Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 12:28

General

  • Target

    b8788ba7d7d7f8fce00f8446b778b9f9b9852e4ec2f3766d6e32c68b50950899.msi

  • Size

    2.9MB

  • MD5

    6e58d9af76a06f068fc49d0f5f895966

  • SHA1

    6eaf5813536f716cab6ccdda47e8f0beaa74b30c

  • SHA256

    b8788ba7d7d7f8fce00f8446b778b9f9b9852e4ec2f3766d6e32c68b50950899

  • SHA512

    4d314dcc18f09ce95453470101efc55e690657e2288728839f04d7060a1f767a4be0d1b48cc0a980979d35c440144cc2cbffd767732b19e4af4c5333a8fc93e9

  • SSDEEP

    49152:1+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:1+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Drops file in Drivers directory 6 IoCs
  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 64 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 60 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 4 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 13 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\b8788ba7d7d7f8fce00f8446b778b9f9b9852e4ec2f3766d6e32c68b50950899.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2344
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2264
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 05553DD6C0E1643DD7AE88E0277107EE
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSICB01.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240634906 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
          3⤵
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3448
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSICE4D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240635484 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
          3⤵
          • Blocklisted process makes network request
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4932
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSID217.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240636453 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
          3⤵
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2452
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIDCF9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240639250 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
          3⤵
          • Blocklisted process makes network request
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2064
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 9B9242CB1A5684A79E50ECD17A94FC43 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Windows\SysWOW64\NET.exe
          "NET" STOP AteraAgent
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4480
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 STOP AteraAgent
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2580
        • C:\Windows\SysWOW64\TaskKill.exe
          "TaskKill.exe" /f /im AteraAgent.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2008
      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
        "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="22" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="21" /AccountId="0013z00002eDbtlAAC" /AgentId="156bf64a-0dd9-4c50-9ee7-d85ab9600c05"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:3304
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 16AC423623661DF6E4603F6EE6ADC2B7 E Global\MSI0000
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8251BA0E-FE17-4924-9D5C-7D86A61F3908}
          3⤵
          • Executes dropped EXE
          PID:3496
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5E4BD3C3-67F5-47CA-9745-EA7393419C60}
          3⤵
          • Executes dropped EXE
          PID:5104
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A4E89AEF-7744-4297-A5AA-AEFEE9D5BDA6}
          3⤵
          • Executes dropped EXE
          PID:5112
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2032C8D1-4122-4B89-9AC5-90193684752D}
          3⤵
          • Executes dropped EXE
          PID:3548
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5C2B8E0B-BE25-4B42-8AE7-187E7E9D7AD9}
          3⤵
          • Executes dropped EXE
          PID:4640
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{ED5EBEBB-7B3A-4C70-AC23-D274259BF266}
          3⤵
          • Executes dropped EXE
          PID:540
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FBE38ED2-3E93-43E9-967F-AACD004930EB}
          3⤵
          • Executes dropped EXE
          PID:3668
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{158B91A9-C8A1-4500-8106-E5554E29A12F}
          3⤵
          • Executes dropped EXE
          PID:1336
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{527E0EDA-5B65-41C4-8CCB-73A45B29E9B8}
          3⤵
          • Executes dropped EXE
          PID:2452
        • C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe
          C:\Windows\TEMP\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_is2769.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CF4378EC-E9A5-4A43-ABF4-7AC0D9C14989}
          3⤵
          • Executes dropped EXE
          PID:2144
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRServer.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:372
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRServer.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2332
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRApp.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4372
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRApp.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:3388
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAppPB.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4152
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAppPB.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:1520
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRFeature.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2800
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRFeature.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2088
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRFeatMini.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4728
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRFeatMini.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:1764
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRManager.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4332
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRManager.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:4784
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAgent.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2364
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAgent.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRChat.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3424
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRChat.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:4176
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAudioChat.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1204
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAudioChat.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:1764
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRVirtualDisplay.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4400
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRVirtualDisplay.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:3372
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{ABA5ED13-590B-421F-BE0C-05047536B4BA}
          3⤵
          • Executes dropped EXE
          PID:1336
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{39F9F228-4F91-43BE-AB99-1E6503C52BCA}
          3⤵
          • Executes dropped EXE
          PID:3576
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{42E7FB01-4689-4E4C-88A0-BD2B54CD9204}
          3⤵
          • Executes dropped EXE
          PID:4996
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6BE3FD91-C5BE-4DD6-AF4D-BB9731B28D4A}
          3⤵
          • Executes dropped EXE
          PID:4472
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5C8B93AD-762F-451B-8632-76A1C6D7D727}
          3⤵
          • Executes dropped EXE
          PID:1220
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A14B539F-B4FD-4164-8237-691BA888AC08}
          3⤵
          • Executes dropped EXE
          PID:1564
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5304CB34-9956-4C97-B5FC-4AD827313A87}
          3⤵
          • Executes dropped EXE
          PID:4640
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{692AC8E2-1A3E-4652-86ED-61834D985C91}
          3⤵
          • Executes dropped EXE
          PID:4480
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7B34CC92-315B-4A0F-BE74-FF084930B00D}
          3⤵
          • Executes dropped EXE
          PID:3524
        • C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe
          C:\Windows\TEMP\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CD3BD26F-A415-45B1-A65D-98E7B35C7EF9}
          3⤵
          • Executes dropped EXE
          PID:3196
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{443B24C2-CC6E-4331-9212-751F3213FB0E}
          3⤵
          • Executes dropped EXE
          PID:4300
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{572B26DD-506D-45F3-AE36-9C0C35AEF59A}
          3⤵
          • Executes dropped EXE
          PID:2404
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4C66B850-9A96-48DA-8712-56FC537D0291}
          3⤵
          • Executes dropped EXE
          PID:4592
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1D8A97B2-E38B-4C95-AA66-8205C2FAD2E0}
          3⤵
          • Executes dropped EXE
          PID:2360
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B5D3A2CE-F083-4028-9866-DDEF361A9891}
          3⤵
          • Executes dropped EXE
          PID:2676
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3412892B-A15C-4844-9DAE-48900261DB3E}
          3⤵
          • Executes dropped EXE
          PID:3500
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B04348F9-96C8-4604-809D-B5A7DBCBE6C7}
          3⤵
          • Executes dropped EXE
          PID:1892
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{935D7E30-4266-44A9-9585-FDC7E0BC9665}
          3⤵
          • Executes dropped EXE
          PID:4064
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B70A66B5-4766-47E7-A4ED-437DA72E3639}
          3⤵
          • Executes dropped EXE
          PID:1712
        • C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe
          C:\Windows\TEMP\{0F96EE84-4C35-44EF-9147-5052A38B1338}\_is3CE7.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B96F6ADC-039D-46E8-9615-CA618C36DAA5}
          3⤵
          • Executes dropped EXE
          PID:4668
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P ADDUSERINFO /V "sec_opt=0,confirm_d=0,hidewindow=1"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2036
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P USERSESSIONID
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4480
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P ST_EVENT
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:440
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /C "C:\Windows\system32\wevtutil.exe" um "C:\ProgramData\Splashtop\Common\Event\stevt_srs_provider.man"
            4⤵
              PID:2264
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /C "C:\Windows\system32\wevtutil.exe" im "C:\ProgramData\Splashtop\Common\Event\stevt_srs_provider.man"
              4⤵
                PID:2100
            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRSelfSignCertUtil.exe
              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRSelfSignCertUtil.exe" -g
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:852
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AB824DA8-1B4C-4A4D-BC8F-8652B4F1C399}
              3⤵
              • Executes dropped EXE
              PID:4592
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6DF01806-CFCB-4DB9-986D-3B214EE43A89}
              3⤵
              • Executes dropped EXE
              PID:4176
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4FAFC8F6-203F-49CB-9B42-23A85FD567DA}
              3⤵
              • Executes dropped EXE
              PID:1152
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1BD5429D-8A8E-497E-B995-9E6614E0A509}
              3⤵
              • Executes dropped EXE
              PID:1972
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AAC35B8C-C397-41CA-BAF5-32D28DBB0D97}
              3⤵
              • Executes dropped EXE
              PID:540
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{953C2331-7B8E-4E4C-AE95-6814583997D3}
              3⤵
              • Executes dropped EXE
              PID:4892
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5F90BDCA-A631-45BD-A847-AA46D7FD2925}
              3⤵
              • Executes dropped EXE
              PID:896
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{55FD8B46-F0D0-4A0D-8AF5-F48EEE21D7E0}
              3⤵
              • Executes dropped EXE
              PID:1812
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{73B184B6-0866-4C73-A133-26CF6A6A8191}
              3⤵
              • Executes dropped EXE
              PID:2124
            • C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe
              C:\Windows\TEMP\{A91B0F89-1B20-4A42-92B4-E7E031F759A8}\_is5080.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BEAEF178-7925-4869-BEB2-11D9C769B0D6}
              3⤵
              • Executes dropped EXE
              PID:3112
            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe" -i
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:2804
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{70C102E8-AB7D-4C94-A52A-DBC1395F2E52}
              3⤵
              • Executes dropped EXE
              PID:3568
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{207B10CE-AE68-4239-A1FF-7DE19260F488}
              3⤵
              • Executes dropped EXE
              PID:1812
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{450D6F7E-B31C-4100-9ABC-94B104F3824C}
              3⤵
              • Executes dropped EXE
              PID:2124
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{075A6C1C-68E5-4B06-9B97-B0DB8103FB0F}
              3⤵
              • Executes dropped EXE
              PID:3112
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FBAE8F5F-7C03-43E3-B2A0-4997483BB6E8}
              3⤵
              • Executes dropped EXE
              PID:4784
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F6116E7D-342D-491A-B693-874E30453662}
              3⤵
              • Executes dropped EXE
              PID:4312
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B1F96B50-DECA-41C2-809A-EC96B2B309A3}
              3⤵
              • Executes dropped EXE
              PID:1336
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4B49EF96-3C60-46F7-8A1B-F3A431F4FC60}
              3⤵
              • Executes dropped EXE
              PID:224
            • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
              C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3D3BEA96-77F8-4182-9F56-35CCC7E28040}
              3⤵
                PID:2108
              • C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe
                C:\Windows\TEMP\{A9205497-E694-4DA3-A3AE-B482290AB688}\_is539E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F60700F2-E2E0-4FB3-8DDB-A317AC9DA8A0}
                3⤵
                  PID:648
                • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
                  "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe" -r
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4272
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 42E5DAEF0BC4716EEF7D06211C8DD923 E Global\MSI0000
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5992
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSI8078.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240681312 464 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
                  3⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4284
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSI82AC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240681640 468 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
                  3⤵
                  • Blocklisted process makes network request
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5916
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSI86E3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240682718 473 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
                  3⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5248
                • C:\Windows\SysWOW64\NET.exe
                  "NET" STOP AteraAgent
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1080
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 STOP AteraAgent
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4592
                • C:\Windows\SysWOW64\TaskKill.exe
                  "TaskKill.exe" /f /im AteraAgent.exe
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  PID:4604
                • C:\Windows\syswow64\NET.exe
                  "NET" STOP AteraAgent
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3968
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 STOP AteraAgent
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:5892
                • C:\Windows\syswow64\TaskKill.exe
                  "TaskKill.exe" /f /im AteraAgent.exe
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  PID:456
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSIA7F1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240691250 511 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
                  3⤵
                  • Blocklisted process makes network request
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4252
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /u
                2⤵
                • Drops file in System32 directory
                PID:3276
              • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
                "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="" /CompanyId="" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="" /AgentId="030ad479-241f-4778-b886-22acc9095fc2"
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:5416
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:2084
            • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
              "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
              1⤵
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4436
              • C:\Windows\System32\sc.exe
                "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                2⤵
                • Launches sc.exe
                PID:3576
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "4f9eec27-b924-4fe1-bcfc-1564813f07a5" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 0013z00002eDbtlAAC
                2⤵
                • Drops file in System32 directory
                • Executes dropped EXE
                PID:3088
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "afb335dc-b148-4493-b82c-f66e1d9a5282" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 0013z00002eDbtlAAC
                2⤵
                • Executes dropped EXE
                PID:2676
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "35243b6a-8377-4a3b-b31a-4eec20c83772" agent-api.atera.com/Production 443 or8ixLi90Mf "identified" 0013z00002eDbtlAAC
                2⤵
                • Executes dropped EXE
                PID:2452
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "35c275c7-dcfc-467d-9b2b-5294b1f2cf4d" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo fromGui" 0013z00002eDbtlAAC
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:4996
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4312
                  • C:\Windows\system32\cscript.exe
                    cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                    4⤵
                    • Modifies data under HKEY_USERS
                    PID:672
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "4b53d850-e8f1-4000-9c5e-5c12bc18c182" agent-api.atera.com/Production 443 or8ixLi90Mf "install eyJSbW1Db2RlIjoiaFpDREZQaEs3NW1KIn0=" 0013z00002eDbtlAAC
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3448
                • C:\Windows\TEMP\SplashtopStreamer.exe
                  "C:\Windows\TEMP\SplashtopStreamer.exe" prevercheck /s /i sec_opt=0,confirm_d=0,hidewindow=1
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:3276
                  • C:\Windows\Temp\unpack\PreVerCheck.exe
                    "C:\Windows\Temp\unpack\PreVerCheck.exe" /s /i sec_opt=0,confirm_d=0,hidewindow=1
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3764
                    • C:\Windows\SysWOW64\msiexec.exe
                      msiexec /norestart /i "setup.msi" /qn /l*v "C:\Windows\TEMP\PreVer.log.txt" CA_EXTPATH=1 USERINFO="sec_opt=0,confirm_d=0,hidewindow=1"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2248
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "33e9e435-2a47-42a0-97c4-987e08501cc4" agent-api.atera.com/Production 443 or8ixLi90Mf "syncprofile" 0013z00002eDbtlAAC
