Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 18:01 UTC
Behavioral task
behavioral1
Sample
z1eCAC2025.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
z1eCAC2025.msi
Resource
win10v2004-20241007-en
General
-
Target
z1eCAC2025.msi
-
Size
2.9MB
-
MD5
30c87bf81a6b9da8c2d2196d4471f056
-
SHA1
a8c45bd3cb66256a07ba8c4047aa88db5c72c50b
-
SHA256
40c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216
-
SHA512
066c4c9922994259cdb62d9cbc21fa6e63b1c765a18a1c4e94b1741e60b580ddb132134f13d6ad0f86285c618243ca6849dc5aac92fb8b8be014610a6159bf06
-
SSDEEP
49152:N+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:N+lUlz9FKbsodq0YaH7ZPxMb8tT
Malware Config
Signatures
-
AteraAgent
AteraAgent is a remote monitoring and management tool.
-
Ateraagent family
-
Detects AteraAgent 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023ca9-238.dat family_ateraagent -
Blocklisted process makes network request 4 IoCs
flow pid Process 4 4144 msiexec.exe 8 4144 msiexec.exe 28 4412 rundll32.exe 32 392 rundll32.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 AteraAgent.exe File opened for modification C:\Windows\system32\InstallUtil.InstallLog AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4 AteraAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log AgentPackageAgentInformation.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944 AteraAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4 AteraAgent.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState AteraAgent.exe File opened for modification C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll msiexec.exe File opened for modification C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini AteraAgent.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll msiexec.exe File created C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe AteraAgent.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIFF95.tmp-\Newtonsoft.Json.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIE715.tmp-\AlphaControlAgentInstallation.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIF186.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIF439.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF38D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFF95.tmp-\AlphaControlAgentInstallation.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIFF95.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIE715.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE715.tmp-\System.Management.dll rundll32.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp-\System.Management.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIE715.tmp-\Newtonsoft.Json.dll rundll32.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF33D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFF95.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIE715.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIE715.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSIF186.tmp-\System.Management.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIF186.tmp-\Newtonsoft.Json.dll rundll32.exe File created C:\Windows\Installer\e57e12a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFF95.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp-\AlphaControlAgentInstallation.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp-\Newtonsoft.Json.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIF186.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created C:\Windows\Installer\e57e128.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIFF95.tmp-\System.Management.dll rundll32.exe File opened for modification C:\Windows\Installer\e57e128.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF186.tmp-\AlphaControlAgentInstallation.dll rundll32.exe File created C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45} msiexec.exe File opened for modification C:\Windows\Installer\MSIF33C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE1F4.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSIF186.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Executes dropped EXE 4 IoCs
pid Process 832 AteraAgent.exe 4736 AteraAgent.exe 3440 AgentPackageAgentInformation.exe 4272 AgentPackageAgentInformation.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4592 sc.exe -
Loads dropped DLL 31 IoCs
