Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-07-2021 12:36

General

  • Target

    Dike_Infocert_upgrade.msi

  • Size

    628KB

  • MD5

    0162581e46cffb64d7c8c90c4134695b

  • SHA1

    5af1b43c0264814e030b0b0116a9cf998d1ce8ca

  • SHA256

    67158ec3e3edcaff528ce829517c6ab20095b2dda6a3f60a5ebf53025d116040

  • SHA512

    13acfccd5022f4cbb6d4e4b9a6d8ca8ef2d919a4b67c5e196f4ed62d387dadd460594cbc42761f8e48a32f1a184df5c5fea6857ea1f61f251ce301877eccdb2c

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 23 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 49 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Dike_Infocert_upgrade.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1100
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 31F403C7DCC94963ADD756FC005152C0
      2⤵
      • Loads dropped DLL
      PID:768
    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
      "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="amministrazione@universoinvestigazioni.it" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="0013z00002gg5y2AAA"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:1348
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 57D8293C869F24D417DC34331CA0228C M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:2860
    • C:\Windows\system32\NET.exe
      NET STOP AteraAgent
      2⤵
        PID:2712
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 STOP AteraAgent
          3⤵
            PID:2364
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im AteraAgent.exe
          2⤵
          • Kills process with taskkill
          PID:3008
        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
          "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /u
          2⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2664
        • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
          "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="" /CompanyId="" /IntegratorLoginUI="" /CompanyIdUI=""
          2⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2740
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:420
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000003A8" "00000000000004A8"
        1⤵
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:1888
      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
        "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\System32\sc.exe
          "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
          2⤵
            PID:2140
          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "3d9a2b9e-9f88-43c0-86c1-d29b213ef60a" agent-api.atera.com/Production 443 or8ixLi90Mf "initialIdentification"
            2⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:2408
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c "cscript ospp.vbs /dstatus"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Windows\system32\cscript.exe
                cscript ospp.vbs /dstatus
                4⤵
                • Modifies data under HKEY_USERS
                PID:2556
          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "1a69000a-d1ac-45ff-b7d5-3c35d8b52cbb" agent-api.atera.com/Production 443 or8ixLi90Mf "initialIdentification"
            2⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\system32\cmd.exe
              "cmd.exe" /c "cscript ospp.vbs /dstatus"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\system32\cscript.exe
                cscript ospp.vbs /dstatus
                4⤵
                  PID:2828
            • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
              "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "9dabfb7d-d1d0-468d-a6ff-df5de79efa28" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates"
              2⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3008
              • C:\Windows\TEMP\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe
                "C:\Windows\TEMP\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe" "13ae7552-f7ea-441a-8598-e2b865701259" "9dabfb7d-d1d0-468d-a6ff-df5de79efa28" "agent-api.atera.com/Production" "443" "or8ixLi90Mf" "checkforupdates"
                3⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2724
                • C:\Windows\system32\msiexec.exe
                  "msiexec.exe" /i C:\Windows\TEMP\Setupx64.msi /lv* AteraSetupLog.txt /qn /norestart
                  4⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2188
            • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
              "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "3e7727ae-3eff-41b6-b3d9-8f6bb26e0384" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo"
              2⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Modifies data under HKEY_USERS
              PID:3024
              • C:\Windows\system32\cmd.exe
                "cmd.exe" /c "cscript ospp.vbs /dstatus"
                3⤵
                  PID:2336
                  • C:\Windows\system32\cscript.exe
                    cscript ospp.vbs /dstatus
                    4⤵
                      PID:2692
                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "8f1cee9f-3496-4715-9d15-7e9e22f84aad" agent-api.atera.com/Production 443 or8ixLi90Mf "downloadifneeded"
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2060
                  • C:\Windows\TEMP\SplashtopStreamer3360.exe
                    "C:\Windows\TEMP\SplashtopStreamer3360.exe" prevercheck /s /i sec_opt=0,confirm_d=0,hidewindow=1
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Modifies data under HKEY_USERS
                    • Suspicious use of SetWindowsHookEx
                    PID:2112
                    • C:\Windows\Temp\unpack\PreVerCheck.exe
                      "C:\Windows\Temp\unpack\PreVerCheck.exe" /s /i sec_opt=0,confirm_d=0,hidewindow=1
                      4⤵
                      • Executes dropped EXE
                      PID:1580
                      • C:\Windows\SysWOW64\msiexec.exe
                        msiexec /norestart /i "setup.msi" /qn /l*v "C:\Windows\TEMP\PreVer.log.txt" CA_EXTPATH=1 USERINFO="sec_opt=0,confirm_d=0,hidewindow=1"
                        5⤵
                          PID:2832
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "532e9225-9315-4196-b04f-2a10eecb3144" agent-api.atera.com/Production 443 or8ixLi90Mf "maintain"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    PID:1228
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "4c893f06-d557-4159-893c-727b0e4de2fb" agent-api.atera.com/Production 443 or8ixLi90Mf "getlistofallupdates"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:820
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "f232d31f-dcf9-4866-9fd2-906c9dacff65" agent-api.atera.com/Production 443 or8ixLi90Mf "pollAll"
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1740
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "fe39715c-a6cf-4448-823e-910a7a5d2679" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:2696
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "141ce568-26e0-4dc4-9a44-cb7aa6a643d6" agent-api.atera.com/Production 443 or8ixLi90Mf "syncinstalledapps"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    PID:2848
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "fcd6e8f5-4d82-4847-8b54-a69df528a76a" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBZENvbW1hbmRUeXBlIjo1LCJJbnN0YWxsYXRpb25GaWxlVXJsIjpudWxsfQ=="
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    PID:2492
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageNetworkDiscovery\AgentPackageNetworkDiscovery.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageNetworkDiscovery\AgentPackageNetworkDiscovery.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "bdc8f445-38f4-4226-8c7f-5c8ca426baf0" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJQYXJhbXMiOiJ7XCJDb21tYW5kXCI6NixcIkRvbWFpbk5hbWVcIjpcIlwiLFwiVXNlck5hbWVcIjpcIlwiLFwiUGFzc3dvcmRcIjpcIlwiLFwiQ3VzdG9tZXJOYW1lXCI6XCJcIixcIkJhY2tncm91bmRTY2FuSG91cnNcIjpbMTAsMTRdfSIsIktleSI6IiIsIk5ldHdvcmtEaXNjb3ZlcnlDb21tYW5kVHlwZSI6NiwiSXNBZG1pbiI6ZmFsc2V9"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2880
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "7f4a9360-c975-4aab-a1d9-9a789a889f64" agent-api.atera.com/Production 443 or8ixLi90Mf "monitor"
                    2⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    PID:1620
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTaskScheduler\AgentPackageTaskScheduler.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTaskScheduler\AgentPackageTaskScheduler.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "f257dc80-5bb1-49d3-8324-84fdc8d99e8b" agent-api.atera.com/Production 443 or8ixLi90Mf "Schedule"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2604
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" 13ae7552-f7ea-441a-8598-e2b865701259 "e6be9a03-e4bf-4ca7-af80-0b96fdbb2d74" agent-api.atera.com/Production 443 or8ixLi90Mf "syncdevices"
                    2⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Modifies data under HKEY_USERS
                    PID:1600
                • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
                  "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe"
                  1⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  PID:1076
                  • C:\Windows\System32\sc.exe
                    "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                    2⤵
                      PID:2828

