Analysis

  • max time kernel
    103s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 19:54

General

  • Target

    https://www.dropbox.com/scl/fi/zgxfzes4y09jcfjax2jd9/PlanilhaOrcamentoPDF.msi?rlkey=ijhrpa833envr6inh6gd8nsqb&st=h7ecvuvj&dl=1

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 34 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 15 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 39 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 23 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.dropbox.com/scl/fi/zgxfzes4y09jcfjax2jd9/PlanilhaOrcamentoPDF.msi?rlkey=ijhrpa833envr6inh6gd8nsqb&st=h7ecvuvj&dl=1
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1a8f46f8,0x7ffe1a8f4708,0x7ffe1a8f4718
      2⤵
        PID:3588
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:2
        2⤵
          PID:5028
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4560
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:8
          2⤵
            PID:1788
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:2852
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:4648
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                2⤵
                  PID:2904
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4676
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                  2⤵
                    PID:4372
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1
                    2⤵
                      PID:4640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4772 /prefetch:8
                      2⤵
                        PID:3056
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                        2⤵
                          PID:4424
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:1
                          2⤵
                            PID:2148
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:1
                            2⤵
                              PID:5116
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1976,14769956310318151825,14355730195979062683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6424 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:412
                            • C:\Windows\System32\msiexec.exe
                              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\PlanilhaOrcamentoPDF.msi"
                              2⤵
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:5012
                            • C:\Windows\System32\msiexec.exe
                              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\PlanilhaOrcamentoPDF.msi"
                              2⤵
                              • Enumerates connected drives
                              • Suspicious use of FindShellTrayWindow
                              PID:6020
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:396
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1084
                              • C:\Windows\system32\msiexec.exe
                                C:\Windows\system32\msiexec.exe /V
                                1⤵
                                • Enumerates connected drives
                                • Drops file in Program Files directory
                                • Drops file in Windows directory
                                • Modifies data under HKEY_USERS
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2760
                                • C:\Windows\system32\srtasks.exe
                                  C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                  2⤵
                                    PID:5572
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding 8B8A83FA45F5DFAA4E7202FCDF099D0B
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:5668
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe "C:\Windows\Installer\MSI31E8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240661187 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
                                      3⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5728
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe "C:\Windows\Installer\MSI3564.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240661875 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5892
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe "C:\Windows\Installer\MSI3A08.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240663078 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
                                      3⤵
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:6104
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe "C:\Windows\Installer\MSI44FA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240665890 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Loads dropped DLL
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5948
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding A68FD54DF8CDA32461A7EFD171627EFC E Global\MSI0000
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:5260
                                    • C:\Windows\SysWOW64\NET.exe
                                      "NET" STOP AteraAgent
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5244
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 STOP AteraAgent
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:628
                                    • C:\Windows\SysWOW64\TaskKill.exe
                                      "TaskKill.exe" /f /im AteraAgent.exe
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3856
                                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Nz1DFIAZ" /AgentId="8d4b063a-e4db-4969-abce-7736cdd44d69"
                                    2⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Drops file in Program Files directory
                                    • Modifies data under HKEY_USERS
                                    PID:4196
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding BD087BD7CA34104EC4082E874A6D50B8
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:2472
                                  • C:\Windows\syswow64\MsiExec.exe
                                    C:\Windows\syswow64\MsiExec.exe -Embedding 2CB17B76DE73EBA326B7AD6796F8F9CD E Global\MSI0000
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:2636
                                    • C:\Windows\SysWOW64\NET.exe
                                      "NET" STOP AteraAgent
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4188
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 STOP AteraAgent
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1368
                                    • C:\Windows\SysWOW64\TaskKill.exe
                                      "TaskKill.exe" /f /im AteraAgent.exe
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:5248
                                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Nz1DFIAZ" /AgentId=""
                                    2⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Drops file in Program Files directory
                                    • Modifies data under HKEY_USERS
                                    • Modifies system certificate store
                                    PID:4520
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:692
                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Drops file in Program Files directory
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5884
                                  • C:\Windows\System32\sc.exe
                                    "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                                    2⤵
                                    • Launches sc.exe
                                    PID:5876
                                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 8d4b063a-e4db-4969-abce-7736cdd44d69 "7b27a9fe-6c5a-4f91-95ed-37582449099b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Nz1DFIAZ
                                    2⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    PID:3248
                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
                                  1⤵
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  • Modifies data under HKEY_USERS
                                  PID:4908
                                  • C:\Windows\System32\sc.exe
                                    "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                                    2⤵
                                    • Launches sc.exe
                                    PID:5772
                                  • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                                    "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 8d4b063a-e4db-4969-abce-7736cdd44d69 "b120c0d1-1ae8-47ab-a681-91b079a5ea49" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Nz1DFIAZ
                                    2⤵
                                    • Executes dropped EXE
                                    PID:948