                2⤵
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies data under HKEY_USERS
                PID:4408
            • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
              "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
              1⤵
              • Drops file in Program Files directory
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Suspicious use of WriteProcessMemory
              PID:1168
              • C:\Windows\System32\sc.exe
                "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                2⤵
                • Launches sc.exe
                PID:2176
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "9cc6ef40-6f5b-4ce1-80c6-61b3bb429a42" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo" 0013z00002eDbtlAAC
                2⤵
                  PID:1812
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                    3⤵
                      PID:2372
                      • C:\Windows\system32\cscript.exe
                        cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                        4⤵
                        • Modifies data under HKEY_USERS
                        PID:468
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "ca9a6f62-a2cb-4154-a2bf-fd36441b31e9" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates" 0013z00002eDbtlAAC
                    2⤵
                    • Drops file in Program Files directory
                    PID:404
                    • C:\Windows\SYSTEM32\msiexec.exe
                      "msiexec.exe" /i C:\Windows\TEMP\ateraAgentSetup64_1_8_7_2.msi /lv* AteraSetupLog.txt /qn /norestart
                      3⤵
                      • Modifies data under HKEY_USERS
                      PID:5264
                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "b8935ea8-7c07-46c3-8bbe-ca9a97f065fc" agent-api.atera.com/Production 443 or8ixLi90Mf "downloadifneeded" 0013z00002eDbtlAAC
                    2⤵
                      PID:676
                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                        "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe" -a "st-streamer://com.splashtop.streamer/?rmm_code=hZCDFPhK75mJ&rmm_session_pwd=1bd2db6656646497215d91044d2bfd02&rmm_session_pwd_ttl=86400"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5296
                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "885b76f4-cb7f-402e-82e7-54eca1fc440b" agent-api.atera.com/Production 443 or8ixLi90Mf "maintain" 0013z00002eDbtlAAC
                      2⤵
                      • Modifies registry class
                      PID:3844
                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "3084a8ef-526d-43d2-bfdd-8e035902f04a" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat" 0013z00002eDbtlAAC
                      2⤵
                      • Drops file in System32 directory
                      PID:5208
                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "fcf02280-0415-495c-80ac-1cfeb863da2a" agent-api.atera.com/Production 443 or8ixLi90Mf "pollAll" 0013z00002eDbtlAAC
                      2⤵
                        PID:5776
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "4d36db3f-bdd2-4bf5-b2ed-89686c564141" agent-api.atera.com/Production 443 or8ixLi90Mf "syncinstalledapps" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        • Drops file in Program Files directory
                        PID:5796
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "3bac347f-2518-4cd8-ac5d-f80d0dd32c9e" agent-api.atera.com/Production 443 or8ixLi90Mf "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" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        PID:5948
                        • C:\Windows\SYSTEM32\cmd.exe
                          "cmd.exe" /K "cd /d C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                          3⤵
                          • System Time Discovery
                          PID:5564
                          • C:\Program Files\dotnet\dotnet.exe
                            dotnet --list-runtimes
                            4⤵
                            • System Time Discovery
                            PID:6112
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "96744ddf-fa75-4d3b-92d8-f8d2a2790af0" agent-api.atera.com/Production 443 or8ixLi90Mf "agentprovision" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        PID:5996
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "fd3c514b-bd0e-4cb7-a763-d25923a542cd" agent-api.atera.com/Production 443 or8ixLi90Mf "getlistofallupdates" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        PID:3524
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "74626089-d04c-484f-b711-f32ab5feb6e9" agent-api.atera.com/Production 443 or8ixLi90Mf "probe" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        PID:5516
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "742a7977-bef3-49dc-8f83-fd92081ef45c" agent-api.atera.com/Production 443 or8ixLi90Mf "monitor" 0013z00002eDbtlAAC
                        2⤵
                        • Writes to the Master Boot Record (MBR)
                        • Drops file in Program Files directory
                        • Modifies data under HKEY_USERS
                        PID:5708
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "9dbce92f-08ab-49d9-a869-c798fcd4354d" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBZENvbW1hbmRUeXBlIjo1LCJJbnN0YWxsYXRpb25GaWxlVXJsIjoiaHR0cHM6Ly9nZXQuYW55ZGVzay5jb20vOENRc3U5a3YvQW55RGVza19DdXN0b21fQ2xpZW50Lm1zaSIsIkZvcmNlSW5zdGFsbCI6ZmFsc2UsIlRhcmdldFZlcnNpb24iOiIifQ==" 0013z00002eDbtlAAC
                        2⤵
                        • Drops file in System32 directory
                        PID:5640
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "89cb7dc8-e43e-4157-ae69-4c66d90544dd" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIybWFpbnRlbmFuY2VcdTAwMjIsXHUwMDIyRW5hYmxlZFx1MDAyMjp0cnVlLFx1MDAyMlJlcGVhdEludGVydmFsTWludXRlc1x1MDAyMjoxMCxcdTAwMjJEYXlzSW50ZXJ2YWxcdTAwMjI6MSxcdTAwMjJSZXBlYXREdXJhdGlvbkRheXNcdTAwMjI6MX0ifQ==" 0013z00002eDbtlAAC
                        2⤵
                          PID:5260
                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
                        "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe"
                        1⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2440
                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRManager.exe
                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRManager.exe"
                          2⤵
                          • Drops file in System32 directory
                          • Drops file in Program Files directory
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2360
                          • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRServer.exe
                            -h
                            3⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:3388
                          • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAgent.exe
                            "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAgent.exe"
                            3⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1364
                            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\BdEpSDK.exe
                              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\BdEpSDK.exe" -v
                              4⤵
                                PID:1972
                            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAppPB.exe
                              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAppPB.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SetWindowsHookEx
                              PID:2264
                            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRFeature.exe
                              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRFeature.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2800
                              • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                                SRUtility.exe -r
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:3376
                            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRVirtualDisplay.exe
                              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRVirtualDisplay.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:3968
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\install_driver64.bat" nosetkey
                                4⤵
                                  PID:3040
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ver
                                    5⤵
                                      PID:5748
                                    • C:\Windows\system32\sc.exe
                                      sc query ddmgr
                                      5⤵
                                      • Launches sc.exe
                                      PID:5236
                                    • C:\Windows\system32\sc.exe
                                      sc query lci_proxykmd
                                      5⤵
                                      • Launches sc.exe
                                      PID:1396
                                    • C:\Windows\system32\rundll32.exe
                                      rundll32 x64\my_setup.dll do_install_lci_proxywddm
                                      5⤵
                                      • Checks SCSI registry key(s)
                                      • Modifies data under HKEY_USERS
                                      PID:2008
                            • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
                              "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe"
                              1⤵
                              • Drops file in Program Files directory
                              • Modifies data under HKEY_USERS
                              PID:2224
                              • C:\Windows\System32\sc.exe
                                "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                                2⤵
                                • Launches sc.exe
                                PID:5488
                              • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                                "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "9351d23e-d6fb-49cc-bbe9-7e02c1a7b68b" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo" 0013z00002eDbtlAAC
                                2⤵
                                  PID:1680
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                                    3⤵
                                      PID:976
                                      • C:\Windows\system32\cscript.exe
                                        cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                                        4⤵
                                        • Modifies data under HKEY_USERS
                                        PID:5560
                                  • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe
                                    "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "b146f4f3-09b5-4df8-b6f8-64b83b6eb34f" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBZENvbW1hbmRUeXBlIjo1LCJJbnN0YWxsYXRpb25GaWxlVXJsIjoiaHR0cHM6Ly9nZXQuYW55ZGVzay5jb20vOENRc3U5a3YvQW55RGVza19DdXN0b21fQ2xpZW50Lm1zaSIsIkZvcmNlSW5zdGFsbCI6ZmFsc2UsIlRhcmdldFZlcnNpb24iOiIifQ==" 0013z00002eDbtlAAC
                                    2⤵
                                      PID:4936
                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                                      "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "6b1139a0-3392-4f9b-8538-2852555950dc" agent-api.atera.com/Production 443 or8ixLi90Mf "pollAll" 0013z00002eDbtlAAC
                                      2⤵
                                      • Drops file in Program Files directory
                                      PID:6132
                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe
                                      "C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "afe808ea-f28b-4767-96eb-806a02c463c2" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIybWFpbnRlbmFuY2VcdTAwMjIsXHUwMDIyRW5hYmxlZFx1MDAyMjp0cnVlLFx1MDAyMlJlcGVhdEludGVydmFsTWludXRlc1x1MDAyMjoxMCxcdTAwMjJEYXlzSW50ZXJ2YWxcdTAwMjI6MSxcdTAwMjJSZXBlYXREdXJhdGlvbkRheXNcdTAwMjI6MX0ifQ==" 0013z00002eDbtlAAC
                                      2⤵
                                        PID:6084
                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                                        "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "c5e2d9af-304e-4b8d-b75b-633e23b5461d" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat" 0013z00002eDbtlAAC
                                        2⤵
                                          PID:5572
                                        • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                                          "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "724036fd-f42c-481f-989a-50421320a834" agent-api.atera.com/Production 443 or8ixLi90Mf "monitor" 0013z00002eDbtlAAC
                                          2⤵
                                          • Writes to the Master Boot Record (MBR)
                                          • Drops file in Program Files directory
                                          PID:4000
                                        • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
                                          "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "d57e5bfa-517b-4120-b38d-e4a738eff931" agent-api.atera.com/Production 443 or8ixLi90Mf "agentprovision" 0013z00002eDbtlAAC
                                          2⤵
                                            PID:6124
                                          • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                                            "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "bf629e10-43cb-4d1e-8af6-01ae5f0609ef" agent-api.atera.com/Production 443 or8ixLi90Mf "downloadifneeded" 0013z00002eDbtlAAC
                                            2⤵
                                              PID:4372
                                              • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                                                "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe" -a "st-streamer://com.splashtop.streamer/?rmm_code=hZCDFPhK75mJ&rmm_session_pwd=1bd2db6656646497215d91044d2bfd02&rmm_session_pwd_ttl=86400"
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3096
                                            • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
                                              "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "273cdd28-a122-4283-8dad-8e907a64cfd5" agent-api.atera.com/Production 443 or8ixLi90Mf "syncinstalledapps" 0013z00002eDbtlAAC
                                              2⤵
                                                PID:5628
                                              • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
                                                "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "5e6d3af2-b629-4164-89b8-85cdb643e8d9" agent-api.atera.com/Production 443 or8ixLi90Mf "getlistofallupdates" 0013z00002eDbtlAAC
                                                2⤵
                                                  PID:5996
                                                • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe
                                                  "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "73806543-8039-4cc6-b832-5e273ea4b258" agent-api.atera.com/Production 443 or8ixLi90Mf "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" 0013z00002eDbtlAAC
                                                  2⤵
                                                    PID:1968
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      "cmd.exe" /K "cd /d C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                                                      3⤵
                                                      • System Time Discovery
                                                      PID:5720
                                                      • C:\Program Files\dotnet\dotnet.exe
                                                        dotnet --list-runtimes
                                                        4⤵
                                                        • System Time Discovery
                                                        PID:1540
                                                  • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
                                                    "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "9ad77ab7-a7d7-443f-ad62-badf5f97de04" agent-api.atera.com/Production 443 or8ixLi90Mf "probe" 0013z00002eDbtlAAC
                                                    2⤵
                                                      PID:5376
                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
                                                      "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "1279324f-9484-4e9a-b8c5-2de59cdf7ebd" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates" 0013z00002eDbtlAAC
                                                      2⤵
                                                        PID:5852
                                                        • C:\Windows\TEMP\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe
                                                          "C:\Windows\TEMP\AteraUpgradeAgentPackage\AgentPackageUpgradeAgent.exe" "156bf64a-0dd9-4c50-9ee7-d85ab9600c05" "1279324f-9484-4e9a-b8c5-2de59cdf7ebd" "agent-api.atera.com/Production" "443" "or8ixLi90Mf" "checkforupdates" "0013z00002eDbtlAAC"
                                                          3⤵
                                                            PID:5560
                                                        • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                                                          "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" 156bf64a-0dd9-4c50-9ee7-d85ab9600c05 "c5e2d9af-304e-4b8d-b75b-633e23b5461d" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat" 0013z00002eDbtlAAC
                                                          2⤵
                                                          • Modifies data under HKEY_USERS
                                                          PID:5832
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                        1⤵
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        PID:4544
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "4" "1" "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\win10\lci_iddcx.inf" "9" "4804066df" "0000000000000154" "WinSta0\Default" "00000000000000E8" "208" "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\win10"
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Checks SCSI registry key(s)
                                                          • Modifies data under HKEY_USERS
                                                          PID:4372
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "4" "1" "c:\program files (x86)\splashtop\splashtop remote\server\driver\lcidisplay\win10\lci_proxywddm.inf" "9" "4a8a251e7" "00000000000000B8" "WinSta0\Default" "0000000000000138" "208" "c:\program files (x86)\splashtop\splashtop remote\server\driver\lcidisplay\win10"
                                                          2⤵
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Checks SCSI registry key(s)
                                                          • Modifies data under HKEY_USERS
                                                          PID:3696
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem4.inf" "oem4.inf:c276d4b8d1e66062:lci_proxywddm.Install:1.0.2018.1204:root\lci_proxywddm," "4a8a251e7" "000000000000013C"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          • Checks SCSI registry key(s)
                                                          PID:60
                                                        • C:\Windows\system32\DrvInst.exe
                                                          DrvInst.exe "1" "0" "LCI\IDDCX\1&79f5d87&0&WHO_CARE" "" "" "48ef22a9f" "0000000000000000"
                                                          2⤵
                                                          • Drops file in Drivers directory
                                                          • Checks SCSI registry key(s)
                                                          PID:5772