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Bootkit

                  1
                  T1067

                  Defense Evasion

                  Install Root Certificate

                  1
                  T1130

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  2
                  T1012

                  Peripheral Device Discovery

                  1
                  T1120

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                    MD5

                    33dd421f03cba2285db580d195337417

                    SHA1

                    ef6a57315a9f4bc95e8372de231c76961bb26d61

                    SHA256

                    0bfee9b7976dac1a18339d57d5f9991f65ce25b87fd01c74e16f943eb3d1d899

                    SHA512

                    b3993661dce0d5a472384f244baf34f680d4bbcde066c45cfef94a2f4c5db4a796be24ecb7dd081bd6e1b5dd8da7ce9f9a7a41713f2dfda2e11e6f15edd69073

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                    MD5

                    33dd421f03cba2285db580d195337417

                    SHA1

                    ef6a57315a9f4bc95e8372de231c76961bb26d61

                    SHA256

                    0bfee9b7976dac1a18339d57d5f9991f65ce25b87fd01c74e16f943eb3d1d899

                    SHA512

                    b3993661dce0d5a472384f244baf34f680d4bbcde066c45cfef94a2f4c5db4a796be24ecb7dd081bd6e1b5dd8da7ce9f9a7a41713f2dfda2e11e6f15edd69073

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                    MD5

                    33dd421f03cba2285db580d195337417

                    SHA1

                    ef6a57315a9f4bc95e8372de231c76961bb26d61

                    SHA256

                    0bfee9b7976dac1a18339d57d5f9991f65ce25b87fd01c74e16f943eb3d1d899

                    SHA512

                    b3993661dce0d5a472384f244baf34f680d4bbcde066c45cfef94a2f4c5db4a796be24ecb7dd081bd6e1b5dd8da7ce9f9a7a41713f2dfda2e11e6f15edd69073

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
                    MD5

                    7ff0ac77806aed9588b143cd0fab552b

                    SHA1

                    184b62f2956b95ffe3dc98ebb31d7f45dbca83fd

                    SHA256

                    730d85d5ef4f0939154278949c126a444ed859e7718bb175ca3153ca6ed9d142

                    SHA512

                    1856bda8cc3d4161110cd75a7be4939193ed408a95f9c41e22f4cc9f85b1294584f95796bce207dd65d606ffb57760b3d2e1681efbbb7759a19a9f70fb7edac8

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
                    MD5

                    c8164876b6f66616d68387443621510c

                    SHA1

                    7a9df9c25d49690b6a3c451607d311a866b131f4

                    SHA256

                    40b3d590f95191f3e33e5d00e534fa40f823d9b1bb2a9afe05f139c4e0a3af8d

                    SHA512

                    44a6accc70c312a16d0e533d3287e380997c5e5d610dbeaa14b2dbb5567f2c41253b895c9817ecd96c85d286795bbe6ab35fd2352fddd9d191669a2fb0774bc4

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
                    MD5

                    83222120c8095b8623fe827fb70faf6b

                    SHA1

                    9294136b07c36fab5523ef345fe05f03ea516b15

                    SHA256

                    eff79de319ca8941a2e62fb573230d82b79b80958e5a26ab1a4e87193eb13503

                    SHA512

                    3077e4ea7ebfd4d25b60b9727fbab183827aad5ba914e8cd3d9557fa3913fd82efe2cd20b1a193d8c7e1b81ee44f04dadfcb8f18507977c78dd5c8b071f8addb

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI
                    MD5

                    04ef8a3c001a0ee28b1787423127271e

                    SHA1

                    aa0b319a3b8f04d1ba5704e0d87f9195deaed332

                    SHA256

                    4f02c008ea3183f19c0a5d56a71e2b6e07a99a56489d36cf40b5bac910409e18

                    SHA512

                    9c0d91eb8c9339a788c78d3850d78aae9a8e251cfc56c9c58e347f5f0fb6ba72fb111bb849c3857b4167f3f312fe3e920bb1826c2254d20954f75c7c19f65f33

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                    MD5

                    49916107ee58eb8150c4e20ccfcc15d7

                    SHA1

                    c6e89b6881d46ae708ab1a3df023f8228e5476c0

                    SHA256

                    3e6ea764c4eaa5685f6a0e44268a7f2d7cd48c42aa6ab32f80124389757938f2

                    SHA512

                    4e18017d43e6d7410aeadc161f53efea733b0091b28dc0201ec4c153a2e8b00999f09b0439168eea932e6464a6104d76d35dbbd8b420487c41e2b81e8faba08a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                    MD5

                    49916107ee58eb8150c4e20ccfcc15d7

                    SHA1

                    c6e89b6881d46ae708ab1a3df023f8228e5476c0

                    SHA256

                    3e6ea764c4eaa5685f6a0e44268a7f2d7cd48c42aa6ab32f80124389757938f2

                    SHA512

                    4e18017d43e6d7410aeadc161f53efea733b0091b28dc0201ec4c153a2e8b00999f09b0439168eea932e6464a6104d76d35dbbd8b420487c41e2b81e8faba08a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                    MD5

