Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05/02/2025, 03:37

General

  • Target

    394659c01bd981c3a4d5840fbd624c20e3270c9defc432ff3fe6ddb482b5ad46.msi

  • Size

    2.9MB

  • MD5

    6032d2452e05a12f1449182deb3ab258

  • SHA1

    03a992f9020a003fe86e477ac28698afc16a73d3

  • SHA256

    394659c01bd981c3a4d5840fbd624c20e3270c9defc432ff3fe6ddb482b5ad46

  • SHA512

    1318d1844efe031d05499e642c9509422a9f92977b8b4c76d38c6c614d81813af4ec927d2dd807e9b7b205ab06ea1800eb4a082f1a89a4e3721a37301165e28d

  • SSDEEP

    49152:9+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:9+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\394659c01bd981c3a4d5840fbd624c20e3270c9defc432ff3fe6ddb482b5ad46.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2124
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1CDF320554DFC749C96ECF86D0A4859F
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIE948.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259451378 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:872
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIEC55.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259451986 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2788
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIFCDA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259456307 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1752
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIA29.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259459630 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1580
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5CA0FBB27B22029710EDE2E24811285 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1400
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2488
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000QFoFLIA1" /AgentId="9a4bb2cd-ec51-4150-87bc-70aead15dacb"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2496
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003BC" "00000000000003B8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1156
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:1356
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 9a4bb2cd-ec51-4150-87bc-70aead15dacb "992d6210-1c69-487c-978c-bfe625b6258b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000QFoFLIA1
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76e8ac.rbs

    Filesize

    8KB

    MD5

    760b6e8df600dcd18387b830f46b906c

    SHA1

    a05c17ee14b635f36675aa11b99948d62cfd6ce2

    SHA256

    a125d97664894c685067612bcc5b0b1db6a1b4145d7d74151b4b5d3506be006d

    SHA512

    ac282ac6d9006f05b878f5c1bd64bdca5440ab6f7516ec69542d27f50afce111c2c0f6fdcdd9b774c6839fc534d8d9647edcd6248e257c9f0e3cd41b76c847d1

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    1e065e191e89cc811ff49c96fa8fa5e6

    SHA1

    bc50ff2a20a8b83683583684fcac640a91689ed4

    SHA256

    d88faf6d47342587ea5fbcaf2ef88fb403f7fcdc08fcab67d4f4f381c237a61e

    SHA512

    5a710e168316c30ca10f7b126e870621f46cca6200e206a9984d144abd11fea045bc475599b18597bbed1e4f00e832d94576837f643b22ffaee56871629290dd

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    247KB

    MD5

    aa5cf64d575b7544eefd77f256c4dc57

    SHA1

    bd23989db4f9af0aae34d032e817d802c06ca5a9

    SHA256

    79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

    SHA512

    774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    546B

    MD5

    158fb7d9323c6ce69d4fce11486a40a1

    SHA1

    29ab26f5728f6ba6f0e5636bf47149bd9851f532

    SHA256

    5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

    SHA512

    7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

    Filesize

    688KB

    MD5

    111e2e63bccead95bb5ffc53c9282070

    SHA1

    eaae7df21e291aa089bc101b1e265ca202be1225

    SHA256

    9615fe5fe63c48b13ffd8c9bc76170a9ed1cfea6a3d0901e857a1c6c6edaea76

    SHA512

    ffc818615fb30e24633c90b8f5a55c100b5f307414ec54e5a2914bb4ea36d3fb3aa6ed0e5815976a2f6d1b7f056e7da1f108a8eed81b458decebe721ad30b920

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    76d23a19a5f456656b347a6ac02b5601

    SHA1

    769a0c8a1cfb99d383d1d180153a028894e2793a

    SHA256

    294ee911151bb06463a9852bec80d2cfa67e50a5ed12cb825848eb251623e909

    SHA512

    bbaae1027388027db496732790ba7dd9285b8044971f76981ea052bcb6840a55170ff1b32b828f7316af6d1a2960a61d01d665002993fed1ec5c59b8696b8a19

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    218B

    MD5

    f39be89e8e86d60e954689e8a921a7ee

    SHA1

    f10d347f75f8f69fb8feba2a1d957bda1ca0fcb3

    SHA256

    13c1836dd58de7283bf68526b2a34e7b655b3d6bfde8910f681f4309f0a26a3b

    SHA512

    5645d30c9667095a63ad9ec6f9a1b7fb11aafeff874519509ad388a01b46d092329462626fb73ac067305f3c131d8ef5a1ef510d2e419e228586e58f49b4d85a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    a92359bcd40ab68df3b2a726b293703e