pid Process 864 MsiExec.exe 4428 rundll32.exe 4428 rundll32.exe 4428 rundll32.exe 4428 rundll32.exe 4428 rundll32.exe 864 MsiExec.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 4412 rundll32.exe 864 MsiExec.exe 2948 rundll32.exe 2948 rundll32.exe 2948 rundll32.exe 2948 rundll32.exe 2948 rundll32.exe 864 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 864 MsiExec.exe 392 rundll32.exe 392 rundll32.exe 392 rundll32.exe 392 rundll32.exe 392 rundll32.exe 392 rundll32.exe 392 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4144 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaskKill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Kills process with taskkill 1 IoCs
pid Process 4348 TaskKill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust AteraAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs AteraAgent.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs AteraAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs AteraAgent.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C\Blob = 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 AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs AteraAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs AteraAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates AteraAgent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA AteraAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed AteraAgent.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE\7D0A237E2F2A7564CA141B792446E854 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\ProductName = "AteraAgent" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\Version = "17301511" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\PackageName = "z1eCAC2025.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854\INSTALLFOLDER_files_Feature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\PackageCode = "559DA127DF979104BB5FD9CCC41157BB" msiexec.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 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 AteraAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 AteraAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e AteraAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 AteraAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 AteraAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 AteraAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F AteraAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\925A8F8D2C6D04E0665F596AFF22D863E8256F3F\Blob = 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 AteraAgent.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3384 msiexec.exe 3384 msiexec.exe 4736 AteraAgent.exe 3440 AgentPackageAgentInformation.exe 4272 AgentPackageAgentInformation.exe 4272 AgentPackageAgentInformation.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4144 msiexec.exe Token: SeIncreaseQuotaPrivilege 4144 msiexec.exe Token: SeSecurityPrivilege 3384 msiexec.exe Token: SeCreateTokenPrivilege 4144 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4144 msiexec.exe Token: SeLockMemoryPrivilege 4144 msiexec.exe Token: SeIncreaseQuotaPrivilege 4144 msiexec.exe Token: SeMachineAccountPrivilege 4144 msiexec.exe Token: SeTcbPrivilege 4144 msiexec.exe Token: SeSecurityPrivilege 4144 msiexec.exe Token: SeTakeOwnershipPrivilege 4144 msiexec.exe Token: SeLoadDriverPrivilege 4144 msiexec.exe Token: SeSystemProfilePrivilege 4144 msiexec.exe Token: SeSystemtimePrivilege 4144 msiexec.exe Token: SeProfSingleProcessPrivilege 4144 msiexec.exe Token: SeIncBasePriorityPrivilege 4144 msiexec.exe Token: SeCreatePagefilePrivilege 4144 msiexec.exe Token: SeCreatePermanentPrivilege 4144 msiexec.exe Token: SeBackupPrivilege 4144 msiexec.exe Token: SeRestorePrivilege 4144 msiexec.exe Token: SeShutdownPrivilege 4144 msiexec.exe Token: SeDebugPrivilege 4144 msiexec.exe Token: SeAuditPrivilege 4144 msiexec.exe Token: SeSystemEnvironmentPrivilege 4144 msiexec.exe Token: SeChangeNotifyPrivilege 4144 msiexec.exe Token: SeRemoteShutdownPrivilege 4144 msiexec.exe Token: SeUndockPrivilege 4144 msiexec.exe Token: SeSyncAgentPrivilege 4144 msiexec.exe Token: SeEnableDelegationPrivilege 4144 msiexec.exe Token: SeManageVolumePrivilege 4144 msiexec.exe Token: SeImpersonatePrivilege 4144 msiexec.exe Token: SeCreateGlobalPrivilege 4144 msiexec.exe Token: SeBackupPrivilege 4568 vssvc.exe Token: SeRestorePrivilege 4568 vssvc.exe Token: SeAuditPrivilege 4568 vssvc.exe Token: SeBackupPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeBackupPrivilege 1220 srtasks.exe Token: SeRestorePrivilege 1220 srtasks.exe Token: SeSecurityPrivilege 1220 srtasks.exe Token: SeTakeOwnershipPrivilege 1220 srtasks.exe Token: SeBackupPrivilege 1220 srtasks.exe Token: SeRestorePrivilege 1220 srtasks.exe Token: SeSecurityPrivilege 1220 srtasks.exe Token: SeTakeOwnershipPrivilege 1220 srtasks.