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Config.Msi\e58314d.rbs

                                  Filesize

                                  8KB

                                  MD5

                                  1c45d273b429cc5b5f8eeea548e5341f

                                  SHA1

                                  9356cfe84a23001cfb1e940515bb88f54df50fd1

                                  SHA256

                                  664d96fb124fc3230b25ae8c5cb852868488d0f5dd2ea3e096f293ea2496f4cd

                                  SHA512

                                  06124a9094158763684cf6a6f21d6b3ac667cf9b933ca3732155408565ceb155f1e31f02ce5ea46436b81d8d104c80a107f672e20df90a63d2ba031945d2b21d

                                • C:\Config.Msi\e58314f.rbs

                                  Filesize

                                  3KB

                                  MD5

                                  5bd879533eb46a8bc7a611e4b3919ef3

                                  SHA1

                                  ad902b06ecb0f917244420db95ac707e87d12b60

                                  SHA256

                                  be493870a7f83d9ed2041b9e6435b9b83abdc7e1b4ed5d712069b85dc976dd9e

                                  SHA512

                                  d49c8f70c19f1b344736d3f28ecca8c94dc7c670a759a77dc0a399bbbd315dac1014472615542c16fc51eb50ad5154d72b656b6ca4e501483cff3dc68cc60ccb

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                  Filesize

                                  1KB

                                  MD5

                                  89ebebc9e136e2e2d8e104ae8ca4207c

                                  SHA1

                                  333e67522cea1d92a1709219a1e964c8e384f7c7

                                  SHA256

                                  3c3aa140d971c7ecada419528401c8314704ac945aaf673f4f2cba954de7a437

                                  SHA512

                                  a68bf09a7192a14bb62455a3535d993fe0d9749bdfc54fcf8f3e4b53432aa775351ee159cab1b5d8211ef7036f146c86348d8feb1ddbf73a378fd31e5e054fe0

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                  Filesize

                                  1KB

                                  MD5

                                  4eacb8ed863fef6a3d09d47ad9c48e8d

                                  SHA1

                                  83ffd1497df662bc1573269a16d95b6ca24658a1

                                  SHA256

                                  e293ecc7970e6de799f3d6f521b06a54e76d08dbfadcddee539ab5fed82d745c

                                  SHA512

                                  cde41d36659f77f2596e77713ffdf2f1cb51f7550eee69c6512768448a1e26bdf29bf6dab6df27ff6d9d28e1a32518035c368a05781400525ddf93f76371b5a4

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

                                  Filesize

                                  142KB

                                  MD5

                                  477293f80461713d51a98a24023d45e8

                                  SHA1

                                  e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

                                  SHA256

                                  a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

                                  SHA512

                                  23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

                                  Filesize

                                  1KB

                                  MD5

                                  b3bb71f9bb4de4236c26578a8fae2dcd

                                  SHA1

                                  1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

                                  SHA256

                                  e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

                                  SHA512

                                  fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

                                  Filesize

                                  693KB

                                  MD5

                                  2c4d25b7fbd1adfd4471052fa482af72

                                  SHA1

                                  fd6cd773d241b581e3c856f9e6cd06cb31a01407

                                  SHA256

                                  2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

                                  SHA512

                                  f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

                                  Filesize

                                  173KB

                                  MD5

                                  fd9df72620bca7c4d48bc105c89dffd2

                                  SHA1

                                  2e537e504704670b52ce775943f14bfbaf175c1b

                                  SHA256

                                  847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

                                  SHA512

                                  47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

                                  Filesize

                                  588KB

                                  MD5

                                  17d74c03b6bcbcd88b46fcc58fc79a0d

                                  SHA1

                                  bc0316e11c119806907c058d62513eb8ce32288c

                                  SHA256

                                  13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

                                  SHA512

                                  f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                                  Filesize

