Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2025, 20:36

General

  • Target

    NFe41250177881001000117550020006153601993846395-nfe.msi

  • Size

    2.9MB

  • MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

  • SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

  • SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

  • SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • SSDEEP

    49152:Y+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:Y+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\NFe41250177881001000117550020006153601993846395-nfe.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1960
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 85C0FCD9CF0327F14D18D0FC0EE9A032
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEB4B.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259451939 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2028
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEDFA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259452454 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIFCE9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259456292 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1068
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI79A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259458959 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:612
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 96A7D00FF8C72433512999F474DDA486 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2740
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2648
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Q4TE9IAN" /AgentId="6d035fce-af36-4f75-9d29-b0d746189e93"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2636
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2336
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D0" "0000000000000570"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1300
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2060
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 6d035fce-af36-4f75-9d29-b0d746189e93 "06e75d10-496f-4ead-aed8-450ac61008b4" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Q4TE9IAN
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76eabe.rbs

    Filesize

    8KB

    MD5

    d882e7697953eb97790bd6c425497616

    SHA1

    324745a4dfd4cc77a89ca0d2f1204ab9098bcd99

    SHA256

    fb96b9fd90b33fe5b281cc81f4f4fc1142a0d07f8cd50ca25bc5fbc92b902dee

    SHA512

    881483165a3821a1acada13f31aaf10a5b9c4f355d005d1e761716818d3d250341ebcaf6ab47212e072c05cf2bed1660c8f8c2f76f2ba39fad49a8a284bebd3a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    1e065e191e89cc811ff49c96fa8fa5e6

    SHA1

    bc50ff2a20a8b83683583684fcac640a91689ed4

    SHA256

    d88faf6d47342587ea5fbcaf2ef88fb403f7fcdc08fcab67d4f4f381c237a61e

    SHA512

    5a710e168316c30ca10f7b126e870621f46cca6200e206a9984d144abd11fea045bc475599b18597bbed1e4f00e832d94576837f643b22ffaee56871629290dd

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    247KB

    MD5

    aa5cf64d575b7544eefd77f256c4dc57

    SHA1

    bd23989db4f9af0aae34d032e817d802c06ca5a9

    SHA256

    79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

    SHA512

    774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    111e2e63bccead95bb5ffc53c9282070

    SHA1

    eaae7df21e291aa089bc101b1e265ca202be1225

    SHA256

    9615fe5fe63c48b13ffd8c9bc76170a9ed1cfea6a3d0901e857a1c6c6edaea76

    SHA512

    ffc818615fb30e24633c90b8f5a55c100b5f307414ec54e5a2914bb4ea36d3fb3aa6ed0e5815976a2f6d1b7f056e7da1f108a8eed81b458decebe721ad30b920

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    bd0adfca594c290c8cf44c789a4110bd

    SHA1

    93a8ca1b612d74948b01ecc1eb97b7bb096cb1d6

    SHA256

    382291efbb4a4f43a7b3b4ccd30a269e7602ba0e0c0d540c0c76c8fe3f04ebc2

    SHA512

    4f71ea8f02fa22008e32ad364dbc0c37ec3d27edc6bc7edb147002de56f79cd29cc6a0f73f76adf72374d8a401dc8680c567f9c0c2d90ad7d4fb045253a81f49

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    317d0cb140567783baf71fd0f9305f81

    SHA1

    2c4d326a51fa51a710f68a654efeab5f1fa334bd

    SHA256

    ae4ebb881506fedf96fd200c2ab97fe06adb60c008fe0d6bb1b8ee6f59983815

    SHA512

    051559a0e92a73f333ad4659028a2707d2699195cd626fac7ea502cfead31bf55d6c4a253b2529aeef518cad795cc4e9f072ce06e5c5e79c0b3f5df3ccbf1651

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    24c659285181a6979c3b1c898260b9d1

    SHA1

    71e65f61a9ed73586fbaf96339f4776ef59b70a6

    SHA256

    5338deecd4178b1ba815013ab182c436111a0ef8f8c2aff10f9051b920b80104

    SHA512

    64247f866db8872d9d10b30e35023d5dae79d13403f66eb66a13c22d766b032cebf082343bb8c8e7b5c77b47e1478c891eb2164a94b17edb988cebb997732d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    0ac0e46916c5474084957814c371fdcf