                    49916107ee58eb8150c4e20ccfcc15d7

                    SHA1

                    c6e89b6881d46ae708ab1a3df023f8228e5476c0

                    SHA256

                    3e6ea764c4eaa5685f6a0e44268a7f2d7cd48c42aa6ab32f80124389757938f2

                    SHA512

                    4e18017d43e6d7410aeadc161f53efea733b0091b28dc0201ec4c153a2e8b00999f09b0439168eea932e6464a6104d76d35dbbd8b420487c41e2b81e8faba08a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                    MD5

                    49916107ee58eb8150c4e20ccfcc15d7

                    SHA1

                    c6e89b6881d46ae708ab1a3df023f8228e5476c0

                    SHA256

                    3e6ea764c4eaa5685f6a0e44268a7f2d7cd48c42aa6ab32f80124389757938f2

                    SHA512

                    4e18017d43e6d7410aeadc161f53efea733b0091b28dc0201ec4c153a2e8b00999f09b0439168eea932e6464a6104d76d35dbbd8b420487c41e2b81e8faba08a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
                    MD5

                    7033bdb79f5752cbcafa17b296df24b2

                    SHA1

                    1d59a4aa8545f1d8aef1606c4a8a23b1b807ff18

                    SHA256

                    7b07559d1b4b17d4aef7e6f305a0d8c2fed13931b85e217bda0ee702af523f74

                    SHA512

                    df78b9194a91a2c2ab5814e92ab8585c3aaaef3f1519146592ad345253dea0afe2be8c3d99291f4bdfaf32d3785ad5cb33586e9f4a18a01e370451b69e9fc36d

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
                    MD5

                    159c9643ddfb511421327ece3bb3133b

                    SHA1

                    4c11d1e591bf0d9b89ea5a949ed26a0425b25184

                    SHA256

                    a1c9523bdb884cd43b20d3d5173f2c6bf206de17c2e79db25d372ff19cec5fb7

                    SHA512

                    c7232aed3013d5d472475c1e4ba2335f57ebb31228545d7e1a7de45bbcb0246af0115a590d608389a32f1614befa67122eb33bd9881bea7ea2ff1b5b56bd2a98

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
                    MD5

                    c56f50320ec016d53ccaa5cb824f4573

                    SHA1

                    7a3102cd45cf49f12195f9354f0412e0885f8504

                    SHA256

                    cbc15a831e6ca49482dc16a50cfd6cd8b70f1865b3ed2be57b831e1e0d8dec6e

                    SHA512

                    92720fc806dd79399df2f2f9d2f5f66a7cae2b6debef3da3f018c183a15d9e49691612615b492c573b6665ccbb3da37041a74263d1f20cf1b45c2640d6044ef2

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.INI
                    MD5

                    03b8a5a32d56d4fbdf7802d7aec58aa1

                    SHA1

                    d340ac69ebbd1883d17915ea3bb856c93ec37a98

                    SHA256

                    a42f4dfec2e8385fe457f0604977a4f5cedae391776598b04367addc6d1c8ada

                    SHA512

                    1ee29b06c9a8ee1d1f5e200f59e25ce29d4aa4c8fcf1c809e75a28f4d3c9faf3e7ff2077bc351dca81e287a0c57d17f6b1b5f535415f7837667bad29e6559991

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                    MD5

                    e6cf1fac613f61846812b4a30efc3a39

                    SHA1

                    060b70d76d5178a6bf33d160fbc7db6a5789fbfe

                    SHA256

                    524c7a89c9de151943d41261910f5e3b58abed77a7ff8827f1903e972dd37be2

                    SHA512

                    4c03b7603cff7997a9fe53711946440fde14b24bc325b853cc72096d548b89cb992a7ac970bb1ceddb898ea1d7b456038508ad45d2bfeb63553e83b3ffb398e8

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                    MD5

                    e6cf1fac613f61846812b4a30efc3a39

                    SHA1

                    060b70d76d5178a6bf33d160fbc7db6a5789fbfe

                    SHA256

                    524c7a89c9de151943d41261910f5e3b58abed77a7ff8827f1903e972dd37be2

                    SHA512

                    4c03b7603cff7997a9fe53711946440fde14b24bc325b853cc72096d548b89cb992a7ac970bb1ceddb898ea1d7b456038508ad45d2bfeb63553e83b3ffb398e8

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe.config
                    MD5

                    3f9b7c50015ca8be5ec84127bb37e2cb

                    SHA1

                    07fa0b2f00ba82a440bfeacafd8b0b8d1b3e4ee7

                    SHA256

                    c66e1ba36e874342cd570cf5bdd3d8b73864a4c9e9d802398be7f46fe39a8532

                    SHA512

                    db5713dda4ecac0a1201add7d5d1a55bdbfc9e373b2277661869f7de9e8ba593f44bdafa6c8dbeba09df158b2dfdd1875c26c047f50597185f1f2f5612fc87b9

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\Atera.AgentPackage.Common.dll
                    MD5

                    01686fb0e3083594677d84d0f46df354

                    SHA1

                    0419ea9022e5ad29217344a0962ae99a4473bc0c

                    SHA256

                    a1d6a5121135c51c1644c3d1888ae02517b3e5fa71092397485f2ad25aa1e691

                    SHA512

                    34c6a1fe79a5b19748247f162b1645a63b71632784bd9b5cd482f81c77dc8aa229d8f8aeba419696b276d34ce0e4258752c6c7f78d5e2d846d355e6bddcce0fe

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.INI
                    MD5

                    fd927f3ce29ff76dfc6846b9f6782f92

                    SHA1

                    d3734ef11e871ff44a49665f3d83da23b547d460

                    SHA256

                    be98b9e8c7393dcd9ae795a02dc06f67848fe13b3de199e66d94144b54dbcff6

                    SHA512

                    db1b5d3ef2ee77c12d8fce03ccf1fe29cd956d36503d9e78ee2aa51c5f344681e00f3127e7b075d43729fd1371b75c84535075854760d3184681d79d5d9c590d

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                    MD5

                    36243dab64849780a7b800e0b3e9419f

                    SHA1

                    cb6be598bafea04e25a9a0515141a3a6fe00fa38

                    SHA256

                    2f599ae4c76b642d30d2d5dfd0f0c009c3407cc592d3341d368f19da9b4cd29f

                    SHA512

                    3d897e9ba1fe0f706c819cc6b0f4a260e437a564ce7c84c68db43003d181b6fcb735ab63a8d2fa5cfbec6b23319e9fadc269aa8331d1f818fd665bb1029fadae

