Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2025, 03:44

General

  • Target

    ed6fdde07417d5285eb5283ef25349fb4808948c5e7131c7a67c1dc34af29b84.msi

  • Size

    2.9MB

  • MD5

    6e9a59d1ea18ce58e5fac465c188dfdc

  • SHA1

    0ebcc6b59014326c1e1e5cea57734026d5a692e4

  • SHA256

    ed6fdde07417d5285eb5283ef25349fb4808948c5e7131c7a67c1dc34af29b84

  • SHA512

    0cc8a8c2acd2fa19544087932db67090dca07c6bc20dde11af43f028324c7e71714b40157d9effeb3a18037a46d2a5d3025c2e93aad09fbd8bb010d18ffc9cf2

  • SSDEEP

    49152:G+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQG:G+lUlz9FKbsodq0YaH7ZPxMb8tT9

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 24 IoCs
  • Drops file in Windows directory 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\ed6fdde07417d5285eb5283ef25349fb4808948c5e7131c7a67c1dc34af29b84.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1684
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D0AD3817BAE9C285C1FCA4C1AD4291A7
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1067.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259461377 1 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1544
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI1355.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259461986 5 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3064
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI2659.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259466853 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
        3⤵
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:352
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI32CF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259470035 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
        3⤵
        • Blocklisted process makes network request
        • Drops file in Windows directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1784
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding FE8A3243A703241BDF12761CA4C053E9 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\syswow64\NET.exe
        "NET" STOP AteraAgent
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          4⤵
          • System Location Discovery: System Language Discovery
          PID:568
      • C:\Windows\syswow64\TaskKill.exe
        "TaskKill.exe" /f /im AteraAgent.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        PID:2804
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000QdujKIAR" /AgentId="c85ff4bd-10ac-48ee-8a00-a41c75e55b8c"
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      PID:2352
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2664
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D4" "00000000000004C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2856
  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
      2⤵
      • Launches sc.exe
      PID:2204
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" c85ff4bd-10ac-48ee-8a00-a41c75e55b8c "5dafa4e4-40b0-41d7-80fc-a25ccf558bc9" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000QdujKIAR
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f770fea.rbs

    Filesize

    8KB

    MD5

    1582688979eddefb89ff8bad2f0a96b5

    SHA1

    c27097f8f749a1af5b216cb45e0c7dc18e0ec9df

    SHA256

    a22e90d5cdb9bc301f068295b6f6e3c69c8d051e09e35ba6e47926df91f21d10

    SHA512

    9272b8f53c655c1b7634b3ad8ab6781b351363d1ca463d181441b8bb112b722c16379b76ad69742da147b5dc9c552587cff43be144e90408806beaf7babb43fe

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

    Filesize

    753B

    MD5

    8298451e4dee214334dd2e22b8996bdc

    SHA1

    bc429029cc6b42c59c417773ea5df8ae54dbb971

    SHA256

    6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

    SHA512

    cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

    Filesize

    142KB

    MD5

    477293f80461713d51a98a24023d45e8

    SHA1

    e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

    SHA256

    a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

    SHA512

    23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

    Filesize

    1KB

    MD5

    b3bb71f9bb4de4236c26578a8fae2dcd

    SHA1

    1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

    SHA256

    e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

    SHA512

    fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

    Filesize

    210KB

    MD5

    c106df1b5b43af3b937ace19d92b42f3

    SHA1

    7670fc4b6369e3fb705200050618acaa5213637f

    SHA256

    2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

    SHA512

    616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

    Filesize

    693KB

    MD5

    2c4d25b7fbd1adfd4471052fa482af72

    SHA1

    fd6cd773d241b581e3c856f9e6cd06cb31a01407

    SHA256

    2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

    SHA512

    f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

    Filesize

    12B

    MD5

    ce16cece86df7cad32c69f93446c22fc

    SHA1

    459712d7f9188d931f856238efb04ba21bacf9f4

    SHA256

    18c77a1cf7df7989d2cc49aa852193257c4c5099e68f29264ff175c30cb8f8cc

    SHA512

    9ad26fa338c2b26b688cfebab4e78293b5d9df4986eaaac78f0bc21c567d86e2c138b52fa34bcc3d7c50a1008137f47ade817002730354a58d7c9964f7e0a509