    SHA1

    03af49fbe93ce7312ceb352c712941d1ac5fd2f0

    SHA256

    e61fca89129e6e9eecaafaa8612f1d82efb267b900a8ca27427fa0b32e065c63

    SHA512

    f2f2ff4c354ce68642ec37357e40c28cfc2449bfa9971ffe59c800a50287f8a39b5729a6fb2aaf8f23b9f45ea3e478a9f12dbba0479d93e4c2c598263aa7ce92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    727B

    MD5

    12d865d718c648c03e5657a02fbd7128

    SHA1

    67992668978bbcf0dc94166c3d68fe91adf5a4f7

    SHA256

    605bc5c5942c346edd5a9639cd65d9829c8aa80d06b01dfd1b7c8dfa5fc5f671

    SHA512

    02628a076f36de16e92be4b799074dcc843df16a065313662b163a368b46e9a458388e9e4a5c7deedeb9ea3db9da47ba886fa9be7fb8724c5f6af46a372c4c41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    7ede1c2319349ee09eef9b918f848ee1

    SHA1

    907bc671d8865713c6c6758ab35d880bc195cd26

    SHA256

    0091300b2b650fad4fdf32c8681ca431aa280403bb7afec50e1e3b2232537c9e

    SHA512

    673710e89af144f22a6a69011341e48681cf2b46ec58fa7ceed13688f3dfa17e5c8ea9f8054cb99c054864ec980fa0acebdb480ce9abf4d1d7a8ec46dcfb5866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    4fa72e280e9f4d27c8446ba21478a062

    SHA1

    2e6caf3ec8f9125aaeaccee11942478264ca5f71

    SHA256

    d86cad9d69c9fb677c18a4ecac5f6cbc061c95a59c84caa7bd9fd81518c37d49

    SHA512

    48d8e49aa6a56a3f531bc52487ae2203183b03e533d48f7ccde24b435d8f42ded7895bc50e5b161c3e4f76be68111928a5591bdc49c0f0d83a8dc63642e42fc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

    Filesize

    404B

    MD5

    a07fd5a4d4d20d9d0062de0c77f090fe

    SHA1

    f64d068b36dca3bf7838f9573e38a09b03bd74f9

    SHA256

    19f8d77a33979dcdfc786c2029b14ef97ab7cd96f31ece1f272060cd5331699c

    SHA512

    afb9e7634b39614a48d62cc579da8eed7e3ebbba2006e20d959341592d40024b3028fb095a0d86e026134e35261bebe867e8b9ed9198bff3c89ebda2a0dc3b04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ca950fef5ebd2c29ea01f19797ec377

    SHA1

    44a7358c2a9ff267115c59249b8c28d53241b87e

    SHA256

    526e128ee2732bbc2a74d72617cb02e118b1b6362b016097232f0f79ff039b52

    SHA512

    77e4f7de7d594912d1282bad4f4df84723a7bbc75eda1b1e205d5478dd99fc2eaf10d81fcd89cda9687b555aa74748a5ebd579b968db14257680d084f758a46e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29a76681858fc53c0053e86a188b21f6

    SHA1

    4f2c696f4e636690c0495b337bba0950e05140eb

    SHA256

    3ea01c8f828ee51a4e37dc5c0af33336508abb015277e2d4ac4a06b666850fa7

    SHA512

    f4faaf3b5942770a1121a881786acb0479577fc79c32a416e07cce7e4eaac35b594098d2632b822126cf6f1e041724aa8e9783684661d282bdf0a5db492ed6ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    2f03a1ff35316b287f0857e63c0428b0

    SHA1

    d33aaaeb493631c7a94ae0e61c52cc95d7023e6b

    SHA256

    64a61ef494386c6f9f71fe1bdc04f0f88995e4308b2714aeb36301e7a2336a49

    SHA512

    8df36bb3dd2f427948af7815a2dc062383aad65d1c08389c7b4d76d3b77005ebbeec6414c206a4e3a7b8e97d230356eda273b8f87f4c61e36b297a042eb0d7b9

  • C:\Users\Admin\AppData\Local\Temp\CabC479.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC602.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\Installer\MSIE948.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • C:\Windows\Installer\MSIEC55.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSIFFB9.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f76e8aa.msi