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Config.Msi\e57ca75.rbs

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        6a16b2ecd7e8ad682a27b96f0a63ffe3

                                                        SHA1

                                                        1368fb9c87075230e4c4f72a39ba2523af80ab43

                                                        SHA256

                                                        ed0c3b6decdfe498c22f506d0b33263817f6a992b20183dacfc488bb0a105604

                                                        SHA512

                                                        435dbeea6bbe698d05ba5db836ae101402009f99b3ea7c5e502631db3a3e0d54c52a9caf7b498c0fabb3c2657d20b99df66812853475a8079a86eaea654fbf70

                                                      • C:\Config.Msi\e57ca7a.rbs

                                                        Filesize

                                                        74KB

                                                        MD5

                                                        fabf6753f602f1735fc3213a94a69b96

                                                        SHA1

                                                        8ce2a8db2f4347847bd6361cfa7e21b142b45f61

                                                        SHA256

                                                        39656f0e7a12826780f7cbf1586629c18ba2e78b586f49afee0890c2dfb994c3

                                                        SHA512

                                                        df60187d30852fa9e024a858a8952aa6adfcc8b3fb9a0adb322daaae2588501726a81fc24728706516d79a1ff3cbfdeeaea680204ecd614b6c22a19a8b2153ac

                                                      • C:\Config.Msi\e57ca7c.rbs

                                                        Filesize

                                                        464B

                                                        MD5

                                                        83ef9340ec71f0c9f40041cdeec86c38

                                                        SHA1

                                                        953c75a5db6abec2dab5ed9216d543c08b60a578

                                                        SHA256

                                                        99c8bd589ef7a8657358e09dc4c0270d181ab14b9946050a11fd1ba4411c20aa

                                                        SHA512

                                                        2bf95b5ea7dfd7360e4a786c67fce0e1b4e98cf00839ad1d972fcbeb21cb5baa76525e7ece16be135c008c3a0d441b296f8bab5cc1c715c394e251c79be9674d

                                                      • C:\Config.Msi\e57ca82.rbs

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        db732aa6fdeb63fcbb771901bfad506e

                                                        SHA1

                                                        8b6778e9712e054eb12e1cdad40e57be1d92c205

                                                        SHA256

                                                        6a1ee1db04008f2c8e7e1014acbf27400d3f39e71436ed6346c36e0b27170d73

                                                        SHA512

                                                        6fcbce0823bf442e6c9c10bdadda082142144d9bb97f95eba64ffebd22cd4f2c960279bdf20fdec7515cd4d4b88e21a5748a086f7c2774e51fa412bf748100ab

                                                      • C:\Config.Msi\e57ca8a.rbs

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        530b0df12e9a161f32f134fafb170f8c

                                                        SHA1

                                                        cb651d7b88eb75b5e1d46d7e92a78d52ce3db10e

                                                        SHA256

                                                        90c71d30577c617fa8f1832511951b8a5e85aa3bf1570968e43fcdf12fc87156

                                                        SHA512

                                                        65d5be46b158900e31944dfe3af36a06c27e7a176b631aa3a93d8a3025feb1b1ca45273d4b1d930c7ecb24cce634bd35adcb472a09d3bb4f17fb3420c05f9a7d

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        337079222a6f6c6edf58f3f981ff20ae

                                                        SHA1

                                                        1f705fc0faa84c69e1fe936b34783b301323e255

                                                        SHA256

                                                        ae56a6c4f6622b5485c46d9fde5d3db468c1bfb573b34c9f199007b5eedcbda5

                                                        SHA512

                                                        ae9cd225f7327da6eeea63c661b9e159d6608dff4897fb6b9651a1756d69282e8051b058a2473d9153fc87c0b54aa59b9a1a865871df693adcb267f8b0157b61

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

                                                        Filesize

                                                        142KB

                                                        MD5

                                                        477293f80461713d51a98a24023d45e8

                                                        SHA1

                                                        e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

                                                        SHA256

                                                        a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

                                                        SHA512

                                                        23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        b3bb71f9bb4de4236c26578a8fae2dcd

                                                        SHA1

                                                        1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

                                                        SHA256

                                                        e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

                                                        SHA512

                                                        fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

                                                        Filesize

                                                        210KB

                                                        MD5

                                                        c106df1b5b43af3b937ace19d92b42f3

                                                        SHA1

                                                        7670fc4b6369e3fb705200050618acaa5213637f

                                                        SHA256

                                                        2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

                                                        SHA512

                                                        616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

                                                        Filesize

                                                        693KB

                                                        MD5

                                                        2c4d25b7fbd1adfd4471052fa482af72

                                                        SHA1

                                                        fd6cd773d241b581e3c856f9e6cd06cb31a01407

                                                        SHA256

                                                        2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

                                                        SHA512

                                                        f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe

                                                        Filesize

                                                        157KB

                                                        MD5

                                                        242d415e238789fbc57c5ac7e8ca5d02

                                                        SHA1

                                                        09c1e25e035be67c9fbfa23b336e26bfd2c76d04

                                                        SHA256

                                                        7f3ded5bf167553a5a09ca8a9d80a451eb71ccecc043bda1dd8080a2cbe35fa2

                                                        SHA512

                                                        ac55d401951ecf0112051db033cc9014e824ab6a5ed9ea129a8793408d9bf2446cb3c15711e59a8577e0f60d858a4639e99e38d6232315f0f39df2c40217ea40

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe

                                                        Filesize

                                                        51KB

                                                        MD5

                                                        3180c705182447f4bcc7ce8e2820b25d

                                                        SHA1

                                                        ad6486557819a33d3f29b18d92b43b11707aae6e

                                                        SHA256

                                                        5b536eda4bff1fdb5b1db4987e66da88c6c0e1d919777623344cd064d5c9ba22

                                                        SHA512

                                                        228149e1915d8375aa93a0aff8c5a1d3417df41b46f5a6d9a7052715dbb93e1e0a034a63f0faad98d4067bcfe86edb5eb1ddf750c341607d33931526c784eb35

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

                                                        Filesize

                                                        12B

                                                        MD5

                                                        dc63026e80d2bb04f71e41916f807e33

                                                        SHA1

                                                        6cda386d2c365f94ea3de41e2390fd916622eb51

                                                        SHA256

                                                        3b54d00f00aa80384de88e4f4005e9d4d889a2ccf64b56e0c29d274352495c85

                                                        SHA512

                                                        61da550efd55187978872f5d8e88164a6181a11c8a720684eaa737e0846fe20b9e82b73e1f689a6585834b84c4cee8dd949af43e76fd0158f6cafa704ab25183

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

                                                        Filesize

                                                        173KB

                                                        MD5

                                                        31def444e6135301ea3c38a985341837

                                                        SHA1

                                                        f135be75c721af2d5291cb463cbc22a32467084a

                                                        SHA256

                                                        36704967877e4117405bde5ec30beaf31e7492166714f3ffb2ceb262bf2fb571

                                                        SHA512

                                                        bd654388202cb5090c860a7229950b1184620746f4c584ab864eade831168bc7fae0b5e59b90165b1a9e4ba2bd154f235749718ae2df35d3dd10403092185ed1

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

                                                        Filesize

                                                        546B

                                                        MD5

                                                        158fb7d9323c6ce69d4fce11486a40a1

                                                        SHA1

                                                        29ab26f5728f6ba6f0e5636bf47149bd9851f532

                                                        SHA256

                                                        5e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21

                                                        SHA512

                                                        7eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

                                                        Filesize

                                                        94KB

                                                        MD5

                                                        9d8b5941ea5b905e8197a175ef2b15a9

                                                        SHA1

                                                        86a078e94b5578ec4125f50f78c8518a8ce1d086

                                                        SHA256

                                                        c6f05b647dbadc15ab97d31790fc8ace054986ec33e9178feead4235ad15cb0d

                                                        SHA512

                                                        fab5fe82873862ce8ed1a427482093cca307f6663e9f6497fdc244ce461312872d419ff274cdca0c496414c28681901f335c9911b95d2a7c112d30e32d74e498