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

    Filesize

    248KB

    MD5

    593dc8f5dcb912d49e28c09237006f49

    SHA1

    7299076b571c97e3e1d43118b2acdb4cce80904a

    SHA256

    41d8e46de5dc0749e66b9b106a58337160b44d0a89200874ed8aa2b35227d3f7

    SHA512

    b05c6a689b4b14445504402f437c2f4ae57aa133b40af14c9480e85054ada9e8f5b3e8093b173f5c4a4b98beaf550e031b79485f6d140d840c2f6a32e3d4c534

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

    Filesize

    1021B

    MD5

    51a41966b950af62998eee5043f543b0

    SHA1

    d4ce80134834a1f10d50a6cac3ca3a3e80ff1dc2

    SHA256

    f1461b023e02fac832979ebf9bfa59ee7043885c90fc8ee6f8077f07a1cb7097

    SHA512

    9c4ba08451116f92036ce24075a641eb5973b740bb876cb8ec7229dae10308364404f175b8abd1f0d6eefa73b9123fa857bf2c3b39577d767831444f99435936

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\log.txt

    Filesize

    23KB

    MD5

    892b6349115e524b29b107701666b6b6

    SHA1

    a451573a5e947dc8fb116b597852914aaf1c1bdd

    SHA256

    28b7da9c0051d21366d2a0777c419a5d00828e97db4d6df9735aa22f481a6317

    SHA512

    e145a45fb75c2b52c8f57bbf7419da8bf0e5aae6f6d1531ffe282cb6cc30ffc4745f6dd64d879ce463d61902467cd8bf87bf116260bdc3311589f89da7a5f8b1

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

    Filesize

    588KB

    MD5

    17d74c03b6bcbcd88b46fcc58fc79a0d

    SHA1

    bc0316e11c119806907c058d62513eb8ce32288c

    SHA256

    13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

    SHA512

    f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

    Filesize

    225B

    MD5

    cd5908fb47b1421baaeb0e2b09fa7edb

    SHA1

    ed7eddc5ab8c95be91e5c7c46d8f9a55e1d3aa97

    SHA256

    f4aa1c90a4b55e236ac353308c64124d97e162e6ff136d937558ed3fea5adb0d

    SHA512

    0e4b904deb88ad1a2732b5d49ab56212047072af971d98aabd85257c2a43d6a0d258f594acc5173ead5f0ecc9f0e6f573cb035ffa17fdd4f299ab0bd8a422697

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    5badec328a1af56466fe1cf6ee5d78b1

    SHA1

    9c9d9a8cfea484f1bd7f05e5e2743017ec70971f

    SHA256

    5e2264b59ffb7fb3390400250110126383a8caeecac68b55399a53d145264729

    SHA512

    08584873f67a4391d93ae52afee82b52ea9d46f013f65a884561cf42b592accdf39a3864a043c10bffab2e228ce16eb367d4687e396ce7ed6fbfae246771bee7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_93E8F0A6DF0B1F1414474691911362FC

    Filesize

    727B

    MD5

    e9517c2d7514cbc7e192f697a72b55f3

    SHA1

    69ebba769419b9716a0a6cf471a5ca45a23e10b1

    SHA256

    dd3ebd223d7943ab07cb582a09d48c97d515050e799d36b1b7032605b97dc046

    SHA512

    d09ec480ff69198ad9c7e203dc7c0b3594d0fa1d0fc37d903003510494a0fb7c22fedd98faddb6eeb16a6f8bb7767610e14a4f64b7a4c7a4bc6011084f8ae001

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    17000dfd6df4427e373acbcb6135b212

    SHA1

    1a8b182c656d92a003f1ed34dc05417fff84451f

    SHA256

    e593b8c906b1dc78f9057cf0fb847375df1d1d53f567646cf5c897507c0f0d40

    SHA512

    7dc8370737542739dee2b78de2be1ff063786750355be4a2c631b8720d09c20e7b56d7dc92cc442a07f253bdcb7fab51d0aab31f4dd4862fec2cea733a0e04f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    2b1cb9fd7faf285931f806bd892ed571

    SHA1

    389e797758c96cbc23cf96a41e044546c3138407

    SHA256

    55d7e597a8213b7a2f1fcc70a0edde2e7c1320b280208706a82a977f8cc2e4d1

    SHA512

    15b4429b413206619884fdd07ad9fbf0111e4e36bd9c7c03cd20080dd6f671b5529086a3ba4e4e8c0d7058e7623247b8cf7d32faf00cff0c85e4f04066861d18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_93E8F0A6DF0B1F1414474691911362FC

