Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2025, 05:13

General

  • Target

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f.msi

  • Size

    2.9MB

  • MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

  • SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

  • SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

  • SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • SSDEEP

    49152:Y+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:Y+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2844
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 5CBA5E27B6851217DBC1994605E1DE71
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9742.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259430317 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1268
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9B1A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259431207 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIABAE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259435465 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1928
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB852.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259438679 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1520
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A73CD98E3215DCB1F9DCF1CF72537B74 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2812
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2836
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Q4TE9IAN" /AgentId="069b70a9-2298-4ed0-a6d3-e45f468fcb70"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2156
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:560
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000568" "0000000000000324"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2336
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1664
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 069b70a9-2298-4ed0-a6d3-e45f468fcb70 "cf9747c5-1a86-46a1-a6e3-31c597452d1b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Q4TE9IAN
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f769697.rbs

    Filesize

    8KB

    MD5

    0c668f23621bc772a5cd872e37f38130

    SHA1

    7a428a4f4308b302716ef2a51699995b731eb179

    SHA256

    4c78213bd3b58a8e61360d4460c829330c146cc0b9b79ace005e792d6f0a0aaa

    SHA512

    63b432f06a5778229dc0bcfea645b81c0701970d388ba9fe7fb10447c76cb018688242c1560bb49aab36c91b6093b29d544f08b555e8311e26d0d847197424a0

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    1e065e191e89cc811ff49c96fa8fa5e6

    SHA1

    bc50ff2a20a8b83683583684fcac640a91689ed4

    SHA256

    d88faf6d47342587ea5fbcaf2ef88fb403f7fcdc08fcab67d4f4f381c237a61e

    SHA512

    5a710e168316c30ca10f7b126e870621f46cca6200e206a9984d144abd11fea045bc475599b18597bbed1e4f00e832d94576837f643b22ffaee56871629290dd

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    247KB

    MD5

    aa5cf64d575b7544eefd77f256c4dc57

    SHA1

    bd23989db4f9af0aae34d032e817d802c06ca5a9

    SHA256

    79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

    SHA512

    774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

    Filesize

    94KB

    MD5

    c69c7690482c75a8fc70df2990d7afc6

    SHA1

    79d72d32a03151823bbf0953d5c2ce6bc2bde4b1

    SHA256

    580415595e5936d5f3945e9eeee63f6f4dbacd327aa46e2b7625b638715c27f5

    SHA512

    ed80ade3519345552ca74958efc9c122de840d2844baa08c94400f15168b6fc25377628a55ed12488ea790aaa40bc5bb77b6586de4f1ecd296902bbe36fba4f4

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    111e2e63bccead95bb5ffc53c9282070

    SHA1

    eaae7df21e291aa089bc101b1e265ca202be1225

    SHA256

    9615fe5fe63c48b13ffd8c9bc76170a9ed1cfea6a3d0901e857a1c6c6edaea76

    SHA512

    ffc818615fb30e24633c90b8f5a55c100b5f307414ec54e5a2914bb4ea36d3fb3aa6ed0e5815976a2f6d1b7f056e7da1f108a8eed81b458decebe721ad30b920

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    250f8304d6d87d875cccba958277cfc7

    SHA1

    661a68a3b6755c2ec5516566463e42637db67957

    SHA256

    df9c89b69571a97208f4fb03fb8949c7a2df4c36e310d131ba092065446d73b8

    SHA512

    3c5654a925749429d82c75167a7936eb57ad90c8ebcbffe7d22370f75ccfcb4d36ccb7be541b595ffdeb55b9319545549aa22d25407b98a655c6e28a84cc01a5

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    217B

    MD5

    51de4b47bfaab709836dbba7f58b097c

    SHA1

    c4d8252459cf2a5b78f3ac2bff21652d71b17ed2

    SHA256

    a575f2820a56165251052240577e88e46c6e1758dba1153e3e87c214181c28c7

    SHA512

    9aee40155d54bf7bf2b49f5dbfadab6599dca0188ea0cc2cfc3f51ee44e2c5a1969bb11d525b407487656006cf1c0bee7991835bcb50c68bea1271f9ce22bbab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    a92359bcd40ab68df3b2a726b293703e

    SHA1

    03af49fbe93ce7312ceb352c712941d1ac5fd2f0

    SHA256

    e61fca89129e6e9eecaafaa8612f1d82efb267b900a8ca27427fa0b32e065c63

    SHA512

    f2f2ff4c354ce68642ec37357e40c28cfc2449bfa9971ffe59c800a50287f8a39b5729a6fb2aaf8f23b9f45ea3e478a9f12dbba0479d93e4c2c598263aa7ce92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    62f50b09757845b91a11afe304f912e7