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

                                                        Filesize

                                                        688KB

                                                        MD5

                                                        ba66874c510645c1fb5fe74f85b32e98

                                                        SHA1

                                                        e33c7e6991a25cc40d9e0dcc260b5a27f4a34e6c

                                                        SHA256

                                                        12d64550cb536a067d8afff42864836f6d41566e18f46d3ca92cb68726bdd4e9

                                                        SHA512

                                                        44e8caa916ab98da36af02b84ac944fbf0a65c80b0adbdc1a087f8ed3eff71c750fb6116f2c12034f9f9b429d6915db8f88511b79507cc4d063bab40c4eaa568

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe

                                                        Filesize

                                                        27KB

                                                        MD5

                                                        797c9554ec56fd72ebb3f6f6bef67fb5

                                                        SHA1

                                                        40af8f7e72222ba9ec2ea2dd1e42ff51dc2eb1bb

                                                        SHA256

                                                        7138b6beda7a3f640871e232d93b4307065ab3cd9cfac1bd7964a6bec9e60f49

                                                        SHA512

                                                        4f461a8a25da59f47ced0c0dbf59318ddb30c21758037e22bbaa3b03d08ff769bfd1bfc7f43f0e020df8ae4668355ab4b9e42950dca25435c2dd3e9a341c4a08

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe

                                                        Filesize

                                                        214KB

                                                        MD5

                                                        01807774f043028ec29982a62fa75941

                                                        SHA1

                                                        afc25cf6a7a90f908c0a77f2519744f75b3140d4

                                                        SHA256

                                                        9d4727352bf6d1cca9cba16953ebd1be360b9df570fd7ba022172780179c251e

                                                        SHA512

                                                        33bd2b21db275dc8411da6a1c78effa6f43b34afd2f57959e2931aa966edea46c78d7b11729955879889cbe8b81a8e3fb9d3f7e4988e3b7f309cbd1037e0dc02

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe

                                                        Filesize

                                                        37KB

                                                        MD5

                                                        efb4712c8713cb05eb7fe7d87a83a55a

                                                        SHA1

                                                        c94d106bba77aecf88540807da89349b50ea5ae7

                                                        SHA256

                                                        30271d8a49c2547ab63a80bc170f42e9f240cf359a844b10bc91340444678e75

                                                        SHA512

                                                        3594955ad79a07f75c697229b0de30c60c2c7372b5a94186a705159a25d2e233e398b9e2dc846b8b47e295dcddd1765a8287b13456c0a3b3c4e296409a428ef8

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring.zip

                                                        Filesize

                                                        3.4MB

                                                        MD5

                                                        e010d1f614b1a830482d3df4ba056f24

                                                        SHA1

                                                        5873e22b8c51a808c06a3bbf425fcf02b2a80328

                                                        SHA256

                                                        98a98dd1df25d31a01d47eaf4fa65d5f88bc0ad166f8f31d68f2994b4f739a9b

                                                        SHA512

                                                        727877929530e08062611868fd751d1b64e4c7d28c26b70f14c7cd942b1ae1579cba2a2ef038bad07032ef728ae277963ffb3e1ab7a5c28351326fabad84daa6

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe

                                                        Filesize

                                                        389KB

                                                        MD5

                                                        5e3252e0248b484e76fcdbf8b42a645d

                                                        SHA1

                                                        11ae92fd16ac87f6ab755911e85e263253c16516

                                                        SHA256

                                                        01f464fbb9b0bfd0e16d4ad6c5de80f7aad0f126e084d7f41fef36be6ec2fc8e

                                                        SHA512

                                                        540d6b3ca9c01e3e09673601514af701a41e7d024070de1257249c3c077ac53852bd04ab4ac928a38c9c84f423a6a3a89ab0676501a9edc28f95de83818fb699

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        69ae4f39f43b4999b95f3f735c93cf37

                                                        SHA1

                                                        324c899e02d4dc946c9143ca2dff7bba20b15c8d

                                                        SHA256

                                                        4e60f5094ed8ad58fb4f7830068787bde9580601aab0cbc6203ec9026db8d14b

                                                        SHA512

                                                        0843f66ad504fad7d1a1f93ae89b2265be975d633c13a30d910f340ce7e85427e29a93bea759bfa65e7db91008776abd5bbd3729390b5e58675b91a240b6c4f7

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe

                                                        Filesize

                                                        196KB

                                                        MD5

                                                        5f782d0cb0f717ae9dfd1b4da1295f15

                                                        SHA1

                                                        b33575e428e19940f0585c747e054ca70a12d454

                                                        SHA256

                                                        0f233bd5fe96cf5f7efea0fa0634f98c37a3a095f72acc79a3544590bf228b43

                                                        SHA512

                                                        e373be20e06f31f81a8c0368e8fbee0bd7e98095a6e1f85ecb8969a35caf32e22194e2448de9213bb86478f454e708363ea6ab990648422b57f057a0516959ed

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe

                                                        Filesize

                                                        55KB

                                                        MD5

                                                        a739b889642ca9ce4ad3a37a3c521604

                                                        SHA1

                                                        18bcf6fd14c5aece67ae795a3c505a0c1a9d5175

                                                        SHA256

                                                        44b96244b823052fb19509b1f9576488750c4edab61840af24b10c208b47fc92

                                                        SHA512

                                                        92243e80fd77b9c3f9231c750935b34d9adcdc76e1a45a445c47888a1e98faca1c26f617459db0c1af4860a5172401f03e64039888e6f84726d2457cc550bae0

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\config\chocolatey.config

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        9d1528a2ce17522f6de064ae2c2b608e

                                                        SHA1

                                                        2f1ce8b589e57ab300bb93dde176689689f75114

                                                        SHA256

                                                        11c9ad150a0d6c391c96e2b7f8ad20e774bdd4e622fcdfbf4f36b6593a736311

                                                        SHA512

                                                        a19b54ed24a2605691997d5293901b52b42f6af7d6f6fda20b9434c9243cc47870ec3ae2b72bdea0e615f4e98c09532cb3b87f20c4257163e782c7ab76245e94

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\config\chocolatey.config.5796.update

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        14ffcf07375b3952bd3f2fe52bb63c14

                                                        SHA1

                                                        ab2eadde4c614eb8f1f2cae09d989c5746796166

                                                        SHA256

                                                        6ccfdb5979e715d12e597b47e1d56db94cf6d3a105b94c6e5f4dd8bab28ef5ed

                                                        SHA512

                                                        14a32151f7f7c45971b4c1adfb61f6af5136b1db93b50d00c6e1e3171e25b19749817b4e916d023ee1822caee64961911103087ca516cf6a0eafce1d17641fc4

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\logs\chocolatey.log

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        09d4f9823d49bdb2a40d0e8cae6b95f1

                                                        SHA1

                                                        abc7c1aa2cccc33010b2706198559d81b328b61b

                                                        SHA256

                                                        7cee306571ce5c963f6a0447f58c845855dfb8b1822da72ef8b2e301d2ec9aeb

                                                        SHA512

                                                        05569fb0be5127c972acdcbd7ddf70e08117da00e0b2c7116d2d90a0ed4f4c9c386b749af57d62463c10252accd54fb9841b14685114cd4e5295887da4a9d607

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\redirects\clist.exe.ignore

                                                        Filesize

                                                        2B

                                                        MD5

                                                        81051bcc2cf1bedf378224b0a93e2877

                                                        SHA1

                                                        ba8ab5a0280b953aa97435ff8946cbcbb2755a27

                                                        SHA256

                                                        7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

                                                        SHA512

                                                        1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe

                                                        Filesize

                                                        54KB

                                                        MD5

                                                        77c613ffadf1f4b2f50d31eeec83af30

                                                        SHA1

                                                        76a6bfd488e73630632cc7bd0c9f51d5d0b71b4c

                                                        SHA256

                                                        2a0ead6e9f424cbc26ef8a27c1eed1a3d0e2df6419e7f5f10aa787377a28d7cf

                                                        SHA512

                                                        29c8ae60d195d525650574933bad59b98cf8438d47f33edf80bbdf0c79b32d78f0c0febe69c9c98c156f52219ecd58d7e5e669ae39d912abe53638092ed8b6c3

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote.zip

                                                        Filesize

                                                        334KB

                                                        MD5

                                                        b3e14504a48bed32c53ec7aab2cb2c8f

                                                        SHA1

                                                        0bc0d486a5ed1c4cdf2390229883ed3473926882

                                                        SHA256

                                                        adea6001759b5604f60bbaec8ce536a1e189adebc7394f9cff3921cae40c8c9b

                                                        SHA512

                                                        e5a5c09355eb9cb45dc872b59edbd54f62f15445ca6caaa3187e31e7928ef4453ae8405d9eee5d2aec4fa34965d3006dcf61c060b8691519a2312382612c683f

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe

                                                        Filesize

                                                        72KB

                                                        MD5

                                                        749c51599fbf82422791e0df1c1e841c

                                                        SHA1

                                                        bba9a471e9300bcd4ebe3359d3f73b53067b781d

                                                        SHA256

                                                        c176f54367f9de7272b24fd4173271fd00e26c2dbdbf944b42d7673a295a65e6

                                                        SHA512

                                                        f0a5059b326446a7bd8f4c5b1ba5858d1affdc48603f6ce36355daeaab4ed3d1e853359a2440c69c5dee3d47e84f7bf38d7adf8707c277cd056f6ebca5942cc5

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe

                                                        Filesize

                                                        50KB

                                                        MD5

                                                        c0f02eaa3eb28659d8f1bcba8de48479

                                                        SHA1

                                                        5be3c69e3f46daff4967484a09eb8c4a1f4a7f0f

                                                        SHA256

                                                        6befb51a6639cae7e25570f5259f7b1f2d9b9b6539177d64d2ed8be50dde6268

                                                        SHA512

                                                        47b536fa628608a58f6f382bbc99911eeff706becfaf4b1c5ff904ca768917f40c2e916ba5a31992df0335ba5a57755f047f70aafaac414fc655da0cd6f95e34

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe

                                                        Filesize

                                                        32KB

                                                        MD5

                                                        f531d3157e9ff57eea92db36c40e283e

                                                        SHA1

                                                        d0e49925476af438875fa9b1ccfb9077fa371ecc

                                                        SHA256

                                                        30aa4b3e85e20ada6fe045c7e93fee0d4642dcabd358a9987d7289c2c5582251

                                                        SHA512

                                                        27d247ab93ef313ce06ff5c1deca4b0819b688839c46808a6be709c205c81b93562181926a36a45a7da9570baea3b3152b6673a3bcce0b9326c7d3599a3d63c8

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe

                                                        Filesize

                                                        54KB

                                                        MD5

                                                        d11b2139d29e79d795054c3866898b7f

                                                        SHA1

                                                        020581c77ed4bc01c3f3912f304a46c12ca443e6

                                                        SHA256

                                                        11cdb5ec172389f93f80d8eff0b9e5d4a98cfeab6f2c0e0bc301a6895a747566

                                                        SHA512

                                                        de5def2efcba83a4b9301dd342391c306cf68d0bb64104839dfc329b343544fd40597a2b9867fd2a8739c63081d74157acfc9b59c0cb4878b2f5155f582a6f09

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

                                                        Filesize

                                                        588KB

                                                        MD5

                                                        17d74c03b6bcbcd88b46fcc58fc79a0d

                                                        SHA1

                                                        bc0316e11c119806907c058d62513eb8ce32288c

                                                        SHA256

                                                        13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

                                                        SHA512

                                                        f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

                                                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                                                        Filesize

                                                        217B

                                                        MD5

                                                        849d9047bcb34c854a732e596ac53668

                                                        SHA1

                                                        57edbc38f0d43f3194063835c564f4255ca3669b

                                                        SHA256

                                                        8b3763b13a7fb60864a404b996cbde28ca624d8a4dba6c3b5520fe182857f59c

                                                        SHA512

                                                        8dcbaaa7b9de657efc07147727b71e48497124c3f0eb773e15e38828edbcbab805717773b5294647fcaa2a0c0f9ea7cc6e3ff7549b1421d038235d5cadb714f2

                                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVAD\utils\DIFxCmd.exe

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        1ef7574bc4d8b6034935d99ad884f15b