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                    MD5

                    36243dab64849780a7b800e0b3e9419f

                    SHA1

                    cb6be598bafea04e25a9a0515141a3a6fe00fa38

                    SHA256

                    2f599ae4c76b642d30d2d5dfd0f0c009c3407cc592d3341d368f19da9b4cd29f

                    SHA512

                    3d897e9ba1fe0f706c819cc6b0f4a260e437a564ce7c84c68db43003d181b6fcb735ab63a8d2fa5cfbec6b23319e9fadc269aa8331d1f818fd665bb1029fadae

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe.config
                    MD5

                    9bc8c60dca1db56880a6de6186139bbb

                    SHA1

                    215828e6240b6d588e1d3e1a92e9df51ede80062

                    SHA256

                    98cbf73681a1b63d4242cb40a2bd0bb6b04a61528a4230e8eb7e10bd83b6e6b0

                    SHA512

                    809a8d652869977bcaa702fc7ab4963ef48554e122acd08314c7645dbb878bb32e0c5be0aa08606956fcf1fac5431cc401f5949ef781e52eb9919c72c88f999a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Newtonsoft.Json.dll
                    MD5

                    76e38ec3d4272fcc0834d86ec464a15b

                    SHA1

                    76dc3b82e571adaa42a3bd614ebe6f70e2887708

                    SHA256

                    92fb82687c111be88cb58958dc7e489d87ba952752e2b4a37ce22992ed949748

                    SHA512

                    43204925f34acf88a7f90236be068b875271b4d87c0b239b62263eef1c6e70526aa9f8fef9d2a3560324fe455d9a396dc2377942813f7ee6773df72f835b0e6d

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
                    MD5

                    38d778364fb8c7a930818f975575a6b0

                    SHA1

                    f4362ec25898d2feb703f90be49eb42c18a41dcb

                    SHA256

                    c66a0a224ec4841562e58602b9b1513cfd689c708dc1949f8e6f8a14b622b295

                    SHA512

                    1b71a3b5d5fa11806501088e01f6d2933f7f18307f1511007a1b20d37aacbe25e55f59053893cc44ca692d22f893c04db47716f5787cd57da94b6918bb8eb4ba

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.INI
                    MD5

                    2ee2a757a5865cc7f0d97c67a0b5d8c5

                    SHA1

                    4bdfbbfa8a5622a5419160f3395916f615918ac9

                    SHA256

                    526d4fb92081239213ed7651bd67d1d6ae80cb69f2e4c64f6305b5f9ae0b3af1

                    SHA512

                    dc39fccc5c88a3ab9a50e8d87c93972054934078b42f436a7fb030e64ba513bd3724538613742b6a087724c4cfa469e45574b190a2390a63a748e0c1982851df

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                    MD5

                    538177ef021e529dfe997d255607fe27

                    SHA1

                    3c34dc31b559c5cd7b39bfaa462e61dc51fd037b

                    SHA256

                    b181ccac37163e346d88cdd4bf1e4dad609f3a45bb5c143f3db7dc152d395a69

                    SHA512

                    a6b3af6ef8b3ab699ebfc1192869ef4d2b56b99aaa47ab6b826ddb23c01fc2c73d3b4680e5839c65f64d1b2c89964b2d69512d214fdb58a088408203eac61cec

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                    MD5

                    538177ef021e529dfe997d255607fe27

                    SHA1

                    3c34dc31b559c5cd7b39bfaa462e61dc51fd037b

                    SHA256

                    b181ccac37163e346d88cdd4bf1e4dad609f3a45bb5c143f3db7dc152d395a69

                    SHA512

                    a6b3af6ef8b3ab699ebfc1192869ef4d2b56b99aaa47ab6b826ddb23c01fc2c73d3b4680e5839c65f64d1b2c89964b2d69512d214fdb58a088408203eac61cec

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe.config
                    MD5

                    9bc8c60dca1db56880a6de6186139bbb

                    SHA1

                    215828e6240b6d588e1d3e1a92e9df51ede80062

                    SHA256

                    98cbf73681a1b63d4242cb40a2bd0bb6b04a61528a4230e8eb7e10bd83b6e6b0

                    SHA512

                    809a8d652869977bcaa702fc7ab4963ef48554e122acd08314c7645dbb878bb32e0c5be0aa08606956fcf1fac5431cc401f5949ef781e52eb9919c72c88f999a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Atera.AgentPackage.Common.dll
                    MD5

                    ced1b0417be18a7c18d13b362b83e1b4

                    SHA1

                    ee6688a75ea807aa8d51d69c1f4cec2fd201590c

                    SHA256

                    3679e9374b1639b46ead6349245adc836243d42c7237b6a94ef917b1f6ed61be

                    SHA512

                    751e24ca287541deb37e501f3bea90cdc699625331c932a31dde4f61ed0d2af1bef839f42c1f53978027285c81a01d1151ff6590040f17ef0be38d50ed50da4a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Newtonsoft.Json.dll
                    MD5

                    ddda7e8fffc144e58f39d7e973aeb64b

                    SHA1

                    bb7ed32023150cab7740524da6f2870c546d3acd

                    SHA256

                    53ba23ec48132705610c6bf3d6c9e8db6d2f3234a629c26f3a974ceb7f2e95f1

                    SHA512

                    a57e9b8c0c11ddaea7773ef3550c9a2fd5c29afcab5eea0ca4cc9507880308f130c417f01383dc9b25a02eb32737b4d8a039e7b3f57ae1d85e13da6de0d3b4dc

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.INI
                    MD5

                    2fc8d65453a9c9c04a37d76b83569a72

                    SHA1

                    32d96fc8d7a9eeab00d5bb5384d301d18263d1f8

                    SHA256

                    ab306495ecfa337cf3bc9c06480c1fe778f9934b245ec7fc25a030fbe4619b98

                    SHA512

                    aa67306ddb9fdb1122d7816ee733d792259aa3bdef7a16211e1751450501fae2243c1556f55ba777dec6b9a868aa15e089e8ad22ef75ac9774623765b78ad01a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                    MD5

