Analysis

  • max time kernel
    49s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 20:37

General

  • Target

    https://www.dropbox.com/scl/fi/ywqcrl914ga9zzaxkzmd5/Or-amento.msi?rlkey=yejuutmmq8ncnp6ukqga4re39&st=0c9w3dbx&dl=1

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 31 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 35 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 23 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/scl/fi/ywqcrl914ga9zzaxkzmd5/Or-amento.msi?rlkey=yejuutmmq8ncnp6ukqga4re39&st=0c9w3dbx&dl=1
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffeaa4ccc40,0x7ffeaa4ccc4c,0x7ffeaa4ccc58
      2⤵
        PID:1640
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:1468
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2184 /prefetch:3
          2⤵
            PID:4540
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2596 /prefetch:8
            2⤵
              PID:3156
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3192 /prefetch:1
              2⤵
                PID:4696
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3372 /prefetch:1
                2⤵
                  PID:3800
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4888,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4876 /prefetch:8
                  2⤵
                    PID:4144
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5180,i,6136852644248844246,14660768629270484483,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5184 /prefetch:8
                    2⤵
                      PID:2928
                    • C:\Windows\System32\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\Orçamento.msi"
                      2⤵
                      • Blocklisted process makes network request
                      • Enumerates connected drives
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:4912
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:3944
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1728
                      • C:\Windows\system32\msiexec.exe
                        C:\Windows\system32\msiexec.exe /V
                        1⤵
                        • Enumerates connected drives
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • Modifies data under HKEY_USERS
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3128
                        • C:\Windows\system32\srtasks.exe
                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                          2⤵
                            PID:3724
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 68C4F4E360D96E87C9B153079553B4FC
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:5080
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI6A3E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240675609 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
                              3⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:4464
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI6FAE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240676828 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
                              3⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1712
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI7443.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240678000 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
                              3⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:4068
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Windows\Installer\MSI805D.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240681078 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
                              3⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3856
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 308489F2E4DAE01256671B6AE1B9BB84 E Global\MSI0000
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2896
                            • C:\Windows\SysWOW64\NET.exe
                              "NET" STOP AteraAgent
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4872
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 STOP AteraAgent
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:532
                            • C:\Windows\SysWOW64\TaskKill.exe
                              "TaskKill.exe" /f /im AteraAgent.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              PID:3356
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000PxdicIAB" /AgentId="3328e369-dbb4-45d5-b2fb-e4d71c5bcb56"
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Drops file in Program Files directory
                            • Modifies data under HKEY_USERS
                            PID:2268
                        • C:\Windows\system32\vssvc.exe
                          C:\Windows\system32\vssvc.exe
                          1⤵
                          • Checks SCSI registry key(s)
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3040
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
                          1⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Drops file in Program Files directory
                          • Modifies data under HKEY_USERS
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4980
                          • C:\Windows\System32\sc.exe
                            "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                            2⤵
                            • Launches sc.exe
                            PID:1564
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 3328e369-dbb4-45d5-b2fb-e4d71c5bcb56 "12997c21-aafd-45d0-b852-3172b084def4" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PxdicIAB
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5036
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 3328e369-dbb4-45d5-b2fb-e4d71c5bcb56 "b21994ec-f7da-4b76-ac0d-e43a89952232" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000PxdicIAB
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3268

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e5869b3.rbs

                          Filesize

                          8KB

                          MD5

                          6b1bc5a72ce6debff590868ed89fa7ee

                          SHA1

                          3aba5ae32878b80c0a287fbd3a179b4c4aefdb08

                          SHA256

                          ab7fe7a17869b148b22d9d602c8b1a1c70cb8142be31db41c735d14385cd1657

                          SHA512

                          0e89b8884f25cf500ab557d79e62436f7866108f3196ff5c3929178d3461110621365be4418282d33cdf87c54de4132af6c0066241fec4883c15140efec1cf0d

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                          Filesize