                                                        SHA1

                                                        110709ab33f893737f4b0567f9495ac60c37667c

                                                        SHA256

                                                        0814aad232c96a4661081e570cf1d9c5f09a8572cfd8e9b5d3ead0fa0f5ca271

                                                        SHA512

                                                        947c306a3a1eec7fce29eaa9b8d4b5e00fd0918fe9d7a25e262d621fb3ee829d5f4829949e766a660e990d1ac14f87e13e5dbd5f7c8252ae9b2dc82e2762fb73

                                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVAD\utils\DIFxCmd64.exe

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        f512536173e386121b3ebd22aac41a4e

                                                        SHA1

                                                        74ae133215345beaebb7a95f969f34a40dda922a

                                                        SHA256

                                                        a993872ad05f33cb49543c00dfca036b32957d2bd09aaa9dafe33b934b7a3e4a

                                                        SHA512

                                                        1efa432ef2d61a6f7e7fc3606c5c982f1b95eabc4912ea622d533d540ddca1a340f8a5f4652af62a9efc112ca82d4334e74decf6ddbc88b0bd191060c08a63b9

                                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVideo\utils\devcon.exe

                                                        Filesize

                                                        76KB

                                                        MD5

                                                        b40fe65431b18a52e6452279b88954af

                                                        SHA1

                                                        c25de80f00014e129ff290bf84ddf25a23fdfc30

                                                        SHA256

                                                        800e396be60133b5ab7881872a73936e24cbebd7a7953cee1479f077ffcf745e

                                                        SHA512

                                                        e58cf187fd71e6f1f5cf7eac347a2682e77bc9a88a64e79a59e1a480cac20b46ad8d0f947dd2cb2840a2e0bb6d3c754f8f26fcf2d55b550eea4f5d7e57a4d91d

                                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVideo\utils\devcon64.exe

                                                        Filesize

                                                        80KB

                                                        MD5

                                                        3904d0698962e09da946046020cbcb17

                                                        SHA1

                                                        edae098e7e8452ca6c125cf6362dda3f4d78f0ae

                                                        SHA256

                                                        a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289

                                                        SHA512

                                                        c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea

                                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\db\SRAgent.sqlite3

                                                        Filesize

                                                        88KB

                                                        MD5

                                                        28685852a140e0fb463efa09966d5d4d

                                                        SHA1

                                                        c9e2d366b504ecd0831a286ce082724dd2ee714b

                                                        SHA256

                                                        4695c92295021ac3ce2aa89889c3ce3153fd7343ee168d2ba0f24b490e07a337

                                                        SHA512

                                                        ac62b061d33b88348c683b28c68af1154446e8a86407b6978e9b186538f667e9f58a794465c8dcb105cb4e9a6400c65e561ff08baa27feb2202b2222e79e65c0

                                                      • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                                        Filesize

                                                        287B

                                                        MD5

                                                        fcad4da5d24f95ebf38031673ddbcdb8

                                                        SHA1

                                                        3f68c81b47e6b4aebd08100c97de739c98f57deb

                                                        SHA256

                                                        7e1def23e5ab80fea0688c3f9dbe81c0ab4ec9e7bdbcc0a4f9cd413832755e63

                                                        SHA512

                                                        1694957720b7a2137f5c96874b1eb814725bdba1f60b0106073fa921da00038a532764ec9a5501b6ffb9904ee485ce42ff2a61c41f88b5ff9b0afde93d6f7f3d

                                                      • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.InstallState

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        362ce475f5d1e84641bad999c16727a0

                                                        SHA1

                                                        6b613c73acb58d259c6379bd820cca6f785cc812

                                                        SHA256

                                                        1f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899

                                                        SHA512

                                                        7630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog.zip

                                                        Filesize

                                                        1.9MB

                                                        MD5

                                                        8de5a7a19d882820893d8b911c1710fb

                                                        SHA1

                                                        95cdf5855bc5e454c8944952697ab142f77124f7

                                                        SHA256

                                                        2bee5835a45e74f454648c57fef0d6fca40d64308f813cb759ccab1b2ab576a9

                                                        SHA512

                                                        3056784d9a1ae5a8a5dd92d7ed6ad1311e863e41a6ca5971aac5d626da1338da44d0828448aa9ab1f9edb88afbaaacd57660c4c102812bc94240654b8d5237a7

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote.zip

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        9a9b1fd85b5f1dcd568a521399a0d057

                                                        SHA1

                                                        34ed149b290a3a94260d889ba50cb286f1795fa6

                                                        SHA256

                                                        88d5a5a4a1b56963d509989b9be1a914afe3e9ee25c2d786328df85da4a7820d

                                                        SHA512

                                                        7c1259dddff406fdaadb236bf4c7dfb734c9da34fd7bad9994839772e298ebf3f19f02eb0655e773ba82702aa9175337ba4416c561dc2cb604d08e271cc74776

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip

                                                        Filesize

                                                        375KB

                                                        MD5

                                                        3c93b399b417b0d6a232d386e65a8b46

                                                        SHA1

                                                        bb26deae135f405229d6f76eb6faaeb9a3c45624

                                                        SHA256

                                                        29bc4577588116cbfea928b2587db3d0d26254163095e7fbbcde6e86fd0022d7

                                                        SHA512

                                                        a963f5cf2221436938f031b65079bea7c4bafbd48833a9e11cd9bdd1548d68ed968d9279299aa2adfc23311a6744d516cc50e6537aa45321e5653755ed56f149

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat.zip

                                                        Filesize

                                                        321KB

                                                        MD5

                                                        d3901e62166e9c42864fe3062cb4d8d5

                                                        SHA1

                                                        c9c19eec0fa04514f2f8b20f075d8f31b78bae70

                                                        SHA256

                                                        dbc0e52e6de93a0567a61c7b1e86daa51fbef725a4a31eef4c9bbff86f43671c

                                                        SHA512

                                                        ae33e57759e573773b9bb79944b09251f0dc4e07cdb8f373ec06963abfc1e6a6326df7f3b5fecf90bd2b060e3cb5a48b913b745cc853ac32d2558a8651c76111

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller.zip

                                                        Filesize

                                                        814KB

                                                        MD5

                                                        9b1f97a41bfb95f148868b49460d9d04

                                                        SHA1

                                                        768031d5e877e347a249dfdeab7c725df941324b

                                                        SHA256

                                                        09491858d849212847e4718d6cc8f2b1bc3caa671ceb165cf522290b960262e4

                                                        SHA512

                                                        9c8929a78cb459f519ace48db494d710efd588a19a7dbea84f46d02563cc9615db8aa78a020f08eca6fa2b99473d15c8192a513b4df8073aef595040d8962ae4

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace.zip

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        e74d2a16da1ddb7f9c54f72b8a25897c

                                                        SHA1

                                                        32379af2dc1c1cb998dc81270b7d6be054f7c1a0

                                                        SHA256

                                                        a0c2f9479b5e3da9d7a213ebc59f1dd983881f4fc47a646ffc0a191e07966f46

                                                        SHA512

                                                        52b8de90dc9ca41388edc9ae637d5b4ce5c872538c87cc3e7d45edcf8eff78b0f5743ab4927490abda1cff38f2a19983b7ccc0fe3f854b0eacca9c9ce28eda75

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.ini

                                                        Filesize

                                                        11B

                                                        MD5

                                                        5eda46a55c61b07029e7202f8cf1781c

                                                        SHA1

                                                        862ee76fc1e20a9cc7bc1920309aa67de42f22d0

                                                        SHA256

                                                        12bf7eb46cb4cb90fae054c798b8fd527f42a5efc8d7833bb4f68414e2383442

                                                        SHA512

                                                        4cf17d20064be9475e45d5f46b4a3400cdb8180e5e375ecac8145d18b34c8fca24432a06aeec937f5bedc7c176f4ee29f4978530be20edbd7fed38966fe989d6

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.ini

                                                        Filesize

                                                        12B

                                                        MD5

                                                        5796d1f96bb31a9d07f4db8ae9f0ddb3

                                                        SHA1

                                                        93012724e6cc0a298838aede678806e6c0c6517d

                                                        SHA256

                                                        a90d255cce3b419641fa0b9ba74d4da464e0ce70638a9c2eba03d6b34fca1dc4

                                                        SHA512

                                                        890112ddcb3b92b739c0dd06721efa81926ce3aab04c55cdadb8c4e6b7a28c9796f08f508249db189547dc4755804aa80cc8b104dd65c813a0450aad2cdda21c

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        b4a865268d5aca5f93bab91d7d83c800

                                                        SHA1

                                                        95ac9334096f5a38ca1c92df31b1e73ae4586930

                                                        SHA256

                                                        5cbf60b0873660b151cf8cd62e326fe8006d1d0cbde2fad697e7f8ad3f284203

                                                        SHA512

                                                        c46ee29861f7e2a1e350cf32602b4369991510804b4b87985465090dd7af64cf6d8dbfa2300f73b2f90f6af95fc0cb5fd1e444b5ddb41dbc89746f04dca6137b

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        4243d570055f3fd65a7c5189c63fbb67

                                                        SHA1

                                                        acafe941c5c27cb61aed4023f20677ec85b42a7e

                                                        SHA256

                                                        c0e14d2f04082849a81e5bf141fd49774e293f1628a44d13f08b9af0ea202584

                                                        SHA512

                                                        4e200ff0a2179b5ef6168b207998756c5b742375bcd19eb99979c3ac795c0b730a9c9b927f364f0683308ce72333e0c8493d3d3866832ae15be697629566e4df

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db

                                                        Filesize

                                                        48KB

                                                        MD5

                                                        3f4bd7745899a4f8b5c49d8dab470cae

                                                        SHA1

                                                        e62ce7ef45368af7b8cd0961762067ae2e6507d2

                                                        SHA256

                                                        aec8aa470a0c0c5d02ae1381a6f6b9a62510c48f27c6c80ead4d4065e93cd05d

                                                        SHA512

                                                        eb413d758b7cb615f654a2b53f8b79cf86f0ac026a12aba520642fe8132b571a6b5cbe4c6d0ef50eca569f052dbeab8ccc89b31bac2c9b4f999320a1733b71c7

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates.zip

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        91453d3e1e2bc9586cf5495073fb3cf7

                                                        SHA1

                                                        09cfa9dc27545fb600dd7a60e44258c511eb43c4

                                                        SHA256

                                                        5d398c6ce0636eadd4b7f6920dbd6127388f698e9bc1a440cb7db3992acb6557

                                                        SHA512

                                                        462d59453ed01d8ddf54e06319aaefc0ab5ef70ed7b0a45ffd4d3f049692044acf0dee3599173e58a4c281bc69af63d8b64f9586a1b2f04991adfa6747f19bdc

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement.zip

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        384d6da5c34ff401b18f0af41e3a2643

                                                        SHA1

                                                        3ddfbcf79e55904df77df2125f2112cfe7703eec

                                                        SHA256

                                                        0699c4ccaa2f9e6768475f7fbd0dd93dab1a0a0dc8859e9ee8f8a48ad1075d7d

                                                        SHA512

                                                        5b63245bedfc7260b27254a33f621a8b626a36c13c8f8ad516f51013bd6751770d37afdc1ff8f7646d9f972081acd24776314405cc397762a4f58d6dca0a7f32

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller.zip

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        6c6f85e896655a6eb726482f04c49086

                                                        SHA1

                                                        2e0c55cd4894117428b34d21a1d53738fce4b02c

                                                        SHA256

                                                        e109400a93fede90201bbf37c1868c789888bce9d03a4ae5b46c48599939c34e

                                                        SHA512

                                                        b58303c149deffc9e374d5ba42a8a73b7ce890d35f9589fe0b09acec541a21d589d49fa5086b965277fa22dfe308357505124f13a6ff1e0de415ebc40ce61e15