    Filesize

    412B

    MD5

    b4bdc4ec718b0d47a508ecd31867c7cc

    SHA1

    405587d8769c94db1d4573ab6ae2ec07bdd15847

    SHA256

    550ec9ddc9a873d5a4a7a1ad7ebbedece772bb508dbe83855aeb7541aa45506c

    SHA512

    677309863a40fb2a9e4784c90f9dff837fb93b6c265b0319c5f65c482ca4b9246ce36d93d9059b360882222e5b77f55728de62a38008a6b1e44d10e98b020be6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    039a55ed2e1365176e15f9d9f11266fc

    SHA1

    8f401c1aaec6eba68ad75ac63cfc3d2f42753900

    SHA256

    3ebf74fb69be2185f70c4a32050c9cfcec8f455018dec481fb8299c479ca9c9b

    SHA512

    66a955e7f5d0b1af9282077b608932525b837eaa1eef9e748acf6eda2a508d6c82d2cac8a1c4dd30bc40009fcac56f85cffe06f8a1d5fa9edcf8e41b0a36de9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bca2a6d93299d0c859aeecfebad084d6

    SHA1

    e7b60c6c51813e080050e1885f06ae805f5b6146

    SHA256

    f95589b0d0c1ff0e68c168d6bd22277736aa89c2596f4c3c05e0ab176036867f

    SHA512

    bb4137e0902b2bb2b2a57b21cd651aa427520887c3ed8df697d0df2ce027e16384fa6454e6434edfdd6b6207f09dd9a3839b2433e2400f149230b2eca760c03b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    8cd7a257edadac1e6976f3dd6033b18f

    SHA1

    a713ee7eb93f1284d59842af7913e1a2116a7177

    SHA256

    ed21fff4269bf6a621500b6d54cc825ecad620e0b682b51eaf180df812adbb27

    SHA512

    ec98e9849a1438fe4dd82a875b5063004a0cbbb37d5817d01bfb0d5d6a19bafb7165cc7bf00ff739ae812b07cfb20644aead8fbdce36f371c825d6d63e031dc8

  • C:\Users\Admin\AppData\Local\Temp\Tar1028.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Windows\Installer\MSI1355.tmp-\CustomAction.config

    Filesize

    1KB

    MD5

    bc17e956cde8dd5425f2b2a68ed919f8

    SHA1

    5e3736331e9e2f6bf851e3355f31006ccd8caa99

    SHA256

    e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

    SHA512

    02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

  • C:\Windows\Installer\MSI1355.tmp-\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    715a1fbee4665e99e859eda667fe8034

    SHA1

    e13c6e4210043c4976dcdc447ea2b32854f70cc6

    SHA256

    c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

    SHA512

    bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

  • C:\Windows\Installer\MSI2810.tmp

    Filesize

    211KB

    MD5

    a3ae5d86ecf38db9427359ea37a5f646

    SHA1

    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

    SHA256

    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

    SHA512

    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

  • C:\Windows\Installer\f770fe8.msi

    Filesize

    2.9MB

    MD5

    6e9a59d1ea18ce58e5fac465c188dfdc

    SHA1

    0ebcc6b59014326c1e1e5cea57734026d5a692e4

    SHA256

    ed6fdde07417d5285eb5283ef25349fb4808948c5e7131c7a67c1dc34af29b84

    SHA512

    0cc8a8c2acd2fa19544087932db67090dca07c6bc20dde11af43f028324c7e71714b40157d9effeb3a18037a46d2a5d3025c2e93aad09fbd8bb010d18ffc9cf2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

    Filesize

    1KB

    MD5

    55540a230bdab55187a841cfe1aa1545

    SHA1

    363e4734f757bdeb89868efe94907774a327695e

    SHA256

    d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

    SHA512

    c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

    Filesize

    230B

    MD5

    3d24814ce1b3fcc1933699663b2d5816

    SHA1

    3d30dff0ab1aa19abc84f3f88093eaf56b574f37

    SHA256

    58fd72454b71fc4c25f2ef89bf6090053ea480599ed0cb595ad40e1f794f3a77

    SHA512

    4ef28bfec6a42c2c72ef3783f6b9cfca01773322462d099ffcf0582c87e57ff8d13c3a480f60233004c25a6f41ec9965041d20c8ffdebcd7648e7d5961bdd545

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bed555579886b46cfa7caffa85c52306

