Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/04/2025, 01:12

General

  • Target

    f2cf1589f2c34fb845c7514db1a07ade8e5f5b786e690f795507fdedc871fd3c.msi

  • Size

    2.9MB

  • MD5

    4166a7fc9a5726e2a468dc7e053b2a24

  • SHA1

    fa2e7de96f5f4cafdc95767c4e8adee460d0399e

  • SHA256

    f2cf1589f2c34fb845c7514db1a07ade8e5f5b786e690f795507fdedc871fd3c

  • SHA512

    b5676a7e71ea5764946c436ee2816345dbd263f90ffb00a2b69558a1c1419324f6ef6d6a5f5a0d3de492a491725d9d1e9ad21af0302a12fe8c9220c8f0665b69

  • SSDEEP

    49152:i+1Ypn4N2MGVv1zyIBWGppT9jnMHRjOOozjcqZJN8dUZTwYaH7oqPxMbY+K/tzQz:i+lUlz9FKbsodq0YaH7ZPxMb8tT

Malware Config

Signatures

  • AteraAgent

    AteraAgent is a remote monitoring and management tool.

  • Ateraagent family
  • Detects AteraAgent 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Drops file in Drivers directory 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Downloads MZ/PE file 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 64 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 20 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 13 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f2cf1589f2c34fb845c7514db1a07ade8e5f5b786e690f795507fdedc871fd3c.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2816
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6060
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4816
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 32DF8A4C254889F9E1DA0C8E28EC6D90
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSI9DF5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240623312 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
          3⤵
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5380
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIA0C5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240623828 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
          3⤵
          • Blocklisted process makes network request
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3612
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIA625.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240625218 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
          3⤵
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5416
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\Windows\Installer\MSIB4B1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240628968 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
          3⤵
          • Blocklisted process makes network request
          • Drops file in Windows directory
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:5996
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 4112392C53D0E6239424C8802376CBE6 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Windows\SysWOW64\NET.exe
          "NET" STOP AteraAgent
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 STOP AteraAgent
            4⤵
            • System Location Discovery: System Language Discovery
            PID:5784
        • C:\Windows\SysWOW64\TaskKill.exe
          "TaskKill.exe" /f /im AteraAgent.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2336
      • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
        "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="[email protected]" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000RfSDkIAN" /AgentId="e2e8eb15-c9e3-46d4-9791-9bdf53adfa50"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:5180
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C9743BC8F87B3EC757EBF7067F04B133 E Global\MSI0000
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:1404
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0FBD8142-1EB3-48E4-93F6-6AFB219257A8}
          3⤵
          • Executes dropped EXE
          PID:3416
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8B699940-0A82-4CA3-B988-D870A37A35DC}
          3⤵
          • Executes dropped EXE
          PID:5296
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D68961CB-C77C-49AC-B162-A0F7F8F12F94}
          3⤵
          • Executes dropped EXE
          PID:8
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{70FD986C-7F7B-4A6E-A7C0-011EF3734E18}
          3⤵
          • Executes dropped EXE
          PID:4084
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{839DC6E6-2189-4A50-937C-FEA911F46260}
          3⤵
          • Executes dropped EXE
          PID:2448
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E83D47D9-A846-4231-A3F5-AE3E43B48979}
          3⤵
          • Executes dropped EXE
          PID:3488
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1F089D15-AE3C-4B42-8E72-E97971DA60A4}
          3⤵
          • Executes dropped EXE
          PID:3520
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2F72F7E7-E5C8-40AF-A479-72F4F999F8AE}
          3⤵
          • Executes dropped EXE
          PID:2356
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EE71AC8D-BB7A-4D8C-B3F1-F057BE7377F4}
          3⤵
          • Executes dropped EXE
          PID:4132
        • C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe
          C:\Windows\TEMP\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isF201.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C14CC0A0-BE23-4DC7-B325-A698F736543B}
          3⤵
          • Executes dropped EXE
          PID:5764
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRServer.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5032
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRServer.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:3684
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRApp.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5596
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRApp.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:5708
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAppPB.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5668
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAppPB.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRFeature.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4236
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRFeature.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2236
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRFeatMini.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:5888
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRFeatMini.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:5152
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRManager.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3736
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRManager.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:5848
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAgent.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4004
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAgent.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2948
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRChat.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4148
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRChat.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:5224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRAudioChat.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2880
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRAudioChat.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:5604
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\SysWOW64\cmd.exe /C "taskkill.exe /F /IM SRVirtualDisplay.exe /T"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4824
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill.exe /F /IM SRVirtualDisplay.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2380
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A90E28A4-2487-49F9-A5A7-8614062AE533}
          3⤵
          • Executes dropped EXE
          PID:1212
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{4F6CDCDB-DBF6-45F3-BCE7-50AD5530CAE8}
          3⤵
          • Executes dropped EXE
          PID:4160
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AD5E17A4-994D-400F-867B-340BF1F96EE5}
          3⤵
          • Executes dropped EXE
          PID:2724
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{30BA803F-E428-41D4-852C-62CF13E0AF78}
          3⤵
          • Executes dropped EXE
          PID:840
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{95219E83-69BC-4326-ACAF-A65EBD9FB46B}
          3⤵
          • Executes dropped EXE
          PID:1944
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E48E9551-4851-4E0F-A31C-FC5C519E0BDD}
          3⤵
          • Executes dropped EXE
          PID:2592
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A3D2D73B-ED35-465E-BAA7-B7357992810D}
          3⤵
          • Executes dropped EXE
          PID:1152
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9AB4F685-8821-47CA-BB73-6717C4967C9F}
          3⤵
          • Executes dropped EXE
          PID:624
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{40F39196-D2F2-4E65-A8AB-0477584F1B62}
          3⤵
          • Executes dropped EXE
          PID:4380
        • C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe
          C:\Windows\TEMP\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{162F382E-9C31-4ADB-8877-C820898BA807}
          3⤵
          • Executes dropped EXE
          PID:5196
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9A3CA6A9-1109-4D3E-8846-2D645EC1C260}
          3⤵
          • Executes dropped EXE
          PID:5624
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{60C20124-2B29-4FEA-B181-C98CE44FBDC7}
          3⤵
          • Executes dropped EXE
          PID:3396
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{527ED118-2A4C-4B84-BF7E-09602B9352ED}
          3⤵
          • Executes dropped EXE
          PID:4332
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A7C3A656-DBCE-4FFB-9ADC-384F7B80781C}
          3⤵
          • Executes dropped EXE
          PID:3484
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B7DD6603-83C6-4B52-AF43-DAC523985C57}
          3⤵
          • Executes dropped EXE
          PID:1364
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B925CC22-73FA-4D7E-A719-8193BD3857EA}
          3⤵
          • Executes dropped EXE
          PID:1684
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{92F019E9-BF0E-42F7-BBBB-114ADC792DE3}
          3⤵
          • Executes dropped EXE
          PID:3216
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CA94FF30-8FBA-4958-B124-AF312C86ACCB}
          3⤵
          • Executes dropped EXE
          PID:2748
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F524AED8-3166-4374-9374-29D54D839EED}
          3⤵
          • Executes dropped EXE
          PID:5928
        • C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe
          C:\Windows\TEMP\{4DA70CB7-9F6C-4452-A0C0-7897B6004B2C}\_is171F.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B44F493A-8EC3-4AF9-B65B-213868ABC69B}
          3⤵
          • Executes dropped EXE
          PID:5152
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P ADDUSERINFO /V "sec_opt=0,confirm_d=0,hidewindow=1"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4544
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P USERSESSIONID
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4900
        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe
          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Support\SetupUtil.exe" /P ST_EVENT
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4496
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd.exe" /C "C:\Windows\system32\wevtutil.exe" um "C:\ProgramData\Splashtop\Common\Event\stevt_srs_provider.man"
            4⤵
              PID:4740
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /C "C:\Windows\system32\wevtutil.exe" im "C:\ProgramData\Splashtop\Common\Event\stevt_srs_provider.man"
              4⤵
                PID:1952
            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRSelfSignCertUtil.exe
              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRSelfSignCertUtil.exe" -g
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4128
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3F71727C-5301-4A18-8EA8-63AC6BEA5BB3}
              3⤵
              • Executes dropped EXE
              PID:1036
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B99DD77B-8ABC-4847-BC36-FED78617399B}
              3⤵
              • Executes dropped EXE
              PID:452
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE567097-B991-4E73-A89B-A52A2C7EABB5}
              3⤵
              • Executes dropped EXE
              PID:5860
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EFB889E0-E8F3-4DA2-981B-305899CE25C1}
              3⤵
              • Executes dropped EXE
              PID:4112
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{150BF92B-E50D-4AEF-B240-E210B27747F1}
              3⤵
              • Executes dropped EXE
              PID:3384
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8545277C-C675-464D-8A86-66C818A25577}
              3⤵
              • Executes dropped EXE
              PID:2452
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8621905B-AE8D-40FB-99D1-7DF4E2ED3021}
              3⤵
              • Executes dropped EXE
              PID:2592
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{10E1236F-2A14-4C30-A39D-9B87B629B4A2}
              3⤵
              • Executes dropped EXE
              PID:5624
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{099C37AA-6078-447B-8D99-CD6C8757A890}
              3⤵
              • Executes dropped EXE
              PID:3396
            • C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe
              C:\Windows\TEMP\{780EDC16-57A5-4033-BDAA-23D3E4B6C0E8}\_is29DE.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{18C8A7EB-AA30-4956-8679-54411C32EF3A}
              3⤵
              • Executes dropped EXE
              PID:4332
            • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
              "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe" -i
              3⤵
              • Drops file in Program Files directory
              • Executes dropped EXE
              • Modifies registry class
              PID:2040
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C61E0764-4A17-4710-AFFF-A3F920C176C3}
              3⤵
              • Executes dropped EXE
              PID:5928
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8AA2CBE1-3E0E-40EB-8ADD-6C4AB963C57D}
              3⤵
              • Executes dropped EXE
              PID:1584
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C519C025-BFFD-4B02-A2BF-A45ACDFB37BB}
              3⤵
              • Executes dropped EXE
              PID:1552
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{CD512B2D-C021-4196-AC1C-8CA088D6EB58}
              3⤵
              • Executes dropped EXE
              PID:5076
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5948A1D7-D47A-44AF-BE99-EBB7DA263373}
              3⤵
              • Executes dropped EXE
              PID:4356
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B83FA0C8-7ABF-489E-8E7E-3DC7D7E2EEDF}
              3⤵
              • Executes dropped EXE
              PID:4376
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{82ACC80C-7BE9-47AE-A3CD-0D4A271A32B4}
              3⤵
              • Executes dropped EXE
              PID:1540
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F75F8329-597C-47B4-8033-635A84EC0486}
              3⤵
              • Executes dropped EXE
              PID:5476
            • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
              C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2230C669-BA2D-4F9B-A0F8-E40CEA6908DD}
              3⤵
                PID:4000
              • C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe
                C:\Windows\TEMP\{2C9C080C-16F3-4FB8-AA85-5BCD2991E78A}\_is2C9E.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E701143C-1EB5-47CB-B5CE-1339F4CCE0E9}
                3⤵
                  PID:2620
                • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
                  "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe" -r
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1428
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 7D83FC398D6B10CD73F430DCF807EB1B E Global\MSI0000
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5012
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSI7608.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240678437 463 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
                  3⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:436
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSI76B5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240678593 467 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
                  3⤵
                  • Blocklisted process makes network request
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5372
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSID2E0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240702171 472 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
                  3⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5260
                • C:\Windows\SysWOW64\NET.exe
                  "NET" STOP AteraAgent
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3024
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 STOP AteraAgent
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:5196
                • C:\Windows\SysWOW64\TaskKill.exe
                  "TaskKill.exe" /f /im AteraAgent.exe
                  3⤵
                  • Kills process with taskkill
                  PID:2268
                • C:\Windows\syswow64\NET.exe
                  "NET" STOP AteraAgent
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:5744
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 STOP AteraAgent
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4160
                • C:\Windows\syswow64\TaskKill.exe
                  "TaskKill.exe" /f /im AteraAgent.exe
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  PID:5476
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe "C:\Windows\Installer\MSIF313.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240710406 510 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
                  3⤵
                  • Blocklisted process makes network request
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5304
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /u
                2⤵
                • Drops file in System32 directory
                PID:4560
              • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
                "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="" /CompanyId="" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="" /AgentId="3abde51a-162b-418e-ab69-721425815709"
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                PID:1108
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding F757A10BBC44875FB1BD6AC0B2717F11 E Global\MSI0000
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2648
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding F7F7941BA584D6754DD04A15D46D1D38 E Global\MSI0000
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4284
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 7A1675ECA9DEBF25B5EAC8E2CD8D4A50 E Global\MSI0000
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5348
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              PID:4716
            • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
              "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
              1⤵
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3480
              • C:\Windows\System32\sc.exe
                "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                2⤵
                • Launches sc.exe
                PID:3392
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "ad9c8c8d-81de-476c-baaa-b6328f95adba" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000RfSDkIAN
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:4612
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "295d01d3-cc74-43bb-8132-28fdd39e4732" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000RfSDkIAN
                2⤵
                • Drops file in System32 directory
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2572
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "5b4b066a-f41a-4450-bdc5-f1a27ed5a979" agent-api.atera.com/Production 443 or8ixLi90Mf "identified" 001Q300000RfSDkIAN
                2⤵
                • Executes dropped EXE
                PID:344
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "827e62e9-be32-4bc3-aa8a-15de4df81d92" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo fromGui" 001Q300000RfSDkIAN
                2⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:5508
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" -NoProfile -File "C:\Windows\TEMP\Windows 11 Readiness.ps1"
                  3⤵
                  • Drops file in System32 directory
                  • Command and Scripting Interpreter: PowerShell
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3376
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5920
                  • C:\Windows\system32\cscript.exe
                    cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                    4⤵
                    • Modifies data under HKEY_USERS
                    PID:6020
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "165a57ad-7841-4cab-a934-74d0bb0b3826" agent-api.atera.com/Production 443 or8ixLi90Mf "install eyJSbW1Db2RlIjoiaFpDREZQaEs3NW1KIiwiUmVxdWVzdFBlcm1pc3Npb25PcHRpb24iOjMsIlJlcXVpcmVQYXNzd29yZE9wdGlvbiI6bnVsbCwiUGFzc3dvcmQiOm51bGx9" 001Q300000RfSDkIAN
                2⤵
                • Downloads MZ/PE file
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3064
                • C:\Windows\TEMP\SplashtopStreamer.exe
                  "C:\Windows\TEMP\SplashtopStreamer.exe" prevercheck /s /i sec_opt=0,confirm_d=0,hidewindow=1
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies data under HKEY_USERS
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4728
                  • C:\Windows\Temp\unpack\PreVerCheck.exe
                    "C:\Windows\Temp\unpack\PreVerCheck.exe" /s /i sec_opt=0,confirm_d=0,hidewindow=1
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3028
                    • C:\Windows\SysWOW64\msiexec.exe
                      msiexec /norestart /i "setup.msi" /qn /l*v "C:\Windows\TEMP\PreVer.log.txt" CA_EXTPATH=1 USERINFO="sec_opt=0,confirm_d=0,hidewindow=1"
                      5⤵
                        PID:3492
                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "ffe759b9-3385-41f0-91e8-340b33291fe4" agent-api.atera.com/Production 443 or8ixLi90Mf "syncprofile" 001Q300000RfSDkIAN
                  2⤵
                  • Drops file in System32 directory
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:5176
              • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
                "C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
                1⤵
                • Drops file in Program Files directory
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:2340
                • C:\Windows\System32\sc.exe
                  "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                  2⤵
                  • Launches sc.exe
                  PID:5124
                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "0638d575-7a96-48db-8451-435333cfdbe5" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo" 001Q300000RfSDkIAN
                  2⤵
                    PID:5920
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "powershell.exe" -NoProfile -File "C:\Windows\TEMP\Windows 11 Readiness.ps1"
                      3⤵
                      • Drops file in System32 directory
                      • Command and Scripting Interpreter: PowerShell
                      • Modifies data under HKEY_USERS
                      PID:3428
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                      3⤵
                        PID:6100
                        • C:\Windows\system32\cscript.exe
                          cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                          4⤵
                          • Modifies data under HKEY_USERS
                          PID:392
                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                      "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "868ba1b1-85ec-4a84-a855-aafa2b13112c" agent-api.atera.com/Production 443 or8ixLi90Mf "downloadifneeded" 001Q300000RfSDkIAN
                      2⤵
                        PID:4676
                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe" -a "st-streamer://com.splashtop.streamer?rmm_code=hZCDFPhK75mJ&rmm_session_pwd=f7d7e603836664202427ce0a5f802b59&rmm_session_pwd_ttl=86400"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:916
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "b0de4fe2-c14e-4ce7-8dce-2e81fdfceaa1" agent-api.atera.com/Production 443 or8ixLi90Mf "maintain" 001Q300000RfSDkIAN
                        2⤵
                        • Drops file in System32 directory
                        • Modifies registry class
                        PID:4936
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "23f4c1e2-d7cb-4b6d-bfac-eac3cc23299f" agent-api.atera.com/Production 443 or8ixLi90Mf "pollAll" 001Q300000RfSDkIAN
                        2⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:1444
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "b6d96d0d-72b9-4fa2-bae8-cac3aad3e96d" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat" 001Q300000RfSDkIAN
                        2⤵
                        • Drops file in System32 directory
                        PID:4552
                      • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
                        "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "45dcfc02-e55e-4d1c-a528-85375fbdaf89" agent-api.atera.com/Production 443 or8ixLi90Mf "agentprovision" 001Q300000RfSDkIAN
                        2⤵
                        • Drops file in System32 directory
                        PID:5840
                        • C:\Windows\System32\Conhost.exe
                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          3⤵
                            PID:4356
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "219c5981-f3bb-40a9-b8a7-a5245c08dbab" agent-api.atera.com/Production 443 or8ixLi90Mf "probe" 001Q300000RfSDkIAN
                          2⤵
                          • Drops file in System32 directory
                          PID:1416
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "09536b7a-0951-4691-89e1-af213215efa8" agent-api.atera.com/Production 443 or8ixLi90Mf "monitor" 001Q300000RfSDkIAN
                          2⤵
                          • Writes to the Master Boot Record (MBR)
                          • Modifies data under HKEY_USERS
                          PID:5084
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "277bdfa2-6e82-4735-879d-4bf4b783f3eb" agent-api.atera.com/Production 443 or8ixLi90Mf "getlistofallupdates" 001Q300000RfSDkIAN
                          2⤵
                          • Drops file in System32 directory
                          PID:3480
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "ecfd7aed-e5ee-4aea-97f1-c8aa1728d924" agent-api.atera.com/Production 443 or8ixLi90Mf "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" 001Q300000RfSDkIAN
                          2⤵
                          • Downloads MZ/PE file
                          • Drops file in System32 directory
                          PID:5100
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /K "cd /d C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                            3⤵
                            • System Time Discovery
                            PID:1028
                            • C:\Program Files\dotnet\dotnet.exe
                              dotnet --list-runtimes