                          753B

                          MD5

                          8298451e4dee214334dd2e22b8996bdc

                          SHA1

                          bc429029cc6b42c59c417773ea5df8ae54dbb971

                          SHA256

                          6fbf5845a6738e2dc2aa67dd5f78da2c8f8cb41d866bbba10e5336787c731b25

                          SHA512

                          cda4ffd7d6c6dff90521c6a67a3dba27bf172cc87cee2986ae46dccd02f771d7e784dcad8aea0ad10decf46a1c8ae1041c184206ec2796e54756e49b9217d7ba

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

                          Filesize

                          142KB

                          MD5

                          477293f80461713d51a98a24023d45e8

                          SHA1

                          e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

                          SHA256

                          a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

                          SHA512

                          23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

                          Filesize

                          1KB

                          MD5

                          b3bb71f9bb4de4236c26578a8fae2dcd

                          SHA1

                          1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

                          SHA256

                          e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

                          SHA512

                          fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

                          Filesize

                          210KB

                          MD5

                          c106df1b5b43af3b937ace19d92b42f3

                          SHA1

                          7670fc4b6369e3fb705200050618acaa5213637f

                          SHA256

                          2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

                          SHA512

                          616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

                          Filesize

                          693KB

                          MD5

                          2c4d25b7fbd1adfd4471052fa482af72

                          SHA1

                          fd6cd773d241b581e3c856f9e6cd06cb31a01407

                          SHA256

                          2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

                          SHA512

                          f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

                          Filesize

                          247KB

                          MD5

                          aa5cf64d575b7544eefd77f256c4dc57

                          SHA1

                          bd23989db4f9af0aae34d032e817d802c06ca5a9

                          SHA256

                          79c5afd94d0ffa3519a90e691a6d47f9c2eec93277f7d369aa34e64b171fc920

                          SHA512

                          774aeb5188c536d556a8c7a0cd3dfd9ab22d7bc0ad13353d11c9153232585da352552a69eb967a741372a99db490df355a5a47696b2ea446582c834c963cfeff

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

                          Filesize

                          588KB

                          MD5

                          17d74c03b6bcbcd88b46fcc58fc79a0d

                          SHA1

                          bc0316e11c119806907c058d62513eb8ce32288c

                          SHA256

                          13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

                          SHA512

                          f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                          Filesize

                          221B

                          MD5

                          18bc260b5a952109c3f3350ecdd3b137

                          SHA1

                          c6ef7afd6d59aa64dc0b29828db22a832a6bfbd4

                          SHA256

                          0cd6bdec67c30ba345ff087b0a3a53549c8ff450b7340b9b909b29f9f55e2c0b

                          SHA512

                          b7cf13374bead0cb912af7c37f6055fac84ce933d7a11103265aded1480c97de699e03992f062cf41a896295fc6982b64f0a9d959231d8a19c2d6fee6d10b1fc

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                          Filesize

                          471B

                          MD5

                          a92359bcd40ab68df3b2a726b293703e

                          SHA1

                          03af49fbe93ce7312ceb352c712941d1ac5fd2f0

                          SHA256

                          e61fca89129e6e9eecaafaa8612f1d82efb267b900a8ca27427fa0b32e065c63

                          SHA512

                          f2f2ff4c354ce68642ec37357e40c28cfc2449bfa9971ffe59c800a50287f8a39b5729a6fb2aaf8f23b9f45ea3e478a9f12dbba0479d93e4c2c598263aa7ce92

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                          Filesize

                          727B

                          MD5

                          62f50b09757845b91a11afe304f912e7

                          SHA1

                          ca2093d46e2a9138ef71e5cb6d53d6ced356ec76

                          SHA256

                          9979dad90650f1a6d82d38cb84e4055e46b88f28bcc099b51cd5e2444cc280e9

                          SHA512

                          6b54ad0a12455914f3140a1f5341807cbd97470419109470eabab6cfa1083b703dfd19ea276caba534777bcc8265d80659e6d8db06bc03de57fb6fb3d9e68133

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                          Filesize