    SHA1

    f5d891a355ba8dbb8f84df5fb72d6a346d51304a

    SHA256

    894f1e360f07fa870dab28681da446251379565cf4dd051ac0c4810d50dc0b3e

    SHA512

    bcad0eb941221b6e0225fa16e9ad23c3b191f6e1ba6b0de0550be25f1e02711fd0b071a2cbc1b04ff190deea41a0c3012d2bc621619c5f8b5b66640a0ad4c99b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    f11d59d55f077f02f2651680043ddaa2

    SHA1

    0146112dcbb3b26a6c6f24839f6b1276934eb35b

    SHA256

    a642d13d047785429ffb39d7bfc6e7dd0b92b1be61170e6ecc876671a02fb6e2

    SHA512

    313151140da21c56c26d5ec8a4a49e791d9654e15fb387b5f1374337a644c0e7deb0e3d9c45a9f02b3ee5b83b6cd1a03fa4bbda857d3ce5a332eaa06487be5b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    b311a03728bf18be53efaa3cbf971163

    SHA1

    9e32d3cc86661a5d4db163b7a2b8f6777494ef2a

    SHA256

    45ce680928f8f2cf1c3c9f4a92c6dc8a416a9eb4a48dc5c9ed96298f2c0f346c

    SHA512

    1c59431ae6e336fcf5cef404df9fc37e03627b08a3a2c9ed283b89db0c88ed1cdd178b37a8f60ac77bc6674e7c884933767e0bb1f0bd10d9cba731088c1dda96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    eba20e0a6c14f1a09aad707347e21662

    SHA1

    73484b13dd1f9086716a7a3248b991d63bdc258b

    SHA256

    a237c52b87442e9e99718a10bc04f4381a8966a27854ee95378fdfcff8a83e9d

    SHA512

    a1379cbac7fb69935e08b0477e4c18330785ed2702d7340b7d0e7e7aeda4a1022e093a23c796b0a79fe521d93e1c12a7b1b7cff5523f5c3ab5c538d15abfb58b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df400689646d21021013e000f1eaf34e

    SHA1

    9b61e58a07fc5ea2a8fbd30f1c3c3312d144d84b

    SHA256

    3cae6f7313b82a68ba8fef2a19fc673802a1b207c2b2f3368889832235a7453e

    SHA512

    13edf986ebd87fc0aefbb28a7db7ce6f7c2ff31c3f524fbda07224c9ec38710a237765aee9ea307f065a29cc9040e3f4149fa33c2993f7edbea996baaa7e8c0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d35a169c52a3e2335bfab1ef1a01fef9

    SHA1

    b7d40c95c301f4ef34a0bdeec06a58d32cd024ef

    SHA256

    1d77c3aefc0c1061ba8a7652c2fcedddb3128d0dcff7506f3f0a23d49e125509

    SHA512

    33789c567a8b96bb9a6d0d44818f0e38a05897b58c85c6d4d61a154cd1bec6a0596e5fb9d5c547f72c0840035c426d7b5391679485267717e7a4f79530b46b4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    d7a6cfce6ce20e703bcbb9fd041a056e

    SHA1

    9ceac3d1de8775985a1734a5910e3ae8720b5536

    SHA256

    fbf3f0f5635fedf69991cef6a136458153f19d98c643a6b98dcb18323ec368c5

    SHA512

    d93cc1da84ffff04e626d6a15450f0a33ab2b07efd1daf71519b73c5d46a8811d69d3896128e3029fc2d5f0e60285fab7bf0d4a329d447d441f264638e7d623c

  • C:\Users\Admin\AppData\Local\Temp\CabCF62.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD06E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIEB4B.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIEDFA.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIEDFA.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSIFE62.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76eabc.msi

    Filesize

    2.9MB

    MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

    SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

    SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

    SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    6ebac13935cb5de6d58e43aa2f6c77c9

    SHA1

    e5adb8fa52f012b037eb35483a5c856d337f621f

    SHA256

    c946665519b073768a2e9d7e185216a8dfa4f9487379b37131044d03b345e119

    SHA512

    0f93c2dca78e1c085c72375d339e20f8b6449e80e26dadf164cc2a79e5a31d5c7f70fa42c4f287be40704e8ee210f6749216d9de23e7292e08ee50f6f703e296

