befbdd337b61dd6dc01f4d75bfe57f8724fb9f8

    SHA256

    7410df0265ba5fc0084e47dd096f26e2e8510b5f3af7e80311d3d6a88607250a

    SHA512

    6697ddcfdda757dc6a4da90ccdffc04d8762d40bb7a51cdb776994b8d007161b68ebea731c7ad6060576bfb2d4a95f824fd04d2ee1956d76c9be4c2f048a2d2e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c9935d9a90fa2df1794b882e94e3a0c

    SHA1

    2ed9de917d140f90cb095f1c324ab59335a659e3

    SHA256

    bb96983f29387903cfc44cfbf87c20362da6e13b15a7cbdaf1b5517af054cd8e

    SHA512

    30d0a5ba9fffd9cb3846665929feb2a0edd0ba3d65df590e2e4bffd2b2a49498a14bde71c7a37557ad3bfff04b958afe0945178a8392eb665a088c4c75afcea6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f8adad244b4ee16f30128720ed99e34

    SHA1

    dce9e8fade70d88f861964be38c91af37331ab2f

    SHA256

    585ae29ca5075342c9eac0a0368068b836959baddb7969fe7e84a21cf8a09948

    SHA512

    7ef1126c1751af4f7b2ace66a554a03b44383f4d08235c28f59dc8d61294e42a483d8e014005a489e88c5d7169d41dcc975b4a753e297c2716a0fd37252b8079

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f18d6901df5e35569664ff18afe7f8c

    SHA1

    71b4a2953953243a248c99503963885f09121d4e

    SHA256

    653825260067e48bb692ef375b26349d99feefc2605a87545bda15b612983049

    SHA512

    03dc4ca761c12255fd94a715b5411e2dd0bf18e0ad1f8caebbe4dec70d9820209918b133d1ce25c7f8c970482b12474485d11128be25b05ac75d4186dfcca144

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6909b6408384a8a85c15b46158bcd0ea

    SHA1

    107f80bcd68fc37c55a13495c5c122bbb7d3c7dd

    SHA256

    f87fed1176ed6ff758b825967fc6e18b1b3e81c75314be051bf15472c674b410

    SHA512

    432e637a6a956a37eb43ebb09b8c96c8bbeb08a92234e8768dd8afdc760315248d1caeeebed131b123fa258a3ef94a892804874eb866b78deb1be25db79f3e40

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47064082637fec8ab1e1f8115a2d7d10

    SHA1

    f87d88a621c7a46fc31e5301683d22b774782d75

    SHA256

    945b3b36595d66a9e5aa76245c62e334b008d3576b331150ac0e0165ef689e1a

    SHA512

    3850c46e2c1ed9ee8363209de32fd16eba98c499202fe832c9edd144748542760691142f9590174f9a33b06dddc3c7aba2d2386c7e9aa8ab41367c735b2098cd

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c984b3f35c038bff99d5f46230630172

    SHA1

    927f90eebee7291f1b9987c9a18b5cdd0236a4ae

    SHA256

    cdfbdfc79852b094760d99a86336042b249b42a1f9e48f8a9e1fe50c65c72e05

    SHA512

    f8e3ac6a46dc84b2bd0099124b26817655536be17643304e403ee2228293802b9ca7b49ab73837f7e43d9a95d575e0b4823c74a85cc9b390654c781c736884ac

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f186b8c5f4d113ce75645b52010a7ca1

    SHA1

    720ded42baa9dc07384f94cd852912bc21302e32

    SHA256

    5fc0eadf9fc37cc0778fa55351aba56b9adb910c65a99573f5e96792ac9fec9e

    SHA512

    a9a3f11931353ace4705193fcca9e4101ae7933562567da931e4022c0b60e38f50377dcec430071e1cfce52dd57b016cdf3aa1c97511b0f7fd65e707ef979230

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27f828c034399196d022306d94bf60f9

    SHA1

    e0d95f3fd88a4e08ba58cd3ec60b51e31ce2b2e0

    SHA256

    7149231f39e7ed0c8f61238d6a51d91c6a6d00951c4c88b211288f79a1c7830e

    SHA512

    4bb01e42dcb6f39fc1df1de06d18adda70e290aecd812fc62555c4ecb936f366cc8542ac5220d1940d9441e1b8017d1e03483b7aec8fd2c460507b9d65aa3837

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f6d42a4dbcda24e261e3bec8a2d472c

    SHA1

    616b04548c96ef18825efb8f983ff78c9342ca09

    SHA256

    8707d186f2c32f8bd8ade9b84edc83c4bb22a99b65f7877abc9cb0134e6e7c06

    SHA512

    3a25ae2d2ba4607b6c1d7c18b26fd35a5449a42985f17bca0c1cb06563d92a2e350c65c318971a30a18822740ffaf09d4425fbc344ac8aea2669bf185c16ab7d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e53198455b3bc1959699e4f12a5bda5

    SHA1

    0c0d64eac93b1a1cd518527d1a9c8b49ff5d1b57

    SHA256

    b3fd9e8e697967945bee97f15cfc5e4930ea1321f722f4332606713b41500e10

    SHA512

    0dcf8d36e321746e4d0c67aaa8d14b016088f989aa057a5ae31860d47748f0b2f44585e0f9364fd77f647fc88adead85743c4bd7f390162e492d7061aec8348e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    a7ecbd62eefa861b3d8845c1c90c8aa7

    SHA1

    3eb0b484e9c769ada863195df721a55faa69b2bc

    SHA256

    75c8eaa5d395c305a1bb0312f0ceb2c0fd8685310d393562ec69df51a32a5ea2

    SHA512

    faf90d30cceedbf526c4764ddc42a16182b3ee757c720285b1dcc27a5feb03677fe45cbc718d9084c5a746ffd666256a9c9ed046443e39f87d58b98fc3454902

  • C:\Windows\Temp\CabF7B.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarF9D.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIE3FB.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIE3FB.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/1276-76-0x0000000000BB0000-0x0000000000BBC000-memory.dmp

    Filesize

    48KB

  • memory/1276-72-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB

  • memory/1384-1247-0x0000000000360000-0x000000000037C000-memory.dmp

    Filesize

    112KB

  • memory/1384-1245-0x0000000019890000-0x0000000019940000-memory.dmp

    Filesize

    704KB

  • memory/1384-1242-0x0000000000EC0000-0x0000000000F02000-memory.dmp

    Filesize

    264KB

  • memory/1576-309-0x0000000000C00000-0x0000000000C0C000-memory.dmp

    Filesize

    48KB

  • memory/1576-313-0x0000000004880000-0x0000000004932000-memory.dmp

    Filesize

    712KB

  • memory/1576-305-0x0000000000C50000-0x0000000000C7E000-memory.dmp

    Filesize

    184KB

  • memory/1608-245-0x000000001B640000-0x000000001B6D8000-memory.dmp

    Filesize

    608KB

  • memory/1608-233-0x0000000000B80000-0x0000000000BA8000-memory.dmp

    Filesize

    160KB

  • memory/1784-1132-0x00000000195B0000-0x00000000195E8000-memory.dmp

    Filesize

    224KB

  • memory/1784-300-0x0000000019CA0000-0x0000000019D52000-memory.dmp

    Filesize

    712KB

  • memory/2452-109-0x0000000002580000-0x0000000002632000-memory.dmp

    Filesize

    712KB

  • memory/2452-105-0x00000000003C0000-0x00000000003CC000-memory.dmp

    Filesize

    48KB

  • memory/2452-101-0x00000000008F0000-0x000000000091E000-memory.dmp

    Filesize

    184KB