                              4⤵
                              • System Time Discovery
                              PID:5260
                          • C:\Program Files\dotnet\dotnet.exe
                            "C:\Program Files\dotnet\dotnet" --list-runtimes
                            3⤵
                            • System Time Discovery
                            PID:5940
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\8-0-11.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\8-0-11.exe" /repair /quiet /norestart
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4936
                            • C:\Windows\Temp\{1380653E-0256-4F87-AC35-0456C474B179}\.cr\8-0-11.exe
                              "C:\Windows\Temp\{1380653E-0256-4F87-AC35-0456C474B179}\.cr\8-0-11.exe" -burn.clean.room="C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\8-0-11.exe" -burn.filehandle.attached=720 -burn.filehandle.self=724 /repair /quiet /norestart
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • System Time Discovery
                              • Modifies data under HKEY_USERS
                              PID:5928
                              • C:\Windows\Temp\{E3F7B5DC-C163-47E7-B005-5CDEDC61BDA0}\.be\dotnet-runtime-8.0.11-win-x64.exe
                                "C:\Windows\Temp\{E3F7B5DC-C163-47E7-B005-5CDEDC61BDA0}\.be\dotnet-runtime-8.0.11-win-x64.exe" -q -burn.elevated BurnPipe.{DCB28C82-2AF1-4513-9DAD-762089B12C98} {8DD1A808-923F-4C7F-B161-CA9F73169EA4} 5928
                                5⤵
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • System Time Discovery
                                • Modifies registry class
                                PID:1616
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /K "cd /d C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                            3⤵
                            • System Time Discovery
                            PID:3220
                            • C:\Program Files\dotnet\dotnet.exe
                              dotnet --list-runtimes
                              4⤵
                              • System Time Discovery
                              PID:5852
                          • C:\Windows\SYSTEM32\cmd.exe
                            "cmd.exe" /K "cd /d C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                            3⤵
                            • System Time Discovery
                            PID:4552
                            • C:\Program Files\dotnet\dotnet.exe
                              dotnet --list-runtimes
                              4⤵
                              • System Time Discovery
                              PID:4024
                        • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Software\Agent.Package.Software.exe
                          "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Software\Agent.Package.Software.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "a38117f8-d852-4b4f-b19d-bc84408eae5a" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIyZ2V0LWluc3RhbGxlZC1zb2Z0d2FyZVx1MDAyMixcdTAwMjJDYWNoZVR0bEhvdXJzXHUwMDIyOjEyfSJ9" 001Q300000RfSDkIAN
                          2⤵
                            PID:1964
                          • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability\Agent.Package.Availability.exe
                            "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability\Agent.Package.Availability.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "f4593964-5a6d-400f-b848-b5fef7274848" agent-api.atera.com/Production 443 or8ixLi90Mf "connect" 001Q300000RfSDkIAN
                            2⤵
                              PID:4316
                            • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe
                              "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "fee950c5-32c9-40a3-b5b8-85d50b160098" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIybWFpbnRlbmFuY2VcdTAwMjIsXHUwMDIyRW5hYmxlZFx1MDAyMjpmYWxzZSxcdTAwMjJSZXBlYXRJbnRlcnZhbE1pbnV0ZXNcdTAwMjI6MTAsXHUwMDIyRGF5c0ludGVydmFsXHUwMDIyOjEsXHUwMDIyUmVwZWF0RHVyYXRpb25EYXlzXHUwMDIyOjF9In0=" 001Q300000RfSDkIAN
                              2⤵
                                PID:6108
                              • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe
                                "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "cae4401d-1c7c-4937-a33b-305cec7c481f" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBZENvbW1hbmRUeXBlIjo1LCJJbnN0YWxsYXRpb25GaWxlVXJsIjoiaHR0cHM6Ly9wYWNrYWdlc3N0b3JlLmJsb2IuY29yZS53aW5kb3dzLm5ldC9pbnN0YWxsZXJzL0FueURlc2svV2luZG93cy9BZ2VudF9BbnlEZXNrX0N1c3RvbV9DbGllbnRfOS4wLjUubXNpIiwiRm9yY2VJbnN0YWxsIjpmYWxzZSwiVGFyZ2V0VmVyc2lvbiI6IjkuMC41In0=" 001Q300000RfSDkIAN
                                2⤵
                                  PID:912
                                • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
                                  "C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "e891b122-cb39-436a-a51a-b6a385535607" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates" 001Q300000RfSDkIAN
                                  2⤵
                                    PID:5440
                                    • C:\Windows\SYSTEM32\msiexec.exe
                                      "msiexec.exe" /i C:\Windows\TEMP\ateraAgentSetup64_1_8_7_2.msi /lv* AteraSetupLog.txt /qn /norestart
                                      3⤵
                                        PID:5264
                                  • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe
                                    "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRService.exe"
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3212
                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRManager.exe
                                      "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRManager.exe"
                                      2⤵
                                      • Drops file in System32 directory
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4740
                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRServer.exe
                                        -h -t
                                        3⤵
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4084
                                      • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAgent.exe
                                        "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAgent.exe"
                                        3⤵
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:468
                                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\BdEpSDK.exe
                                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\BdEpSDK.exe" -v
                                          4⤵
                                            PID:5392
                                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAppPB.exe
                                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRAppPB.exe"
                                          3⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2448
                                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRFeature.exe
                                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRFeature.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1036
                                          • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                                            SRUtility.exe -r
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5624
                                        • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRVirtualDisplay.exe
                                          "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRVirtualDisplay.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5184
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\install_driver64.bat" nosetkey
                                            4⤵
                                              PID:392
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ver
                                                5⤵
                                                  PID:552
                                                • C:\Windows\system32\sc.exe
                                                  sc query ddmgr
                                                  5⤵
                                                  • Launches sc.exe
                                                  PID:1092
                                                • C:\Windows\system32\sc.exe
                                                  sc query lci_proxykmd
                                                  5⤵
                                                  • Launches sc.exe
                                                  PID:2812
                                                • C:\Windows\system32\rundll32.exe
                                                  rundll32 x64\my_setup.dll do_install_lci_proxywddm
                                                  5⤵
                                                  • Drops file in System32 directory
                                                  • Checks SCSI registry key(s)
                                                  • Modifies data under HKEY_USERS
                                                  PID:1120
                                        • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
                                          "C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe"
                                          1⤵
                                          • Drops file in Program Files directory
                                          • Modifies data under HKEY_USERS
                                          PID:5368
                                          • C:\Windows\System32\sc.exe
                                            "C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
                                            2⤵
                                            • Launches sc.exe
                                            PID:4848
                                          • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability\Agent.Package.Availability.exe
                                            "C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability\Agent.Package.Availability.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "58b473ba-b834-41fc-b534-6508f87fb479" agent-api.atera.com/Production 443 or8ixLi90Mf "connect" 001Q300000RfSDkIAN
                                            2⤵
                                              PID:5216
                                            • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe
                                              "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "dd567296-c5a5-49b4-8b51-0488a4adeae2" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBZENvbW1hbmRUeXBlIjo1LCJJbnN0YWxsYXRpb25GaWxlVXJsIjoiaHR0cHM6Ly9wYWNrYWdlc3N0b3JlLmJsb2IuY29yZS53aW5kb3dzLm5ldC9pbnN0YWxsZXJzL0FueURlc2svV2luZG93cy9BZ2VudF9BbnlEZXNrX0N1c3RvbV9DbGllbnRfOS4wLjUubXNpIiwiRm9yY2VJbnN0YWxsIjpmYWxzZSwiVGFyZ2V0VmVyc2lvbiI6IjkuMC41In0=" 001Q300000RfSDkIAN
                                              2⤵
                                                PID:2104
                                              • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe
                                                "C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "d37a8d1e-07cb-4a86-b5ee-e3fb6a028c85" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIybWFpbnRlbmFuY2VcdTAwMjIsXHUwMDIyRW5hYmxlZFx1MDAyMjpmYWxzZSxcdTAwMjJSZXBlYXRJbnRlcnZhbE1pbnV0ZXNcdTAwMjI6MTAsXHUwMDIyRGF5c0ludGVydmFsXHUwMDIyOjEsXHUwMDIyUmVwZWF0RHVyYXRpb25EYXlzXHUwMDIyOjF9In0=" 001Q300000RfSDkIAN
                                                2⤵
                                                  PID:4356
                                                • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
                                                  "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "1e3f936b-ed8e-4e16-8839-9b1b7fc52f32" agent-api.atera.com/Production 443 or8ixLi90Mf "generalinfo" 001Q300000RfSDkIAN
                                                  2⤵
                                                    PID:5992
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell.exe" -NoProfile -File "C:\Windows\TEMP\Windows 11 Readiness.ps1"
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Modifies data under HKEY_USERS
                                                      PID:5904
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                                                      3⤵
                                                        PID:5116
                                                        • C:\Windows\system32\cscript.exe
                                                          cscript "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /dstatus
                                                          4⤵
                                                            PID:1128
                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
                                                        "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "0baf80bd-b1af-4526-91ee-d2a8837ede6a" agent-api.atera.com/Production 443 or8ixLi90Mf "pollAll" 001Q300000RfSDkIAN
                                                        2⤵
                                                          PID:4112
                                                        • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
                                                          "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "7804950b-7a9c-4f43-8950-85780a9bd204" agent-api.atera.com/Production 443 or8ixLi90Mf "heartbeat" 001Q300000RfSDkIAN
                                                          2⤵
                                                            PID:5872
                                                          • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Software\Agent.Package.Software.exe
                                                            "C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Software\Agent.Package.Software.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "7190ca0d-3a8b-4df6-b57a-c6c550d21c67" agent-api.atera.com/Production 443 or8ixLi90Mf "eyJBcmd1bWVudHMiOiJ7XHUwMDIyQ29tbWFuZE5hbWVcdTAwMjI6XHUwMDIyZ2V0LWluc3RhbGxlZC1zb2Z0d2FyZVx1MDAyMixcdTAwMjJDYWNoZVR0bEhvdXJzXHUwMDIyOjEyfSJ9" 001Q300000RfSDkIAN
                                                            2⤵
                                                              PID:5748
                                                            • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
                                                              "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "c20bab78-b217-4048-828c-19a5b039c233" agent-api.atera.com/Production 443 or8ixLi90Mf "agentprovision" 001Q300000RfSDkIAN
                                                              2⤵
                                                                PID:5828
                                                              • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
                                                                "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "71860da8-e5e4-4244-84d7-c66e9f2b208a" agent-api.atera.com/Production 443 or8ixLi90Mf "monitor" 001Q300000RfSDkIAN
                                                                2⤵
                                                                • Writes to the Master Boot Record (MBR)
                                                                PID:4628
                                                              • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe
                                                                "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "bda9d690-bf58-483a-a87d-c63ab4ee28e8" agent-api.atera.com/Production 443 or8ixLi90Mf "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" 001Q300000RfSDkIAN
                                                                2⤵
                                                                  PID:632
                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                    "cmd.exe" /K "cd /d C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\" /
                                                                    3⤵
                                                                    • System Time Discovery
                                                                    PID:392
                                                                    • C:\Program Files\dotnet\dotnet.exe
                                                                      dotnet --list-runtimes
                                                                      4⤵
                                                                      • System Time Discovery
                                                                      PID:4176
                                                                • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
                                                                  "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "b1325342-79da-4d42-a877-85c99f4e6229" agent-api.atera.com/Production 443 or8ixLi90Mf "downloadifneeded" 001Q300000RfSDkIAN
                                                                  2⤵
                                                                    PID:1416
                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe
                                                                      "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\SRUtility.exe" -a "st-streamer://com.splashtop.streamer?rmm_code=hZCDFPhK75mJ&rmm_session_pwd=f7d7e603836664202427ce0a5f802b59&rmm_session_pwd_ttl=86400"
                                                                      3⤵
                                                                        PID:5204
                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
                                                                      "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "3e89ecd0-7297-4136-a608-cfe99a344256" agent-api.atera.com/Production 443 or8ixLi90Mf "probe" 001Q300000RfSDkIAN
                                                                      2⤵
                                                                        PID:3000
                                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
                                                                        "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "2e61b9a6-d3db-4866-9967-b2c3091132d0" agent-api.atera.com/Production 443 or8ixLi90Mf "getlistofallupdates" 001Q300000RfSDkIAN
                                                                        2⤵
                                                                        • Drops file in Program Files directory
                                                                        PID:4648
                                                                      • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
                                                                        "C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe" e2e8eb15-c9e3-46d4-9791-9bdf53adfa50 "6f9c31b0-37c9-42a1-aea3-2a37c5530a68" agent-api.atera.com/Production 443 or8ixLi90Mf "maintain" 001Q300000RfSDkIAN
                                                                        2⤵
                                                                        • Modifies registry class
                                                                        PID:1492
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" /burn.runonce
                                                                      1⤵
                                                                      • System Time Discovery
                                                                      PID:1056
                                                                      • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                        "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" /burn.runonce
                                                                        2⤵
                                                                        • System Time Discovery
                                                                        PID:4284
                                                                        • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                          "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" /quiet /norestart /burn.log.append "C:\Windows\TEMP\Microsoft_.NET_Runtime_-_8.0.11_(x64)_20250412011416.log"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • System Time Discovery
                                                                          PID:5096
                                                                          • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                            "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" -burn.filehandle.attached=520 -burn.filehandle.self=540 /quiet /norestart /burn.log.append "C:\Windows\TEMP\Microsoft_.NET_Runtime_-_8.0.11_(x64)_20250412011416.log"
                                                                            4⤵
                                                                            • Checks computer location settings
                                                                            • System Location Discovery: System Language Discovery
                                                                            • System Time Discovery
                                                                            PID:5352
                                                                            • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                              "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" -q -burn.elevated BurnPipe.{4D974948-CBC1-4F7B-9936-263140BD6BC8} {3850C46E-4E68-4511-8DDE-771F9F3194BA} 5352
                                                                              5⤵
                                                                              • Adds Run key to start application
                                                                              • System Location Discovery: System Language Discovery
                                                                              • System Time Discovery
                                                                              • Modifies registry class
                                                                              PID:2628
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" /burn.runonce
                                                                      1⤵
                                                                      • System Time Discovery
                                                                      PID:5476
                                                                      • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                        "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" /burn.runonce
                                                                        2⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • System Time Discovery
                                                                        PID:3012
                                                                        • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                          "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe"
                                                                          3⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • System Time Discovery
                                                                          PID:1524
                                                                          • C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe
                                                                            "C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{e883dae5-a63d-4a45-afb9-257f64d5a59b}\dotnet-runtime-8.0.11-win-x64.exe" -burn.filehandle.attached=516 -burn.filehandle.self=540
                                                                            4⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • System Time Discovery
                                                                            PID:5624
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      PID:4304
                                                                      • C:\Windows\system32\DrvInst.exe
                                                                        DrvInst.exe "4" "1" "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\win10\lci_iddcx.inf" "9" "4804066df" "0000000000000148" "WinSta0\Default" "0000000000000154" "208" "C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\LciDisplay\win10"
                                                                        2⤵
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Windows directory
                                                                        • Checks SCSI registry key(s)
                                                                        • Modifies data under HKEY_USERS
                                                                        PID:628
                                                                      • C:\Windows\system32\DrvInst.exe
                                                                        DrvInst.exe "4" "1" "c:\program files (x86)\splashtop\splashtop remote\server\driver\lcidisplay\win10\lci_proxywddm.inf" "9" "4a8a251e7" "0000000000000170" "WinSta0\Default" "0000000000000154" "208" "c:\program files (x86)\splashtop\splashtop remote\server\driver\lcidisplay\win10"
                                                                        2⤵
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Windows directory
                                                                        • Checks SCSI registry key(s)
                                                                        • Modifies data under HKEY_USERS
                                                                        PID:4340
                                                                      • C:\Windows\system32\DrvInst.exe
                                                                        DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem4.inf" "oem4.inf:c276d4b8d1e66062:lci_proxywddm.Install:1.0.2018.1204:root\lci_proxywddm," "4a8a251e7" "0000000000000174"
                                                                        2⤵
                                                                        • Drops file in Drivers directory
                                                                        • Drops file in System32 directory
                                                                        • Checks SCSI registry key(s)
                                                                        PID:5940
                                                                      • C:\Windows\system32\DrvInst.exe
                                                                        DrvInst.exe "1" "0" "LCI\IDDCX\1&79f5d87&0&WHO_CARE" "" "" "48ef22a9f" "0000000000000000"
                                                                        2⤵
                                                                        • Drops file in Drivers directory
                                                                        • Checks SCSI registry key(s)
                                                                        PID:4504