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe.config

                                                        Filesize

                                                        541B

                                                        MD5

                                                        d0efb0a6d260dbe5d8c91d94b77d7acd

                                                        SHA1

                                                        e33a8c642d2a4b3af77e0c79671eab5200a45613

                                                        SHA256

                                                        7d38534766a52326a04972a47caca9c05e95169725d59ab4a995f8a498678102

                                                        SHA512

                                                        a3f1cff570201b8944780cf475b58969332c6af9bea0a6231e59443b05fc96df06a005ff05f78954dbe2fec42da207f6d26025aa558d0a30a36f0df23a44a35c

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.ini

                                                        Filesize

                                                        12B

                                                        MD5

                                                        3d66ae5ed06891e8ce75a39a24070844

                                                        SHA1

                                                        368064119835d4376727a14706c41384446183e8

                                                        SHA256

                                                        73dba8242fdb4de1393b367a239f730aca6713e6658be69f1d8992ad26479176

                                                        SHA512

                                                        c0b61f92bb61a7bf90225d1ba5a1bea0fc077c2481a2149663b546296421855ab3147c3a1f5372ebc920731624bc8578595c18ca9d138691c720fdcb86d03f8a

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools.zip

                                                        Filesize

                                                        646KB

                                                        MD5

                                                        7895698867d1ad33934a8553b4806dc5

                                                        SHA1

                                                        32704df55deaff9bf0b4ee0b887541856578938b

                                                        SHA256

                                                        ef5854b5e800a534a08c083d4a3956dfc0a474ff540cae9bf0a9077a213b2ff9

                                                        SHA512

                                                        20337093ddc5322c4b96c7bf26f1a0b966fafde70a96f7e9b5e9d36acac7d862bd2a50cae9a63731b23904a9256c94cd3bb4e19768130580511ec4c408536a58

                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent.zip

                                                        Filesize

                                                        569KB

                                                        MD5

                                                        9614d1da18956de06747c03068208d66

                                                        SHA1

                                                        fea2680ddb9e4ceea8489a132df9a1542febfe88

                                                        SHA256

                                                        dde9e0ca3fd274902f1a4c22cfec6870c6c4dbbccad17d2189477ab60f769dab

                                                        SHA512

                                                        d8e46a5819e9dced61471966646de153bf3480933054c50190d50de4900685265367b12c9147630f184ce8809786fc010bf6fcd1884035fb4c77cfde660a8b9d

                                                      • C:\ProgramData\Splashtop\Splashtop Remote Server\Credential\14cbe845711500ea42cd9fadf6f34667

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        b2e89027a140a89b6e3eb4e504e93d96

                                                        SHA1

                                                        f3b1b34874b73ae3032decb97ef96a53a654228f

                                                        SHA256

                                                        5f97b3a9d3702d41e15c0c472c43bea25f825401adbc6e0e1425717e75174982

                                                        SHA512

                                                        93fc993af1c83f78fd991cc3d145a81ee6229a89f2c70e038c723032bf5ad12d9962309005d94cdbe0ef1ab11dc5205f57bcf1bc638ee0099fedf88977b99a19

                                                      • C:\ProgramData\chocolatey\config\chocolatey.config

                                                        Filesize

                                                        809B

                                                        MD5

                                                        8b6737800745d3b99886d013b3392ac3

                                                        SHA1

                                                        bb94da3f294922d9e8d31879f2d145586a182e19

                                                        SHA256

                                                        86f10504ca147d13a157944f926141fe164a89fa8a71847458bda7102abb6594

                                                        SHA512

                                                        654dda9b645b4900ac6e5bb226494921194dab7de71d75806f645d9b94ed820055914073ef9a5407e468089c0b2ee4d021f03c2ea61e73889b553895e79713df

                                                      • C:\ProgramData\chocolatey\logs\chocolatey.log

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        f9819d446cdf1ef8ec708f8f9d705c21

                                                        SHA1

                                                        785bb1595789fbbadab3dbe4880afd7630e9e2b2

                                                        SHA256

                                                        42e165474b0b0e3d74f57dc1b6981d5157846d4de844374b7e751d15e779c1e3

                                                        SHA512

                                                        6b1de89189b6209bc1bf92da47e4c65991dc2a9c138863f7d49c6b9fbc5c3721f98838cf82cd7edc57e895f0c0bcba2f035c222528606c6a6594397ebd0db661

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                                        Filesize

                                                        471B

                                                        MD5

                                                        7795df33fc7dd3aa62e0bc052f9dfbad

                                                        SHA1

                                                        ea227ec994561b5bce01c5228f9c337286fbec9c

                                                        SHA256

                                                        6ad47d714f3dd55b2fe9072e829542851d2ecf60cb88254002c60449e8aca736

                                                        SHA512

                                                        de11027f0ca32119ebbb17976ecbe6582ab6af8caa7ce522d75c4185da722550f1f981064db9be6074eb1c6c096c933c2de7ee42b1f31b4fedc9982f87157f9d

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                                                        Filesize

                                                        727B

                                                        MD5

                                                        29dd7378778c44788bac45d70ea7b440

                                                        SHA1

                                                        7a3c5e30c0c9a9be505b18fd2c24422d5e3dbe56

                                                        SHA256

                                                        69354ff510301b85c14cc1ecd0e5b3c98308b820cfbce483389a7b9a437f67d5

                                                        SHA512

                                                        9e67bee1ae05b0f2408210a6662926cc9da6ee2864820a4704adffae9dd78b80e79ee32e83f5a5e35bed9603e82795a38570d56cc93384b82dc6254940079fe7

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                        Filesize

                                                        727B

                                                        MD5

                                                        eb9a1d98cc4b6ac3d674a6621df5a758

                                                        SHA1

                                                        5e9bc182d48b8e86a61d8a3f4b5add9c88da6800

                                                        SHA256

                                                        20d856d68dba3e2246ebb62a5eaedcefda221accfa1b9362b33afad33b6e48c7

                                                        SHA512

                                                        1054d82e5e1b2f2c1416d31f01ff2c172aca8dcc31a622cdd959f918b78a474bd9b40a9b7316122a8262fac24d6236860e2eadd665030a61d56c5c0a153f81c7

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                                        Filesize

                                                        400B

                                                        MD5

                                                        fe7c523a5b7f6cb414410c003966c880

                                                        SHA1

                                                        7ced7a7ff926bfc2731945c4d497c30c0004bd17

                                                        SHA256

                                                        6f25be317621e9fd9f606a6a7412eb340334c60104571f847854f6489adcda7b

                                                        SHA512

                                                        6fd38de20706e5dc19e8628ff6bd106f0c6f663612d3edc4ee03efaea855dae66d9514b9eb821913a39e182f63f1430af3897d13083d742cd1e5021d0c36894d

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                                                        Filesize

                                                        404B

                                                        MD5

                                                        e9565fd6122b70255672d7c7c654a882

                                                        SHA1

                                                        2f9c5a6e4c1534de4e14c2834ffde019ee9dc3c6

                                                        SHA256

                                                        1079ccfefe0a7d90ab0b3cca135c517d1c325e8c6cf76e66595a7360ab503e41

                                                        SHA512

                                                        721ca75d06cf7d711455825454f040a761970a2c09c1c096e7f1e37e813f9a966fa0b65ca7de061b59ec9c784e9a35ca5b4c8eb6c56a43b1c48bc120bc6af172

                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                        Filesize

                                                        412B

                                                        MD5

                                                        fcd2af0604e4ff13a1147c7be02d17a6

                                                        SHA1

                                                        37d842fed6bd3ecd046325f098d730393fbf2017

                                                        SHA256

                                                        7cb038fc4491a4d6b2afe4784b8a67a25c9f85002fbdd47cbd373bb2733a2069

                                                        SHA512

                                                        535760f97bde91d2257463d59a41a75f0659b946f40f19fdf40dd1ec36e6280d04dfd2c11d65905f4ce43fb51accbc3c95692a2ec0ec52fb3bf203f941811b88

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                                                        Filesize

                                                        651B

                                                        MD5

                                                        9bbfe11735bac43a2ed1be18d0655fe2

                                                        SHA1

                                                        61141928bb248fd6e9cd5084a9db05a9b980fb3a

                                                        SHA256

                                                        549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                                                        SHA512

                                                        a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                                                      • C:\Windows\Installer\MSI3C47.tmp

                                                        Filesize

                                                        4.5MB

                                                        MD5

                                                        25a0aa722268b17888b4e159a9f82f18

                                                        SHA1

                                                        68ccb5adae9095056a9d5592f6a850f30715a86b

                                                        SHA256

                                                        72896d8abeeeb40360596927c0feade8f0bc28f9937d35f646b9ba2a47f1edca

                                                        SHA512

                                                        79a574f95dbb5ff11e35f2938fcd6a9e22a3f1a35d7e032aceb099dd69ad45dcdf006d92aeb7d1086e3d0615241f6669e510d5dee6f7d262e0e3d4179822365d

                                                      • C:\Windows\Installer\MSI8078.tmp-\System.Management.dll

                                                        Filesize

                                                        60KB

                                                        MD5

                                                        878e361c41c05c0519bfc72c7d6e141c

                                                        SHA1

                                                        432ef61862d3c7a95ab42df36a7caf27d08dc98f

                                                        SHA256

                                                        24de61b5cab2e3495fe8d817fb6e80094662846f976cf38997987270f8bbae40

                                                        SHA512

                                                        59a7cbb9224ee28a0f3d88e5f0c518b248768ff0013189c954a3012463e5c0ba63a7297497131c9c0306332646af935dd3a1acf0d3e4e449351c28ec9f1be1fa

                                                      • C:\Windows\Installer\MSICB01.tmp

                                                        Filesize

                                                        509KB

                                                        MD5

                                                        88d29734f37bdcffd202eafcdd082f9d

                                                        SHA1

                                                        823b40d05a1cab06b857ed87451bf683fdd56a5e

                                                        SHA256

                                                        87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

                                                        SHA512

                                                        1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

                                                      • C:\Windows\Installer\MSICB01.tmp-\AlphaControlAgentInstallation.dll

                                                        Filesize

                                                        25KB

                                                        MD5

                                                        aa1b9c5c685173fad2dabebeb3171f01

                                                        SHA1

                                                        ed756b1760e563ce888276ff248c734b7dd851fb

                                                        SHA256

                                                        e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

                                                        SHA512

                                                        d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

                                                      • C:\Windows\Installer\MSICB01.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                        Filesize

                                                        179KB

                                                        MD5

                                                        1a5caea6734fdd07caa514c3f3fb75da

                                                        SHA1

                                                        f070ac0d91bd337d7952abd1ddf19a737b94510c

                                                        SHA256

                                                        cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                                                        SHA512

                                                        a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                                                      • C:\Windows\Installer\MSICE4D.tmp-\CustomAction.config

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        bc17e956cde8dd5425f2b2a68ed919f8

                                                        SHA1

                                                        5e3736331e9e2f6bf851e3355f31006ccd8caa99

                                                        SHA256

                                                        e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

                                                        SHA512

                                                        02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

                                                      • C:\Windows\Installer\MSICE4D.tmp-\Newtonsoft.Json.dll

                                                        Filesize

                                                        695KB

                                                        MD5

                                                        715a1fbee4665e99e859eda667fe8034

                                                        SHA1

                                                        e13c6e4210043c4976dcdc447ea2b32854f70cc6

                                                        SHA256

                                                        c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

                                                        SHA512

                                                        bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

                                                      • C:\Windows\Installer\MSID3A0.tmp

                                                        Filesize

                                                        211KB

                                                        MD5

                                                        a3ae5d86ecf38db9427359ea37a5f646

                                                        SHA1

                                                        eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                                        SHA256

                                                        c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                                        SHA512

                                                        96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                                      • C:\Windows\Installer\e57ca74.msi

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        6e58d9af76a06f068fc49d0f5f895966

                                                        SHA1

                                                        6eaf5813536f716cab6ccdda47e8f0beaa74b30c

                                                        SHA256

                                                        b8788ba7d7d7f8fce00f8446b778b9f9b9852e4ec2f3766d6e32c68b50950899

                                                        SHA512

                                                        4d314dcc18f09ce95453470101efc55e690657e2288728839f04d7060a1f767a4be0d1b48cc0a980979d35c440144cc2cbffd767732b19e4af4c5333a8fc93e9