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeDebugPrivilege 4412 rundll32.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeRestorePrivilege 3384 msiexec.exe Token: SeTakeOwnershipPrivilege 3384 msiexec.exe Token: SeDebugPrivilege 4348 TaskKill.exe Token: SeRestorePrivilege 3384 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4144 msiexec.exe 4144 msiexec.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1220 3384 msiexec.exe 87 PID 3384 wrote to memory of 1220 3384 msiexec.exe 87 PID 3384 wrote to memory of 864 3384 msiexec.exe 89 PID 3384 wrote to memory of 864 3384 msiexec.exe 89 PID 3384 wrote to memory of 864 3384 msiexec.exe 89 PID 864 wrote to memory of 4428 864 MsiExec.exe 90 PID 864 wrote to memory of 4428 864 MsiExec.exe 90 PID 864 wrote to memory of 4428 864 MsiExec.exe 90 PID 864 wrote to memory of 4412 864 MsiExec.exe 93 PID 864 wrote to memory of 4412 864 MsiExec.exe 93 PID 864 wrote to memory of 4412 864 MsiExec.exe 93 PID 864 wrote to memory of 2948 864 MsiExec.exe 96 PID 864 wrote to memory of 2948 864 MsiExec.exe 96 PID 864 wrote to memory of 2948 864 MsiExec.exe 96 PID 3384 wrote to memory of 4440 3384 msiexec.exe 98 PID 3384 wrote to memory of 4440 3384 msiexec.exe 98 PID 3384 wrote to memory of 4440 3384 msiexec.exe 98 PID 4440 wrote to memory of 3144 4440 MsiExec.exe 99 PID 4440 wrote to memory of 3144 4440 MsiExec.exe 99 PID 4440 wrote to memory of 3144 4440 MsiExec.exe 99 PID 3144 wrote to memory of 2608 3144 NET.exe 101 PID 3144 wrote to memory of 2608 3144 NET.exe 101 PID 3144 wrote to memory of 2608 3144 NET.exe 101 PID 4440 wrote to memory of 4348 4440 MsiExec.exe 102 PID 4440 wrote to memory of 4348 4440 MsiExec.exe 102 PID 4440 wrote to memory of 4348 4440 MsiExec.exe 102 PID 3384 wrote to memory of 832 3384 msiexec.exe 104 PID 3384 wrote to memory of 832 3384 msiexec.exe 104 PID 864 wrote to memory of 392 864 MsiExec.exe 107 PID 864 wrote to memory of 392 864 MsiExec.exe 107 PID 864 wrote to memory of 392 864 MsiExec.exe 107 PID 4736 wrote to memory of 4592 4736 AteraAgent.exe 108 PID 4736 wrote to memory of 4592 4736 AteraAgent.exe 108 PID 4736 wrote to memory of 3440 4736 AteraAgent.exe 113 PID 4736 wrote to memory of 3440 4736 AteraAgent.exe 113 PID 4736 wrote to memory of 4272 4736 AteraAgent.exe 115 PID 4736 wrote to memory of 4272 4736 AteraAgent.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\z1eCAC2025.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4144
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B9E2C0BD1844001DD7C07B40610251F82⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIE1F4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240640796 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId3⤵
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIE715.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240641843 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIF186.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240644546 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation3⤵
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSIFF95.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240648109 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd3⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:392
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3A91B200A9965DDBE5462F48FE2AB5DA E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\NET.exe"NET" STOP AteraAgent3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AteraAgent4⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
-
C:\Windows\SysWOW64\TaskKill.exe"TaskKill.exe" /f /im AteraAgent.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="financeiro@brasmasdistribuicao.com.br" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000PPiXTIA1" /AgentId="947a9008-1c28-4f55-9671-dc0371ff0c73"2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:832
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/250002⤵
- Launches sc.exe
PID:4592
-