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v16

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Config.Msi\e579d5a.rbs

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      35155ac783b502519ae3e4772e8b5317

                                                                      SHA1

                                                                      78ba8f3dcc7db6184ff664b47dce4a1745fa068b

                                                                      SHA256

                                                                      b09bbfa423cf5dcb548aa8dc6c00e7e545c9179f741211d3187486f4216b0aa8

                                                                      SHA512

                                                                      984275a402864bcebf5d2f5421d6ce5ca499354c0c7ce726fd94704fb1b7cb40df93a78d53c099564f7f00a7849d8f0141a4f2744b1f23d0e1f3984323663bfd

                                                                    • C:\Config.Msi\e579d5f.rbs

                                                                      Filesize

                                                                      74KB

                                                                      MD5

                                                                      53277451c1fe1d53716dbb5414993d71

                                                                      SHA1

                                                                      ca47db33f19fbeaa13ce0b67e5c26b7782b69e8d

                                                                      SHA256

                                                                      a9ee2dc9c6baf7b27883fe895066bb3a90de2ad625df1ca7d0835f0b59c8937b

                                                                      SHA512

                                                                      0a5cd649bccabc6fb3338e58add9c34e2801f8346340269931ff31e291dbf3a4468cbddc8bdcc94ff5951b04252fc14234af272c235112180705a428d4302668

                                                                    • C:\Config.Msi\e579d61.rbs

                                                                      Filesize

                                                                      464B

                                                                      MD5

                                                                      ad71d51d0f5996f58090246637fdf020

                                                                      SHA1

                                                                      dd9742b5ce2b21ccba816e1d5b9c2de85b70503d

                                                                      SHA256

                                                                      a85ea5995f10b0a70d21a87e0ec0540a7ea271e8535a90d8390a40c397f28fd9

                                                                      SHA512

                                                                      1a37d4da31f14166b94ebcd90cc53436f0d603f5485b0a365cf702985c582205343f3ea02b3e59b54c778dd24c6fb523fdf34d009d14707a0befb4d84b3241db

                                                                    • C:\Config.Msi\e579d67.rbs

                                                                      Filesize

                                                                      9KB

                                                                      MD5

                                                                      c701a0ddaa72c04016ab1cff49ff5eda

                                                                      SHA1

                                                                      5c65692aec25805aa05dfde828cffff888954f1d

                                                                      SHA256

                                                                      8c3c8c0d16dc472a3f0896d1cf5742f7ac2a5e90253baa35bf8c0b1d637d048d

                                                                      SHA512

                                                                      5ca90d5da770a553f07f381fd51c6a75eeb9b1e5850321aaf8d8c1aa47bc77f10b150ba9b74b236b4899e0bfcc24aee5571eef78db225a4747d5a8349a756614

                                                                    • C:\Config.Msi\e579d6f.rbs

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      03caf4ac660bb60a57ec18e7d21b8532

                                                                      SHA1

                                                                      61c902f97ce302420c0b8e5a2ffe6a11c0e9fa73

                                                                      SHA256

                                                                      28077cbc88cca7981d52e548b3347930af364acb1d0a473fc06e97e103a5630f

                                                                      SHA512

                                                                      6412950aa81494c74aad5648bb087235c9cb402ba8cf874e47cc48b8ac09bb87e55bf7a0cf66800dc4b2b5964458dc6afd8d9d6d8831297b574c083a350bc98c

                                                                    • C:\Config.Msi\e579d74.rbs

                                                                      Filesize

                                                                      48KB

                                                                      MD5

                                                                      e70c808b3655119fb926691f8bba5483

                                                                      SHA1

                                                                      8b1c9fad43922b6798b62817f1c80866c2c6c56e

                                                                      SHA256

                                                                      46c2b565418f95b1dbcf2506892050916c06073e65a84a19093a08f692cabb89

                                                                      SHA512

                                                                      400bbf0102c26700dcf343da851a240d18c96082dccb6d2fb662517313f6e4a350526de1f8a4a2aeafde06ac50c7ebbc8f985759c448adcca5e2283c4235d775

                                                                    • C:\Config.Msi\e579d79.rbs

                                                                      Filesize

                                                                      9KB

                                                                      MD5

                                                                      381f84671d965d1e6f19d5874cde8367

                                                                      SHA1

                                                                      cc7c4d7d6143954d2e6ac388f734a53a79616292

                                                                      SHA256

                                                                      7b0272fd2659c32295026bd700a32582d4d80d54bce572d3cab8fbb67391289f

                                                                      SHA512

                                                                      fea3050e6c57cacded5a897fc726c6ddb8a6d3bc76d8d428c57d5d7d8b2d5912fddf481c2f205560d86a70ca4df1be263fc687a2f385d3a6d3613ed70d054dff

                                                                    • C:\Config.Msi\e579d7e.rbs

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      3123b92e8c18b44e2a64d11b18f38ec5

                                                                      SHA1

                                                                      fdc589a287ca3dd654f5a7880f54c433c535ec2a

                                                                      SHA256

                                                                      85391765ec2958314c8cda47ab79d5301b462e8ba4dae376e3e89d898ea1fc63

                                                                      SHA512

                                                                      e4b4cd1149a8467300f9a0519abcc25607443bb2d175888f5f13ffdbbbe7e2287f0b1d3bbf6c65661df97d34e20574b5ee63bf1c19c0db79491802d2dfaec188

                                                                    • C:\Config.Msi\e579d83.rbs

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      20ebf1c57f8e9c41d6f1a3c7e3dc4817

                                                                      SHA1

                                                                      61daa8c937f11803796a56a43d7a6843e33bb5df

                                                                      SHA256

                                                                      d3f773d3628af57ab32394f24380333f02d3db7d1c8db08bb8b75c4c99fe54e2

                                                                      SHA512

                                                                      3741c1a6451dfa8810f4040888bc1db87f0f6b467b06c72d8a61ff14d7aa0e1f260b303417b6b7cf72ed359990c4ee124401e91b92c4a714b110791903f1278f

                                                                    • C:\Config.Msi\e579d84.rbf

                                                                      Filesize

                                                                      143KB

                                                                      MD5

                                                                      33b4c87f18b4c49114d7a8980241657a

                                                                      SHA1

                                                                      254c67b915e45ad8584434a4af5e06ca730baa3b

                                                                      SHA256

                                                                      587296f3ff624295079471e529104385e5c30ddc46462096d343c76515e1d662

                                                                      SHA512

                                                                      42b48b4dcd76a8b2200cfafddc064c053a9d1a4b91b81dee9153322c0b2269e4d75f340c1bf7e7750351fb656445efaf1e1fe0f7e543497b247dd3f83f0c86f9

                                                                    • C:\Config.Msi\e579d85.rbf

                                                                      Filesize

                                                                      3B

                                                                      MD5

                                                                      21438ef4b9ad4fc266b6129a2f60de29

                                                                      SHA1

                                                                      5eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd

                                                                      SHA256

                                                                      13bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354

                                                                      SHA512

                                                                      37436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      337079222a6f6c6edf58f3f981ff20ae

                                                                      SHA1

                                                                      1f705fc0faa84c69e1fe936b34783b301323e255

                                                                      SHA256

                                                                      ae56a6c4f6622b5485c46d9fde5d3db468c1bfb573b34c9f199007b5eedcbda5

                                                                      SHA512

                                                                      ae9cd225f7327da6eeea63c661b9e159d6608dff4897fb6b9651a1756d69282e8051b058a2473d9153fc87c0b54aa59b9a1a865871df693adcb267f8b0157b61

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe

                                                                      Filesize

                                                                      142KB

                                                                      MD5

                                                                      477293f80461713d51a98a24023d45e8

                                                                      SHA1

                                                                      e9aa4e6c514ee951665a7cd6f0b4a4c49146241d

                                                                      SHA256

                                                                      a96a0ba7998a6956c8073b6eff9306398cc03fb9866e4cabf0810a69bb2a43b2

                                                                      SHA512

                                                                      23f3bd44a5fb66be7fea3f7d6440742b657e4050b565c1f8f4684722502d46b68c9e54dcc2486e7de441482fcc6aa4ad54e94b1d73992eb5d070e2a17f35de2f

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      b3bb71f9bb4de4236c26578a8fae2dcd