                                                      • C:\Windows\System32\DriverStore\Temp\{13395a64-ca0a-934f-8ecf-47b859d1ea08}\lci_iddcx.cat

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        62458e58313475c9a3642a392363e359

                                                        SHA1

                                                        e63a3866f20e8c057933ba75d940e5fd2bf62bc6

                                                        SHA256

                                                        85620d87874f27d1aaf1743c0ca47e210c51d9afd0c9381fc0cd8acca3854562

                                                        SHA512

                                                        49fb8ca58aecf97a6ab6b97de7d367accb7c5be76fbcd324af4ce75efe96642e8c488f273c0363250f7a5bcea7f7055242d28fd4b1f130b68a1a5d9a078e7fad

                                                      • C:\Windows\System32\DriverStore\Temp\{13395a64-ca0a-934f-8ecf-47b859d1ea08}\lci_iddcx.inf

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        1cec22ca85e1b5a8615774fca59a420b

                                                        SHA1

                                                        049a651751ef38321a1088af6a47c4380f9293fc

                                                        SHA256

                                                        60a018f46d17b7640fc34587667cd852a16fa8e82f957a69522637f22e5fe5cf

                                                        SHA512

                                                        0f24fe3914aef080a0d109df6cfac548a880947fb85e7490f0d8fa174a606730b29dc8d2ae10525dba4d1ca05ac9b190e4704629b86ac96867188df4ca3168bb

                                                      • C:\Windows\System32\DriverStore\Temp\{13395a64-ca0a-934f-8ecf-47b859d1ea08}\x64\lci_iddcx.dll

                                                        Filesize

                                                        52KB

                                                        MD5

                                                        01e8bc64139d6b74467330b11331858d

                                                        SHA1

                                                        b6421a1d92a791b4d4548ab84f7140f4fc4eb829

                                                        SHA256

                                                        148359a84c637d05c20a58f5038d8b2c5390f99a5a229be8eccbb5f85e969438

                                                        SHA512

                                                        4099e8038d65d95d3f00fd32eba012f55ae16d0da3828e5d689ef32e20352fdfcc278cd6f78536dc7f28fb97d07185e654fe6eee610822ea8d9e9d5af696dff5

                                                      • C:\Windows\System32\DriverStore\Temp\{e4c565ff-e341-234a-8b18-f6a385cdc974}\lci_proxywddm.cat

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        8e16d54f986dbe98812fd5ec04d434e8

                                                        SHA1

                                                        8bf49fa8e12f801559cc2869365f0b184d7f93fe

                                                        SHA256

                                                        7c772fb24326e90d6e9c60a08495f32f7d5def1c52037d78cbd0436ad70549cd

                                                        SHA512

                                                        e1da797044663ad6362641189fa78116cc4b8e611f9d33c89d6c562f981d5913920acb12a4f7ef6c1871490563470e583910045378bda5c7a13db25f987e9029

                                                      • C:\Windows\System32\DriverStore\Temp\{e4c565ff-e341-234a-8b18-f6a385cdc974}\lci_proxywddm.inf

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        0315a579f5afe989154cb7c6a6376b05

                                                        SHA1

                                                        e352ff670358cf71e0194918dfe47981e9ccbb88

                                                        SHA256

                                                        d10fa136d6ae9a15216202e4dd9f787b3a148213569e438da3bf82b618d8001d

                                                        SHA512

                                                        c7ce8278bc5ee8f8b4738ef8bb2c0a96398b40dc65eea1c28688e772ae0f873624311146f4f4ec8971c91df57983d2d8cdbec1fe98eaa7f9d15a2c159d80e0af

                                                      • C:\Windows\System32\DriverStore\Temp\{e4c565ff-e341-234a-8b18-f6a385cdc974}\x64\lci_proxyumd.dll

                                                        Filesize

                                                        179KB

                                                        MD5

                                                        4dc11547a5fc28ca8f6965fa21573481

                                                        SHA1

                                                        d531b0d8d2f8d49d81a4c17fbaf3bc294845362c

                                                        SHA256

                                                        e9db5cd21c8d709a47fc0cfb2c6ca3bb76a3ed8218bed5dc37948b3f9c7bd99d

                                                        SHA512

                                                        bd0f0a3bbc598480a9b678aa1b35728b2380bf57b195b0249936d0eaaa014f219031a563f486871099bf1c78ccc758f6b25b97cfc5296a73fc60b6caff9877f6

                                                      • C:\Windows\System32\DriverStore\Temp\{e4c565ff-e341-234a-8b18-f6a385cdc974}\x64\lci_proxyumd32.dll

                                                        Filesize

                                                        135KB

                                                        MD5

                                                        67ae7b2c36c9c70086b9d41b4515b0a8

                                                        SHA1

                                                        ba735d6a338c8fdfa61c98f328b97bf3e8e48b8b

                                                        SHA256

                                                        79876f242b79269fe0fe3516f2bdb0a1922c86d820ce1dd98500b385511dac69

                                                        SHA512

                                                        4d8320440f3472ee0e9bd489da749a738370970de07b0920b535642723c92de848f4b3d7f898689c817145ce7b08f65128abe91d816827aeb7e5e193d7027078

                                                      • C:\Windows\System32\DriverStore\Temp\{e4c565ff-e341-234a-8b18-f6a385cdc974}\x64\lci_proxywddm.sys

                                                        Filesize

                                                        119KB

                                                        MD5

                                                        b9b0e9b4d93b18b99ece31a819d71d00

                                                        SHA1

                                                        2be1ad570f3ccb2e6f2e2b16d1e0002ca4ec8d9e

                                                        SHA256

                                                        0f1c64c0fa08fe45beac15dc675d3b956525b8f198e92e0ccac21d2a70ce42cf

                                                        SHA512

                                                        465e389806f3b87a544ab8b0b7b49864feeba2eeef4fb51628d40175573ed1ba00b26d6a2abebc74c31369194206ed31d32c68471dddcf817fdd2d26e3da7a53

                                                      • C:\Windows\Temp\B7C5EA94-B96A-41F5-BE95-25D78B486678-12-28-46.dat

                                                        Filesize

                                                        602B

                                                        MD5

                                                        0a324e43a12790008f6d3b3ef8df4288

                                                        SHA1

                                                        57e2b4d2c82a0622a35261e8048c588120b79132

                                                        SHA256

                                                        2ac6fa22b2e34f45187df1ab80f14c8102bd7588969cb6cbd3f7a6f0b6225a9b

                                                        SHA512

                                                        9d95b68043eb7555789c957b1258212764920e7b3905642f8aea65ca849416073c993f5133290b0b482f98886e54fb55821a745c5440b5d465f3a81dce85659d

                                                      • C:\Windows\Temp\InstallUtil.log

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        8b145c1c133714a3f0164caddf9f2e8a

                                                        SHA1

                                                        29f31a01133e548b05cb60d2c55dcf64a23dd181

                                                        SHA256

                                                        e2b5520bf25d657f618a3efdbb48e446232548c441604eebbe79b2bca082c4e0

                                                        SHA512

                                                        614e0f6be270d674f10a2b8881ac93d74f3fc6f5710067bb8ceeaf2484e7235ab3734a35c97bb3d5c825f3a6a4b215a24521657fc99d8b03f0fbb09332862afa

                                                      • C:\Windows\Temp\PreVer.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        10049c59b07db10f1fe893171c436d11

                                                        SHA1

                                                        b7b775ccd4c0bb504e2f2a5d950148d2a9144045

                                                        SHA256

                                                        94aa3490b6d3c69244f219203a015fb285e4d8f8533e49d298fa2579e584306a

                                                        SHA512

                                                        c274eefc023eb8acd028f68bfb959c01d301632a4541b75051ad874b0f8c57f18779da0027b339c5b493835132ab80818417e9bde56d1442baaf58e131e0d081

                                                      • C:\Windows\Temp\unpack.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        b7fb5421de5e54bbde59e9a2be469a3e

                                                        SHA1

                                                        bea4a0a7dee1dba8af6866fad997b7dc69524a24

                                                        SHA256

                                                        e42eed1679828d8da1cad155f14cb4f045bb443e9598a6fd2a137938ad51b851

                                                        SHA512

                                                        ca09d5f3166c97ace889ab569e6ad305ca0f43cbddd648c6f753271367f76a75f1613b06f3db79645ba1965dd427ffde3cc82ec39e1799a22dcd4e3a9833f15a

                                                      • C:\Windows\Temp\unpack.log

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        e6d296ddbe33788cefec1038827f0e03

                                                        SHA1

                                                        bd937a3e865e326e895254d67a0e3586ea5c7fa3

                                                        SHA256

                                                        c9be490303445f796eb2ab5e2a03368c602f28c05987b8bb6b79fa79c5a2718b

                                                        SHA512

                                                        98a2d3eb31e933e2e03948fd736b3295604dccf9d61b382727446d089900efeddc9be206c15e3e5bcc66add0b43a4bcab620f40e0ce58ccf191db04886b0a36e

                                                      • C:\Windows\Temp\unpack\PreVerCheck.exe

                                                        Filesize

                                                        2.7MB

                                                        MD5

                                                        df5eb1af99091a902effa52463eda084

                                                        SHA1

                                                        b04578b36490a4ec0092e9a44ae6b2679670450a

                                                        SHA256

                                                        83ef8e362af27279b63ef28379675a087984791e5eaf4a9272a5cb4e52dd059c

                                                        SHA512

                                                        663e11667ec5c6c7969ce61f90d869f3723cbd007236150478ef6dbd861ddc75cf5f96b0345319bd178cd87045daa39a0d6ca4af83cf8dcdb4ebe7462d3eeabd

                                                      • C:\Windows\Temp\{8B37145B-4D59-48CE-8A43-9698B8913E17}\ISRT.dll

                                                        Filesize

                                                        427KB

                                                        MD5

                                                        85315ad538fa5af8162f1cd2fce1c99d

                                                        SHA1

                                                        31c177c28a05fa3de5e1f934b96b9d01a8969bba

                                                        SHA256

                                                        70735b13f629f247d6af2be567f2da8112039fbced5fbb37961e53a2a3ec1ec7

                                                        SHA512

                                                        877eb3238517eeb87c2a5d42839167e6c58f9ca7228847db3d20a19fb13b176a6280c37decda676fa99a6ccf7469569ddc0974eccf4ad67514fdedf9e9358556

                                                      • C:\Windows\Temp\{8B37145B-4D59-48CE-8A43-9698B8913E17}\_isres_0x0409.dll

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        befe2ef369d12f83c72c5f2f7069dd87

                                                        SHA1

                                                        b89c7f6da1241ed98015dc347e70322832bcbe50

                                                        SHA256

                                                        9652ffae3f5c57d1095c6317ab6d75a9c835bb296e7c8b353a4d55d55c49a131

                                                        SHA512

                                                        760631b05ef79c308570b12d0c91c1d2a527427d51e4e568630e410b022e4ba24c924d6d85be6462ba7f71b2f0ba05587d3ec4b8f98fcdb8bb4f57949a41743b

                                                      • C:\Windows\Temp\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\IsConfig.ini

                                                        Filesize

                                                        571B

                                                        MD5

                                                        de10be3435fbcab7eeccaa67e2431619

                                                        SHA1

                                                        7afdb3c4c042692ea3f19f2d2275bada7cacfbfd

                                                        SHA256

                                                        d193eda99410268676293d315164ff29cd263ca0251a0238592a23a9d78476b0

                                                        SHA512

                                                        bda2f23885d4bb07c328622d7f637379f63f08b57eb54c4a665fb56d5f68e61d36ff4b4e3cc2b8b2b3d3c5f2e0d3dbb581770eec4fddf9a8c0f4b6555ad3c1af

                                                      • C:\Windows\Temp\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\String1033.txt