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 947a9008-1c28-4f55-9671-dc0371ff0c73 "0f05d8d3-3f08-4113-a8ba-2d0a5007bfb9" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PPiXTIA12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 947a9008-1c28-4f55-9671-dc0371ff0c73 "9f4d1ce7-e106-4d01-81eb-baef6d7f0b7a" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PPiXTIA12⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request29.153.16.2.in-addr.arpaIN PTRResponse29.153.16.2.in-addr.arpaIN PTRa2-16-153-29deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request4.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request167.57.26.184.in-addr.arpaIN PTRResponse167.57.26.184.in-addr.arpaIN PTRa184-26-57-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestagent-api.atera.comIN AResponseagent-api.atera.comIN CNAMEagentsapi.trafficmanager.netagentsapi.trafficmanager.netIN CNAMEatera-agent-api-eu.westeurope.cloudapp.azure.comatera-agent-api-eu.westeurope.cloudapp.azure.comIN A40.119.152.241
-
Remote address:8.8.8.8:53Requestagent-api.atera.comIN A
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/track-event HTTP/1.1
X-Atera-AccountId: 001Q300000PPiXTIA1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 130
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 0
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:8.8.8.8:53Request241.152.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.152.119.40.in-addr.arpaIN PTR
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/GetEnvironmentStatus HTTP/1.1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 39
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/GetCommands HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent-api.atera.com
Content-Length: 98
Connection: Close
ResponseHTTP/1.1 204 No Content
Connection: close
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/track-event HTTP/1.1
X-Atera-AccountId: 001Q300000PPiXTIA1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 142
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 0
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/GetRecurringPackages HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent-api.atera.com
Content-Length: 44
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/AgentStarting HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent-api.atera.com
Content-Length: 98
Connection: Close
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:8.8.8.8:53Requestps.pndsn.comIN AResponseps.pndsn.comIN A35.157.63.227ps.pndsn.comIN A35.157.63.228
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=00d14cf7-df2f-415e-901d-189f6e1d9762&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=00d14cf7-df2f-415e-901d-189f6e1d9762&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c90407cd-4ede-4823-a31a-9903c8d72b69&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c90407cd-4ede-4823-a31a-9903c8d72b69&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cd46a75e-3cdb-4894-a1e0-f9e107e20425&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cd46a75e-3cdb-4894-a1e0-f9e107e20425&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=23116936-77a9-40b6-a3de-071810b40aac&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=23116936-77a9-40b6-a3de-071810b40aac&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fd50af99-6aa4-4534-9600-171e01379044&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fd50af99-6aa4-4534-9600-171e01379044&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/947a9008-1c28-4f55-9671-dc0371ff0c73/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c2e2c184-e863-4e45-b93f-47bb92a9138e&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/947a9008-1c28-4f55-9671-dc0371ff0c73/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c2e2c184-e863-4e45-b93f-47bb92a9138e&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Content-Length: 55
Connection: keep-alive
Access-Control-Allow-Methods: OPTIONS, GET, POST
Age: 0
Cache-Control: no-cache
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=36fe9743-c909-4acb-a7f0-291a7f4a9f85&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /time/0?pnsdk=NET45CSharp6.13.0.0&requestid=36fe9743-c909-4acb-a7f0-291a7f4a9f85&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Connection: keep-alive
Content-Length: 19
Cache-Control: no-cache
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0c28f481-1f9a-4ac4-9cb9-0cca941b7ed0&tt=0&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0c28f481-1f9a-4ac4-9cb9-0cca941b7ed0&tt=0&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Content-Length: 45
Connection: keep-alive
Cache-Control: no-cache
Access-Control-Allow-Methods: GET
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a399027a-f25e-4a1e-91fa-4fe7eeefc92b&tr=41&tt=17373960898347171&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a399027a-f25e-4a1e-91fa-4fe7eeefc92b&tr=41&tt=17373960898347171&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Content-Length: 1884