                                                                      SHA1

                                                                      1ad6a034ccfdce5e3a3ced93068aa216bd0c6e0e

                                                                      SHA256

                                                                      e505b08308622ad12d98e1c7a07e5dc619a2a00bcd4a5cbe04fe8b078bcf94a2

                                                                      SHA512

                                                                      fb6a46708d048a8f964839a514315b9c76659c8e1ab2cd8c5c5d8f312aa4fb628ab3ce5d23a793c41c13a2aa6a95106a47964dad72a5ecb8d035106fc5b7ba71

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll

                                                                      Filesize

                                                                      210KB

                                                                      MD5

                                                                      c106df1b5b43af3b937ace19d92b42f3

                                                                      SHA1

                                                                      7670fc4b6369e3fb705200050618acaa5213637f

                                                                      SHA256

                                                                      2b5b7a2afbc88a4f674e1d7836119b57e65fae6863f4be6832c38e08341f2d68

                                                                      SHA512

                                                                      616e45e1f15486787418a2b2b8eca50cacac6145d353ff66bf2c13839cd3db6592953bf6feed1469db7ddf2f223416d5651cd013fb32f64dc6c72561ab2449ae

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll

                                                                      Filesize

                                                                      693KB

                                                                      MD5

                                                                      2c4d25b7fbd1adfd4471052fa482af72

                                                                      SHA1

                                                                      fd6cd773d241b581e3c856f9e6cd06cb31a01407

                                                                      SHA256

                                                                      2a7a84768cc09a15362878b270371daad9872caacbbeebe7f30c4a7ed6c03ca7

                                                                      SHA512

                                                                      f7f94ec00435466db2fb535a490162b906d60a3cfa531a36c4c552183d62d58ccc9a6bb8bbfe39815844b0c3a861d3e1f1178e29dbcb6c09fa2e6ebbb7ab943a

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability\Agent.Package.Availability.exe

                                                                      Filesize

                                                                      146KB

                                                                      MD5

                                                                      8d477b63bc5a56ae15314bda8dea7a3a

                                                                      SHA1

                                                                      3ca390584cd3e11172a014784e4c968e7cbb18f5

                                                                      SHA256

                                                                      9eec91cdd39cbb560ad5b1d063df67088f412da4b851ae41e71304fb8a444293

                                                                      SHA512

                                                                      44e3d91ad96b4cb919c06ccb91d3c3e31165b2412e1d78bfbaca0bee6f0c1a3253b3e3ddf19009cebf12c261a0392f6a0b7091cf8aba1d0cc4c1ed61c1b6dc42

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Software\Agent.Package.Software.exe

                                                                      Filesize

                                                                      145KB

                                                                      MD5

                                                                      32b43563e860a1797f9b5197b2893bec

                                                                      SHA1

                                                                      ef8125963e9382db994629865a929d9317e07b95

                                                                      SHA256

                                                                      a1b45513a6946b0d7b972429feb069ea6bb27670d3c5271db02455f26c451a69

                                                                      SHA512

                                                                      b8e299cac3b948f4af16544b558e9644f3402f9baca4f4a72a7074176b0507b5664fd92b2095e94d687323acec761f1f1899057364103199077e67216c05e6b2

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.exe

                                                                      Filesize

                                                                      145KB

                                                                      MD5

                                                                      2b9beb2fdbc41afc48d68d32ef41dd08

                                                                      SHA1

                                                                      4a9ea4cf8e02e34ef2dd0ef849ffc0cd9ea6f91c

                                                                      SHA256

                                                                      977d48979e30a146417937d7e11b26334edec2abddfae1369a9c4348e34857b1

                                                                      SHA512

                                                                      3e3c3e39ff2df0d1ed769e6c5acba6f7c5d2737d3c426fb4f0e19f3cf6c604707155917584e454a3f208524ed46766b7a3d2d861fa7419f8258c3b6022238e10

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote\AgentPackageADRemote.exe

                                                                      Filesize

                                                                      51KB

                                                                      MD5

                                                                      3180c705182447f4bcc7ce8e2820b25d

                                                                      SHA1

                                                                      ad6486557819a33d3f29b18d92b43b11707aae6e

                                                                      SHA256

                                                                      5b536eda4bff1fdb5b1db4987e66da88c6c0e1d919777623344cd064d5c9ba22

                                                                      SHA512

                                                                      228149e1915d8375aa93a0aff8c5a1d3417df41b46f5a6d9a7052715dbb93e1e0a034a63f0faad98d4067bcfe86edb5eb1ddf750c341607d33931526c784eb35

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.INI

                                                                      Filesize

                                                                      12B

                                                                      MD5

                                                                      eca4e75e54ad1f7399e57c18580474ab

                                                                      SHA1

                                                                      28fbde46981fa9643dccc45f556f4b2eee0bba54

                                                                      SHA256

                                                                      8e8a22eb5f91f1f8fdcfa57e849fda18ff69dbdc3e9da179302673780f597331

                                                                      SHA512

                                                                      d9f0ce128adcc236d4f570de6d41c2c002a455f5e73ff3144ef66590e46f5867fc144465ea4050b790b697450c66b4ee595fda4cbbadba2940e6406b99835e48

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe

                                                                      Filesize

                                                                      248KB

                                                                      MD5

                                                                      51ecaf32a6076ecfa733ffa645634756

                                                                      SHA1

                                                                      a5b7560e810f9482290c15eedec92731ab10bb41

                                                                      SHA256

                                                                      b2b04d4e08c152d0f43764efc14f155e76fa1fba58475188cbd3cdc92e51f457

                                                                      SHA512

                                                                      83222a1b9253364190b2733409190427a01fd05c173a7a04bede45642ddf8619fc10d1067e73fd110a4d83c9da82728ad1e83d35326bb2787d8b46c27fa797a9

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config

                                                                      Filesize

                                                                      1021B

                                                                      MD5

                                                                      51a41966b950af62998eee5043f543b0

                                                                      SHA1

                                                                      d4ce80134834a1f10d50a6cac3ca3a3e80ff1dc2

                                                                      SHA256

                                                                      f1461b023e02fac832979ebf9bfa59ee7043885c90fc8ee6f8077f07a1cb7097

                                                                      SHA512

                                                                      9c4ba08451116f92036ce24075a641eb5973b740bb876cb8ec7229dae10308364404f175b8abd1f0d6eefa73b9123fa857bf2c3b39577d767831444f99435936

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll

                                                                      Filesize

                                                                      109KB

                                                                      MD5

                                                                      308b8f226c9731513b42fb975a39dfdb

                                                                      SHA1

                                                                      95aad91d1c3e97b3f9af8d955f1ee761f3714a89

                                                                      SHA256

                                                                      fbbd3028ed6e373ffd489f441871b3bb336280d9dbef7adf4bb358c6b195fcda

                                                                      SHA512

                                                                      7abd7675d5f85b2eb6321e9e18c6ee4388898c77e88086bae183d348763a1ee2efda322dfe05a478c29b9cdbada4667455f0e5e70e9bae932268b1cab811278c

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll

                                                                      Filesize

                                                                      693KB

                                                                      MD5

                                                                      8e004ca7e38e44a7ff12d0b519a6b1c2

                                                                      SHA1

                                                                      aba81436ea4b88c4f662029e8e105e3fa1dde139

                                                                      SHA256

                                                                      623918f6cb0d86fed4499655308916db984a5ff69afb90975cdb40611cf6e0c0

                                                                      SHA512

                                                                      b7b6621ac35fc89f50167036552bc729140d474c7e776b9757c0cfacd4203f118540d382a571055c1e8ef83ff4f4a988fd850acbce902919e87f3de0c1db4018

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe

                                                                      Filesize

                                                                      27KB

                                                                      MD5

                                                                      797c9554ec56fd72ebb3f6f6bef67fb5

                                                                      SHA1

                                                                      40af8f7e72222ba9ec2ea2dd1e42ff51dc2eb1bb

                                                                      SHA256

                                                                      7138b6beda7a3f640871e232d93b4307065ab3cd9cfac1bd7964a6bec9e60f49

                                                                      SHA512

                                                                      4f461a8a25da59f47ced0c0dbf59318ddb30c21758037e22bbaa3b03d08ff769bfd1bfc7f43f0e020df8ae4668355ab4b9e42950dca25435c2dd3e9a341c4a08

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe

                                                                      Filesize

                                                                      214KB

                                                                      MD5

                                                                      01807774f043028ec29982a62fa75941

                                                                      SHA1

                                                                      afc25cf6a7a90f908c0a77f2519744f75b3140d4

                                                                      SHA256

                                                                      9d4727352bf6d1cca9cba16953ebd1be360b9df570fd7ba022172780179c251e

                                                                      SHA512

                                                                      33bd2b21db275dc8411da6a1c78effa6f43b34afd2f57959e2931aa966edea46c78d7b11729955879889cbe8b81a8e3fb9d3f7e4988e3b7f309cbd1037e0dc02

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe

                                                                      Filesize

                                                                      37KB

                                                                      MD5

                                                                      efb4712c8713cb05eb7fe7d87a83a55a

                                                                      SHA1

                                                                      c94d106bba77aecf88540807da89349b50ea5ae7

                                                                      SHA256

                                                                      30271d8a49c2547ab63a80bc170f42e9f240cf359a844b10bc91340444678e75

                                                                      SHA512

                                                                      3594955ad79a07f75c697229b0de30c60c2c7372b5a94186a705159a25d2e233e398b9e2dc846b8b47e295dcddd1765a8287b13456c0a3b3c4e296409a428ef8

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring.zip

                                                                      Filesize

                                                                      3.5MB

                                                                      MD5

                                                                      723a7f489fb1861821fee5f5de0acba0

                                                                      SHA1

                                                                      ad76a8ec8cd52346c575894e08c458e1adf620b7

                                                                      SHA256

                                                                      0b1afe081f2e2aefdcf40cada67e79e287536999e99145748aeeb4f0010730f5

                                                                      SHA512

                                                                      b3ea87dd52d79b73b443154b71ea44da1ce86032bb4646d2a2813218e55113b3c1b854dc638229ecda370fa49863228dea1e86b6d455457095a9de865e25b0e1

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe

                                                                      Filesize

                                                                      396KB

                                                                      MD5

                                                                      b5929e2ca0e402a373b633bb78d0414a

                                                                      SHA1

                                                                      38146d4f3ddca1b1e854bf638b7722356e5e2195

                                                                      SHA256

                                                                      d7b43a4807e1841b94353656fcfd45b69f7550adf137c56aefb85104883fb821

                                                                      SHA512

                                                                      65e02019656d61238b8fc784496eb6ccf238a5f6eff9b101893641cb45d9c63058cf67abb2bc75007e9e2726458115eb8e9ad9a4cf34a86435ea637dc78c3ea6

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db

                                                                      Filesize

                                                                      48KB

                                                                      MD5

                                                                      8456666b0910ca4c2841cc2e1e1f5768

                                                                      SHA1

                                                                      f7857240263e18ede4509f2f7f0b62697d43b8ad

                                                                      SHA256

                                                                      cd55acb3190ad540c480029a269dd22d94ab65d58a3a7665ad01b6690b54457e

                                                                      SHA512

                                                                      2f2195bc33e8171094a43727936ab570627abec4e4980059f45dff7b46dc6fc90156b623f143324760580b803ca8a6d71253f70995d9c034c0f78565623a3224

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe

                                                                      Filesize

                                                                      303KB

                                                                      MD5

                                                                      3599654fec6a32f214fcd3169886703b

                                                                      SHA1

                                                                      523dece93e47234d1a1d4030e0f2504c3d16158b

                                                                      SHA256

                                                                      06cabbb9f17822cfa44ac78e33ef2d6381b12cb013e7a462586450ea7c6f26ee

                                                                      SHA512

                                                                      88de39813a91bbcc50ab7c0602585a943a6dbdca2c5418bf758c3f21791c0c1307c9dffda5b508d00dbb4cf76090fd5166311d26ada798f40a60cf3f3cf31fa8

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller\AgentPackageRuntimeInstaller.exe

                                                                      Filesize

                                                                      53KB

                                                                      MD5

                                                                      8c105c1fdaac154d727df0ed34bca083

                                                                      SHA1

                                                                      3525fc304f7464876ec0bac3305d604e8a2340c9

                                                                      SHA256

                                                                      dd4b31b650621c6ee76bc65ef7d4a56901fc4d6629816e64c3fbe2539ea6d4e2

                                                                      SHA512

                                                                      47793671c67625a5595c09f87bcb592e403f9103a410a62d1e8d37b5d38ced47fb8efecb9fb7d55e5b41834923907af91aa8fbe884aecd73a888cfa7170fc9f4

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote.zip

                                                                      Filesize

                                                                      333KB

                                                                      MD5

                                                                      745714d838c4d4f88c6e0db6a434f444

                                                                      SHA1

                                                                      90689ce709bf2464b678c7afa7b1e18f080d52bb

                                                                      SHA256

                                                                      e35302995dad1d5e4b7147d8763f7262500271cf01eac8edfa896b392ac7139f

                                                                      SHA512

                                                                      08cbfac0b604530108978c757ad8481c69ed62deac5520777bacee9751f3f260d2c3158609fd723819d8d6626c46b302fe7da7005efc09ab571871ac9d58a0ed

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe

                                                                      Filesize

                                                                      70KB

                                                                      MD5

                                                                      e9b3a59f67febdd7f8fbe68d71c5d0ab

                                                                      SHA1

                                                                      22bd3ec3f8e0be2f317ade9d553acdb3ea11f52e

                                                                      SHA256

                                                                      bff4de54dacec104e1e63659857ca99d3e9658dcc09d6e1cbf54dc7b22629cbf

                                                                      SHA512

                                                                      00e95ea600777025a30e23c755522b869320ca445ac5bd74f123306457d0793efa338220cba9d064e5d25cc3dcf19d66e4e48d3a1c72d196eeb77fb61e4b0688

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe

                                                                      Filesize

                                                                      50KB

                                                                      MD5

                                                                      5bb0687e2384644ea48f688d7e75377b

                                                                      SHA1

                                                                      44e4651a52517570894cfec764ec790263b88c4a

                                                                      SHA256

                                                                      963a4c7863beae55b1058f10f38b5f0d026496c28c78246230d992fd7b19b70a

                                                                      SHA512

                                                                      260b661f52287af95c5033b0a03ac2e182211d165cadb7c4a19e5a8ca765e76fc84b0daf298c3eccb4904504a204194a9bf2547fc91039c3ec2d41f9977ff650

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe

                                                                      Filesize

                                                                      32KB

                                                                      MD5

                                                                      0308f32676d9211746048594a5bcb7c3

                                                                      SHA1

                                                                      5caf000789ba28a18de93a6ce536a352414fd871

                                                                      SHA256

                                                                      0c64ec6ff34865a8d2fc0e267ead43c8f70a6dc36ab476af6748797995f4bc43

                                                                      SHA512

                                                                      980248cf713fd9721f2a41aed19a227ad76c2bcbac928df70129b4e4441c62a00b5df5cda0a583cffd365424ea6a7625ded6132f89ed70aa61c851b90b2487d2

