Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2025, 04:29

General

  • Target

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f.msi

  • Size

    2.9MB

  • MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

  • SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

  • SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

  • SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • SSDEEP

    49152:Y+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:Y+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2076
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3117D00EFCA1342203D9FDD7D95E12DD
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1AA4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259529924 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:836
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI21E5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259531234 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI3E9A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259538769 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2212
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI5B84.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259546008 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2536
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2EF3F185055785A40F9F1CDEC1F50081 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2100
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2084
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Q4TE9IAN" /AgentId="203414ab-64ef-490d-b8fd-3eea4793746e"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2752
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2868
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000002B8" "0000000000000544"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2828
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1428
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 203414ab-64ef-490d-b8fd-3eea4793746e "2cb87d10-b6b3-41e9-827f-5a53b3c35c06" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Q4TE9IAN
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f78197c.rbs

    Filesize

    8KB

    MD5

    638911bdeb6abcfaa10d114bcdf0c416

    SHA1

    8b43e6bd3afed2bd52d07a49a8be33c0650a3f90

    SHA256

    fa140d99be0f8ce41cbfc8811b4cd5581f39ef56a8d32c7365470ac87d8bf14d

    SHA512

    65f3f894df83e273e70df5173afdac75e08d04f197ef368f3a05180621bc0f6d4deaf6acb1d04ce9a1421930a1333a348f246df7aeab97da9dc885d9b2ab28c4

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    247KB

    MD5

    aa5cf64d575b7544eefd77f256c4dc57

    SHA1

    bd23989db4f9af0aae34d032e817d802c06ca5a9

    SHA256

    79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

    SHA512

    774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    c5ffd26ccf1641599a4169a884040681

    SHA1

    b0243004f797ba2156206326e93e808c0ea4d67e

    SHA256

    ad74d0c836624b8cd0d4e8d78c109496ad040f3912aeeffb5168749b087928b1

    SHA512

    ba431e3e3cc407c5f1be837c5f6d88c829ee74f8b38a1af5d3e95810a79889ed24930d3557148faaf301259f9cd964eb8e4ffbf74ba01361236b01b7857a3400

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    f04e6b68a6a038b4bc65955cfe1dcdc2

    SHA1

    052e52890e605de1f59c73384844937be912f707

    SHA256

    cdafd9df621090bc45a81e337ea3551444fed1c48c41d976a447e1636600d879

    SHA512

    f4a225da39af9fa2cd9a5d50642174b321e46fce6fc5488ddb8ad27852240545f8431d677dcc10d74855657054dc97b8578e1341df6b359aa25d664b7cd39ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    24c659285181a6979c3b1c898260b9d1

    SHA1

    71e65f61a9ed73586fbaf96339f4776ef59b70a6

    SHA256

    5338deecd4178b1ba815013ab182c436111a0ef8f8c2aff10f9051b920b80104

    SHA512

    64247f866db8872d9d10b30e35023d5dae79d13403f66eb66a13c22d766b032cebf082343bb8c8e7b5c77b47e1478c891eb2164a94b17edb988cebb997732d75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    62f50b09757845b91a11afe304f912e7

    SHA1

    ca2093d46e2a9138ef71e5cb6d53d6ced356ec76

    SHA256

    9979dad90650f1a6d82d38cb84e4055e46b88f28bcc099b51cd5e2444cc280e9

    SHA512

    6b54ad0a12455914f3140a1f5341807cbd97470419109470eabab6cfa1083b703dfd19ea276caba534777bcc8265d80659e6d8db06bc03de57fb6fb3d9e68133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    f11d59d55f077f02f2651680043ddaa2

    SHA1

    0146112dcbb3b26a6c6f24839f6b1276934eb35b

    SHA256

    a642d13d047785429ffb39d7bfc6e7dd0b92b1be61170e6ecc876671a02fb6e2

    SHA512

    313151140da21c56c26d5ec8a4a49e791d9654e15fb387b5f1374337a644c0e7deb0e3d9c45a9f02b3ee5b83b6cd1a03fa4bbda857d3ce5a332eaa06487be5b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    52a150695d865559ea84b32df3198cb7

    SHA1

    e83c4f3d1aeb8c79a31eac061ca8c63a98da59f2

    SHA256

    73b8e84905fb17975d1b3d1c47ce8f5947f0fd4ec880ab6b7c1dfb8b6a1e03fc

    SHA512

    ec7b698a64fd298d6e8da6dfb4c29bcee1d93420c32670d99ee9d17ae73dc80ee2bca5b0384337b425e033a30c3e30880ffa4e88b48c070195dda12c8f4f7edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    8ec35de3c8ca9969bbd617a8aadb337c