                                  226B

                                  MD5

                                  6fa3611afce324b1cfee05619fe8c7a8

                                  SHA1

                                  b6280b18d38d638492fa1936a675519efdd2c040

                                  SHA256

                                  f5eac937fcc9083a8b844ec909d0c34f5528ab2830144dcc91136e24548124df

                                  SHA512

                                  1c368d7a69e193cc029a1637e6fca32e960b5ecc2647a05f5a4436aa82f9d4a4866749068b2455bdfdba8dfc49210147a5159f1c3ea1ecf9711a3467b05379f0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                  Filesize

                                  471B

                                  MD5

                                  4dffcaea598ca9a7ac90c4ac4d896fce

                                  SHA1

                                  fb2a9089cacc45b01b8ec8073ce56542c3372162

                                  SHA256

                                  d2493f2955428ce9d1e90ead6467e43f57ac55d5db6b61f3ce5276025b73f9b9

                                  SHA512

                                  8d172aa0e7d56bcc253d6491f2982630bddea87a289fb492e57db93efb56f06e35897228ce23264913522f8d6fe7390f934f7d96afd41369a892c00adf9521d1

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                                  Filesize

                                  727B

                                  MD5

                                  e7be7791d0c1baf7ab7110f5deac570e

                                  SHA1

                                  5eba5cde83647884b6f570bd39bbf0810493652e

                                  SHA256

                                  78ccc2eb627dfdf47fd133265205a563aa1b2557c986398bcb8cdad68a6964e4

                                  SHA512

                                  fd74f32588706358c5d226e38fc02a3cfdd1d22085fc75e35659ab2dd412c984b5b77077b4986ab9a536699ddf8bace8cb0ee3719eb210d44aa8e983cd1f9e84

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                  Filesize

                                  727B

                                  MD5

                                  5a9f34d0bd7074d978bca26efee83cea

                                  SHA1

                                  ea74177ba4a9b12793dbbb410ae50020cd7eacee

                                  SHA256

                                  266cf7f825c8eca0893d2b344853f0a4fe06a48bf76fd2ed9b5c4ccfe9ab69bd

                                  SHA512

                                  e220822af425d92a377c1ad644754809e31a3426040473f7fd9b8d99a6db8a0a3238193d38be912bfdacd231f8485161c5d64c41f4b3ae76beeec734a294f6be

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                                  Filesize

                                  400B

                                  MD5

                                  3110f85aae792e511561b0d64007d43f

                                  SHA1

                                  b369c2c29db8811ab2f3cc800c1507f523faf36b

                                  SHA256

                                  3eb4e8f794ff8613a389e91d9951885525eb37a84058fc095e52d513c2ef1013

                                  SHA512

                                  d921f8dc32ff9d564e732e0e57c1ea087b7825d6edebd8bac820824f1e28b7e17b7e29a68424c106982e926905df3da87a23100db09224011c396202b0bf175c

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                                  Filesize

                                  404B

                                  MD5

                                  d257712aca5e69244c1d28f53e7d2238

                                  SHA1

                                  3a218c8e24b02316d17f566ede9a76cb954dabd5

                                  SHA256

                                  8993268b5db3047f76e7675033fc963abbe51d4a72a873156d765a5630c7bd64

                                  SHA512

                                  579772d8f2539766aa0d37dad2e31d8494f8c60d54c1e352d17c791739fc460cfd006c3d3a075a3f3c878bc37fd3f41c3b094c6ae4b7bc4ed712ec7f263d0857