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe

                                                                      Filesize

                                                                      60KB

                                                                      MD5

                                                                      99c72ae773f0e16818bc628e6c30272a

                                                                      SHA1

                                                                      901b18faa2eeb35946746bcf80a3ed7a67f6daab

                                                                      SHA256

                                                                      9159d0f626aebaca406d0ff9abfe19d6153f3d6eefbc1f831a48c17f4aea7a81

                                                                      SHA512

                                                                      f05b5884ab3f8b2c0960c2ccbb982555948d293fd37bd29df1157d40c138f1eed6fc94ac5a7d7a4fd098755e9d242d4da992d073ddffcc8f0c543e538b322633

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll

                                                                      Filesize

                                                                      588KB

                                                                      MD5

                                                                      17d74c03b6bcbcd88b46fcc58fc79a0d

                                                                      SHA1

                                                                      bc0316e11c119806907c058d62513eb8ce32288c

                                                                      SHA256

                                                                      13774cc16c1254752ea801538bfb9a9d1328f8b4dd3ff41760ac492a245fbb15

                                                                      SHA512

                                                                      f1457a8596a4d4f9b98a7dcb79f79885fa28bd7fc09a606ad3cd6f37d732ec7e334a64458e51e65d839ddfcdf20b8b5676267aa8ced0080e8cf81a1b2291f030

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                                                                      Filesize

                                                                      219B

                                                                      MD5

                                                                      fa8accb7abf1d39ba32720989b186c51

                                                                      SHA1

                                                                      979c06871f8bdf58801fbd8856b7d7928772a735

                                                                      SHA256

                                                                      8e34cfa4ef732f7bfc2b81e1eb884cd27358f60e211cd580ded16e160508c006

                                                                      SHA512

                                                                      442cfbbfb804d47ec9ebce5a1a7f04fd21a93af9e01cd28f2c211fc451410718b9c91240eeec7a773ca6b50a2fa69f20b7a51d0f054bff55386d03d563ad280d

                                                                    • C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt

                                                                      Filesize

                                                                      256B

                                                                      MD5

                                                                      a3ced8ada197d0d4f6f1415ed27362bf

                                                                      SHA1

                                                                      82c96b84b31b9decba74e431194972eb9a6c3170

                                                                      SHA256

                                                                      40bec9beb194d8b6a8501b009a153dce647157cc9cf7f92a2dbf5c6bbb6d1639

                                                                      SHA512

                                                                      f6deefca8e73ff840909d97832d8449f1393b6a48d4826ccc5ea3d2f34a6919be6648254159cb3a9a19cbd130f41ff7164c50b81e5830d771983e73f160f82b6

                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVAD\utils\DIFxCmd.exe

                                                                      Filesize

                                                                      9KB

                                                                      MD5

                                                                      1ef7574bc4d8b6034935d99ad884f15b

                                                                      SHA1

                                                                      110709ab33f893737f4b0567f9495ac60c37667c

                                                                      SHA256

                                                                      0814aad232c96a4661081e570cf1d9c5f09a8572cfd8e9b5d3ead0fa0f5ca271

                                                                      SHA512

                                                                      947c306a3a1eec7fce29eaa9b8d4b5e00fd0918fe9d7a25e262d621fb3ee829d5f4829949e766a660e990d1ac14f87e13e5dbd5f7c8252ae9b2dc82e2762fb73

                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVAD\utils\DIFxCmd64.exe

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      f512536173e386121b3ebd22aac41a4e

                                                                      SHA1

                                                                      74ae133215345beaebb7a95f969f34a40dda922a

                                                                      SHA256

                                                                      a993872ad05f33cb49543c00dfca036b32957d2bd09aaa9dafe33b934b7a3e4a

                                                                      SHA512

                                                                      1efa432ef2d61a6f7e7fc3606c5c982f1b95eabc4912ea622d533d540ddca1a340f8a5f4652af62a9efc112ca82d4334e74decf6ddbc88b0bd191060c08a63b9

                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVideo\utils\devcon.exe

                                                                      Filesize

                                                                      76KB

                                                                      MD5

                                                                      b40fe65431b18a52e6452279b88954af

                                                                      SHA1

                                                                      c25de80f00014e129ff290bf84ddf25a23fdfc30

                                                                      SHA256

                                                                      800e396be60133b5ab7881872a73936e24cbebd7a7953cee1479f077ffcf745e

                                                                      SHA512

                                                                      e58cf187fd71e6f1f5cf7eac347a2682e77bc9a88a64e79a59e1a480cac20b46ad8d0f947dd2cb2840a2e0bb6d3c754f8f26fcf2d55b550eea4f5d7e57a4d91d

                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\Driver\STVideo\utils\devcon64.exe

                                                                      Filesize

                                                                      80KB

                                                                      MD5

                                                                      3904d0698962e09da946046020cbcb17

                                                                      SHA1

                                                                      edae098e7e8452ca6c125cf6362dda3f4d78f0ae

                                                                      SHA256

                                                                      a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289

                                                                      SHA512

                                                                      c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea

                                                                    • C:\Program Files (x86)\Splashtop\Splashtop Remote\Server\db\SRAgent.sqlite3

                                                                      Filesize

                                                                      92KB

                                                                      MD5

                                                                      c00dab9f6dd70f5aab49d56e05cfd29c

                                                                      SHA1

                                                                      f9f231de793564a622c22790f14884b77f6c3bef

                                                                      SHA256

                                                                      f399b1375c806309edcba40c939b9ef74b6f9f69e49cc0c304564c2bff809e8c

                                                                      SHA512

                                                                      f464eb2540cf3fa7bcedb7cb767d3a4f31a43a21c572ed9e412024574a14b775ef018cf4dd561935cfe0826138246493fa2d060508af130b06ee6f149ee81fd3

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                                                      Filesize

                                                                      433B

                                                                      MD5

                                                                      cf5f69533151675ab4f248fbc8cdedeb

                                                                      SHA1

                                                                      eb736e17118ac79e341b49eb29ea04433e65e66f

                                                                      SHA256

                                                                      e774620005d8e57306dcad1f2b427044f0be3da21897de56258fed1f8c565486

                                                                      SHA512

                                                                      e9954bab77bc76a3b85bcd988f05356c8dfa1f109c5fd58e5f2d214ed266ddbc520159a416fbfb0a4e24133b143e873ee3d9e88d62db4c486403215d76394f84

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.InstallLog

                                                                      Filesize

                                                                      717B

                                                                      MD5

                                                                      ef0a07aec4367a64c16c581da2657aa9

                                                                      SHA1

                                                                      13011a5abcbadb3424fb6ecee560665556bb1d24

                                                                      SHA256

                                                                      f8c02541eba2fde1b29b3ce428cbb0f1913110d4bba9b52f7252f728e9fce987

                                                                      SHA512

                                                                      35cfaedb4e5f754dde69f4cef508bbd6127408c405baa5ee2e20104f9aaa1ff2a228f0bfa42d51dcd1006e026ce238bd7042906e449ca78ef91e4d00b08c5c46

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.InstallState

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      362ce475f5d1e84641bad999c16727a0

                                                                      SHA1

                                                                      6b613c73acb58d259c6379bd820cca6f785cc812

                                                                      SHA256

                                                                      1f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899

                                                                      SHA512

                                                                      7630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Availability.zip

                                                                      Filesize

                                                                      1.3MB

                                                                      MD5

                                                                      40df7f2a02cdfa70ae76d70d21473428

                                                                      SHA1

                                                                      4baddbc082fdb197c77bc1c232be2881a82a7ec8

                                                                      SHA256

                                                                      f037309cf6b0174ba282106da31c141e3912486c69c438a53afe7ff589743dc2

                                                                      SHA512

                                                                      2522483e9d1b9fc20f14ffab3dcb2a9e5735a260e08e7196a05319076ad9b4d7a9fe94b28c52559022f003d2fe55ec5e4abcecb1b11f4000e804dae5b1c0126f

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Software.zip

                                                                      Filesize

                                                                      1.6MB

                                                                      MD5

                                                                      0e716ebf03f2937d544ecd16508a2606

                                                                      SHA1

                                                                      13ea3144117ed76c3347d9e29cb4398c329c79d4

                                                                      SHA256

                                                                      57603d1a9b47fb699a5ec6747eaad408fff65f35bee665bdccff9d09334bd608

                                                                      SHA512

                                                                      4680687f19fa46d089b5c80c6b83d6822eb70a27ec9586a9d602ac14afda6a918b02adbc3567205378c0fea59715119acb5a32ea16366ebf48382553496ba763

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog.zip

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      5ed9543e9f5826ead203316ef0a8863d

                                                                      SHA1

                                                                      8235c0e7568ec42d6851c198adc76f006883eb4b

                                                                      SHA256

                                                                      33583a8e2dcf039382e80bfa855944407bcba71976ec41c52810cb8358f42043

                                                                      SHA512

                                                                      5b4318ddc6953f31531ee8163463259da5546f1018c0fe671280337751f1c57398a5fd28583afba85e93d70167494b8997c23fee121e67bf2f6fb4ca076e9d9f

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog\Agent.Package.Watchdog.runtimeconfig.json

                                                                      Filesize

                                                                      375B

                                                                      MD5

                                                                      e8d9109bd15637b1fbf349f9c7ff776f

                                                                      SHA1

                                                                      19762daa20afc8085ba6417a7215f1fe2d619f60

                                                                      SHA256

                                                                      c4a84cdd787cb31aaa46e8282f7d288f0641fdaa4252ac78979340131c8b9110

                                                                      SHA512

                                                                      5cc792c0cdf32c4c893eebc6651aabed7428d2f467b58d3b58ad21dfce9dd4ee0924257b4699297f6d41069f27829ce8b8a711642f3208981761b48382d68b74

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageADRemote.zip

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      9a9b1fd85b5f1dcd568a521399a0d057

                                                                      SHA1

                                                                      34ed149b290a3a94260d889ba50cb286f1795fa6

                                                                      SHA256

                                                                      88d5a5a4a1b56963d509989b9be1a914afe3e9ee25c2d786328df85da4a7820d

                                                                      SHA512

                                                                      7c1259dddff406fdaadb236bf4c7dfb734c9da34fd7bad9994839772e298ebf3f19f02eb0655e773ba82702aa9175337ba4416c561dc2cb604d08e271cc74776

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip

                                                                      Filesize

                                                                      673KB

                                                                      MD5

                                                                      4273b6b6cf5856ffbed8ccbb31328892

                                                                      SHA1

                                                                      cbd8196a984b7da22ec10f4c1b3c835a384a395e

                                                                      SHA256

                                                                      f8853371616211c2eb21b999dbd4907c005183b34f67f06f3b4acfbf75093df6

                                                                      SHA512

                                                                      ae11669a9c28d820a7779713fb071a7c07fdbc2199312ea7ad6d61bc3b37e11be8fca720796d982a5eccc1b273a53fd37b9590e118d6101a71f01f3eada358d5

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat.zip

                                                                      Filesize

                                                                      321KB

                                                                      MD5

                                                                      d3901e62166e9c42864fe3062cb4d8d5

                                                                      SHA1

                                                                      c9c19eec0fa04514f2f8b20f075d8f31b78bae70

                                                                      SHA256

                                                                      dbc0e52e6de93a0567a61c7b1e86daa51fbef725a4a31eef4c9bbff86f43671c

                                                                      SHA512

                                                                      ae33e57759e573773b9bb79944b09251f0dc4e07cdb8f373ec06963abfc1e6a6326df7f3b5fecf90bd2b060e3cb5a48b913b745cc853ac32d2558a8651c76111

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller.zip

                                                                      Filesize

                                                                      814KB

                                                                      MD5

                                                                      9b1f97a41bfb95f148868b49460d9d04

                                                                      SHA1

                                                                      768031d5e877e347a249dfdeab7c725df941324b

                                                                      SHA256

                                                                      09491858d849212847e4718d6cc8f2b1bc3caa671ceb165cf522290b960262e4

                                                                      SHA512

                                                                      9c8929a78cb459f519ace48db494d710efd588a19a7dbea84f46d02563cc9615db8aa78a020f08eca6fa2b99473d15c8192a513b4df8073aef595040d8962ae4

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace.zip

                                                                      Filesize

                                                                      1.2MB

                                                                      MD5

                                                                      e74d2a16da1ddb7f9c54f72b8a25897c

                                                                      SHA1

                                                                      32379af2dc1c1cb998dc81270b7d6be054f7c1a0

                                                                      SHA256

                                                                      a0c2f9479b5e3da9d7a213ebc59f1dd983881f4fc47a646ffc0a191e07966f46

                                                                      SHA512

                                                                      52b8de90dc9ca41388edc9ae637d5b4ce5c872538c87cc3e7d45edcf8eff78b0f5743ab4927490abda1cff38f2a19983b7ccc0fe3f854b0eacca9c9ce28eda75

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.ini

                                                                      Filesize

                                                                      12B

                                                                      MD5

                                                                      b2d5d511002960697118598e9233b21d

                                                                      SHA1

                                                                      9f0c9252594d590e47027d9fb6afc34abbd3d6f1

                                                                      SHA256

                                                                      a7a70e5be36672e698230c01904255958bf3e5d81bb5655ffc8dc9221b6134be

                                                                      SHA512

                                                                      d773d1c77c59c51270ec4f1357ae227e81ca599a98798001ad2c587f1b54877501128a9895ebdc47a5d0a0372a2804ecdc9fb9b47f1ea53607c54eb74a4a7dd7

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates.zip

                                                                      Filesize

                                                                      2.8MB

                                                                      MD5

                                                                      a5b275a4daa8669700b6e9ce1e2c41d8

                                                                      SHA1

                                                                      85a982c682d19623010e9d595dbde72fba738161

                                                                      SHA256

                                                                      cf789fc90c44cb5064de670816131a12cd855c65a735da0f0210e2ca62697e4c

                                                                      SHA512

                                                                      e18d194855e459a7f7c06a0d2d2f205084f4f5d410b2b8c09db194198a959519b22c892fd712ed2ee3437c4a90f4e76a5c3c48e8f775c612c48981e8c0cdf1e8

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller.zip

                                                                      Filesize

                                                                      1.1MB

                                                                      MD5

                                                                      bccad70b35abf4bdd51d2cabe9e2a114

                                                                      SHA1

                                                                      2d255cb7170b6b592b4849fb9f00b0add0a99c48

                                                                      SHA256

                                                                      6d25105508b5e94af634d97f1751b9926adcbc5ad86f3bc2d79d26c4712d1c06

                                                                      SHA512

                                                                      394de4ffe8a9fcf9e4ca6038b3579dc04a6f1c15e8cb3428b10540726aaf563073a893efb14dba1d109af15994a0bf1370a0cd53de5a8c759ee123ed362e0b29