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    299239ff471d6ebdbfa2fb11fb6ef945

    SHA1

    c2062fb28d78dc406b330b180dc901a21a6933ac

    SHA256

    6fa779f6f1784e678895ca37ca72b183f2f17c5a8e5cee954cd7de1fad99e025

    SHA512

    b38e4e7f4f6bf7163c32899c0c4f6527dd2b7ab7d260bce9a22c911e5d5dcad050d59c6041a1630ba88e6c32896fd158e0c9a41f484d862e634b68e126ee6dbc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e3d47576b150a9d6a35dab14cbbe574

    SHA1

    39d2c665d83330b08fbc7a6f00609df8a9e7c4dd

    SHA256

    a42c2e8789ad1c299060d8c523e724b0764796b266c63207ddc79542572d94aa

    SHA512

    4a7ea1c7b353c657ff11d8c56e4ce1753cf2cb9bfe8e5c29f2b3899a5e26ba0c9043164ee54643fa0b93683aab31406e602ef5274ebebbee152852e35646888f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    424cc9aec3f77bed9f6cbf2b6507cea8

    SHA1

    d16588278e6acc9161f888260d99a55b392f32b6

    SHA256

    2be7a2dfd1be9e2b77fea4375627c4f2b0c0fb420617b5178250d48d51c8c675

    SHA512

    0dbaaf93909299aff64b96c830c352405179a53aa2fa3d577a34dc528c9e53aacb2d66f9e20d65e9991380ffe668c7d31137994148d3a48e55e9d298038fcaf9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dac7fde64baccb77701609dff1314a68

    SHA1

    f4edeac5ccb661edb1d839688e898e12b62c8c35

    SHA256

    b936d1104ddac49c9c939a0d7b6f0851d49be8b05d7567ab2240a138f41ada86

    SHA512

    acb76b5ad245c4e7391cc41efd18b6030d25d41ba92b3d7a62e79014ee1dc1f39f2f979da332f0634407ec6aecc9ae255bba85a04507fb3ba876eba5c18d59c3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5933769748ff915f84f66ba7054f681e

    SHA1

    19bc683d61898e445fb2453fec368bff4fe5512c

    SHA256

    fea6c2492f94c2b8ffdeae07f9c6ed2d32ac03d0e1501a2642c9965624107704

    SHA512

    fdc97ffdfe35d9d45fc98d830dafe19d0e33fca7a299f71f10957cd733818fed8c3e1e2241aadfe254e5509d98dbeb04f21a33291fa9ce5a36a32d117ee45b69

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0bedb58369124c1e544815963578358

    SHA1

    8252e2ec45182873d17eef5f761ee75852349568

    SHA256

    4fc09958431bdfc08b6387689cb56c9acc1027e204db36cf0bc4c4f6b2f54ae8

    SHA512

    41c4a79f1413bf0378960f4663650b11d0db5336a6a610a7ee2dec5000fe65c3c8f021c8e75b1db5873b9b7ae8499167ad46d0da547f7764b8ce5abc93172cf7

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c18a373b9e0dc2f1d040a6a724b9b4bf

    SHA1

    08a27f95cac6f0b2f93c668353ebbdcfc6dc37fa

    SHA256

    464de69475b60e964e88324cc5ac49440b146888a83f28677398cef6f7268d03

    SHA512

    2692118bd83a65f7d8e1ee59290e5e386b57228099bb1286018d9a0c11b45783f9d8d020a6ab650daab31ee42810bd1bce1aa56a51d16b8729b84c1f4f539db0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2df42ffe93fb81fe609a1e8f639f5a1f

    SHA1

    b064ac41ad2bbdb9f2927c85f77166231a0b3146

    SHA256

    224c577abd918ff3bce5db2f398a90b5b0185a1874a18991c9d34bf2eb584a11

    SHA512

    903695e90e47222f7869d179499e2ce9b8e729429df1caa525a8e7aefd718d2e80614f9093adfed2c692fbe7f92fb402973d9134c1ae10de96ac9658f4e6a361

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec34ccb94eade65001e1d595239585e2