    SHA1

    eaa93eb41fa92a1b4e263d9b8de600b96fcc87f5

    SHA256

    fe4d0109aedb35d7e682fc4169ae995da8528d3f21ff2f0197f946c08bd5d696

    SHA512

    1e58c9f816064a0fefb385d8e1ef8ef0e2599f31410baa3f724315cbabd88b90496e246ca53b00ab2e42fd9cad3fee63d863be35f20fb70d9ae99dcb04a7dc8b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bae9bbdafddf65088af1b4ba146a07c6

    SHA1

    c229065b30b05cf978bf529fcb2dd324bd9947a0

    SHA256

    eabba286e301ac9996303ff6e98cc1d8916c38e607e1bc09f297d64696f8dfb7

    SHA512

    740ab8251983ff4670f0421cb65e2eea5090c453dc6b9d1e6d12e235dee6d9e771d1838e1ed280b8ce6bc1139a9bd69a329f37624f1222fed9d898d060301888

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38609d11510f7c174ef34a472edfb249

    SHA1

    a442775a322e130b33af3e4f96a1057ae12a3e69

    SHA256

    c1e5122db370e323e5cebd559730e84ab205f1fae2463c344be0c92d870fb0d4

    SHA512

    5abbdfbb6fda77c48d3f9089fbbf274f1c5d6286eb37c9e23ba3cef6aadd721c75d15d54667a1ee78a677df41111c1bdf486f85545701c55320140368cab2972

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d3051c324a7e0f4b1f59a17262617ebd

    SHA1

    e1739b3856189f0c0cff6f61505e374907c9ab89

    SHA256

    f8a9eed97dc552a3deda04259459680049154907f2caef87a58bda9516905522

    SHA512

    a99177595ad63a55d24b11b29efe2880ad3cff820f20bf752845695a3db272fbfb84720d4b670211309b9239fdde85749f9e62f6471b356308b3433f0a4cfd58

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a31f901d820342474cd51bc414ee450a

    SHA1

    c83103dd54b5db24db1edbe5009770634cca445c

    SHA256

    feaf6853da354ceaaa4077c582fc8fa7024327f6e002403758a5b2d355fd8f26

    SHA512

    e2714bb629d0c815ebb6c2d87b47d6c83043f717f3cc6ad4768727239917d69e12d5540b9cf1f15bda719af4d0ce4eefc396641743e9d2371e74377cd2ed7db2

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d2b24ec2a73975ff33ab95f8cc481fa0

    SHA1

    d29fd0e5331b9cd47aadea0d7becc59ddd7bb99a

    SHA256

    376130c245059ab7a6ee38acac0b4db8a2e75567ddccc39e56deae9a4dd3f32c

    SHA512

    28545613d785a0962e545a816f6ec86a44d0d00e10c726b6229e2371053af3f7840edd00980bbee02af0612adc02f1e39da392a153332f49baee816627214c5b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e532feed2046fdac0de8a7172199aede

    SHA1

    d595122ce9d2b88f2d4f18bd9ba844b12ccd0f62

    SHA256

    ece4a636c404c44085c567ca365f71ec32ea3dc2ca3a718d84a5042e8cc2bf3f

    SHA512

    b6c9f3e922930a2ac4e5e705a69c538b83e685956c38df496bf7afb1a473ecf0819a1045b5470403dc71f9a7594d35155ee4ba4de1dc0c22a30ee9e5863793ac

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31b7f49b715da0fc18cbf79d399f5090

    SHA1

    623dd18bc161062ffa666cdba182a4b37cf32734

    SHA256

    39f454600e9fbf369eb34550250ff8f8c170fa5d4af6165e6beff51c3585b923

    SHA512

    b9e66225ce6a1b27f18c073c1fe181087ed90355d07c299adabc68d5d6224155c0b2aaa45651a15d23b606008c87e274c944f8dad704d90dd17f4c80691e60b6

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d29a45d448b916702b491f4b071e0aa

    SHA1

    65b85b4f636fd17d9492581c7dd1d38ccd2a4ef2

    SHA256

    c66262edf5a2c0529f2870ee36f34a051d02f9d5abb6906bc2e0c6d8a5edbbc0

    SHA512

    75d6b1950185c67747813c2047b374f7267f0ca359820553140afe7949fe056e9d657a28e037d2fb30010321aa36df80e8bd289bab6a41135a83d61fcac5a434

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afed3830fc673ac41117b4e0f32fbd5d

    SHA1

    9ae3f4392ec19d95bbba9d0b1577c81495c438fb

    SHA256

    91f244288fac65ace313be2b8fc84d27553d273356dc3ea62b9b7aef02b937a0

    SHA512

    b5bd1e755740786c33df8063848f8d75d6c82c38b3080cb768edbc049183753a200aaea8052d9a39874d9c6a2a9395365b7532e43b3d406b5c67ff188f8bf35c