                                                        Filesize

                                                        182KB

                                                        MD5

                                                        1d4329601bef6492cd3227df5bcd5125

                                                        SHA1

                                                        d03a3c50ba7663b52c13b54b08b9284f40e4f848

                                                        SHA256

                                                        bd703470b2f35e3c4d917d3038bf806fcc7c155142d300806c95500274951efd

                                                        SHA512

                                                        b0cfc1aef000d428d1ff4f2df41539284a048571e26a2c1a217093e593e546f5af79bbc61be8458021a9829a7d79f68cb8728bf942475096b53c81a66094dd7b

                                                      • C:\Windows\Temp\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\_is3303.exe

                                                        Filesize

                                                        179KB

                                                        MD5

                                                        7a1c100df8065815dc34c05abc0c13de

                                                        SHA1

                                                        3c23414ae545d2087e5462a8994d2b87d3e6d9e2

                                                        SHA256

                                                        e46c768950aad809d04c91fb4234cb4b2e7d0b195f318719a71e967609e3bbed

                                                        SHA512

                                                        bbec114913bc2f92e8de7a4dd9513bff31f6b0ef4872171b9b6b63fef7faa363cf47e63e2d710dd32e9fc84c61f828e0fae3d48d06b76da023241bee9d4a6327

                                                      • C:\Windows\Temp\{B8495585-34D2-42CC-8799-4CFEEB4F1EB2}\setup.inx

                                                        Filesize

                                                        345KB

                                                        MD5

                                                        0376dd5b7e37985ea50e693dc212094c

                                                        SHA1

                                                        02859394164c33924907b85ab0aaddc628c31bf1

                                                        SHA256

                                                        c9e6af6fb0bdbeb532e297436a80eb92a2ff7675f9c777c109208ee227f73415

                                                        SHA512

                                                        69d79d44908f6305eee5d8e6f815a0fee0c6d913f4f40f0c2c9f2f2e50f24bf7859ebe12c85138d971e5db95047f159f077ae687989b8588f76517cab7d3e0d5

                                                      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                                                        Filesize

                                                        404B

                                                        MD5

                                                        1dce205b628777c3e4af9e0be376cfb5

                                                        SHA1

                                                        dced4dd8e2673ba06f46ccb1e0cf7d96ef0f73b3

                                                        SHA256

                                                        f3cf317e888aa532a2bae313c48297277539cf564cf2a4085ad36011eb9f54e1

                                                        SHA512

                                                        91fbc059e2e8053e2e36f577b0943ae1ecf940fd31f24448e035a8dea1b223d6f522a73a52ba6dee5d7da9b9dd063f755dd418d60a51d0e5fc749869a04b63b3

                                                      • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                        Filesize

                                                        412B

                                                        MD5

                                                        387377d6cedde7e92d580992745a07f9

                                                        SHA1

                                                        3419e47124bc4abd3ead69d1d9e76e38fed415de

                                                        SHA256

                                                        508b24597f74f12d770b78d4f9338c2ea2f26b38b00cec58fd189bba281657fe

                                                        SHA512

                                                        99e2e9d7dda70195eb911338ab3b9581bb72bec89b683172eeff222c3976e765feceb9632ab0646a25b71221093def3f5b87f21ed733aefd54606b2767390a1e

                                                      • memory/404-1242-0x000001728BA20000-0x000001728BAD2000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/404-1561-0x000001728B9C0000-0x000001728BA14000-memory.dmp

                                                        Filesize

                                                        336KB

                                                      • memory/404-1240-0x000001728AF60000-0x000001728AF72000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/404-1241-0x000001728B8D0000-0x000001728B8EC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/1364-1152-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/1364-1153-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1364-2314-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/1364-2312-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/1364-2313-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1364-2038-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/1364-1154-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/2360-1136-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/2360-1137-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/2360-1217-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/2360-1214-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/2360-1308-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/2360-2273-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/2360-2275-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/2360-2332-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/2360-1928-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/2360-1930-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/2360-2274-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/2360-1135-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/2452-110-0x00000000047D0000-0x0000000004836000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/3088-277-0x0000013B22CB0000-0x0000013B22CCC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/3088-275-0x0000013B3B630000-0x0000013B3B6E0000-memory.dmp

                                                        Filesize

                                                        704KB

                                                      • memory/3088-272-0x0000013B22440000-0x0000013B22470000-memory.dmp

                                                        Filesize

                                                        192KB

                                                      • memory/3304-160-0x000001E242840000-0x000001E2428D8000-memory.dmp

                                                        Filesize

                                                        608KB

                                                      • memory/3304-164-0x000001E2285C0000-0x000001E2285D2000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3304-148-0x000001E2281D0000-0x000001E2281F8000-memory.dmp

                                                        Filesize

                                                        160KB

                                                      • memory/3304-165-0x000001E229E20000-0x000001E229E5C000-memory.dmp

                                                        Filesize

                                                        240KB

                                                      • memory/3388-1150-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3388-1149-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/3388-2336-0x0000000072F00000-0x000000007301C000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3388-1151-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/3388-2337-0x0000000072B30000-0x0000000072EF4000-memory.dmp

                                                        Filesize

                                                        3.8MB

                                                      • memory/3388-2335-0x0000000073020000-0x000000007311D000-memory.dmp

                                                        Filesize

                                                        1012KB

                                                      • memory/3448-300-0x0000013D045E0000-0x0000013D045F6000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/3448-301-0x0000013D1D720000-0x0000013D1D7D2000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/3448-302-0x0000013D04F60000-0x0000013D04F7C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/3448-43-0x00000000026C0000-0x00000000026CC000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/3448-39-0x0000000002680000-0x00000000026AE000-memory.dmp

                                                        Filesize

                                                        184KB

                                                      • memory/3524-1725-0x000002632AEA0000-0x000002632AEBC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/3524-1787-0x000002632B460000-0x000002632B4AA000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/3524-1699-0x000002632B3B0000-0x000002632B3FA000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/3524-1783-0x000002632AEC0000-0x000002632AECA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/3524-1696-0x000002632A9D0000-0x000002632AA04000-memory.dmp

                                                        Filesize

                                                        208KB

                                                      • memory/3524-1782-0x000002632AEE0000-0x000002632AEF8000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/3612-480-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-483-0x0000000002FF0000-0x00000000031B7000-memory.dmp

                                                        Filesize

                                                        1.8MB

                                                      • memory/3612-514-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-1009-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-902-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-1082-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-1045-0x0000000010000000-0x0000000010114000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/3612-905-0x0000000003030000-0x00000000031F7000-memory.dmp

                                                        Filesize

                                                        1.8MB

                                                      • memory/3844-1377-0x0000010DD8140000-0x0000010DD8160000-memory.dmp

                                                        Filesize

                                                        128KB

                                                      • memory/3844-1327-0x0000010DF08D0000-0x0000010DF0982000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/3844-1309-0x0000010DD7790000-0x0000010DD779C000-memory.dmp

                                                        Filesize

                                                        48KB

                                                      • memory/3844-1310-0x0000010DD8120000-0x0000010DD8138000-memory.dmp

                                                        Filesize

                                                        96KB

                                                      • memory/4408-346-0x000001CDDA8A0000-0x000001CDDA8E8000-memory.dmp

                                                        Filesize

                                                        288KB

                                                      • memory/4408-350-0x000001CDF32B0000-0x000001CDF3362000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/4408-358-0x000001CDF3420000-0x000001CDF345A000-memory.dmp

                                                        Filesize

                                                        232KB

                                                      • memory/4408-357-0x000001CDF3150000-0x000001CDF317A000-memory.dmp

                                                        Filesize

                                                        168KB

                                                      • memory/4408-354-0x000001CDF3370000-0x000001CDF33D8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4408-353-0x000001CDF3110000-0x000001CDF3118000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4408-352-0x000001CDF3100000-0x000001CDF3108000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4408-351-0x000001CDF30F0000-0x000001CDF30F8000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4408-359-0x000001CDF3120000-0x000001CDF3146000-memory.dmp

                                                        Filesize

                                                        152KB

                                                      • memory/4408-349-0x000001CDF31D0000-0x000001CDF32AC000-memory.dmp

                                                        Filesize

                                                        880KB

                                                      • memory/4408-347-0x000001CDDA1B0000-0x000001CDDA1B8000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/4408-348-0x000001CDDA2C0000-0x000001CDDA2CA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/4408-342-0x000001CDD9D90000-0x000001CDD9DF4000-memory.dmp

                                                        Filesize

                                                        400KB

                                                      • memory/4408-343-0x000001CDDA800000-0x000001CDDA84A000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/4408-345-0x000001CDDA850000-0x000001CDDA89C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/4408-344-0x000001CDDA2A0000-0x000001CDDA2BC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/4436-241-0x000001CC24400000-0x000001CC24438000-memory.dmp

                                                        Filesize

                                                        224KB

                                                      • memory/4436-201-0x000001CC23C60000-0x000001CC23C82000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/4436-195-0x000001CC23EC0000-0x000001CC23F72000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/4932-80-0x0000000005390000-0x00000000056E4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/4932-76-0x00000000052A0000-0x0000000005352000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/4932-79-0x0000000005210000-0x0000000005232000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/5208-1593-0x000001ED7C2A0000-0x000001ED7C352000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5208-1791-0x000001ED7C990000-0x000001ED7CEB8000-memory.dmp

                                                        Filesize

                                                        5.2MB

                                                      • memory/5208-1529-0x000001ED630D0000-0x000001ED630DA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/5208-1559-0x000001ED63A40000-0x000001ED63A5A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/5516-1785-0x00000246B17D0000-0x00000246B17E4000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/5516-1767-0x00000246CA0F0000-0x00000246CA1A2000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5516-1784-0x00000246B1840000-0x00000246B18A6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/5516-1743-0x00000246B1790000-0x00000246B17B0000-memory.dmp

                                                        Filesize

                                                        128KB

                                                      • memory/5516-1719-0x00000246B0F50000-0x00000246B0F60000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/5640-1755-0x0000018E9E960000-0x0000018E9E97C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/5640-1750-0x0000018E9E4C0000-0x0000018E9E4D0000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/5640-1793-0x0000018EB7900000-0x0000018EB79B2000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5640-1789-0x0000018EB7820000-0x0000018EB78FC000-memory.dmp

                                                        Filesize

                                                        880KB

                                                      • memory/5640-1753-0x0000018E9EE90000-0x0000018E9EEDA000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/5776-1587-0x000001E9FFEA0000-0x000001E9FFEDA000-memory.dmp

                                                        Filesize

                                                        232KB

                                                      • memory/5776-1744-0x000001EA000C0000-0x000001EA00172000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5776-1764-0x000001E9FFF50000-0x000001E9FFF6C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/5776-1786-0x000001EA00000000-0x000001EA00048000-memory.dmp

                                                        Filesize

                                                        288KB

                                                      • memory/5796-1592-0x000002607D180000-0x000002607D232000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5796-1677-0x000002607D0C0000-0x000002607D0E0000-memory.dmp

                                                        Filesize

                                                        128KB

                                                      • memory/5796-1590-0x000002607C750000-0x000002607C760000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/5796-1591-0x000002607CB10000-0x000002607CB20000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/5948-1597-0x0000013145B80000-0x0000013145B92000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/5948-1790-0x000001315EF70000-0x000001315F022000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/5948-1792-0x000001315F110000-0x000001315F1EC000-memory.dmp

                                                        Filesize

                                                        880KB

                                                      • memory/5948-1650-0x0000013146030000-0x000001314604C000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/5948-1602-0x000001315EC60000-0x000001315ECAA000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/5996-1651-0x000001E3E9D10000-0x000001E3E9D5A000-memory.dmp

                                                        Filesize

                                                        296KB

                                                      • memory/5996-1697-0x000001E3E9CC0000-0x000001E3E9CDC000-memory.dmp

                                                        Filesize

                                                        112KB

                                                      • memory/5996-1609-0x000001E3E9480000-0x000001E3E948C000-memory.dmp

                                                        Filesize

                                                        48KB