                          727B

                          MD5

                          f11d59d55f077f02f2651680043ddaa2

                          SHA1

                          0146112dcbb3b26a6c6f24839f6b1276934eb35b

                          SHA256

                          a642d13d047785429ffb39d7bfc6e7dd0b92b1be61170e6ecc876671a02fb6e2

                          SHA512

                          313151140da21c56c26d5ec8a4a49e791d9654e15fb387b5f1374337a644c0e7deb0e3d9c45a9f02b3ee5b83b6cd1a03fa4bbda857d3ce5a332eaa06487be5b4

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

                          Filesize

                          400B

                          MD5

                          9346e6787a49bd4dbf6504750aa3b64f

                          SHA1

                          76da91302ddcb5090cd87fe4f202b6b95b348519

                          SHA256

                          062a60bda1d11e1af0bfbb734cc69b9650a731b863445785061da66d84539307

                          SHA512

                          6949596f46387d0bc589e8e8a18c93f0b0bf1656aae76ae657fd7115a1d2363d66751fe31258f3e4d534a08503159f12855adcd18c5ae0b7ef01db5ac710b066

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944

                          Filesize

                          404B

                          MD5

                          b580e05d1d463b2d1a49c99acd57a23f

                          SHA1

                          fc942f610cf751a5acd31cbdda712db8dd74c748

                          SHA256

                          ba4c0887c56e7f3b10f219a8382d420766e23fd7cace98ede48613f80be49037

                          SHA512

                          74970e6b4ec1289ec2e437d303a1e58052a673f49daca08c8aeac345dc87aed8cbb6b5328384910c24aa73f51312dc36b862230ebe461b176e681e40685d5af8

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                          Filesize

                          412B

                          MD5

                          9417b33d312c5d6d60387751c7b708a1

                          SHA1

                          d400ee0b5d4b8de9dbe18d177300f24718c1efe5

                          SHA256

                          1e9b3b014d1b6736970ef1f873b5f586d3c07566e2fd1f282c48f982db6a04ce

                          SHA512

                          4164bbe2cda66ec235c7ef9bfa83d1c03339a60c36f6e2265526055043301fa08f53a9885857d66570053960afb60ea6540cf2bec2f73a5ffb021eea8b03fc8c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          562581f81c2e37898355130b47903e0e

                          SHA1

                          e535e8b648bbde03b6ebea74c0df5f39e3d3eb83

                          SHA256

                          97c7d7722e55c1c367e36ed06ec8ccfd4fafe18299bbe8acb38d4180532d9790

                          SHA512

                          34f35098a1bed4c48596180b2574618847ec61d778d97285e5421c048766ba320bb2a40b305f70bc8561e1084fba78c56ef77737e2df86f318ba60ec16d59560

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          690B

                          MD5

                          53b01db6037bb7ceea41f55efa6ddeba

                          SHA1

                          d48cb106610ea1aca1589157d9177bfd3b8b2119

                          SHA256

                          bca054d07c44ccc97fbb818faa7476ca5c9dddae20f026a5de07d501e1a15b63

                          SHA512

                          735e4761c89148c3aa53a17e3ffc5c93fcdda9aa34a109cb01fd250c47c816724a18c39ae7950aea2352373e7a7695388b344444fd411da653e47e655cacf769

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          57750f4eff4811685b6d2d946645adfa

                          SHA1

                          7d5b816d53a3d289b8694c90ac1c38ba4f89282c

                          SHA256

                          715075886101c22b23b4a333af311705fa5d1f158785a332572866a5dc4b215f

                          SHA512

                          56d70a12d642d5ae3e711be3180ee26092c66720d613cb87de3b6cab6779ffaa6159fbecd2638e7d67dd95d34b2c0b5f9b9c34961f490bb67d1a53fad212d080

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          97fcd63da9578926adbe1fa429215086

                          SHA1

                          a8e3ee5f589a4c0afcfdcd3113652af331cab6b8

                          SHA256

                          757d70ae78ea36d8b303051c6f68d74dbd39696d8e5e37376bab23e7b9ef5329

                          SHA512

                          809f6b2d04d20c332bccd5c870943db4fb75e40adc190ad7c6d80026baffb15b18c79389361b0ea07e765e8ab9d084bb4d5a464b38ff48430cb495d9ad5e701b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          8KB