                    779a81d6343a98b9b27beeafbb0a05ee

                    SHA1

                    507320c64adacae75ec7d58f641befebe348cf0d

                    SHA256

                    d88ceae464b731344f2dd7d6402b517571cff6faa6ac12d5b1f5abc5200a6693

                    SHA512

                    16048677f1a49b49ad3b9a424a4d2c8560ff3efb71967cefbe4b70c4baa72ed82bd4ef70dd73472182c66c8226102f2364dc9b3233bd246f2188c236d191a70a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                    MD5

                    779a81d6343a98b9b27beeafbb0a05ee

                    SHA1

                    507320c64adacae75ec7d58f641befebe348cf0d

                    SHA256

                    d88ceae464b731344f2dd7d6402b517571cff6faa6ac12d5b1f5abc5200a6693

                    SHA512

                    16048677f1a49b49ad3b9a424a4d2c8560ff3efb71967cefbe4b70c4baa72ed82bd4ef70dd73472182c66c8226102f2364dc9b3233bd246f2188c236d191a70a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe.config
                    MD5

                    9bc8c60dca1db56880a6de6186139bbb

                    SHA1

                    215828e6240b6d588e1d3e1a92e9df51ede80062

                    SHA256

                    98cbf73681a1b63d4242cb40a2bd0bb6b04a61528a4230e8eb7e10bd83b6e6b0

                    SHA512

                    809a8d652869977bcaa702fc7ab4963ef48554e122acd08314c7645dbb878bb32e0c5be0aa08606956fcf1fac5431cc401f5949ef781e52eb9919c72c88f999a

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Newtonsoft.Json.dll
                    MD5

                    13e68cf6aecd7ac7f47080b230523262

                    SHA1

                    c3d3e8ca1030e96ce20d00695c0bc9778ae43c96

                    SHA256

                    067e009ec640b958e2be69863d3a486daf59b6b523725f94eb8f649d839f340a

                    SHA512

                    8266a604c4db593565c75a203ce6dc9221bfee279ad0a87a2ace19dbd8c193762f327378a5337aebffff3187849f8808b8c4612e599ece1ea7aaf091f5a6ba13

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.INI
                    MD5

                    3fe6a123d0c45e029f56a609eab81093

                    SHA1

                    38dabbd862ebb7f1cb3e87a586053bb88bda7b4b

                    SHA256

                    dce269e4f2071e8fba665b887957504bd42418176469ae1a671781aeaeaff756

                    SHA512

                    47b00bcd95134325fcbe27d19702234d50be2f53485e72a4f34887797d4ba0999da35a7e3e8119bd74d60a6fa5e21b83b480cdd1ea50bd844f17b73717c1209b

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
                    MD5

                    2827351b0af210d7118dbe0c2e894e21

                    SHA1

                    eb9a09a375a2652f78256ab69b883914f4219e3b

                    SHA256

                    7533cd228397a23e7c807f95cc9cb5cbea9f820c7cc71be7e2cfe3fe4b243c7d

                    SHA512

                    a1800510b511bd23acad9ffdc08ca4187421f7e366c21307f2d9a86193d6b0bc0a4be4dcb8773099bf91b7b880b028af3225467bcaac4dea327907fb4ea4b7e1

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
                    MD5

                    2827351b0af210d7118dbe0c2e894e21

                    SHA1

                    eb9a09a375a2652f78256ab69b883914f4219e3b

                    SHA256

                    7533cd228397a23e7c807f95cc9cb5cbea9f820c7cc71be7e2cfe3fe4b243c7d

                    SHA512

                    a1800510b511bd23acad9ffdc08ca4187421f7e366c21307f2d9a86193d6b0bc0a4be4dcb8773099bf91b7b880b028af3225467bcaac4dea327907fb4ea4b7e1

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe.config
                    MD5

                    332f07af284ae49f72f9b8554936340e

                    SHA1

                    422a0d4659036445311fed59949443f2d46c0d5c

                    SHA256

                    8a4d689f426e0523d7011753f369ea208e0c08039c7ddb51aaf97b8dc16f18d3

                    SHA512

                    7aad55c55b223826e6388158bd2dca01ab95d4195d0f4445b417e42b67b96a2a44acb441d43c7252cf7083417f8c256a616289ff3119b2eda0a6e156632f6745

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Atera.AgentPackage.Common.dll
                    MD5

                    882a73f430897f51897f45711cab55fc

                    SHA1

                    c52975ba6fa69d438ff5d3e3056eeeb760595181

                    SHA256

                    38a9b9819f4e3e95289d267a40d2613a9ea5eebc801ce3d3ee142adf444e6fc7

                    SHA512

                    116d5bcb7a54d2f15363597afdccfcad888d1cc44d031f525f100a52a588789a9fa3e512f46957dea6b72c13360b40fd0cb39bdae5d30117b98372261079da91

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Deployment.WindowsInstaller.dll
                    MD5

                    845ad48e8b58985c191bcfde3ee47e91

                    SHA1

                    5912c17d51a58602814e5bab21e06adb754dc5ff

                    SHA256

                    d0df5ca626e3187a0b8cfdeaf1431e2770c44c8560c387ddaec41f500d2f0a0b

                    SHA512

                    d9ce24abd51260dbbb02a855379882ee8584af901546c4770469ad3509959be5d1437e33f3e2249ac77bb342dfaa398692bda5661d7235b26b541bfd7375664e

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Win32.TaskScheduler.dll
                    MD5

                    5364d8bea03ec9f3b70ad65107570d9c

                    SHA1

                    1f8bcbe737fb4b6c116c4d2493afdb307d6df22f

                    SHA256

                    4c1a5199c37f1149919dfed1a65be0f31612a4513a3934838d78ddc89cc2ec8b

                    SHA512

                    28d4a93df540c1bf8af065db3f28a62b7d6cb43a4f76456bf8ea09981ddf500017255597143badb6c2847ac618688d375d10e41f6d719ec1d9f39a1eacc7b8bd

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Newtonsoft.Json.dll
                    MD5

                    023a40faddbca03965f8d6a5cf7d476b

                    SHA1

                    e3facf40b7444728410311421c79dd7e5e8e08b9

                    SHA256

                    ab4e2c053fd2ff6b87e148c98980c63a9c250aff841f536f117508867b62d6e8

                    SHA512

                    3f693ac6fb86e69741d33bf32b86ba78cfc51a379a1cb038781aac1eca26ca5a21c789662a785ff7fa9e9bf68fa03077e6b6d4633a594426f7d538d0a9dee36e