Connection: keep-alive
Cache-Control: no-cache
Access-Control-Allow-Methods: GET
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a1cc679a-1e56-4dab-b90c-85db41cfc04e&tr=41&tt=17373961042415944&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a1cc679a-1e56-4dab-b90c-85db41cfc04e&tr=41&tt=17373961042415944&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Content-Length: 1874
Connection: keep-alive
Cache-Control: no-cache
Access-Control-Allow-Methods: GET
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0307b428-c1a5-4238-a773-1bcc9206cfad&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0307b428-c1a5-4238-a773-1bcc9206cfad&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
ResponseHTTP/1.1 200 OK
Content-Type: text/javascript; charset="UTF-8"
Content-Length: 45
Connection: keep-alive
Cache-Control: no-cache
Access-Control-Allow-Methods: GET
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: *
-
GEThttps://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e4a77797-f4d2-43d2-bfd1-d765a6442f53&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73AteraAgent.exeRemote address:35.157.63.227:443RequestGET /v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e4a77797-f4d2-43d2-bfd1-d765a6442f53&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 HTTP/1.1
Cache-Control: no-cache
Pragma: no-cache
Content-Type: application/json
Host: ps.pndsn.com
-
Remote address:8.8.8.8:53Request227.63.157.35.in-addr.arpaIN PTRResponse227.63.157.35.in-addr.arpaIN PTRec2-35-157-63-227eu-central-1compute amazonawscom
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/AcknowledgeCommands HTTP/1.1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 104
Connection: Close
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:8.8.8.8:53Requestps.atera.comIN AResponseps.atera.comIN CNAMEd25btwd9wax8gu.cloudfront.netd25btwd9wax8gu.cloudfront.netIN A99.84.9.89d25btwd9wax8gu.cloudfront.netIN A99.84.9.56d25btwd9wax8gu.cloudfront.netIN A99.84.9.5d25btwd9wax8gu.cloudfront.netIN A99.84.9.72
-
GEThttps://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.9/AgentPackageAgentInformation.zip?cbPE7HhXVwVxCL/+uNxZnr+pf+AexLWE0lCxJHzwvWxI7jB4tsD4a4dGqOwWXafIAteraAgent.exeRemote address:99.84.9.89:443RequestGET /agentpackagesnet45/AgentPackageAgentInformation/38.9/AgentPackageAgentInformation.zip?cbPE7HhXVwVxCL/+uNxZnr+pf+AexLWE0lCxJHzwvWxI7jB4tsD4a4dGqOwWXafI HTTP/1.1
Host: ps.atera.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 392705
Connection: keep-alive
Content-MD5: InI9MK2XWjOhKKIMr9tmhA==
Last-Modified: Mon, 20 Jan 2025 15:32:16 GMT
ETag: 0x8DD39679F007D26
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: 94c0104f-201e-0018-3f51-6ba2ad000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Mon, 20 Jan 2025 15:41:34 GMT
X-Cache: Hit from cloudfront
Via: 1.1 8583f64172baf458ac5712a4d1815fec.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: LHR62-C2
X-Amz-Cf-Id: D_aC4Zp08hc5DIX4zMUt4F22iZtB87U3n-3uP9WDE51sTn0IUJCPPw==
Age: 8409
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/AcknowledgeCommands HTTP/1.1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 104
Connection: Close
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:8.8.8.8:53Requestagent-api.atera.comIN AResponseagent-api.atera.comIN CNAMEagentsapi.trafficmanager.netagentsapi.trafficmanager.netIN CNAMEatera-agent-api-eu.westeurope.cloudapp.azure.comatera-agent-api-eu.westeurope.cloudapp.azure.comIN A40.119.152.241
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/CommandResult HTTP/1.1
X-PackageName: AgentPackageAgentInformation
X-PackageVersion: 38.9.0.0
X-AccountId: 001Q300000PPiXTIA1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 469
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 0
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:40.119.152.241:443RequestPOST /Production/Agent/CommandResult HTTP/1.1
X-PackageName: AgentPackageAgentInformation
X-PackageVersion: 38.9.0.0
X-AccountId: 001Q300000PPiXTIA1
Content-Type: application/json
Host: agent-api.atera.com
Content-Length: 469
Expect: 100-continue
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 0
Connection: keep-alive
Request-Context: appId=cid-v1:dab78164-68e3-479b-97e3-bbc6914c52dc
-
Remote address:8.8.8.8:53Request89.9.84.99.in-addr.arpaIN PTRResponse89.9.84.99.in-addr.arpaIN PTRserver-99-84-9-89lhr62r cloudfrontnet
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.65.42.20.in-addr.arpaIN PTRResponse