    SHA1

    6c84ca31f368b344e8628f5e4781fdc96eea000b

    SHA256

    c2d3a82b8c30f494f2ef0d30effc4a81f10aa2fbd354a9a3adb59e89e5231941

    SHA512

    208fe737915f94b24f642b7e15e4635bb49036f85c40d684b1c0f48247c1b3a4206e138f9d368762972058c69271892d97fb2338d3a50d470ccc737c09874c30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    111a48841320635d492fe75b1d0da094

    SHA1

    59d79594119c516c88a4d82650949a327ad5db6e

    SHA256

    dca560542b98ae5561be8b688b98cdc86538f70c6e831d9f63242f3cdbaabc86

    SHA512

    770b0b391271a1eefba43b3277acb6a3b66deaf35e912d1ed51544050ae48b623baa6fb27b7029edfd5fa992a22e311e76be49b391ba38179ed39bb338668f87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f7ac5f16cec5a7bbcf0bcefaffcc7e5

    SHA1

    027ec69561200d80f34ecfc340b3ac502feb52b1

    SHA256

    4bdf60bb2c6723355bd70a5d36a4f8235df3f5f9db2243461f7ffcbe233cee4f

    SHA512

    27f820f51823f0fb51972c209b3a78e859e14e74d87408b318d9633986558a77c606934b59caf06fe974457b48bf1fbf05baeec197b0f4b90d101fdbd446aa72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    c877c85374ab0446c458f631ca7382e6

    SHA1

    0b08b8c71a675dadc2bdc2c94cccecd89f7c1584

    SHA256

    a6f5819ed57bd2848aa34c70de2cd6f3e576844ea7f39309ebdd3594fde4b8c6

    SHA512

    e50c87b511f7d6110989340d339894cc8580e788abc0f05ac053f92c5c2ef4458a309b9064fc443486750100e0d42d65b4fbd942c10dbf1c9dc98ed72f0166d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    4dc22d4d34b200af7f29824f82781ecb

    SHA1

    23468c6e7b08c121fadd428b7ebbc6f88c8fa92c

    SHA256

    8b5ad1874f17c23b28840208ecef41880d113aa1faa1e3f42a67ab3d1baca884

    SHA512

    3e80223c2d32ac6faf000b6b3c0ae3c3362a6348055b76b9a2fefed650ba208771c8d51b70d3a239002cfd0918b92f0a71a770fe4c208f6e837b46e0b0af0b18

  • C:\Users\Admin\AppData\Local\Temp\CabB5BA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB936.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI1AA4.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI21E5.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI457F.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f78197a.msi

    Filesize

    2.9MB

    MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

    SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

    SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

    SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    63c3f0b8344c1484ee3bc5598126646c

    SHA1

    e2fd15f2ec3944fd8f4659accbbbc23ac166229e

    SHA256

    3a0ffa0b8cc49bfdafe15ee1d23e1e90cded2ccb46f8319ecef86a8e217e6b1f

    SHA512

    3f8d85e5b565e017e8d7100d3cdeb71b1b101107497f9d865837e937ce6cf012b168f05181df55fed2741e4373f20ab61bf9d6d73b81007d26d8bfbdbfe89bf0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce699ea43b95760c90b7814c78a10164

    SHA1

    150fead81a367e393be4fc31aed86cb55242027f

    SHA256

    c198d73a7a45320c03008af7d4f788c2e94ec88f9f281ae4525c9cf98fde5902

    SHA512

    bc44070be5686b2642139a7800f9e61f48cf203d83fdecef7f3a886239fe11284ca77a85355d92ddc581ca5d74898cbc3a9a43683117437aaf8354fea1135afb

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7548a5ef684215749e5aa07eba79d5fb

    SHA1

    e15fbb693d618d4a59ec85548c5a4f761a746f1d

    SHA256

    8c0e4aee6623df85a5b73077f1bb8df7d0cb5e0754dc45ccd80a41c7e6126cea

    SHA512

    93be40ddf1e1d126423dd9076df01fc2ec952e2fa6f2cbb4c4f702d3ce83770c84f587db28d117144685d10a963502c963ffd7171e864c398b43584a56d70ae4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6260214e295af0aa4e0a561c663fa59