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\System.Management.dll
                    MD5

                    1a0e64601929604a5abd0ea25a6f2803

                    SHA1

                    2f2732c7e7647c1e5cbc7b9c941948bb711c0961

                    SHA256

                    ef50129f5b2927788faff1aa0bb9df681546a6c02f607b9f5fcf7b7c33147453

                    SHA512

                    f4fcac7b7e8ccd184624061d71970266b504bc19f2424374adfcd8370b8037fdfefa7f99b0c8ad7b8cd888e3cae43dd50f523faf0243de6e3156b5a1be432f28

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.INI
                    MD5

                    93af2eaefb9b3fe0799ebb4155104fab

                    SHA1

                    ae3455155c1881d098397e6f3f1ad31858b35c5f

                    SHA256

                    d662fe4971fc12d599f47641acbbdaf3b1cc1175fca3744bc4699c93a08b074b

                    SHA512

                    f9e791c248c48bc8017647d5b07e9d8ac3c33d17ba57caf8ff89fa8dad50657832c9d5688110a367d235dd220e32060069a7c9f96da79f90211a1e7a442cbcb0

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.exe
                    MD5

                    b12c63053efe64ae12a800e7202ef65e

                    SHA1

                    f4c459ed00f653c97dda9af913760ff129ed8294

                    SHA256

                    b178c407dde32dd0810f2e1672260b23a08b917624ce67af302b9a795728c6db

                    SHA512

                    e3a3b8bfc04b7b9cb2eb4f666d25b5dbdd15c19c94f7465e446566f8f4337aaca1bac7a5cd67a6b8f275a3494fa9145087f2dcc46b9a1ba6a9e3e08867f00314

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.exe
                    MD5

                    b12c63053efe64ae12a800e7202ef65e

                    SHA1

                    f4c459ed00f653c97dda9af913760ff129ed8294

                    SHA256

                    b178c407dde32dd0810f2e1672260b23a08b917624ce67af302b9a795728c6db

                    SHA512

                    e3a3b8bfc04b7b9cb2eb4f666d25b5dbdd15c19c94f7465e446566f8f4337aaca1bac7a5cd67a6b8f275a3494fa9145087f2dcc46b9a1ba6a9e3e08867f00314

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\AgentPackageWindowsUpdate.exe.config
                    MD5

                    c0a1095205d9061cb19da9e7dc8323d0

                    SHA1

                    f50b534777f0ece5414ed533aeafdc660d97fb1d

                    SHA256

                    de0b0fe7b58f4c212cd825b3b07e978caa43103708445fdab2347986ecc12acb

                    SHA512

                    a64ce84f73859b3703c615a8422aaa6825570f7ff974e88a047d167a541d2ba7fc4bf2c77bb2c3c2afbca56f1e2e47e37197ac5f56fcf37be22f9bf195a5e370

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\Atera.AgentPackage.Common.dll
                    MD5

                    3c0e332cc4eca9cab722263a0f2cc082

                    SHA1

                    e7a33fdcbbfa7ad5d2a3d9efcf07c2ca7f1e5531

                    SHA256

                    e8abad75b5f29668151f9070fce8624525c8da80203cfa9fb81d03a948a6da71

                    SHA512

                    129a84b1fa6c491b5ab98896cf3bb32a17f2a504e0cc635a028fcf4496121b832f608d007b21a8d84ae22af31a0382951635690e204dd9ac2cec17a690dc1057

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\Interop.WUApiLib.dll
                    MD5

                    ba6f28e2359291c2778ec04427acea2a

                    SHA1

                    759a9518bfb3ef76b3dc1664385a13a3403feabf

                    SHA256

                    708308c9d5c2579afb21d0b10229f94b274fd5ad0a2ed0659abd3bb5f8733bf5

                    SHA512

                    20fe56f29dd58f30db8021edd6f5b7e178ce909d4b438a97bad71850f4441b9abbf1c0c83559d9c19d958d616c9aa9344b686601f37db36cb0a66a22323f951d

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageWindowsUpdate\Newtonsoft.Json.dll
                    MD5

                    b83633d144eb1d00c744c709ab54490e

                    SHA1

                    dad6e6759042810e2a9a7c5882b0ed1399e289d3

                    SHA256

                    8855c8021ab67f0a15ffb4c1568de102e5882e478acc8000554e821d8c4c042e

                    SHA512

                    96471e13d771b6e91dfdcb1684b98762e41338972fcf47f8d46cc6bf07cb0f9271a89cd656a55d9be422a2741aae4349be7a312f88ec2c4218fc25d7588057ee

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\PubNub-Messaging.dll
                    MD5

                    e8458b60d4f251de071b765287c5661e

                    SHA1

                    b4a4d91483f658b79204ec4be2c2012efefd5a63

                    SHA256

                    52c29826c96e35373f05fefbd0f92ac9ec377cd65e8f58a945f3a86b41c3ddc6

                    SHA512

                    57b3b9cd3a47a6543e0e81a4606e7a90e4a459fe827c01ec6a21d1a64503fe6267079fa89e3120519079a1e9a0eb925f3b794d9b39f03d7eba524393dc564bea

                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
                    MD5

                    9dc2fbe0e930e08f7d5d1da59d98d924

                    SHA1

                    78cb6957c931d363cb2875064a20e3604b88808a

                    SHA256

                    9ad38c006ae1b56da77ab566a6167c2ea26bc16e8d43c55fc9dc42a092b43943

                    SHA512

                    1be3a7f94f35790f7fb2ceebbb1e137d2d2b9004464075f469517d1dde892ff9b7cc2807fd1f8db413f242ef42c3946bf221bc40fea0327257bacaef576bc3ac

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
                    MD5

                    a67caad04483de7ffee8359d2c6e8550

                    SHA1

                    6cc2f0c416e8d43d02fb86d6c134f2fc77bfd970

                    SHA256

                    75bfd1b527fa64ead4723b09b574b1b5542bc2164d17e216b4b6c0112ec388c0

                    SHA512

                    59c2431eb2654f6e328242035b79fa4c9057dfd5b6c4432e3c5457671143f488c8dafe33d8db3233b29b3abaca4c22674da0056a66e17a5ba9a10924a22aa248