    SHA1

    ca2093d46e2a9138ef71e5cb6d53d6ced356ec76

    SHA256

    9979dad90650f1a6d82d38cb84e4055e46b88f28bcc099b51cd5e2444cc280e9

    SHA512

    6b54ad0a12455914f3140a1f5341807cbd97470419109470eabab6cfa1083b703dfd19ea276caba534777bcc8265d80659e6d8db06bc03de57fb6fb3d9e68133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    f11d59d55f077f02f2651680043ddaa2

    SHA1

    0146112dcbb3b26a6c6f24839f6b1276934eb35b

    SHA256

    a642d13d047785429ffb39d7bfc6e7dd0b92b1be61170e6ecc876671a02fb6e2

    SHA512

    313151140da21c56c26d5ec8a4a49e791d9654e15fb387b5f1374337a644c0e7deb0e3d9c45a9f02b3ee5b83b6cd1a03fa4bbda857d3ce5a332eaa06487be5b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    385faabc1a886a21079b99583f63f503

    SHA1

    7630b794fb8906b61ad0a6bad4f81a88782c2083

    SHA256

    790864b9d5ea1b7b59b166d6473211a5fac99061e7837a89e6720723b2002b08

    SHA512

    1fd5b47c016f90d8011dc837c83ee3fa8c64567063d2a147a70a3a61376579b63527d816e4f055cb0e61da1a9a716b0b2d1625f6cedf7cdc3d2d2b11f569fd5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    4c25eddaa96750c5f66e60d289ef94e6

    SHA1

    cd9b0d62cb9ead7cd5bb863ca40733b6e729f4f3

    SHA256

    f3f35199b0684f38ab55d3323f30fa20f9a5146419d8d866c231ed860f55dffe

    SHA512

    7d116df6f053476e61e398d6b8c5fec86cc2afd2a27f02746ccf8680199982741a5b3ac12e5ff91ee50d30cc7f501d769502278d374f0717670ca53d55b96986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d574f96ed7e5dc30a51f9b2f5759920f

    SHA1

    94b44db2374dd032bccb7aa7b4ec1b5b64d9da3c

    SHA256

    aeb4536122d53072bd03cf9b34b9b26161f9cb9084cad9cc7e33d754c7d7e057

    SHA512

    2307e0594685029f8988c2765dc99c7b10c4cdbf8db48b5b487b7d8378caba5b6650a7d42951bf66b1abf0bbd2b087eb7bb93419de7ea1b0d418b341cc5ee246

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94779af13eda72f6dfde5ee982015152

    SHA1

    3c029cf48dec6a92256eb34db6942eeefc1c0910

    SHA256

    f3cbd88d34e9709f55b3313c50447e4b9838f8a59bf081e7bc0ef9b0a175bf28

    SHA512

    687f4532572b009c358f7b666a62a44f224b1f03ad45e260eefb3fa36bb3dac2ba3215af815d8fa57e20524ec32f15b6434492db5a1dc217f4c7731f15927a99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    ab6a565f153d14916c86dd5b885387cb

    SHA1

    0aea79638b0ef56ca887e33993ecb0ee76002ed9

    SHA256

    981d0b9133b001a0b30fb7e2a1b4f629cace76167af8dd140231299e8f3a435a

    SHA512

    26e6f40ec9408a312e2547e0d10bf8e8640925f5e94538abef1f4d2daaf78ea35751707033c4f8581ea2152466fdc2a1b21fc251e51127f022d6667899ec629f

  • C:\Users\Admin\AppData\Local\Temp\Cab6EEB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7016.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSI9742.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSI9B1A.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIAD75.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f769695.msi

    Filesize

    2.9MB

    MD5

    f08f1cfeb4906ab03141d5fb2ddfa8f8

    SHA1

    6a57e1496d50b4a7067c661bc6ed1b9ed4910517

    SHA256

    bc0c575d69f00c3ee2314cbb379628b5b6cad499b7db5c6fc60cbfb02257145f

    SHA512

    71e063d066b6513da6cc24c8d852812489f1e29b4a381bf0b9f69016b8927852b5f21ae9a7b41f0a0fd63f943c51e536618052f3f6d906bde8fb03d40fa592d8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    a3da41f38dc264192b59b6ce2a3236fe