    SHA1

    d9b8bf95596b0056ab0aa20a27359a2456086447

    SHA256

    44e04384ea69b74556d935156ef4c68542b67d479fbd0572b86401cbf58760c2

    SHA512

    bebd8e1ac0cd01e9d4f565acb45f510726fdc28d92d11c32cd8f1f4bd1b9538f5a62d0819c4875112af947e72842fc6c6971410bfc2dcb190e5a1c389733a559

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cc03fc1a40fc70ca96fd184af435a84

    SHA1

    6a02d12500a2abb2a5b2dd96e8ec7343155377c3

    SHA256

    5beb2130e6e5290e4f29e87c6f6e59dc116f47e4e6da5ee721d18ead82d1f2b7

    SHA512

    a5cf990c7e845c9c22f08de05085a6ae4df95f3b3bc705dea751d413610b0f9041ac677ffcb020ae726c761f1207b0ebbc2638f89c50de1ffe77b25460abda95

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a58f760544675bfc2937327f374c192c

    SHA1

    2dc574aad2e6bdaf375074d83d3b87d539087d6e

    SHA256

    43fb85522e23970c69aa19a1082498c546539dd228f1038881047bdd8ae4da68

    SHA512

    3c65a497a559d177f192951471685479f705a5d03ba640dd8ed764de02d01398f752533a27d35b3d379caa16050e333357a51b1b9c6fb7a1445f78a8dd509054

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c4e8fa890761ec419f1aecd00c83bd8

    SHA1

    03de68341015cfcf46ef09c841d21babdf78aaa9

    SHA256

    afc01f8868c082230026d498a9ce120ad9b7f22b3aa71c500c03da38d1af6d1f

    SHA512

    e2ac11826b2bcac76d12bbadf3ac7cd880a3f3d434ca5366e44b869e8980ff6d294acd0201cf4847b9530d5d1a5f7a18723178c0f8413573e44ec3611c28822f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    005f1079cbcf877bddafe3cc6c0593a0

    SHA1

    47efa251e5bd57c46d3ea545dbc907419f3d951f

    SHA256

    f5abeb1ab686aea746cbb88e2512caee57ede77638ed01273587fde84f6c35ec

    SHA512

    ea56e5ec8b2137f3f4f113587d906286f4fd682a5de74fa9096e4a6b8638e45cf27b301662d5c48323bee6cd7b0444bee0b17926312033b58a1ff6647532cb3f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    037fa4a0b7c13075bb2f9518c9307fdf

    SHA1

    e17d131633ed7ab38863de2c0575bd2515b0eb19

    SHA256

    79dc80b3bf4a2ef098744d9f600365e621f4793b9afbae28d8fa61563a8a0f7e

    SHA512

    81376eb27f40f41a5c6a3607788a3346b11cfd59cb322112c1df2f728cb9b139fb632a3f3471995cd9ed287d0174ee687e046c7fa2e503c8e246434ead80115a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97fd48fc37b6fcb49b05dc93972cf6fe

    SHA1

    7e81324ece194cddf011c399ba37a29a02250cee

    SHA256

    05fc179f6f18de81a2b1cc9464660d03599b5f2dc8656033068705dd30610c98

    SHA512

    a5d3ae052a55fa1fc4724c30717900dd845296c8f57e6b19c9a84a5369cc189ee4745dd03a0f4fccc09b99efaedbef5ae6f99d58a3ca474aee8da118e2845846

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bd9af2b3462146946f6472d600b497c

    SHA1

    b7e843df56329a6ccd5753fb1767c7c64618a98d

    SHA256

    71353054eedd263e36fbe6200c81f0480b46a0317a36337c622b3ed7ae84381b

    SHA512

    d4dea77060eec56ad6a47d6a73b7c676b0ac46ad0274c35bdff467cb0a1fba7eab5e4c327fecd53bb13e16614d5502644b01e689f76aa8b8ce13fef1e2b7e550

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4410a4fa71f2c41c928d74a22d7cef88

    SHA1

    71414be11380d1d5c8fab71c85b3f8377c461343

    SHA256

    c9b6461ea4901a267dcae2876434f86810180850464590be8b31cecfc3e4bdbe

    SHA512

    1811b41c48d463fbe97bdb9c051dd81143be2107be47db53040f6de8a1f7f38280a9ec5bc6bb531b046fa2a3972e3edda0b59ce787c81e4df913677f64e397c9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a739bc38cc610357c601ce78a718c50