                          MD5

                          aab0de3c72b11974d6369d11e58ee27e

                          SHA1

                          f25986f4524330a227be9374018e81cf598b11d0

                          SHA256

                          cfd3bad0ac11c510c80022c281440894bc25ef6e67a7e40729fcf35638ce6a90

                          SHA512

                          440518837d73fa6d26629cd6e43b2e3a83c2d4fed41b0a390857fad5e04c94272f4ba6e0f654fa37e76b04a8bdc4e48b4393390c6d45461bb8656bbb8de7dbe6

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          122KB

                          MD5

                          374557e3cf94e2c1045770429f8502fc

                          SHA1

                          6272d4c9b63e53796aef324f6e4639ebac89133e

                          SHA256

                          08dd136e6de676ee709ae3ffd371c7f1beadd131c935f6833fa2f54aa0ef63f8

                          SHA512

                          dc173f61a8c19d614a05157936e026e26a168ad355bf7d0962578834c618fc2774860322c2feba12154f5a2e4873c05081e28e38505ee6ecc54cc50cd08fc2b2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          122KB

                          MD5

                          10dd9ed701bb8138f97d67bafbbac24f

                          SHA1

                          d7299c346d585ecf4cbf652a7e702f2a94861d99

                          SHA256

                          142ad6e764291d578646678876b7c86f67a27fcee76fac8e1e06d46aedef8047

                          SHA512

                          9a65198d76c5a1d10a6023962adade4d3c263071184c215a7e48bfa9bc685dc9c2f0837d8aae8b6df091efaea6547635cc7c184336685e803a9a33ef2c2e58f2

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                          Filesize

                          651B

                          MD5

                          9bbfe11735bac43a2ed1be18d0655fe2

                          SHA1

                          61141928bb248fd6e9cd5084a9db05a9b980fb3a

                          SHA256

                          549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                          SHA512

                          a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                        • C:\Users\Admin\Downloads\Unconfirmed 952449.crdownload

                          Filesize

                          2.9MB

                          MD5

                          670d86e56e15bc8c931d776bc796679d

                          SHA1

                          7201e9f354465e2ef277238cdfb46c3c96e90648

                          SHA256

                          b6def77b1b51f144d13bd8df1036902eaa87112782d812313231d7e317a650c0

                          SHA512

                          e35ff9389149cfb58cee986ede05cfa3c5f27f5b9c67b3bdb174837382f462e3d6b05b5b9990f10021660c802cd41a8c881cb7b495c16f78a63f332a305e7b28

                        • C:\Windows\Installer\MSI6A3E.tmp

                          Filesize

                          509KB

                          MD5

                          88d29734f37bdcffd202eafcdd082f9d

                          SHA1

                          823b40d05a1cab06b857ed87451bf683fdd56a5e

                          SHA256

                          87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

                          SHA512

                          1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

                        • C:\Windows\Installer\MSI6A3E.tmp-\AlphaControlAgentInstallation.dll

                          Filesize

                          25KB

                          MD5

                          aa1b9c5c685173fad2dabebeb3171f01

                          SHA1

                          ed756b1760e563ce888276ff248c734b7dd851fb

                          SHA256

                          e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

                          SHA512

                          d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

                        • C:\Windows\Installer\MSI6A3E.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                          Filesize

                          179KB

                          MD5

                          1a5caea6734fdd07caa514c3f3fb75da

                          SHA1

                          f070ac0d91bd337d7952abd1ddf19a737b94510c

                          SHA256

                          cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                          SHA512

                          a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                        • C:\Windows\Installer\MSI6FAE.tmp-\CustomAction.config

                          Filesize

                          1KB

                          MD5

                          bc17e956cde8dd5425f2b2a68ed919f8

                          SHA1

                          5e3736331e9e2f6bf851e3355f31006ccd8caa99

                          SHA256

                          e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

                          SHA512

                          02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

                        • C:\Windows\Installer\MSI6FAE.tmp-\Newtonsoft.Json.dll

                          Filesize

                          695KB

                          MD5

                          715a1fbee4665e99e859eda667fe8034

                          SHA1

                          e13c6e4210043c4976dcdc447ea2b32854f70cc6

                          SHA256

                          c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

                          SHA512

                          bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

                        • C:\Windows\Installer\MSI75FA.tmp

                          Filesize

                          211KB

                          MD5

                          a3ae5d86ecf38db9427359ea37a5f646

                          SHA1

                          eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                          SHA256