-
1.5kB 5.5kB 11 9
HTTP Request
POST https://agent-api.atera.com/Production/Agent/track-eventHTTP Response
200 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/GetCommandstls, httpAteraAgent.exe1.4kB 6.0kB 13 15
HTTP Request
POST https://agent-api.atera.com/Production/Agent/GetEnvironmentStatusHTTP Response
200HTTP Request
POST https://agent-api.atera.com/Production/Agent/GetCommandsHTTP Response
204 -
1.1kB 5.5kB 9 9
HTTP Request
POST https://agent-api.atera.com/Production/Agent/track-eventHTTP Response
200 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/AgentStartingtls, httpAteraAgent.exe1.8kB 28.0kB 20 30
HTTP Request
POST https://agent-api.atera.com/Production/Agent/GetRecurringPackagesHTTP Response
200HTTP Request
POST https://agent-api.atera.com/Production/Agent/AgentStartingHTTP Response
200 -
35.157.63.227:443https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=36fe9743-c909-4acb-a7f0-291a7f4a9f85&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73tls, httpAteraAgent.exe3.0kB 9.0kB 26 26
HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=00d14cf7-df2f-415e-901d-189f6e1d9762&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c90407cd-4ede-4823-a31a-9903c8d72b69&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cd46a75e-3cdb-4894-a1e0-f9e107e20425&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=23116936-77a9-40b6-a3de-071810b40aac&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fd50af99-6aa4-4534-9600-171e01379044&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/947a9008-1c28-4f55-9671-dc0371ff0c73/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c2e2c184-e863-4e45-b93f-47bb92a9138e&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=36fe9743-c909-4acb-a7f0-291a7f4a9f85&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200 -
35.157.63.227:443https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e4a77797-f4d2-43d2-bfd1-d765a6442f53&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73tls, httpAteraAgent.exe3.3kB 11.8kB 23 29
HTTP Request
GET https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0c28f481-1f9a-4ac4-9cb9-0cca941b7ed0&tt=0&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a399027a-f25e-4a1e-91fa-4fe7eeefc92b&tr=41&tt=17373960898347171&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a1cc679a-1e56-4dab-b90c-85db41cfc04e&tr=41&tt=17373961042415944&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0307b428-c1a5-4238-a773-1bcc9206cfad&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73HTTP Response
200HTTP Request
GET https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/947a9008-1c28-4f55-9671-dc0371ff0c73/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e4a77797-f4d2-43d2-bfd1-d765a6442f53&tr=41&tt=17373961054587351&uuid=947a9008-1c28-4f55-9671-dc0371ff0c73 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/AcknowledgeCommandstls, httpAteraAgent.exe1.6kB 6.4kB 15 12
HTTP Request
POST https://agent-api.atera.com/Production/Agent/AcknowledgeCommandsHTTP Response
200 -
99.84.9.89:443https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.9/AgentPackageAgentInformation.zip?cbPE7HhXVwVxCL/+uNxZnr+pf+AexLWE0lCxJHzwvWxI7jB4tsD4a4dGqOwWXafItls, httpAteraAgent.exe13.3kB 410.6kB 220 301
HTTP Request
GET https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.9/AgentPackageAgentInformation.zip?cbPE7HhXVwVxCL/+uNxZnr+pf+AexLWE0lCxJHzwvWxI7jB4tsD4a4dGqOwWXafIHTTP Response
200 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/AcknowledgeCommandstls, httpAteraAgent.exe1.1kB 5.6kB 10 12
HTTP Request
POST https://agent-api.atera.com/Production/Agent/AcknowledgeCommandsHTTP Response
200 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/CommandResulttls, httpAgentPackageAgentInformation.exe2.1kB 5.6kB 11 11
HTTP Request
POST https://agent-api.atera.com/Production/Agent/CommandResultHTTP Response
200 -
40.119.152.241:443https://agent-api.atera.com/Production/Agent/CommandResulttls, httpAgentPackageAgentInformation.exe2.1kB 5.6kB 11 10
HTTP Request
POST https://agent-api.atera.com/Production/Agent/CommandResultHTTP Response
200
-
142 B 145 B 2 1
DNS Request
97.17.167.52.in-addr.arpa
DNS Request
97.17.167.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
29.153.16.2.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.159.190.20.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
13.86.106.20.in-addr.arpa
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
167.57.26.184.in-addr.arpa
-
130 B 182 B 2 1