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe.config

                                                                      Filesize

                                                                      541B

                                                                      MD5

                                                                      d0efb0a6d260dbe5d8c91d94b77d7acd

                                                                      SHA1

                                                                      e33a8c642d2a4b3af77e0c79671eab5200a45613

                                                                      SHA256

                                                                      7d38534766a52326a04972a47caca9c05e95169725d59ab4a995f8a498678102

                                                                      SHA512

                                                                      a3f1cff570201b8944780cf475b58969332c6af9bea0a6231e59443b05fc96df06a005ff05f78954dbe2fec42da207f6d26025aa558d0a30a36f0df23a44a35c

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.ini

                                                                      Filesize

                                                                      12B

                                                                      MD5

                                                                      880d31390a25de6a9cd34463b46c75e6

                                                                      SHA1

                                                                      837af65938c9606b5de3c6f2195fc3e855554cd7

                                                                      SHA256

                                                                      425adf50cf113d68bd6aa8dc1015db43422bbc1c977933d5f8c1ecaabf18eb2e

                                                                      SHA512

                                                                      8e9dd066ff73625a5a55d1ece5ba1e4fb248ab14a32880a3d4d86266176cb4f1c61f8301e1ff49839c283affe877b9fbcd3bc2b9763c08b0b63ba56023c2282b

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools.zip

                                                                      Filesize

                                                                      670KB

                                                                      MD5

                                                                      96e50bbca30d75af7b8b40acf8dda817

                                                                      SHA1

                                                                      4b1255280dff8de8b7be47def58f83f6ec39ded6

                                                                      SHA256

                                                                      a3ad00ccb61bc87d58eb7977f68130b78a0b95e74d61e6a4624ac114ccde5736

                                                                      SHA512

                                                                      0034c08cb878b703f272e3fd2734bb928ff1bdba85cf79a151519b019c83bd4d199c80af0aa30db28ef82f7ee68a9d59dcaede92f83bfe8787f6a5d4d5e9817c

                                                                    • C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing.zip

                                                                      Filesize

                                                                      3.1MB

                                                                      MD5

                                                                      9c8eb5e114c1446f78f1312256ab61e4

                                                                      SHA1

                                                                      6b820d9158359687e52878d72b6121b295ad6ffd

                                                                      SHA256

                                                                      3f5eef6b6777c84ebd4d957bf7c0ab096614554453339327286f7535dcc480f5

                                                                      SHA512

                                                                      2f8c831a7e75ce92fdbe005cd5bd7213850a4f8937ded0712210c69b8e1748732a6222ba5ec26ce9c2ee73b2a3b6e391551bf09b3db2914be5c7096ae7565c9c

                                                                    • C:\Program Files\dotnet\dotnet.exe

                                                                      Filesize

                                                                      143KB

                                                                      MD5

                                                                      71026b098f8fb39c88b003df746d9fa0

                                                                      SHA1

                                                                      013ca259f551ad6f33db53fff0e121e74408e20e

                                                                      SHA256

                                                                      11058e8c2cd05f30dcf1775644bf19d2913c9a6d674c12f91d1896d95d9cc5c2

                                                                      SHA512

                                                                      9830be3444225a4b2f9fa4aedbc8af4f45fdb2548f0b6a2eba2a2a407ea3c7d8fd78c0e37fac66cafbdfad781ae78b076d225fd5c836a451f57a54053ccef9ad

                                                                    • C:\ProgramData\Splashtop\Splashtop Remote Server\Credential\84b1e4ca51c0b43bb56e9058f96dc9ed

                                                                      Filesize

                                                                      16KB

                                                                      MD5

                                                                      b2e89027a140a89b6e3eb4e504e93d96

                                                                      SHA1

                                                                      f3b1b34874b73ae3032decb97ef96a53a654228f

                                                                      SHA256

                                                                      5f97b3a9d3702d41e15c0c472c43bea25f825401adbc6e0e1425717e75174982

                                                                      SHA512

                                                                      93fc993af1c83f78fd991cc3d145a81ee6229a89f2c70e038c723032bf5ad12d9962309005d94cdbe0ef1ab11dc5205f57bcf1bc638ee0099fedf88977b99a19

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_93E8F0A6DF0B1F1414474691911362FC

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      c212a23df22afe5a16aa5d2cfbe479ab

                                                                      SHA1

                                                                      e2a3856f52fab8a7b7300a294983b7bdde4be82e

                                                                      SHA256

                                                                      e57899be97b15e6ea97cdaba9b363aa759ad675473e1cb8bde7ba5e6a95cb0e2

                                                                      SHA512

                                                                      8a58c1a02591970aaec5d42c76592c459a54525964fb980b959b63264090fd0f3b264c3ef23ec60b5764d31f33368abdb78c4120d735e0539d3e878768d6cbcd

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_93E8F0A6DF0B1F1414474691911362FC

                                                                      Filesize

                                                                      412B

                                                                      MD5

                                                                      08a59d8c65446ee6137dc0511dfde388

                                                                      SHA1

                                                                      cedf21225fb25c5aa4b76afea1ee79444318f79b

                                                                      SHA256

                                                                      dd79d3971d7a97636cec44a22af3b72da9020766b802f45ca392d1287891d054

                                                                      SHA512

                                                                      dd15525a8ace031693af4eea92544f171ace33fa18dd1e6b73a5b4f30b2d97a554b06519923be49d73b918bd8565ea18b5f4bccd5a71637c1b777a4accb6d675

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

                                                                      Filesize

                                                                      651B

                                                                      MD5

                                                                      9bbfe11735bac43a2ed1be18d0655fe2

                                                                      SHA1

                                                                      61141928bb248fd6e9cd5084a9db05a9b980fb3a

                                                                      SHA256

                                                                      549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

                                                                      SHA512

                                                                      a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

                                                                    • C:\Windows\Installer\MSI1660.tmp

                                                                      Filesize

                                                                      4.5MB

                                                                      MD5

                                                                      08211c29e0d617a579ffa2c41bde1317

                                                                      SHA1

                                                                      4991dae22d8cdc6ca172ad1846010e3d9e35c301

                                                                      SHA256

                                                                      3334a7025ff6cd58d38155a8f9b9867f1a2d872964c72776c9bf4c50f51f9621

                                                                      SHA512

                                                                      d6ae36a09745fdd6d0d508b18eb9f3499a06a7eeafa0834bb47a7004f4b7d54f15fec0d0a45b7e6347a85c8091ca52fe4c679f6f23c3668efe75a660a8ce917f

                                                                    • C:\Windows\Installer\MSI6FD.tmp

                                                                      Filesize

                                                                      219KB

                                                                      MD5

                                                                      928f4b0fc68501395f93ad524a36148c

                                                                      SHA1

                                                                      084590b18957ca45b4a0d4576d1cc72966c3ea10

                                                                      SHA256

                                                                      2bf33a9b9980e44d21d48f04cc6ac4eed4c68f207bd5990b7d3254a310b944ae

                                                                      SHA512

                                                                      7f2163f651693f9b73a67e90b5c820af060a23502667a5c32c3beb2d6b043f5459f22d61072a744089d622c05502d80f7485e0f86eb6d565ff711d5680512372

                                                                    • C:\Windows\Installer\MSI7608.tmp-\System.Management.dll

                                                                      Filesize

                                                                      60KB

                                                                      MD5

                                                                      878e361c41c05c0519bfc72c7d6e141c

                                                                      SHA1

                                                                      432ef61862d3c7a95ab42df36a7caf27d08dc98f

                                                                      SHA256

                                                                      24de61b5cab2e3495fe8d817fb6e80094662846f976cf38997987270f8bbae40

                                                                      SHA512

                                                                      59a7cbb9224ee28a0f3d88e5f0c518b248768ff0013189c954a3012463e5c0ba63a7297497131c9c0306332646af935dd3a1acf0d3e4e449351c28ec9f1be1fa

                                                                    • C:\Windows\Installer\MSI9DF5.tmp

                                                                      Filesize

                                                                      509KB

                                                                      MD5

                                                                      88d29734f37bdcffd202eafcdd082f9d

                                                                      SHA1

                                                                      823b40d05a1cab06b857ed87451bf683fdd56a5e

                                                                      SHA256

                                                                      87c97269e2b68898be87b884cd6a21880e6f15336b1194713e12a2db45f1dccf

                                                                      SHA512

                                                                      1343ed80dccf0fa4e7ae837b68926619d734bc52785b586a4f4102d205497d2715f951d9acacc8c3e5434a94837820493173040dc90fb7339a34b6f3ef0288d0

                                                                    • C:\Windows\Installer\MSI9DF5.tmp-\AlphaControlAgentInstallation.dll

                                                                      Filesize

                                                                      25KB

                                                                      MD5

                                                                      aa1b9c5c685173fad2dabebeb3171f01

                                                                      SHA1

                                                                      ed756b1760e563ce888276ff248c734b7dd851fb

                                                                      SHA256

                                                                      e44a6582cd3f84f4255d3c230e0a2c284e0cffa0ca5e62e4d749e089555494c7

                                                                      SHA512

                                                                      d3bfb4bd7e7fdb7159fbfc14056067c813ce52cdd91e885bdaac36820b5385fb70077bf58ec434d31a5a48245eb62b6794794618c73fe7953f79a4fc26592334

                                                                    • C:\Windows\Installer\MSI9DF5.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                                      Filesize

                                                                      179KB

                                                                      MD5

                                                                      1a5caea6734fdd07caa514c3f3fb75da

                                                                      SHA1

                                                                      f070ac0d91bd337d7952abd1ddf19a737b94510c

                                                                      SHA256

                                                                      cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca

                                                                      SHA512

                                                                      a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1

                                                                    • C:\Windows\Installer\MSIA0C5.tmp-\CustomAction.config

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      bc17e956cde8dd5425f2b2a68ed919f8

                                                                      SHA1

                                                                      5e3736331e9e2f6bf851e3355f31006ccd8caa99

                                                                      SHA256

                                                                      e4ff538599c2d8e898d7f90ccf74081192d5afa8040e6b6c180f3aa0f46ad2c5

                                                                      SHA512

                                                                      02090daf1d5226b33edaae80263431a7a5b35a2ece97f74f494cc138002211e71498d42c260395ed40aee8e4a40474b395690b8b24e4aee19f0231da7377a940

                                                                    • C:\Windows\Installer\MSIA0C5.tmp-\Newtonsoft.Json.dll

                                                                      Filesize

                                                                      695KB

                                                                      MD5

                                                                      715a1fbee4665e99e859eda667fe8034

                                                                      SHA1

                                                                      e13c6e4210043c4976dcdc447ea2b32854f70cc6

                                                                      SHA256

                                                                      c5c83bbc1741be6ff4c490c0aee34c162945423ec577c646538b2d21ce13199e

                                                                      SHA512

                                                                      bf9744ccb20f8205b2de39dbe79d34497b4d5c19b353d0f95e87ea7ef7fa1784aea87e10efcef11e4c90451eaa47a379204eb0533aa3018e378dd3511ce0e8ad

                                                                    • C:\Windows\Installer\MSIA8A8.tmp

                                                                      Filesize

                                                                      211KB

                                                                      MD5

                                                                      a3ae5d86ecf38db9427359ea37a5f646

                                                                      SHA1

                                                                      eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                                                      SHA256

                                                                      c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                                                      SHA512

                                                                      96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                                                    • C:\Windows\Installer\e579d59.msi

                                                                      Filesize

                                                                      2.9MB

                                                                      MD5

                                                                      4166a7fc9a5726e2a468dc7e053b2a24

                                                                      SHA1

                                                                      fa2e7de96f5f4cafdc95767c4e8adee460d0399e

                                                                      SHA256

                                                                      f2cf1589f2c34fb845c7514db1a07ade8e5f5b786e690f795507fdedc871fd3c

                                                                      SHA512

                                                                      b5676a7e71ea5764946c436ee2816345dbd263f90ffb00a2b69558a1c1419324f6ef6d6a5f5a0d3de492a491725d9d1e9ad21af0302a12fe8c9220c8f0665b69

                                                                    • C:\Windows\Installer\e579d75.msi

                                                                      Filesize

                                                                      26.3MB

                                                                      MD5

                                                                      b9c6d23462adef092b8a5b7880531b03

                                                                      SHA1

                                                                      9e8c4f7f48d38fb54a93789a583852869c074f2d

                                                                      SHA256

                                                                      2e23da54aa1ff64de09021ab089c1be6d4a323bdf0d8f46f78b5c6a33df83109

                                                                      SHA512

                                                                      18623991c5690e516541eaf867f22b3a1a02317392178943143bedc7f7eda5e02e69665c3c4a5fa50ade516a191bbbf16fd71e60f3225f660fb10ebc25cd01a5

                                                                    • C:\Windows\Installer\e579d76.msi

                                                                      Filesize

                                                                      772KB

                                                                      MD5

                                                                      d73de5788ab129f16afdd990d8e6bfa9

                                                                      SHA1

                                                                      88cb87af50ea4999e2079d9269ce64c8eb1a584e

                                                                      SHA256

                                                                      4f9ac5a094e9b1b4f0285e6e69c2e914e42dcc184dfe6fe93894f8e03ca6c193

                                                                      SHA512

                                                                      bfc32f9a20e30045f5207446c6ab6e8ef49a3fd7a5a41491c2242e10fee8efd2f82f81c3ff3bf7681e5e660fde065a315a89d87e9f488c863421fe1d6381ba3b

                                                                    • C:\Windows\System32\DriverStore\Temp\{6e078297-e9bf-3347-af94-5512e479879f}\lci_iddcx.cat

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      62458e58313475c9a3642a392363e359

                                                                      SHA1

                                                                      e63a3866f20e8c057933ba75d940e5fd2bf62bc6

                                                                      SHA256

                                                                      85620d87874f27d1aaf1743c0ca47e210c51d9afd0c9381fc0cd8acca3854562

                                                                      SHA512

                                                                      49fb8ca58aecf97a6ab6b97de7d367accb7c5be76fbcd324af4ce75efe96642e8c488f273c0363250f7a5bcea7f7055242d28fd4b1f130b68a1a5d9a078e7fad

                                                                    • C:\Windows\System32\DriverStore\Temp\{6e078297-e9bf-3347-af94-5512e479879f}\lci_iddcx.inf

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      1cec22ca85e1b5a8615774fca59a420b