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                    MD5

                    2902de11e30dcc620b184e3bb0f0c1cb

                    SHA1

                    5d11d14a2558801a2688dc2d6dfad39ac294f222

                    SHA256

                    e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

                    SHA512

                    efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_45127723BB4D97FE8AFE9AA61205741A
                    MD5

                    b97b24e989431cea371a2786279890aa

                    SHA1

                    47685405d8c4a3bb115ca1b1271f3756125a0a94

                    SHA256

                    78620c9358834a3c491c36f58bf1c5085357107c811f87c6a3d32353c3271604

                    SHA512

                    60e09235587f08e32c439734680b3c7a115dc1874b628b75c32f6b30bfb92046ed5eaf949ba827aeb28082b2eafe51d9c979754c1e6297e7d6b69b619201f796

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D
                    MD5

                    a9f51b6351150d2abbc899b2a4e9938e

                    SHA1

                    1323cac05da352a22c5d00f0cf10eb735f0ea098

                    SHA256

                    0ef1d93a0b95454422bbc38844e35ace8424e00482e62f3eb78630fa0f40f8ea

                    SHA512

                    50d2dc827430a4c0074f94c68fcb4610a6970d53b8a4e6f79068937b2557104535aed87af561060ce83d3e88e8340b460818b99b515fa1de2043d2656ef1fe8e

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                    MD5

                    0128abe9afed24dfedb24f6884811022

                    SHA1

                    47b6b0de4812ba51fcb1f46fe7c97e3331f0353b

                    SHA256

                    e1812b48f5b0d8a832ca48ed476f7b5207eaf103d8258e3aaac3b2393bec101d

                    SHA512

                    4f1a6711f6fddd5677a1679cff12d0b9cf18d07ecf3793cad235e41578ae81d8db7d2ce77993b9c7760ce08774b33aee999af4a8ffe060f7e9a584c259a0c769

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_45127723BB4D97FE8AFE9AA61205741A
                    MD5

                    4c18de862068a4baf57edc15fc9a36e6

                    SHA1

                    be1c74cb459102a743a9280d91b79704e1b0aae9

                    SHA256

                    ab617c7a681598198d219b681d2129c715704647f2fcf05b46ea686e60069135

                    SHA512

                    b0b64cbc52cc881c7b1490de2440b98daaa5f2ca314221a1f0f18ab4ebbc9c3095fa68c5cb604ee58bb43b1d152f503aaec1d51ca9ec5e69513a40fde678e313

                  • C:\Windows\Installer\MSI2BA5.tmp
                    MD5

                    a3ae5d86ecf38db9427359ea37a5f646

                    SHA1

                    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                    SHA256

                    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                    SHA512

                    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                  • C:\Windows\TEMP\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe
                    MD5

                    2827351b0af210d7118dbe0c2e894e21

                    SHA1

                    eb9a09a375a2652f78256ab69b883914f4219e3b

                    SHA256

                    7533cd228397a23e7c807f95cc9cb5cbea9f820c7cc71be7e2cfe3fe4b243c7d

                    SHA512

                    a1800510b511bd23acad9ffdc08ca4187421f7e366c21307f2d9a86193d6b0bc0a4be4dcb8773099bf91b7b880b028af3225467bcaac4dea327907fb4ea4b7e1

                  • C:\Windows\Temp\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe
                    MD5

                    2827351b0af210d7118dbe0c2e894e21

                    SHA1

                    eb9a09a375a2652f78256ab69b883914f4219e3b

                    SHA256

                    7533cd228397a23e7c807f95cc9cb5cbea9f820c7cc71be7e2cfe3fe4b243c7d

                    SHA512

                    a1800510b511bd23acad9ffdc08ca4187421f7e366c21307f2d9a86193d6b0bc0a4be4dcb8773099bf91b7b880b028af3225467bcaac4dea327907fb4ea4b7e1

                  • \Windows\Installer\MSI2BA5.tmp
                    MD5

                    a3ae5d86ecf38db9427359ea37a5f646

                    SHA1

                    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                    SHA256

                    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                    SHA512

                    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                  • memory/768-69-0x00000000757D1000-0x00000000757D3000-memory.dmp
                    Filesize

                    8KB

                  • memory/768-68-0x0000000000000000-mapping.dmp
                  • memory/820-152-0x0000000000000000-mapping.dmp
                  • memory/820-180-0x0000000000390000-0x0000000000391000-memory.dmp
                    Filesize

                    4KB

                  • memory/820-164-0x0000000000B60000-0x0000000000B61000-memory.dmp
                    Filesize

                    4KB

                  • memory/820-172-0x0000000019350000-0x0000000019351000-memory.dmp
                    Filesize

                    4KB

                  • memory/820-182-0x0000000019D90000-0x0000000019D92000-memory.dmp
                    Filesize

                    8KB

                  • memory/820-175-0x0000000000350000-0x0000000000351000-memory.dmp
                    Filesize

                    4KB

                  • memory/1076-343-0x0000000019BD0000-0x0000000019BD2000-memory.dmp
                    Filesize

                    8KB

                  • memory/1100-60-0x000007FEFBDA1000-0x000007FEFBDA3000-memory.dmp
                    Filesize

                    8KB

                  • memory/1216-84-0x0000000019230000-0x0000000019232000-memory.dmp
                    Filesize

                    8KB

                  • memory/1216-91-0x000000001A110000-0x000000001A111000-memory.dmp
                    Filesize

                    4KB

                  • memory/1216-85-0x00000000003D0000-0x00000000003D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1216-89-0x0000000019C50000-0x0000000019C51000-memory.dmp
                    Filesize

                    4KB

                  • memory/1228-142-0x0000000000000000-mapping.dmp
                  • memory/1228-168-0x0000000000470000-0x0000000000471000-memory.dmp
                    Filesize

                    4KB

                  • memory/1228-149-0x00000000008D0000-0x00000000008D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1228-178-0x00000000196E0000-0x00000000196E2000-memory.dmp
                    Filesize

                    8KB

                  • memory/1348-76-0x0000000000B70000-0x0000000000B71000-memory.dmp
                    Filesize

                    4KB

                  • memory/1348-72-0x0000000000000000-mapping.dmp
                  • memory/1348-79-0x000000001B110000-0x000000001B112000-memory.dmp
                    Filesize