DNS Request
agent-api.atera.com
DNS Request
agent-api.atera.com
DNS Response
40.119.152.241
-
146 B 147 B 2 1
DNS Request
241.152.119.40.in-addr.arpa
DNS Request
241.152.119.40.in-addr.arpa
-
58 B 90 B 1 1
DNS Request
ps.pndsn.com
DNS Response
35.157.63.22735.157.63.228
-
72 B 138 B 1 1
DNS Request
227.63.157.35.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
197.87.175.4.in-addr.arpa
DNS Request
197.87.175.4.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
58 B 165 B 1 1
DNS Request
ps.atera.com
DNS Response
99.84.9.8999.84.9.5699.84.9.599.84.9.72
-
65 B 182 B 1 1
DNS Request
agent-api.atera.com
DNS Response
40.119.152.241
-
69 B 123 B 1 1
DNS Request
89.9.84.99.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
90.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD593936099b1b307d4857838566fb97932
SHA1687aff99b2699db1caeb71ec7f97bb1f24bc3062
SHA2560425d37e74a9f42c39b08f09b3287b5dcce6693ac5daa4780cad34b49d39819d
SHA5124d95b50c331d9b96ca0a3cb8d0c2bedd46aa56126dcede9c3f5eba3cb90ff2e62dd54d5fe937bb01d4ee0f2d8fd7d2737269965a080424cea682dd9585ca8095
-
Filesize
753B
MD58298451e4dee214334dd2e22b8996bdc
SHA1bc429029cc6b42c59c417773ea5df8ae54dbb971
SHA2566fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25
SHA512cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba
-
Filesize
142KB
MD5477293f80461713d51a98a24023d45e8
SHA1e9aa4e6c514ee951665a7cd6f0b4a4c49146241d
SHA256a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2
SHA51223f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f
-
Filesize
1KB
MD5b3bb71f9bb4de4236c26578a8fae2dcd
SHA11ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e
SHA256e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2
SHA512fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71
-
Filesize
210KB
MD5c106df1b5b43af3b937ace19d92b42f3
SHA17670fc4b6369e3fb705200050618acaa5213637f
SHA2562b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68
SHA512616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae
-
Filesize
693KB
MD52c4d25b7fbd1adfd4471052fa482af72
SHA1fd6cd773d241b581e3c856f9e6cd06cb31a01407
SHA2562a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7
SHA512f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI
Filesize12B
MD5e7d76972b7bcee4b8e7ff558c4b5332f
SHA16925ef528563be830aa054df66fb5359aa5e1442
SHA25639d7fb8d9cdf74d5b1fec800b082936486ce182fffc619f1bb7176611b1a1336
SHA512f3eff8f7e02374f100db3148952c4d145b56686057af20aa989311958ed03db2c12da038db12be02aca6430812eb4474c704cb65a39b5566c972c33d0a6b6251
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
Filesize248KB
MD502c5e1d68418152679c58cd3c8130aeb
SHA1ba1e87324cd9ce568584ded884be8967311495d6
SHA2568d21a793b93af34f0de79094be326e543e7a2a18aed77e4e12f0fe5969b9868d
SHA5120aee6baf3a77341b0c111137f81215b481bd7a0e9f6ba871941bf3cf547e9f66adf61cf781d46c04a773eee5762f73221d3094f64d3470d49e7eabf1f774ce08
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
Filesize546B
MD5158fb7d9323c6ce69d4fce11486a40a1
SHA129ab26f5728f6ba6f0e5636bf47149bd9851f532
SHA2565e38ef232f42f9b0474f8ce937a478200f7a8926b90e45cb375ffda339ec3c21
SHA5127eefcc5e65ab4110655e71bc282587e88242c15292d9c670885f0daae30fa19a4b059390eb8e934607b8b14105e3e25d7c5c1b926b6f93bdd40cbd284aaa3ceb
-
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
Filesize688KB
MD5c63e1d81d747a07f62c914fe92e7e62b
SHA1793dce4607d78d95df754f57c6857e80adb4d1fe
SHA256a7b3fc2f4aac37f80052515b92e514210920adf05c096a7bd85af51b0c3ebe66
SHA512d3cb63dc5699e8c775fcd82de6d19cdeabf7aae39f040ad477995945a3e4cee5c34a07d5f1b0b884de6180e84a576366b1a9af7deb6aaec929ea5ee2e810f1a0
-
Filesize
588KB
MD517d74c03b6bcbcd88b46fcc58fc79a0d
SHA1bc0316e11c119806907c058d62513eb8ce32288c
SHA25613774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15
SHA512f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030
-
Filesize
229B
MD511f7643cc107bff03052756f49956e02
SHA1c3eb7de68d1a7e46de5248ef6f0aba1a01a52515
SHA256c77eb4c87e9e17bdd84c9d17052c7f5008124b39a87b2195b189d697f353946c
SHA512753143d7cb759484d08664bc4d6294e0d47d7f0b64bc710306efe6b5b0cf8337ce3850c577f9a6dbcfa95272587c05ef966af49d1bff36f0305fb7aaac77303b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize471B
MD571bd195d7c58500ba8a871cf9308a385
SHA14ccbbd6d61a80f21a86adb44adbe9018fcc0d09a
SHA256adea38b7c56668aaf6e0536f8aa40de32e398d248a975b573becfdbf880499ae
SHA5129b230b2a5073903847e17c5835f7ffba35647925e742a4e82dbac36e22fe6d74ebe3c686e38c1c8762db82c034480be83202f58424515603c572551e3b93ef02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