    SHA1

    e3dc5c46f83a8bbf8b3109690b90bdfa992042a6

    SHA256

    91bc8a53857cb3e826fd179116c2752cdbf713735e538ebf9ab3d6aa936b253d

    SHA512

    7eefee37c46ac7a6d4902569343b5658a80fbf844274db1b8a8374e6f7d668da2731f644da68ac3e3ff5d44fb824c140dd6c8a0469bf197fdda1ac968d7d147d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94b1aa6a00eb398113785065420e12e4

    SHA1

    1eacaba5f502202791749902f89d6c076fdff51d

    SHA256

    913f57e8d975aef6d67c011174896270237d9859ea1d525c1fe231e6388f02a2

    SHA512

    48bf6ba9536528d9260f7797091250431e02d905bb0779fa5e24a2e499268e42976e7f64975ce664e0b632faa2151782feba874336e1e1f663d781d3731abfaa

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aa824d5ced65e0086bcc3cf62431b49

    SHA1

    7c082933610a553babe0d2ceacba68fe0c615629

    SHA256

    c3110fc21ec7a727b624979f1d30c81882730b9dc757cff1b96bfacf781e3e91

    SHA512

    faef667b92eb6357e4aa0a8cc5c8aea40b1462a0fc82080123196ea2687922a6d669353679fc3d8b357483fb6bd1cc56ea52a25bca8003e2ce4ec630fdd9fee4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0226bb3b620971f9400234549f058ad

    SHA1

    d7f2a7f2d6b39677594e331df365b832a6ba4636

    SHA256

    3830a0a6c177e834f8041f7af08bb0a3cee3b7585d1680c8f82fbeab8a828766

    SHA512

    7059fda631bda7580fb53e1427d3bc1bd239739cd150130f893159b40ba0cc6bd8e486d040edad055456b88b89ad8c0bec79e5382d78b3fcfbbd6bfe9e1a70c9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    baef11d11c06a756e2c9142447df4b89

    SHA1

    4d9b135301566ab420923ccecc142f1e4e3c9e7c

    SHA256

    75bd1d564a41b61ba98a258a780fe14ebe0d802a2d667b15a5e92f682c371241

    SHA512

    91becfdd8d0a4eee48021b74ebeaae09b31e12407fd21a8032bdd037f0b464e8fe5468c78622647f99358bc54e1f4c601d4f30e27c5a340257028ee5b8d5a2ce

  • C:\Windows\Temp\Cab146B.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar146E.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIEB4B.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIEB4B.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/612-309-0x0000000000970000-0x000000000097C000-memory.dmp

    Filesize

    48KB

  • memory/612-305-0x0000000000810000-0x000000000083E000-memory.dmp

    Filesize

    184KB

  • memory/612-313-0x0000000004DB0000-0x0000000004E62000-memory.dmp

    Filesize

    712KB

  • memory/1976-298-0x000000001A750000-0x000000001A802000-memory.dmp

    Filesize

    712KB

  • memory/1976-1141-0x0000000000CF0000-0x0000000000D28000-memory.dmp

    Filesize

    224KB

  • memory/2028-76-0x00000000009C0000-0x00000000009CC000-memory.dmp

    Filesize

    48KB

  • memory/2028-72-0x0000000000AE0000-0x0000000000B0E000-memory.dmp

    Filesize

    184KB

  • memory/2140-109-0x0000000004DA0000-0x0000000004E52000-memory.dmp

    Filesize

    712KB

  • memory/2140-105-0x0000000000800000-0x000000000080C000-memory.dmp

    Filesize

    48KB

  • memory/2140-101-0x00000000007A0000-0x00000000007CE000-memory.dmp

    Filesize

    184KB

  • memory/2636-245-0x0000000000B80000-0x0000000000C18000-memory.dmp

    Filesize

    608KB

  • memory/2636-233-0x0000000000D30000-0x0000000000D58000-memory.dmp

    Filesize

    160KB

  • memory/2940-1238-0x0000000000840000-0x0000000000882000-memory.dmp

    Filesize

    264KB

  • memory/2940-1241-0x0000000019340000-0x00000000193F0000-memory.dmp

    Filesize

    704KB

  • memory/2940-1242-0x0000000000270000-0x000000000028C000-memory.dmp

    Filesize

    112KB