                    8KB

                  • memory/1580-311-0x0000000000000000-mapping.dmp
                  • memory/1600-301-0x0000000000000000-mapping.dmp
                  • memory/1600-312-0x0000000000D30000-0x0000000000D32000-memory.dmp
                    Filesize

                    8KB

                  • memory/1620-294-0x0000000019D10000-0x0000000019D12000-memory.dmp
                    Filesize

                    8KB

                  • memory/1620-229-0x0000000000000000-mapping.dmp
                  • memory/1620-345-0x0000000019D16000-0x0000000019D35000-memory.dmp
                    Filesize

                    124KB

                  • memory/1620-315-0x0000000000C20000-0x0000000000C21000-memory.dmp
                    Filesize

                    4KB

                  • memory/1740-202-0x0000000000540000-0x0000000000541000-memory.dmp
                    Filesize

                    4KB

                  • memory/1740-155-0x0000000000000000-mapping.dmp
                  • memory/1740-216-0x0000000000210000-0x0000000000211000-memory.dmp
                    Filesize

                    4KB

                  • memory/1740-213-0x0000000000780000-0x0000000000782000-memory.dmp
                    Filesize

                    8KB

                  • memory/1740-161-0x0000000000220000-0x0000000000221000-memory.dmp
                    Filesize

                    4KB

                  • memory/2060-143-0x0000000000B50000-0x0000000000B51000-memory.dmp
                    Filesize

                    4KB

                  • memory/2060-154-0x0000000000170000-0x0000000000171000-memory.dmp
                    Filesize

                    4KB

                  • memory/2060-130-0x0000000000190000-0x0000000000191000-memory.dmp
                    Filesize

                    4KB

                  • memory/2060-177-0x0000000019D70000-0x0000000019D72000-memory.dmp
                    Filesize

                    8KB

                  • memory/2060-121-0x0000000000000000-mapping.dmp
                  • memory/2112-300-0x0000000000000000-mapping.dmp
                  • memory/2140-87-0x0000000000000000-mapping.dmp
                  • memory/2188-305-0x0000000000000000-mapping.dmp
                  • memory/2336-322-0x0000000000000000-mapping.dmp
                  • memory/2364-325-0x0000000000000000-mapping.dmp
                  • memory/2408-102-0x00000000005B0000-0x00000000005B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2408-104-0x0000000000EE0000-0x0000000000EE2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2408-100-0x0000000000C60000-0x0000000000C61000-memory.dmp
                    Filesize

                    4KB

                  • memory/2408-96-0x0000000001010000-0x0000000001011000-memory.dmp
                    Filesize

                    4KB

                  • memory/2408-92-0x0000000000000000-mapping.dmp
                  • memory/2492-215-0x0000000000D70000-0x0000000000D71000-memory.dmp
                    Filesize

                    4KB

                  • memory/2492-209-0x0000000000000000-mapping.dmp
                  • memory/2492-240-0x0000000019750000-0x0000000019752000-memory.dmp
                    Filesize

                    8KB

                  • memory/2520-105-0x0000000000000000-mapping.dmp
                  • memory/2556-106-0x0000000000000000-mapping.dmp
                  • memory/2604-288-0x000007FFFFF00000-0x000007FFFFF01000-memory.dmp
                    Filesize

                    4KB

                  • memory/2604-266-0x00000000193E0000-0x00000000193E2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2604-231-0x0000000000000000-mapping.dmp
                  • memory/2636-107-0x0000000000000000-mapping.dmp
                  • memory/2636-114-0x0000000000F60000-0x0000000000F62000-memory.dmp
                    Filesize

                    8KB

                  • memory/2664-332-0x000000001AAB0000-0x000000001AAB2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2664-328-0x0000000000000000-mapping.dmp
                  • memory/2692-323-0x0000000000000000-mapping.dmp
                  • memory/2696-194-0x0000000000A00000-0x0000000000A01000-memory.dmp
                    Filesize

                    4KB

                  • memory/2696-187-0x0000000000000000-mapping.dmp
                  • memory/2696-214-0x0000000000C40000-0x0000000000C42000-memory.dmp
                    Filesize

                    8KB

                  • memory/2696-207-0x00000000005B0000-0x00000000005B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2712-324-0x0000000000000000-mapping.dmp
                  • memory/2724-241-0x0000000019CB0000-0x0000000019CB2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2724-188-0x0000000000000000-mapping.dmp
                  • memory/2724-212-0x0000000000400000-0x0000000000401000-memory.dmp
                    Filesize

                    4KB

                  • memory/2724-199-0x0000000000CC0000-0x0000000000CC1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2740-333-0x0000000000000000-mapping.dmp
                  • memory/2740-342-0x000000001B0A0000-0x000000001B0A2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2792-115-0x0000000000000000-mapping.dmp
                  • memory/2828-341-0x0000000000000000-mapping.dmp
                  • memory/2828-116-0x0000000000000000-mapping.dmp
                  • memory/2832-316-0x0000000000000000-mapping.dmp
                  • memory/2848-203-0x0000000001160000-0x0000000001161000-memory.dmp
                    Filesize

                    4KB

                  • memory/2848-239-0x0000000019AC0000-0x0000000019AC2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2848-191-0x0000000000000000-mapping.dmp
                  • memory/2848-208-0x0000000000250000-0x0000000000251000-memory.dmp
                    Filesize

                    4KB

                  • memory/2860-318-0x0000000000000000-mapping.dmp
                  • memory/2880-263-0x0000000000DF0000-0x0000000000DF2000-memory.dmp
                    Filesize

                    8KB

                  • memory/2880-224-0x0000000000000000-mapping.dmp
                  • memory/3008-126-0x0000000000C40000-0x0000000000C41000-memory.dmp
                    Filesize

                    4KB

                  • memory/3008-326-0x0000000000000000-mapping.dmp
                  • memory/3008-117-0x0000000000000000-mapping.dmp
                  • memory/3008-140-0x0000000000250000-0x0000000000251000-memory.dmp
                    Filesize

                    4KB

                  • memory/3008-167-0x00000000005B0000-0x00000000005B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3024-133-0x00000000005C0000-0x00000000005C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3024-136-0x00000000003F0000-0x00000000003F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/3024-118-0x0000000000000000-mapping.dmp
                  • memory/3024-173-0x0000000019EA0000-0x0000000019EA2000-memory.dmp
                    Filesize

                    8KB