Filesize727B
MD556e77f27ce4a9d1138cf5be406879ce9
SHA19b747d0ed77969273462ebff0d2c8ff3da74fe49
SHA256e053f29d0a4a9ec9504a28363b9d6bdd5a28287cbe98f5f02b7e8ad0bc4c5c40
SHA51257478aa6ad295eb6cd6986a4d748d55b1bb5d1bf28f022e5a2cd105fe3718abda82a39d0d8111cffb8bef066e6271905daaa8a7d83e9e006944020bc7f39bdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize727B
MD5a0cb20d98fd71cf57d7da90834608d35
SHA1806211b77bd71026a6f3c6cdb10f5f7724563aa0
SHA2564d246aba43cc43ee629a9879f6bd3502b3d3656dfe11f0c9a29c7a7a89ad722c
SHA512fa7543436d91734abc480114024f041989d8b780d0e01d63224ea41be0e1c4e9901dc04111db6e499c479ea0d52d6e78f630ae8a8fa46e0a22d315f47ff01358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize400B
MD5c8f78ba12906059228a5e0218982a08f
SHA13e17308b4c7539f6c8d8396d5c23d6d6d0687b36
SHA2567153e4fd16b460274ae069afbb21d3420636b6e187b5b2e30399c76530dee1ef
SHA512a0e241313249a6f6de89aeb4e5b68ad4d99241f0f500b4399ab52a02f3455eb59b3b73ae176c5585b8d81d712ceba4a2ffb27c61f7b0bc431a446bb1cba67576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
Filesize404B
MD523cd00740f610018c2d2802ba3a6b9a2
SHA1bd6873dffd86e65645417907c19c3eeb88170f19
SHA256d071f88c716cbbfbab88fd1b59500c8a23595d5e3e9a14d9f51a758a3a58e900
SHA512e842873d279032ba0e6fd10d4d6201884a0b6ea68defc12847230bb17c4dc60ccf805c3e1a5f52c118aeecc270693edf52b24cc2476f0f54afd9a3cd3ebb2e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD528395cb3d1e5c9aadd09ef628be11d5c
SHA1afda84d5f2da04099f525daab92beef00100807c
SHA25692bc23e5ceeb48603def66b1a394278cf0f1444219a3ad43d19264e76b561450
SHA512666d82ba5c210717aa983f4ab7315ec3f4fe89c635072119991b3cd0f19f78abb62e1075932ac4d15565a4ca5fc22eb13b2bb6fa0a3512d3196a34bc761f6fd4
-
Filesize
651B
MD59bbfe11735bac43a2ed1be18d0655fe2
SHA161141928bb248fd6e9cd5084a9db05a9b980fb3a
SHA256549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74
SHA512a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483
-
Filesize
509KB
MD588d29734f37bdcffd202eafcdd082f9d
SHA1823b40d05a1cab06b857ed87451bf683fdd56a5e
SHA25687c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf
SHA5121343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0
-
Filesize
25KB
MD5aa1b9c5c685173fad2dabebeb3171f01
SHA1ed756b1760e563ce888276ff248c734b7dd851fb
SHA256e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7
SHA512d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
1KB
MD5bc17e956cde8dd5425f2b2a68ed919f8
SHA15e3736331e9e2f6bf851e3355f31006ccd8caa99
SHA256e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5
SHA51202090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940
-
Filesize
695KB
MD5715a1fbee4665e99e859eda667fe8034
SHA1e13c6e4210043c4976dcdc447ea2b32854f70cc6
SHA256c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e
SHA512bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
2.9MB
MD530c87bf81a6b9da8c2d2196d4471f056
SHA1a8c45bd3cb66256a07ba8c4047aa88db5c72c50b
SHA25640c90476979303f54df8bf6ac6ba10a252623cf18519b492b77d8988cb6bd216
SHA512066c4c9922994259cdb62d9cbc21fa6e63b1c765a18a1c4e94b1741e60b580ddb132134f13d6ad0f86285c618243ca6849dc5aac92fb8b8be014610a6159bf06
-
C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
Filesize404B
MD5633abf4507488de7cdb00418e478690a
SHA1f153daebdd5de79a60c3b99b251f1fae26170e4c
SHA256fdc499ba1c02dc0d90be15ff55c29e8dbb3d62ffe22a48966b3b4b01b1dc8203
SHA5129aca065029dabac5e53937c39824bb8f65a3247421bf2e2b7ffa65dd01ecc8192f5734f988f002a478138e90a0963caeef8fa7bcd045a374e9a3989aae47864b
-
C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD553afbb6afa6075c92b170f111be2d62c
SHA181bd124208a94fecd1acdcea5141c4fc387b0e4c
SHA25641503bd5f919c0ac1cdb180ea4a3dd0f94063d1404316b58be7bbedb4fe98820
SHA51230319e340d1fd0bb9983dca2b64c51fdc8c53b3c29e28e137f6bb6962f1abca18e508739690cdbf8f2ca4687b5366cdbb25731435df41d128e029a72f3182e2f
-
Filesize
24.1MB
MD59891182c298a6d7d7d75f878cef79ad3
SHA1ec82cb1ec392ccb880f35615e8ab1483df023eee
SHA2561fbac662ad2a94929866061f7158f9cef62a7afdf3e02004bda17021ec65f795
SHA512bbb3d6de15ad40c9253590dc146d41cc5b1707a498f5cdf103ae7e25c89826bbb1ba5c94e059a75bda247133095fac11b0ec83629640fa0cfc52e153d1d4686a
-
\??\Volume{f0eec59f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{62e72642-e9d6-4270-be80-a1f14268870c}_OnDiskSnapshotProp
Filesize6KB
MD55c8206ea1fcbecf8dfbcb758b275ede7
SHA1f696107283d888391ec7b7eb25980dd17bd57ebd
SHA256f879e194e8615eba05af3679aec5a3a4418dbc261935d2429acf654ae0b12f4f
SHA5120f12cc2fd2684d009accb6c735310b80abe73bf4cd44547baa337815cf02d87989f16c5f6c6812ce1c5bdcb4347d31b725a393c8cf6b349c9540baa7fc0c5819