                          c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                          SHA512

                          96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                        • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                          Filesize

                          412B

                          MD5

                          5505e7ce640126e959ecc5d1434d47a0

                          SHA1

                          99f84cbde5a384a53cf347773d15692223caf564

                          SHA256

                          ad8d737203279d72cd963d68dc5edd36f80126a8474fa8029b808ea5864bf906

                          SHA512

                          0a3acfb485413acf8ae25d7e7aa5dd8fcf605bff9e6dd315498d99bc132b8828bef58ad5fc6c7b90dab7fd0ee0d3a36877f9239fdffaf7a08abb621635ce7fa5

                        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                          Filesize

                          24.1MB

                          MD5

                          1460e7d734ab2c7746b06c06d7f172fc

                          SHA1

                          401a9557148e9020ffdec79948ad91f39ead53bf

                          SHA256

                          fa34963218b18033908d0dcc7b29c0280c375f69bfe438505a6b1cf26b3c1804

                          SHA512

                          3be78bc1ca3cf6772b175cecda01aaa711d277c86283fdb069a324499c7a3deb92fbeeaf5e89dd01e0e26fcfdfd7a7d837a4990adc9c00c6c3970f1aa74d3904

                        • \??\Volume{37f93794-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{566a0229-83a9-477b-ab70-640e427b289b}_OnDiskSnapshotProp

                          Filesize

                          6KB

                          MD5

                          5190d7948da6b7a6ab9440d88f2caa40

                          SHA1

                          16190bd731bcd9a200e6754ee2f9da55980d220f

                          SHA256

                          b562920a3fea597cad986a44fba734df97104456802bfe436abfee4491eba8c4

                          SHA512

                          6977a51544a5f757edb78091b297fc8acf8144733b438929265474df1258d07b4f5438bdde7c6945abe8ad88026971945258fceb0cfd46f41ec4898279146712

                        • memory/1712-148-0x00000000055F0000-0x0000000005944000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/1712-147-0x0000000003060000-0x0000000003082000-memory.dmp

                          Filesize

                          136KB

                        • memory/1712-144-0x0000000005530000-0x00000000055E2000-memory.dmp

                          Filesize

                          712KB

                        • memory/2268-217-0x000002293D2B0000-0x000002293D2D8000-memory.dmp

                          Filesize

                          160KB

                        • memory/2268-234-0x000002293EEF0000-0x000002293EF2C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2268-233-0x000002293EE60000-0x000002293EE72000-memory.dmp

                          Filesize

                          72KB

                        • memory/2268-229-0x00000229578D0000-0x0000022957968000-memory.dmp

                          Filesize

                          608KB

                        • memory/4068-179-0x0000000005360000-0x00000000053C6000-memory.dmp

                          Filesize

                          408KB

                        • memory/4464-111-0x0000000004DF0000-0x0000000004DFC000-memory.dmp

                          Filesize

                          48KB

                        • memory/4464-107-0x0000000004DB0000-0x0000000004DDE000-memory.dmp

                          Filesize

                          184KB

                        • memory/4980-269-0x000002A546A50000-0x000002A546B02000-memory.dmp

                          Filesize

                          712KB

                        • memory/4980-274-0x000002A52DFE0000-0x000002A52E002000-memory.dmp

                          Filesize

                          136KB

                        • memory/4980-311-0x000002A546F50000-0x000002A546F88000-memory.dmp

                          Filesize

                          224KB

                        • memory/5036-335-0x000001BCC7FA0000-0x000001BCC7FE2000-memory.dmp

                          Filesize

                          264KB

                        • memory/5036-337-0x000001BCC8840000-0x000001BCC885C000-memory.dmp

                          Filesize

                          112KB

                        • memory/5036-336-0x000001BCC8A20000-0x000001BCC8AD0000-memory.dmp

                          Filesize

                          704KB