    SHA1

    97c699c93465cafad549d4bce8796f140f3cdbaa

    SHA256

    b4fb3df6f5dc2c9d14a46a0fa8051f7714d6d38742e42bb786d74b306d86530a

    SHA512

    6d31e4008cd93de4aa46987c66a4817ca51cbe1c8157c1bb6d1346bf6320c0fceb8d94b5b910c67c8f6f34ea6270250a76a3b197a5ac5907b755f6c42faa181b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4412bc05e265f4b0e5a97e2c40266f29

    SHA1

    6bff27e8df7b459f279c357a7132112c8380b26a

    SHA256

    cb29626da336a7bd15f179083bbafeafe3662c21213015fbfe3d17ec0d296699

    SHA512

    6de16fd33ca048e0bfc8f59b12c5bf1e4157b484c4d3942bd2dd2684efdbe4cb1d570c132e6548a3e3ebf8733f936240c12dd99aba69f87485c1608b27461f1b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    086c41bececaa838a1c4c266f6c07fb6

    SHA1

    a3f1f09118b0c680e093d1cde02e9bcb0245f111

    SHA256

    7ff24c9290ef91e78d1a82f7066c49eeb7ddf733a1fcb208b9060684a9fddb1a

    SHA512

    4fb43107b46700e7e0bd592b7dd34809e54609d8002c1d30aed88607573d4fff5b02dd0fa758367bbee44da332bd2d54f9c1b9d7c577c8ae39271c92496d5c1c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e258154366083c2949eca7cb3381da1a

    SHA1

    d306d816bf0d7f03d425a9ecc4af3334282670e9

    SHA256

    86b45501117eb149faa0b106ef840b575b3c8afef2489dda6ce6d0520de7cb0b

    SHA512

    130480cffdf0a9855c9fa1d0c84acc939120de9ebeb3874d9f3b024fd7c34c2c7a32907c3e636f76e5a7753a7a1b8466d12d78ccf8c6851bb0230e1795005596

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8734d1d5011bf67dbd6a3678674f98e9

    SHA1

    fdacc141babdddf56d7ce917d09a1fe6a230569a

    SHA256

    d114baae7565475b146955c7dad89274e1eb7aed927b54d5f736490d582d3079

    SHA512

    2a659c1fa0f8344043b1835df59f90428293cb55f9b042e6a973ab1384ea52cf2a5c099f196f79b1b8ac0d6837852220a359c10ec7662ffd9d0c837d2d03d12f

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f993c29098ed281735c45a69bce382ea

    SHA1

    18f3ee58fcefabd16bfcd59b3d1f2394e6aa8982

    SHA256

    53adb887832708c0733b3f256c82dbd6668a9abb25ca6c7e1ba1cc7fc2a845cd

    SHA512

    8b5d59146c1aeefdfcf362efedb81c7c71f5211f87e530460f733ff6d4588ddda421e14b9b20796db76be7fd6cb6266e67a17b680720b637c019c6cd3d4db0e8

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    621d4826dadb3725e61c6023b49670cf

    SHA1

    d03cb4d8b55aa2698d1cd7a1c469cd5ee2b0b6aa

    SHA256

    ac7bf78990d534498698cb56d2ec1f3f9e72baac9a366833d6f884f5235d289c

    SHA512

    e412d349cba0cfbe4c8d24140d78d075fc1a22e103880c4dd6030d75aee9bf633a25849877b0c59de9332ea3e96987daeb71de4ca078508df0d5d59494ccbd10

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19d27a43abfd8a2231bef455153bb0eb

    SHA1

    79d1d28a214b17e42ac9c03afcb25b4b45f56fbf

    SHA256

    2bfd05d198d109d00cfb2ea0e595f14014e2034082a2eef9b096a516a29402ec

    SHA512

    ef31249a591dfbac58de2e96b045311bb8f70fc21419d76d4f3c771851dd8bc3b3ec8951b4cc39e4c94852d1070651611da3cdf643898583df0370679ae1937c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    912cb6ed9de95dfdb1f6cc7beec6fd31

    SHA1

    2d83056dfc84bb98e5003886172b05cd63ab971e

    SHA256

    6fb674deb691d0ca124bbac43632e876b3c22cdc163c1ca7c6741547984c20d3

    SHA512

    9a07d3ad1a6b072a0fbceb0e2b1a8c2a04090f2b1cd884533d17028bbe4edccaad2a7e81beab7fd248d6f2659c510f800f9ea86c0dd34858e68b95d8c18e7bfe