    SHA1

    1204afbf09b2e80c0b83486534d1741a2462312a

    SHA256

    afeb626a9dab383c468022a44542836e4eca2a69930f035ecf642c7c9de93d48

    SHA512

    8aa82b084cbb4a221d1c7a1d13ba9536e400a3a91851fc7f1340f3f9e7d6ea3d8e1fef816fa9e9c0c4c603d4289b4c5224979fd000c347b8ff660f256dab9980

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edda5445e5eeaccbead9433abd58a475

    SHA1

    c30dd500aacb60a812fa143da36f10841af184fa

    SHA256

    3069c1f857131d29a18782f8c42c24bbb4fe29053d4913238eb2b3ff637c40fb

    SHA512

    46ce8d6d3f5a525a4c360425bdfeaae4365f62eeddecc9783fc8ec99d77060f3d2883ade0b39b3b668b5906821e074c0a652682fcb3f3514e278e743c4f1d276

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cd70bedfb0c53586aad9b7982b89d49

    SHA1

    d47a81e844c077c7bfef69c07996af16223cc97b

    SHA256

    7e87ca16a725957c95981f4dfad3460197f495525a0c59ac3be26bff044fe38c

    SHA512

    1813b679a71eca4784d826c2822856c23ed666224aac09938db19a04220db472abf5626bba2f8dd74d13dc44c44fc591ce3fb61c0ac9cb869558e18d77ff3a41

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36dde847466eba06b961cec07de38bcf

    SHA1

    f097b239961cfe0de5b9da59443596998374b76e

    SHA256

    790d15de1c843574637742767c38e2dbb383b06f4517aa6df9b2eff3a9b5cab0

    SHA512

    f7a4036b17dd87aa674de67880c1f2acebcce22c79f51caeb7f54240b5a494f9c9703e3c4044e9ac508c93ef7ab024ce94138855336d5953211e77488a1a6b7a

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    3e59b68216a6c67d322e33c57b85bca8

    SHA1

    17cb1744354b0ba96f64da4ef8862ff4e1c6679b

    SHA256

    b5305e4b130177ebb547be1619ae94fe4c0fd79c4b6a030d3f3027abd99bfdf2

    SHA512

    bde3adc5606a0c390810ccadc9f38cfedb8dae583cf2adb17f9d6788bc0233ec5c24b884376a8baab2c70b31b2a0aef3a4edf0e461df8ba6c1e4763a680d4823

  • C:\Windows\Temp\Cab6BBE.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar6BE0.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI1AA4.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI1AA4.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI21E5.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/624-1252-0x0000000001060000-0x00000000010A2000-memory.dmp

    Filesize

    264KB

  • memory/624-1263-0x0000000000E30000-0x0000000000EE0000-memory.dmp

    Filesize

    704KB

  • memory/624-1266-0x00000000007C0000-0x00000000007DC000-memory.dmp

    Filesize

    112KB

  • memory/836-76-0x0000000000950000-0x000000000095C000-memory.dmp

    Filesize

    48KB

  • memory/836-72-0x00000000003F0000-0x000000000041E000-memory.dmp

    Filesize

    184KB

  • memory/2068-309-0x0000000000F00000-0x0000000000FB2000-memory.dmp

    Filesize

    712KB

  • memory/2068-1071-0x00000000195F0000-0x0000000019628000-memory.dmp

    Filesize

    224KB

  • memory/2536-318-0x00000000003F0000-0x000000000041E000-memory.dmp

    Filesize

    184KB

  • memory/2536-326-0x00000000045C0000-0x0000000004672000-memory.dmp

    Filesize

    712KB

  • memory/2536-322-0x0000000000930000-0x000000000093C000-memory.dmp

    Filesize

    48KB

  • memory/2732-109-0x0000000002310000-0x00000000023C2000-memory.dmp

    Filesize

    712KB

  • memory/2732-105-0x0000000000410000-0x000000000041C000-memory.dmp

    Filesize

    48KB

  • memory/2732-101-0x00000000003B0000-0x00000000003DE000-memory.dmp

    Filesize

    184KB

  • memory/2752-258-0x0000000000500000-0x0000000000598000-memory.dmp

    Filesize

    608KB

  • memory/2752-246-0x00000000010B0000-0x00000000010D8000-memory.dmp

    Filesize

    160KB