    Filesize

    2.9MB

    MD5

    6032d2452e05a12f1449182deb3ab258

    SHA1

    03a992f9020a003fe86e477ac28698afc16a73d3

    SHA256

    394659c01bd981c3a4d5840fbd624c20e3270c9defc432ff3fe6ddb482b5ad46

    SHA512

    1318d1844efe031d05499e642c9509422a9f92977b8b4c76d38c6c614d81813af4ec927d2dd807e9b7b205ab06ea1800eb4a082f1a89a4e3721a37301165e28d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dd666b7572c2cf8c3700f0d63b13a59

    SHA1

    c2a866d910854e891f68cf7030d385f434627ce8

    SHA256

    eef685409e12d52fc2d755e8d2bd525e2f44d9b65a95fdafd20e447a4531fde7

    SHA512

    fab793fe311c38877081b64c7a5237fdd10df3d07df0e5114c1d7eaad1b28c6cb83d29621887562cf8c52b479b6eaab165e0525ac5e68d4fd9402aa31780edda

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7407fa726650b128f752efc38801290a

    SHA1

    ed8ad632b9ba98ceb158ebd94e37a1d630f4eb3a

    SHA256

    2817edb2c5e23331afc98f3068e03a74cbdbd09eff694d1d30bd66ed222037f0

    SHA512

    a0034516e005ee468e5d01bb2b429c601664d04d286250b41b0daf97b2a18d765aa23b43934ae1b1c509ae5d5e5c44a677f838787df0698afdcd6abcbf535718

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77c37dbbf9661447dfe5920170488277

    SHA1

    a7eb91f198673d5b2d91427838559d6e9703b841

    SHA256

    b1f7f95d817248546907485164bc0ceba7e695b8acf6c534ddb578c27aafc1f5

    SHA512

    69213b5220b91aed363591e7fb3bd3f333a0547ba26da31260ad762a9b1812741ddce39695c5883546b265ea0d89cb3de237b09d376cb20171e133780e86629c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7a2f767c6e34f46a36fa174017def41

    SHA1

    b9195ab75919ca21965d8a2efff3e3ba464b1381

    SHA256

    088f246caa0a58aaa0aa98b025bd30845ce60043814dae97e988a8a26ef43288

    SHA512

    0d2827ab1164f831162530d002ca76cb44197c0e9853fb501d345e1bfb28713463160fe829cf7a62c4eeb2e8ef2c4cf7f75651a006705adca65353fb36a7d593

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    342f74ac71c0d80bb24d94debd249f4a

    SHA1

    291dc064336078d2a65726344d4f85b62fd5014a

    SHA256

    692e7162d876f006e3cee9762cc9790b448704e1ffd589f62e01bf526956ba68

    SHA512

    6fbea0646d063062657c28912538e42e985a78bab9106180070348fd89b9a8292de0a0e3d91ea4184db0bccfc1fe35735ab3eb70d32add5f9f6e936981455c50

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f26b15bf7878596e4373c9ac7c910ad

    SHA1

    1c3789a0fb39b2253b61159d4ca13a6106708ff5

    SHA256

    6d9d7a7db4af38522128a382a404560b111e6cb18214a635b6c33dfed9ab5b86

    SHA512

    8cd52e3f61746399dbba2a7b4192d9720469f4968addb03d1bcd983834eb555d288121769ed0f55ab9cf7451d055de61ff1d4c51b50ab677369f6125ddbbd188

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d34e334ae4deab1a606d17ab9cce7b8d

    SHA1

    58d28e49054d3a2ae154622aabc23d25b63eef68

    SHA256

    d3a2e5609000f8ffaaba60b4f6c7fc1d07d70a18801c2453596355a9301bf43a

    SHA512

    777d6da30949d77d9ad5acbd0b366dde63a46ef6d2b576936a4c8c3692c2c19db23467b692e7671ee8fbc1dbc08942136e90ec03dc25f2339c461f0c3f59124e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de73b0efe9f2cdc086b85462cdd45b73

    SHA1

    882f81b995375c13ffb0c5eea0934af6cad0ac04

    SHA256

    def67b21e57b0aafa9203c76211e075895bbfa594bb63695d626444e5a2b09b3

    SHA512

    128d0008c6ee31518c7f715b9cc6ee4fcd08a2b717e78e33a99d922a2950ee5eb716fc37d3a97be9a28749a7bfe3ca7dce05160b5aba7a1135e83ffc289f034e

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a30545a1d2b3383be59905ee341f5764

    SHA1

    72a80f123683e8632470a45572a33318fc177013

    SHA256

    8cb6d46d5befb4d4c5def4442c916f3d6ac76e37a7dd7920ec7da6f928bb3fb4

    SHA512

    f4447e1c36f77c40e665019e525529cf77569318fc9257eb69f7ab7e87e958e17dc0468ab4b38a7e12ce1093b0d01053fe0a0ba62481ae9493cfc83bff9714b3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1a85f457c24d2615324ae27853e2f7e