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                  Filesize

                                  412B

                                  MD5

                                  ee260d8357bac487260b72e2433ec82c

                                  SHA1

                                  7c62a50b0e846f88ea905153ead53de5e86e484e

                                  SHA256

                                  2632407f0367d60f179bd7ec7e781ed4d2f143feca3728d0da1c2e1f81131861

                                  SHA512

                                  659d9d65674fd982426ad9ff4ac1278c50a15e6c1d2aad026da1f17e94328d1f7b13f3c3d6560d509cbbb449e90bc548e0c5b15bc0170be416da6633d82919e9

                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                                  Filesize

                                  651B

                                  MD5

                                  9bbfe11735bac43a2ed1be18d0655fe2

                                  SHA1

                                  61141928bb248fd6e9cd5084a9db05a9b980fb3a

                                  SHA256

                                  549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                                  SHA512

                                  a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6960857d16aadfa79d36df8ebbf0e423

                                  SHA1

                                  e1db43bd478274366621a8c6497e270d46c6ed4f

                                  SHA256

                                  f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                  SHA512

                                  6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  f426165d1e5f7df1b7a3758c306cd4ae

                                  SHA1

                                  59ef728fbbb5c4197600f61daec48556fec651c1

                                  SHA256

                                  b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                  SHA512

                                  8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  295B

                                  MD5

                                  fd4c4684170fb9341b3b1fc581f7d8ef

                                  SHA1

                                  63d71196938c3b887b9e3e867138afb2bde69005

                                  SHA256

                                  8b0cf9f53e03c0c83d0f2179f8a9b368c25818ba25f260dd8f4980775005a66c

                                  SHA512

                                  56388b1755a9c1db4fa32200ceb23621d7fadde5d71f1290a7f6f3cb30d1f652def9292c982bc84cfa7b20d746c02b818c53d4a642cefe3aa10bdd0f77e99f3f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  b4441b28776eb365d4de18b6df7cbd2c

                                  SHA1

                                  f80926a932bb765d2890d86a1da0eb8ba1a33bd1

                                  SHA256

                                  5038aaf5c333d6245b2a1dc6e881bfa661dbe47545313665baeb759e0f78ca83

                                  SHA512

                                  f322008a29d3efc6dcf2592f989c025987207dfaad0baf4f905006b30c795c486ab3ee13ba12530cebbcd9cb139038cf70e850fa62852e1fa591f501f5e87ff5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  6f6f21e5aa7448e4b655d4527bd8325c

                                  SHA1

                                  0b16916a711c8f4d33ab1d49f302c270030f99d2

                                  SHA256

                                  fbf3daf186f06af6c6a4f567a3842b7aeedc73d2f2c7ea29e95fe170a081fcd6

                                  SHA512

                                  b88feaab8899947c9f91b8ee17e778c9a94bc5cf1ddc563e2669b70a21c57d6f25fa99527b9016b046c6849b2904c0b2d93fc938adf9eb521584e784beb9e8bc

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  0c0c1dec9e4474bf31911a86f6bb9cf5

                                  SHA1

                                  6bb74871a90bdcbc7e88211c39f2ac952625c6c3

                                  SHA256

                                  91ce62f7a3888b31bbb2d0916006e526371dd2316815a90b0130d7c651dad754

                                  SHA512

                                  d75a2ce06bf19adda75cfdf996805f08a9d38eb4d9f263b368ae1044d17ce28fac6efa0285a43d4d63aee5e0a91804f3bacc40a6c5dcfb821aa0d1d64d14dc89

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  16dce6606b17990091363b84c160385a

                                  SHA1

                                  386d41d3256424fa2687b0c88d0e88e786a8e5a8

                                  SHA256

                                  6ac7c9c22a8397f2e5840b47de2e22941931b7e88ae958f3133f2f72ac84dfbe

                                  SHA512

                                  eba6fa8a757b06ab0e489d05a141b07ff4495dd467b211df7745cb161f0df5d5116beb09ddf5f0e551c7ed5bff27d197608fb96a2f8b4a6b70d6e81487c6de05

                                • C:\Users\Admin\Downloads\Unconfirmed 544843.crdownload

                                  Filesize

                                  2.9MB

                                  MD5

                                  f465b1fcc2a013c09b110466b7da2e4f

                                  SHA1

                                  b757d1147482c38be1b610f4a03bc9ae1dea6294

                                  SHA256

                                  c55e23d9367d422993d826a69644bbcb93175980af52a0c461b8f0240644cf06

                                  SHA512

                                  c30fde00fa73e56d5ac2b49c51429e7aafd9d12602a1059d1e6e472c18e59d21778e73d11578b81cfff8da7b2e9b4a62b84e6fb7c3a45fc5527970e92120e240