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c19690af2d1ac1c0be9b3974bf5636db

    SHA1

    bb38086e5c2504971f85dc55e03b3c25bad6f07e

    SHA256

    3da26dae42f4a82fcacc5e0dedc8b564497fc82ed5439f4e14bdbfe558decd18

    SHA512

    aaf56d9d6c624c36d407a340179cd9de699705322a1990b3273f35af4497e23fb75f5ffd8e9c46fdc107767c68914ab524561e0de33e6bbcf62309ae9a924b41

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8358287b2f2c880fe0cc2652a808708

    SHA1

    b650c4b4c3921a8f4f2d5f3e3041a24b1ffce7c8

    SHA256

    51f6970f411961437d9b1171401f23191aa5a36c5834642f1e04beee86f1bff7

    SHA512

    e8c913d8777427a7e0600b194ef6b1a126f1d7b99dea4a3559751e219a9b3b0beeb3ed7230bfddc79d0df964eefa73ccc94a8a670cd137f9492ca010826c340d

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    eb613ad0d35b607831e6bb0d595472d2

    SHA1

    608deada49ba8799be7e6d7042cba3663ce80422

    SHA256

    0f0e2b023101e4be180c391cfaf88893fda29b2e7870c085c4437f662782ea41

    SHA512

    88e0173fd118a28e53f8b6498a5df1f236a0efb5d85cad6b8608dffafaaf99cdd725e0e2ba8b555bb85810a4214f60af2936cf0279d7cfdfc9c49e3d2e47c3c2

  • C:\Windows\Temp\Cab4135.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar4167.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \Windows\Installer\MSI1067.tmp

    Filesize

    509KB

    MD5

    88d29734f37bdcffd202eafcdd082f9d

    SHA1

    823b40d05a1cab06b857ed87451bf683fdd56a5e

    SHA256

    87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

    SHA512

    1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

  • \Windows\Installer\MSI1067.tmp-\AlphaControlAgentInstallation.dll

    Filesize

    25KB

    MD5

    aa1b9c5c685173fad2dabebeb3171f01

    SHA1

    ed756b1760e563ce888276ff248c734b7dd851fb

    SHA256

    e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

    SHA512

    d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

  • \Windows\Installer\MSI1067.tmp-\Microsoft.Deployment.WindowsInstaller.dll

    Filesize

    179KB

    MD5

    1a5caea6734fdd07caa514c3f3fb75da

    SHA1

    f070ac0d91bd337d7952abd1ddf19a737b94510c

    SHA256

    cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

    SHA512

    a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

  • memory/1544-79-0x0000000000B50000-0x0000000000B5C000-memory.dmp

    Filesize

    48KB

  • memory/1544-75-0x00000000006F0000-0x000000000071E000-memory.dmp

    Filesize

    184KB

  • memory/1620-303-0x0000000019B90000-0x0000000019C42000-memory.dmp

    Filesize

    712KB

  • memory/1620-1103-0x00000000193F0000-0x0000000019428000-memory.dmp

    Filesize

    224KB

  • memory/1784-308-0x0000000000430000-0x000000000045E000-memory.dmp

    Filesize

    184KB

  • memory/1784-316-0x0000000004C90000-0x0000000004D42000-memory.dmp

    Filesize

    712KB

  • memory/1784-312-0x0000000000550000-0x000000000055C000-memory.dmp

    Filesize

    48KB

  • memory/2352-248-0x0000000000480000-0x0000000000518000-memory.dmp

    Filesize

    608KB

  • memory/2352-236-0x0000000000DE0000-0x0000000000E08000-memory.dmp

    Filesize

    160KB

  • memory/2976-1206-0x0000000001040000-0x0000000001082000-memory.dmp

    Filesize

    264KB

  • memory/2976-1208-0x0000000000D30000-0x0000000000DE2000-memory.dmp

    Filesize

    712KB

  • memory/2976-1209-0x0000000000160000-0x0000000000180000-memory.dmp

    Filesize

    128KB

  • memory/3064-112-0x0000000004830000-0x00000000048E2000-memory.dmp

    Filesize

    712KB

  • memory/3064-108-0x0000000000B80000-0x0000000000B8C000-memory.dmp

    Filesize

    48KB

  • memory/3064-104-0x0000000000BE0000-0x0000000000C0E000-memory.dmp

    Filesize

    184KB