                                                                      SHA1

                                                                      049a651751ef38321a1088af6a47c4380f9293fc

                                                                      SHA256

                                                                      60a018f46d17b7640fc34587667cd852a16fa8e82f957a69522637f22e5fe5cf

                                                                      SHA512

                                                                      0f24fe3914aef080a0d109df6cfac548a880947fb85e7490f0d8fa174a606730b29dc8d2ae10525dba4d1ca05ac9b190e4704629b86ac96867188df4ca3168bb

                                                                    • C:\Windows\System32\DriverStore\Temp\{6e078297-e9bf-3347-af94-5512e479879f}\x64\lci_iddcx.dll

                                                                      Filesize

                                                                      52KB

                                                                      MD5

                                                                      01e8bc64139d6b74467330b11331858d

                                                                      SHA1

                                                                      b6421a1d92a791b4d4548ab84f7140f4fc4eb829

                                                                      SHA256

                                                                      148359a84c637d05c20a58f5038d8b2c5390f99a5a229be8eccbb5f85e969438

                                                                      SHA512

                                                                      4099e8038d65d95d3f00fd32eba012f55ae16d0da3828e5d689ef32e20352fdfcc278cd6f78536dc7f28fb97d07185e654fe6eee610822ea8d9e9d5af696dff5

                                                                    • C:\Windows\System32\DriverStore\Temp\{c7d3a5d7-299e-4e48-addf-530bfd7d0329}\lci_proxywddm.cat

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      8e16d54f986dbe98812fd5ec04d434e8

                                                                      SHA1

                                                                      8bf49fa8e12f801559cc2869365f0b184d7f93fe

                                                                      SHA256

                                                                      7c772fb24326e90d6e9c60a08495f32f7d5def1c52037d78cbd0436ad70549cd

                                                                      SHA512

                                                                      e1da797044663ad6362641189fa78116cc4b8e611f9d33c89d6c562f981d5913920acb12a4f7ef6c1871490563470e583910045378bda5c7a13db25f987e9029

                                                                    • C:\Windows\System32\DriverStore\Temp\{c7d3a5d7-299e-4e48-addf-530bfd7d0329}\lci_proxywddm.inf

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      0315a579f5afe989154cb7c6a6376b05

                                                                      SHA1

                                                                      e352ff670358cf71e0194918dfe47981e9ccbb88

                                                                      SHA256

                                                                      d10fa136d6ae9a15216202e4dd9f787b3a148213569e438da3bf82b618d8001d

                                                                      SHA512

                                                                      c7ce8278bc5ee8f8b4738ef8bb2c0a96398b40dc65eea1c28688e772ae0f873624311146f4f4ec8971c91df57983d2d8cdbec1fe98eaa7f9d15a2c159d80e0af

                                                                    • C:\Windows\System32\DriverStore\Temp\{c7d3a5d7-299e-4e48-addf-530bfd7d0329}\x64\lci_proxyumd.dll

                                                                      Filesize

                                                                      179KB

                                                                      MD5

                                                                      4dc11547a5fc28ca8f6965fa21573481

                                                                      SHA1

                                                                      d531b0d8d2f8d49d81a4c17fbaf3bc294845362c

                                                                      SHA256

                                                                      e9db5cd21c8d709a47fc0cfb2c6ca3bb76a3ed8218bed5dc37948b3f9c7bd99d

                                                                      SHA512

                                                                      bd0f0a3bbc598480a9b678aa1b35728b2380bf57b195b0249936d0eaaa014f219031a563f486871099bf1c78ccc758f6b25b97cfc5296a73fc60b6caff9877f6

                                                                    • C:\Windows\System32\DriverStore\Temp\{c7d3a5d7-299e-4e48-addf-530bfd7d0329}\x64\lci_proxyumd32.dll

                                                                      Filesize

                                                                      135KB

                                                                      MD5

                                                                      67ae7b2c36c9c70086b9d41b4515b0a8

                                                                      SHA1

                                                                      ba735d6a338c8fdfa61c98f328b97bf3e8e48b8b

                                                                      SHA256

                                                                      79876f242b79269fe0fe3516f2bdb0a1922c86d820ce1dd98500b385511dac69

                                                                      SHA512

                                                                      4d8320440f3472ee0e9bd489da749a738370970de07b0920b535642723c92de848f4b3d7f898689c817145ce7b08f65128abe91d816827aeb7e5e193d7027078

                                                                    • C:\Windows\System32\DriverStore\Temp\{c7d3a5d7-299e-4e48-addf-530bfd7d0329}\x64\lci_proxywddm.sys

                                                                      Filesize

                                                                      119KB

                                                                      MD5

                                                                      b9b0e9b4d93b18b99ece31a819d71d00

                                                                      SHA1

                                                                      2be1ad570f3ccb2e6f2e2b16d1e0002ca4ec8d9e

                                                                      SHA256

                                                                      0f1c64c0fa08fe45beac15dc675d3b956525b8f198e92e0ccac21d2a70ce42cf

                                                                      SHA512

                                                                      465e389806f3b87a544ab8b0b7b49864feeba2eeef4fb51628d40175573ed1ba00b26d6a2abebc74c31369194206ed31d32c68471dddcf817fdd2d26e3da7a53

                                                                    • C:\Windows\System32\InstallUtil.InstallLog

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      bbe625903f24392c2a25bedce9fabd66

                                                                      SHA1

                                                                      5980c02f4570b749bcc0bed56ee9ff0dde1b1ec2

                                                                      SHA256

                                                                      fac60b5633a0094427f5c5916611912330def57e1418040216be71ee928d69bc

                                                                      SHA512

                                                                      480f79d8dfe1555431e2579b8b8fdbdbe5e0f064c316dc5caba50976436850ba6d2b413477096e97f0c5c76a21a6e38eefbf46b6e8e2f08ffe875fa3279062c6

                                                                    • C:\Windows\Temp\B7C5EA94-B96A-41F5-BE95-25D78B486678-01-13-12.dat

                                                                      Filesize

                                                                      602B

                                                                      MD5

                                                                      9b76bc7b7fe011f566c326e65bf4cb32

                                                                      SHA1

                                                                      351d836e0dd4991760f330e4c2f1121ea96d3a10

                                                                      SHA256

                                                                      8dc644c79275946c5983f3690aa480fdd96dcdeb3cb1029d7e47d16fd354ca5a

                                                                      SHA512

                                                                      1045d0370af2a7748620608df85d3dedd53dfc10d01311668dfcda1c5ffd9d5069450cd55fb7127b4f74126e8f1c82d6ab949f549e1f53e03cf846845d3320b3

                                                                    • C:\Windows\Temp\InstallUtil.log

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      80cdd75a023cd41efeaa72ea51fd25b9

                                                                      SHA1

                                                                      9c12754f4797e1c43ff7096805847e020df5bd8a

                                                                      SHA256

                                                                      eb3bcea1f4cf8a20bd700491c4eee6b092a2cdb527fbacdcfa0573c3df923aea

                                                                      SHA512

                                                                      98362aff2e5e69ef310f09cc8cbf07a3d5888beb5215ea1ba26b810d2c80efc4b9b115615f90cb146bfa48c7e63fc7a0220e58676eaa2e12e76dff321e9b3cc5

                                                                    • C:\Windows\Temp\InstallUtil.log

                                                                      Filesize

                                                                      850B

                                                                      MD5

                                                                      8ca2b50a665ed85c41f199808e97829a

                                                                      SHA1

                                                                      2f4f146e2cdd78d192f50b72553b2c4a062f10a7

                                                                      SHA256

                                                                      79c3a49984da47cf3b7f597ebea403c348745babeb7fb17df84e5beff418de27

                                                                      SHA512

                                                                      31a654b71a3af86fa1490a598688c0136fcaad57a5ab4db4926fa91f2b419b38cd1c79c8fbfee443dd37a33004c1291ea9eb1df8e932ae90421d51ef8be928d3

                                                                    • C:\Windows\Temp\InstallUtil.log

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      6e8efff14451e11e3452512000d2d859

                                                                      SHA1

                                                                      2157a86f88e2e6a22d68e3a12f61b1f854b30aec

                                                                      SHA256

                                                                      9c086207913c8cb80d63f3460be0ea5a168a48960b6db0f4ba96745040aaf4aa

                                                                      SHA512

                                                                      b6e3aeacfdbf530d186ae8e7108e2f211ee7c76be6ea9055e6ee8ec92babf2160a238d0945673c98f13b951b001b04cff885bc584cd7634d9fbaecaac5dea7c0

                                                                    • C:\Windows\Temp\__PSScriptPolicyTest_2dflcvr3.qmy.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • C:\Windows\Temp\unpack.log

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      c45c95d9d5785d2b2f421cbad1f23309

                                                                      SHA1

                                                                      9aecbe057146c7bc5c0112797ce6ed0d4c6a5772

                                                                      SHA256

                                                                      f4d992c74f39ea3c03e11bb9986600c9716950221165d8b4c53156b33b11271f

                                                                      SHA512

                                                                      ac0480779485e698e776a703285d43db1482a537e17a2c843f67b443e87b55761976b1ba960770053ded58776d58a383fef345051f0e479b2e7513deab1ed4a6

                                                                    • C:\Windows\Temp\unpack\PreVerCheck.exe

                                                                      Filesize

                                                                      3.2MB

                                                                      MD5

                                                                      2c18826adf72365827f780b2a1d5ea75

                                                                      SHA1

                                                                      a85b5eae6eba4af001d03996f48d97f7791e36eb

                                                                      SHA256

                                                                      ae06a5a23b6c61d250e8c28534ed0ffa8cc0c69b891c670ffaf54a43a9bf43be

                                                                      SHA512

                                                                      474fce1ec243b9f63ea3d427eb1117ad2ebc5a122f64853c5015193e6727ffc8083c5938117b66e572da3739fd0a86cd5bc118f374c690fa7a5fe9f0c071c167

                                                                    • C:\Windows\Temp\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\IsConfig.ini

                                                                      Filesize

                                                                      571B

                                                                      MD5

                                                                      d239b8964e37974225ad69d78a0a8275

                                                                      SHA1

                                                                      cf208e98a6f11d1807cd84ca61504ad783471679

                                                                      SHA256

                                                                      0ce4b4c69344a2d099dd6ca99e44801542fa2011b5505dd9760f023570049b73

                                                                      SHA512

                                                                      88eb06ae80070203cb7303a790ba0e8a63c503740ca6e7d70002a1071c89b640f9b43f376ddc3c9d6ee29bae0881f736fa71e677591416980b0a526b27ee41e8

                                                                    • C:\Windows\Temp\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\String1033.txt

                                                                      Filesize

                                                                      182KB

                                                                      MD5

                                                                      99bbffd900115fe8672c73fb1a48a604

                                                                      SHA1

                                                                      8f587395fa6b954affef337c70781ce00913950e

                                                                      SHA256

                                                                      57ceff2d980d9224c53a910a6f9e06475dc170f42a0070ae4934868ccd13d2dc

                                                                      SHA512

                                                                      d578b1931a8daa1ef0f0238639a0c1509255480b5dbd464c639b4031832e2e7537f003c646d7bd65b75e721a7ad584254b4dfa7efc41cf6c8fbd6b72d679eeff

                                                                    • C:\Windows\Temp\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\_is1F0.exe

                                                                      Filesize

                                                                      179KB

                                                                      MD5

                                                                      7a1c100df8065815dc34c05abc0c13de

                                                                      SHA1

                                                                      3c23414ae545d2087e5462a8994d2b87d3e6d9e2

                                                                      SHA256

                                                                      e46c768950aad809d04c91fb4234cb4b2e7d0b195f318719a71e967609e3bbed

                                                                      SHA512

                                                                      bbec114913bc2f92e8de7a4dd9513bff31f6b0ef4872171b9b6b63fef7faa363cf47e63e2d710dd32e9fc84c61f828e0fae3d48d06b76da023241bee9d4a6327

                                                                    • C:\Windows\Temp\{07034EEB-4AF5-4991-9CC0-23E713AD475C}\setup.inx

                                                                      Filesize

                                                                      345KB

                                                                      MD5

                                                                      0376dd5b7e37985ea50e693dc212094c

                                                                      SHA1

                                                                      02859394164c33924907b85ab0aaddc628c31bf1

                                                                      SHA256

                                                                      c9e6af6fb0bdbeb532e297436a80eb92a2ff7675f9c777c109208ee227f73415

                                                                      SHA512

                                                                      69d79d44908f6305eee5d8e6f815a0fee0c6d913f4f40f0c2c9f2f2e50f24bf7859ebe12c85138d971e5db95047f159f077ae687989b8588f76517cab7d3e0d5

                                                                    • C:\Windows\Temp\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\ISRT.dll

                                                                      Filesize

                                                                      427KB

                                                                      MD5

                                                                      85315ad538fa5af8162f1cd2fce1c99d

                                                                      SHA1

                                                                      31c177c28a05fa3de5e1f934b96b9d01a8969bba

                                                                      SHA256

                                                                      70735b13f629f247d6af2be567f2da8112039fbced5fbb37961e53a2a3ec1ec7

                                                                      SHA512

                                                                      877eb3238517eeb87c2a5d42839167e6c58f9ca7228847db3d20a19fb13b176a6280c37decda676fa99a6ccf7469569ddc0974eccf4ad67514fdedf9e9358556

                                                                    • C:\Windows\Temp\{3B6A3453-B968-4C6B-BBA6-3E228D99F164}\_isres_0x0409.dll

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      befe2ef369d12f83c72c5f2f7069dd87

                                                                      SHA1

                                                                      b89c7f6da1241ed98015dc347e70322832bcbe50

                                                                      SHA256

                                                                      9652ffae3f5c57d1095c6317ab6d75a9c835bb296e7c8b353a4d55d55c49a131

                                                                      SHA512

                                                                      760631b05ef79c308570b12d0c91c1d2a527427d51e4e568630e410b022e4ba24c924d6d85be6462ba7f71b2f0ba05587d3ec4b8f98fcdb8bb4f57949a41743b

                                                                    • C:\Windows\Temp\{4DDC3C18-7C86-4485-B49F-D62988164059}\.ba\1033\thm.wxl

                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      34d0c531eed48550be3d877290ad2553

                                                                      SHA1

                                                                      7983955032f9e7d2ee72cabc644a14c892a92289

                                                                      SHA256

                                                                      0d2abde2e4974cc8b7231f017975180d67592ee6d3418cd6dc52e2bc4bf03e50

                                                                      SHA512

                                                                      0c9d916ac420c6a27e723d8bab2db80372cc6303c79a6e1c3b2bd462711b711f2cc45fae43ceb2ce603708c884b0ec6bb7217981ef2a03e0fc3e6c6916716e7a