                                • C:\Windows\Installer\MSI31E8.tmp

                                  Filesize

                                  509KB

                                  MD5

                                  88d29734f37bdcffd202eafcdd082f9d

                                  SHA1

                                  823b40d05a1cab06b857ed87451bf683fdd56a5e

                                  SHA256

                                  87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

                                  SHA512

                                  1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

                                • C:\Windows\Installer\MSI31E8.tmp-\AlphaControlAgentInstallation.dll

                                  Filesize

                                  25KB

                                  MD5

                                  aa1b9c5c685173fad2dabebeb3171f01

                                  SHA1

                                  ed756b1760e563ce888276ff248c734b7dd851fb

                                  SHA256

                                  e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

                                  SHA512

                                  d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

                                • C:\Windows\Installer\MSI31E8.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                  Filesize

                                  179KB

                                  MD5

                                  1a5caea6734fdd07caa514c3f3fb75da

                                  SHA1

                                  f070ac0d91bd337d7952abd1ddf19a737b94510c

                                  SHA256

                                  cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                                  SHA512

                                  a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                                • C:\Windows\Installer\MSI3564.tmp-\CustomAction.config

                                  Filesize

                                  1KB

                                  MD5

                                  bc17e956cde8dd5425f2b2a68ed919f8

                                  SHA1

                                  5e3736331e9e2f6bf851e3355f31006ccd8caa99

                                  SHA256

                                  e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

                                  SHA512

                                  02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

                                • C:\Windows\Installer\MSI3564.tmp-\Newtonsoft.Json.dll

                                  Filesize

                                  695KB

                                  MD5

                                  715a1fbee4665e99e859eda667fe8034

                                  SHA1

                                  e13c6e4210043c4976dcdc447ea2b32854f70cc6

                                  SHA256

                                  c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

                                  SHA512

                                  bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

                                • C:\Windows\Installer\MSI3BA1.tmp

                                  Filesize

                                  211KB

                                  MD5

                                  a3ae5d86ecf38db9427359ea37a5f646

                                  SHA1

                                  eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                  SHA256

                                  c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                  SHA512

                                  96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                • \??\pipe\LOCAL\crashpad_1340_BCKLTPWEKKJXMWZG

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/3248-367-0x000001C3A55A0000-0x000001C3A55B6000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/3248-363-0x000001C3A4C70000-0x000001C3A4CA0000-memory.dmp

                                  Filesize

                                  192KB

                                • memory/3248-364-0x000001C3A5600000-0x000001C3A56B0000-memory.dmp

                                  Filesize

                                  704KB

                                • memory/3248-365-0x000001C3A5060000-0x000001C3A507C000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/4196-255-0x000001DA52D90000-0x000001DA52DA2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4196-256-0x000001DA6B610000-0x000001DA6B64C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4196-251-0x000001DA6B870000-0x000001DA6B908000-memory.dmp

                                  Filesize

                                  608KB

                                • memory/4196-239-0x000001DA511E0000-0x000001DA51208000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/5728-130-0x0000000005290000-0x00000000052BE000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/5728-134-0x0000000005280000-0x000000000528C000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/5884-291-0x0000021226D30000-0x0000021226DE2000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/5884-296-0x0000021226CB0000-0x0000021226CD2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5884-339-0x0000021227290000-0x00000212272C8000-memory.dmp

                                  Filesize

                                  224KB

                                • memory/5884-368-0x0000021226C70000-0x0000021226C86000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/5892-170-0x0000000002C70000-0x0000000002C92000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/5892-167-0x00000000050C0000-0x0000000005172000-memory.dmp

                                  Filesize

                                  712KB

                                • memory/5892-171-0x0000000005180000-0x00000000054D4000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/6104-201-0x0000000002AC0000-0x0000000002B26000-memory.dmp

                                  Filesize

                                  408KB