    SHA1

    e6e9717a4ede639450ce04872ae5a557b125a57c

    SHA256

    532eb89c99f4d3dab5fc60ea1705ab76a1ddcfb7f7c73602107a2cfe42973a0e

    SHA512

    4dac7510e336adc1566727233f6e823a2bc3b50bc86bf74cddd3da77f0bcc48488684eb4cd24f3ce4992018055b4a7e448e9d7bef21d6df64434331682071fc5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ed4e72d66556e9da0f125fede3fbf58

    SHA1

    c78e8457b2e9e57bf58ac2bc56b6830724e0c347

    SHA256

    9a172a0ffc8b71e474b355914bfe4684cc8aca7aa5152a68075b851db5c8a750

    SHA512

    00c1194e623834797c46c875fde758b6ac7462b009ee237688dd8cce4fbacbbf1b76ae2216e0882b472277c065d1eb2077d26e1bd9fb9fc441116797509369b9

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1a2d478c1deff6b228a3978195eafb8

    SHA1

    110342ef42326acb7b5e26f6ee1028df4c6b5183

    SHA256

    a6b11ae2177f5297d115198a8a6b2e488d1f3698efe6649777c124dd129866b1

    SHA512

    f7d7d4708855d101a5e6ba18f6a433043f8a9eec24da725d64fee78861c866f11df5efac0e21261afcdbf0491dbb641f16979073f23a25ffc28663082b985756

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3960c270e06fe77cb73d89daa29997b1

    SHA1

    b6dc2ed6656d9217dc728ef4ff4044bc11b13a60

    SHA256

    3fa355f239bcd990586491eebcece74231424b4d50e53a6244c9da3b15fb3a27

    SHA512

    a2e4e8899498585a9743f129707a774a1d314da64b3a96e948809bca96a83b87bbfba6eba78f053bc25353b2d430d2c87962a841e9ac01d3fc82570120bc9bf2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    47ce5ad3e34b2e4b504f8ff4f1ae646d

    SHA1

    126d98ac9a20703af66f327a22e9de4c3294cb71

    SHA256

    ca65df8f33f228c61c5f8598496755ae7836b5a0a35ba4856047ce42eae02bad

    SHA512

    3e129d1cc13f522b242b18daec1771ecc3bead8b5c5c5b6e5faccbcbfd9f51fff6191d40a55f11c1cc0fd54f120a974a07e4106d869a3449def148b66043d1e2

  • C:\Windows\Temp\Cab1803.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar1816.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSIE948.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSIE948.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • \Windows\Installer\MSIEC55.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • memory/872-76-0x0000000000830000-0x000000000083C000-memory.dmp

    Filesize

    48KB

  • memory/872-72-0x00000000007E0000-0x000000000080E000-memory.dmp

    Filesize

    184KB

  • memory/1580-309-0x0000000000530000-0x000000000053C000-memory.dmp

    Filesize

    48KB

  • memory/1580-313-0x0000000004890000-0x0000000004942000-memory.dmp

    Filesize

    712KB

  • memory/1580-305-0x0000000000480000-0x00000000004AE000-memory.dmp

    Filesize

    184KB

  • memory/1852-1278-0x00000000008F0000-0x0000000000932000-memory.dmp

    Filesize

    264KB

  • memory/1852-1281-0x0000000000C60000-0x0000000000D10000-memory.dmp

    Filesize

    704KB

  • memory/1852-1282-0x0000000000160000-0x000000000017C000-memory.dmp

    Filesize

    112KB

  • memory/2496-245-0x0000000000F30000-0x0000000000FC8000-memory.dmp

    Filesize

    608KB

  • memory/2496-233-0x0000000001000000-0x0000000001028000-memory.dmp

    Filesize

    160KB

  • memory/2788-109-0x00000000046E0000-0x0000000004792000-memory.dmp

    Filesize

    712KB

  • memory/2788-101-0x0000000000470000-0x000000000049E000-memory.dmp

    Filesize

    184KB

  • memory/2788-105-0x0000000000500000-0x000000000050C000-memory.dmp

    Filesize

    48KB

  • memory/2912-1107-0x0000000019D30000-0x0000000019D68000-memory.dmp

    Filesize

    224KB

  • memory/2912-300-0x0000000019870000-0x0000000019922000-memory.dmp

    Filesize

    712KB