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac9567e20ad45408f4da12051658c863

    SHA1

    a19942bd436952ef7a1210ef3f3b710d3a6d8f9d

    SHA256

    8e5ce389f941e7a8ff32e694f343664c3ce5eef54de9e358e8232fc49c0fd17a

    SHA512

    d638ee4a7c0166c66b92bcc03b0d04b113673a30d56077fe95c6b01c2f43feed3a7b8ae41d8b933619dbfdd814dfb6ef076c6ce3908c4ccd77ef369af6278e67

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    501081230746bd0cddb1eda780c9b7a8

    SHA1

    ff332ed0e27fad6618590666832bf7905979657e

    SHA256

    7fb09121bb3203b4e1aeb3546213c2d95cba236b8b9650175e73d0246ef33a07

    SHA512

    d1871687a78bcf155e2a9a20c3734219dcdd12a7111b4abd386929a5df7b2f8acdc74f3a0ead527952f755c0e0ffab733642c798728c886a847507b5437432fd

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c02130a3a6dd39abee16af615402a77

    SHA1

    e58e51288fe8f4218373410394f7daadadfb1e42

    SHA256

    5b876a11a8c41e0491b5c0a86a26aef3842b2af32817480c9e42673334e2be8b

    SHA512

    2a633bf05a492bdf97b4637e35d02dd77d427698218656a799ec620eaeb30c83cd1ee1c54ba1b1ebfa119e4aa67bf808059fa80bc0e9bb85ceeb47afe7c9f204

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c9cbaf087d41ee70b863c81e3a0fdad

    SHA1

    55e45921d1872a5167c612f31fe601669054f90a

    SHA256

    10b6bbfa0461f1879b84f32ad50f63fa048c7e8ed2456decdc87d8442778b317

    SHA512

    cd365bd62b01b8c9409aad12e815b536df91e78118fb90452b7f81f29c90463f1ec2090b1f2551a9d77142dc6a89ef6799e033b5e1346a7d496957bc38c7be02

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f5084aba4066af9a3e8f7a86a8f96203

    SHA1

    201cd858ebe0540b6fbacde8bda48c3f099b8d76

    SHA256

    a6a9b236b248568e129bfa0dc9736cf60b67a3d809282e3dfbe5722fafea7bfa

    SHA512

    cbafda78f28379e56cdf83b53e7ea62d2812336e834846f8fbd66ec066c85980d9dc3e86d68a29b64b0730286762fc19b9a1de866bd4897d5bb5700bb8dbd2bd

  • C:\Windows\Temp\CabC5A0.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarC5A3.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI9742.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI9742.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSI9B1A.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/1040-101-0x0000000002040000-0x000000000206E000-memory.dmp

    Filesize

    184KB

  • memory/1040-109-0x00000000022A0000-0x0000000002352000-memory.dmp

    Filesize

    712KB

  • memory/1040-105-0x0000000000660000-0x000000000066C000-memory.dmp

    Filesize

    48KB

  • memory/1268-72-0x0000000000B50000-0x0000000000B7E000-memory.dmp

    Filesize

    184KB

  • memory/1268-76-0x0000000000BE0000-0x0000000000BEC000-memory.dmp

    Filesize

    48KB

  • memory/1520-309-0x0000000000570000-0x000000000057C000-memory.dmp

    Filesize

    48KB

  • memory/1520-305-0x0000000000530000-0x000000000055E000-memory.dmp

    Filesize

    184KB

  • memory/1520-313-0x0000000004790000-0x0000000004842000-memory.dmp

    Filesize

    712KB

  • memory/2156-233-0x0000000000320000-0x0000000000348000-memory.dmp

    Filesize

    160KB

  • memory/2156-245-0x0000000001F10000-0x0000000001FA8000-memory.dmp

    Filesize

    608KB

  • memory/2316-1179-0x00000000006C0000-0x00000000006F8000-memory.dmp

    Filesize

    224KB

  • memory/2316-293-0x0000000000730000-0x00000000007E2000-memory.dmp

    Filesize

    712KB

  • memory/2612-1276-0x0000000000210000-0x0000000000252000-memory.dmp

    Filesize

    264KB

  • memory/2612-1279-0x0000000000CC0000-0x0000000000D70000-memory.dmp

    Filesize

    704KB

  • memory/2612-1281-0x0000000000430000-0x000000000044C000-memory.dmp

    Filesize

    112KB