                                                                    • C:\Windows\Temp\{4DDC3C18-7C86-4485-B49F-D62988164059}\.ba\wixstdba.dll

                                                                      Filesize

                                                                      190KB

                                                                      MD5

                                                                      f1919c6bd85d7a78a70c228a5b227fbe

                                                                      SHA1

                                                                      71647ebf4e7bed3bc1663d520419ac550fe630ff

                                                                      SHA256

                                                                      dcea15f3710822ffc262e62ec04cc7bbbf0f33f5d1a853609fbfb65cb6a45640

                                                                      SHA512

                                                                      c7ff9b19c9bf320454a240c6abbc382950176a6befce05ea73150eeb0085d0b6ed5b65b2dcb4b04621ef9cca1d5c4e59c6682b9c85d1d5845e5ce3e5eedfd2eb

                                                                    • C:\Windows\Temp\{A4B012D7-2A70-40A5-8EBC-940FB8F163AF}\.ba\BootstrapperApplicationData.xml

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      4487aea1acc637f079c0b95cc52556ce

                                                                      SHA1

                                                                      dc4dcc5bd9824e212ab4439632f8d79e5bfcb34f

                                                                      SHA256

                                                                      062c872144b676d3557be20f17acaf98eb0015b135576f3b30a966bc9e0df4ff

                                                                      SHA512

                                                                      8f8915bbc50e14df1969b3e20df22dc968847e0a15aa6a85b7f1d6dbb2f3fbc87c1018d0605292d64d4d3405d74ea6e904bcea04ec060f3589443005ec997311

                                                                    • C:\Windows\Temp\{A4B012D7-2A70-40A5-8EBC-940FB8F163AF}\.ba\thm.xml

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      03cf60952e7b59460fd22807e8cb28e1

                                                                      SHA1

                                                                      5f4454019c5f33059ae53522ffb534eef815a5f5

                                                                      SHA256

                                                                      af7c42ac777b45751763bceaf8604fa5b842b096da4d1370158a1c3422713555

                                                                      SHA512

                                                                      bfb3c642759522cd4fd8c784909e97c38e6c44cced11d70167d0e243d8da12555a94aa2cd9978745849fa5233a1915485d3e1cb011d985c92a115e44a11b7140

                                                                    • C:\Windows\Temp\{E3F7B5DC-C163-47E7-B005-5CDEDC61BDA0}\.ba\bg.png

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      9eb0320dfbf2bd541e6a55c01ddc9f20

                                                                      SHA1

                                                                      eb282a66d29594346531b1ff886d455e1dcd6d99

                                                                      SHA256

                                                                      9095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79

                                                                      SHA512

                                                                      9ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d

                                                                    • C:\Windows\Temp\{E3F7B5DC-C163-47E7-B005-5CDEDC61BDA0}\.be\dotnet-runtime-8.0.11-win-x64.exe

                                                                      Filesize

                                                                      607KB

                                                                      MD5

                                                                      669de3ab32955e69decfe13a3c89891e

                                                                      SHA1

                                                                      ab2e90613c8b9261f022348ca11952a29f9b2c73

                                                                      SHA256

                                                                      2240e6318171b3cddcee6a801488f59145c1f54ca123068c2a73564535954677

                                                                      SHA512

                                                                      be5d737a7d25cc779736b60b1ea59982593f0598e207340219a13fd9572d140cfbcd112e3cf93e3be6085fe284a54d4458563e6f6e4e1cfe7c919685c9ee5442

                                                                    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                                      Filesize

                                                                      727B

                                                                      MD5

                                                                      aad13a044f871848379bac65d25bee2b

                                                                      SHA1

                                                                      589a79ab06d643b05bf0df781cc8900287e4be12

                                                                      SHA256

                                                                      54143c0ee8cbae61776a62bf6e76aac4e986bfd42d8235baa088c94552b5d64f

                                                                      SHA512

                                                                      0001f86ee15780f2f30ed045a85540769f552d269bed38c1779fc775feb56e82e2aca4d38d307b87b218897e90e258f2fafc487ddd5d667b0d37b4f404540173

                                                                    • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

                                                                      Filesize

                                                                      412B

                                                                      MD5

                                                                      7cf154bcb75a7d46f11bdd3663dafa90

                                                                      SHA1

                                                                      e908f0686806117ee25f1b58d53f0afbf3c68682

                                                                      SHA256

                                                                      d9aa356878434bdd740425561f0e2d882737fec44cf4cee9190a457424726bff

                                                                      SHA512

                                                                      fa485b896acd2db689be79c5f7e758874e920688617907adaa75efbb0dd0337ce1bd1a83de1968aea62e20209bfdf847d2f9fafcfbc9646fe0bd65baf9e3710e

                                                                    • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      9cad061ddf5ad182cfe7879190aeed71

                                                                      SHA1

                                                                      cfd292d16d937f95b642527464403b7e5ef6af96

                                                                      SHA256

                                                                      b2d273fa926ebf6946e69e8808ad332db42bc65f449748082e088aa732e408ca

                                                                      SHA512

                                                                      df517d66358f441a7c4c690cd90e214f18d490e3de767dd76164effaa179b1dd865a0056d68ce3ab6aee55917465c7f39146e7694b1ac475fcc95c280fb29e92

                                                                    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                      Filesize

                                                                      24.1MB

                                                                      MD5

                                                                      50459e1a4002290742ca3af97341de9b

                                                                      SHA1

                                                                      375ac894aabd4e6e5de78a009f4ab72a51f3fa25

                                                                      SHA256

                                                                      27e8182d294714be3b7bac7bbdafe9c956a975ab9f3691c1d7aaf191193dfb2d

                                                                      SHA512

                                                                      640731d7167c846e4ae3301f2a66245dca3d92946f5dcd2831525503642a4c0839710b0b8153e3ad1f09b48affa431dc0eef97cbe5475f8c1e2a37ed68588d31

                                                                    • \??\Volume{ceabe027-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c1047e02-1273-48ba-8f66-d132e061258c}_OnDiskSnapshotProp

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      76bdef438b5b2e26d0d6a1d0de44f4a4

                                                                      SHA1

                                                                      2204a5aa7c9f703808f607dbce8758dca426655f

                                                                      SHA256

                                                                      627b6eccaa9c95b751bb3acbfe0d4de965313a32b47a53c390dd957893cfda66

                                                                      SHA512

                                                                      523c9960861dfa78b62f467945e6fe384dc242add0c47df893c851767222d74ad817957848be7bacfc9e9e177cfb1dc115b9b29ffe360f1321b021644a0cfe07

                                                                    • memory/468-1178-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/468-1179-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/468-1919-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/468-1918-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/468-3730-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/468-3729-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/912-1886-0x000002174C3F0000-0x000002174C400000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/912-1902-0x00000217656E0000-0x00000217657BC000-memory.dmp

                                                                      Filesize

                                                                      880KB

                                                                    • memory/912-1890-0x000002174C880000-0x000002174C89C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/912-1913-0x00000217657C0000-0x0000021765872000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/912-1929-0x000002174C920000-0x000002174C928000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/912-1888-0x000002174C8B0000-0x000002174C8FA000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/916-1932-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/916-1921-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/916-1920-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-928-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-932-0x0000000003880000-0x0000000003A47000-memory.dmp

                                                                      Filesize

                                                                      1.8MB

                                                                    • memory/1404-1108-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-507-0x0000000003840000-0x0000000003A07000-memory.dmp

                                                                      Filesize

                                                                      1.8MB

                                                                    • memory/1404-504-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-540-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-929-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1404-1076-0x0000000010000000-0x0000000010114000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/1416-1875-0x000002A2A58B0000-0x000002A2A5962000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/1416-1881-0x000002A2A57F0000-0x000002A2A5856000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/1416-1874-0x000002A2A51A0000-0x000002A2A51C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1416-1873-0x000002A2A4DE0000-0x000002A2A4DF0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1416-1884-0x000002A2A5770000-0x000002A2A5784000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/1444-1584-0x000002407D200000-0x000002407D23A000-memory.dmp

                                                                      Filesize

                                                                      232KB

                                                                    • memory/1444-1891-0x000002407D740000-0x000002407D75C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/1444-1898-0x000002407E5A0000-0x000002407E5E8000-memory.dmp

                                                                      Filesize

                                                                      288KB

                                                                    • memory/1444-1889-0x000002407E490000-0x000002407E542000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/3064-313-0x000001EEF2AE0000-0x000001EEF2B92000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/3064-314-0x000001EEF1D70000-0x000001EEF1D8C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/3064-312-0x000001EEF18C0000-0x000001EEF18D6000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/3480-1899-0x00000255BCE00000-0x00000255BCE0C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/3480-231-0x000001E972210000-0x000001E972248000-memory.dmp

                                                                      Filesize

                                                                      224KB

                                                                    • memory/3480-1883-0x00000255BC570000-0x00000255BC5C0000-memory.dmp

                                                                      Filesize

                                                                      320KB

                                                                    • memory/3480-192-0x000001E971C10000-0x000001E971C32000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/3480-1885-0x00000255D5640000-0x00000255D568A000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/3480-1928-0x00000255D5A10000-0x00000255D5AC2000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/3480-1892-0x00000255BCDE0000-0x00000255BCDFC000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/3480-1923-0x00000255D5930000-0x00000255D5A0C000-memory.dmp

                                                                      Filesize

                                                                      880KB

                                                                    • memory/3480-1900-0x00000255D5700000-0x00000255D574A000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/3480-1897-0x00000255BCE20000-0x00000255BCE38000-memory.dmp

                                                                      Filesize

                                                                      96KB

                                                                    • memory/3480-187-0x000001E971C80000-0x000001E971D32000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/3612-66-0x0000000004990000-0x0000000004A42000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/3612-70-0x0000000004A50000-0x0000000004DA4000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/3612-69-0x0000000004920000-0x0000000004942000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/4084-2180-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4084-1227-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4084-3727-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4084-3728-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4084-2179-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4552-1675-0x000002100DFD0000-0x000002100DFDA000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/4552-1684-0x000002100E810000-0x000002100E82A000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/4552-1903-0x0000021027840000-0x0000021027D68000-memory.dmp

                                                                      Filesize

                                                                      5.2MB

                                                                    • memory/4552-1871-0x0000021027150000-0x0000021027202000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/4612-279-0x000001A595470000-0x000001A5954B2000-memory.dmp

                                                                      Filesize

                                                                      264KB

                                                                    • memory/4612-282-0x000001A5AE5C0000-0x000001A5AE672000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/4612-284-0x000001A595D10000-0x000001A595D30000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4740-1916-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4740-2135-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4740-1173-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4740-1172-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4740-1917-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4740-2134-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4740-2361-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4740-2360-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4740-1270-0x0000000074960000-0x0000000074A7C000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4740-1777-0x0000000073920000-0x0000000073CED000-memory.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                    • memory/4936-1312-0x000002265D620000-0x000002265D62C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/4936-1367-0x000002265DFB0000-0x000002265DFD0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4936-1352-0x00000226767F0000-0x00000226768A2000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/4936-1349-0x000002265DF90000-0x000002265DFA8000-memory.dmp

                                                                      Filesize

                                                                      96KB

                                                                    • memory/5100-1887-0x00000296EBA10000-0x00000296EBA2C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/5100-1882-0x00000296EBA60000-0x00000296EBAAA000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/5100-1880-0x00000296EB1D0000-0x00000296EB1E2000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/5100-1922-0x00000296EC520000-0x00000296EC5D2000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/5100-1924-0x00000296EC6C0000-0x00000296EC79C000-memory.dmp

                                                                      Filesize

                                                                      880KB

                                                                    • memory/5176-359-0x00000177309C0000-0x0000017730A0A000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/5176-383-0x0000017749630000-0x000001774966A000-memory.dmp

                                                                      Filesize

                                                                      232KB

                                                                    • memory/5176-378-0x0000017749140000-0x0000017749148000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/5176-384-0x0000017749320000-0x0000017749346000-memory.dmp

                                                                      Filesize

                                                                      152KB

                                                                    • memory/5176-377-0x00000177494C0000-0x0000017749572000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/5176-360-0x00000177303C0000-0x00000177303DC000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/5176-370-0x0000017749160000-0x00000177491AC000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/5176-372-0x00000177303E0000-0x00000177303E8000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/5176-373-0x00000177303F0000-0x00000177303FA000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/5176-379-0x0000017749300000-0x0000017749308000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/5176-371-0x00000177491B0000-0x00000177491F8000-memory.dmp

                                                                      Filesize

                                                                      288KB

                                                                    • memory/5176-358-0x000001772FFA0000-0x0000017730006000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/5176-376-0x00000177493E0000-0x00000177494BC000-memory.dmp

                                                                      Filesize

                                                                      880KB

                                                                    • memory/5176-382-0x0000017749350000-0x000001774937A000-memory.dmp

                                                                      Filesize

                                                                      168KB

                                                                    • memory/5176-381-0x0000017749580000-0x00000177495E8000-memory.dmp

                                                                      Filesize

                                                                      416KB

                                                                    • memory/5176-380-0x0000017749310000-0x0000017749318000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/5180-138-0x000001C717A50000-0x000001C717A78000-memory.dmp

                                                                      Filesize

                                                                      160KB

                                                                    • memory/5180-150-0x000001C732070000-0x000001C732108000-memory.dmp

                                                                      Filesize

                                                                      608KB

                                                                    • memory/5180-155-0x000001C718050000-0x000001C71808C000-memory.dmp

                                                                      Filesize

                                                                      240KB

                                                                    • memory/5180-154-0x000001C717E40000-0x000001C717E52000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/5380-33-0x0000000002EE0000-0x0000000002EEC000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/5380-29-0x0000000002F00000-0x0000000002F2E000-memory.dmp

                                                                      Filesize

                                                                      184KB

                                                                    • memory/5416-100-0x00000000048C0000-0x0000000004926000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/5440-1901-0x000001B369C60000-0x000001B369D12000-memory.dmp

                                                                      Filesize

                                                                      712KB

                                                                    • memory/5440-1896-0x000001B351300000-0x000001B35131C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/5440-1925-0x000001B351390000-0x000001B3513E4000-memory.dmp

                                                                      Filesize

                                                                      336KB

                                                                    • memory/5440-1894-0x000001B350AB0000-0x000001B350AC2000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/5840-1915-0x000001E8D5800000-0x000001E8D58B0000-memory.dmp

                                                                      Filesize

                                                                      704KB

                                                                    • memory/5840-1879-0x000001E8BC990000-0x000001E8BC9AC000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/5840-1870-0x000001E8BC9C0000-0x000001E8BCA0A000-memory.dmp

                                                                      Filesize

                                                                      296KB

                                                                    • memory/5840-1867-0x000001E8BC500000-0x000001E8BC50C000-memory.dmp

                                                                      Filesize

                                                                      48KB