Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2025, 23:20

General

  • Target

    quarantine/fyBqr89.msi

  • Size

    6.2MB

  • MD5

    69d4092b3524bc2bff4e5c73509c3eb9

  • SHA1

    43cb58b5635aea617dd93565c1baa15fde3eb0c0

  • SHA256

    23662f3ca1692692dc1f090acaf814695eddbbf5dba15fd7b2c95f8ef6c47432

  • SHA512

    2085868cba95b6cf87f1c47efff4b95ce930c3ac2706cecb4f8d66b5611c7af11423a9397d17ad581bd9769143c88010f4b278fa332c8655978aaa5d4f34eaff

  • SSDEEP

    196608:kCLvDC8Y0BDC2zU0jRhsk2/0ReXyhNHnIy9c:1LC8dB3fjRhPhReXyHIy

Malware Config

Signatures

  • Looks for VirtualBox drivers on disk 2 TTPs 64 IoCs
  • Looks for VMWare drivers on disk 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 31 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\quarantine\fyBqr89.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5588
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1780
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding BE20BFC2283FB9DEE0599C92B204260D E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe
        C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe /VERYSILENT /SUPPRESSMSGBOXES /NORESTART
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3652
        • C:\Users\Admin\AppData\Local\Temp\is-7OFE7.tmp\aurelia_setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-7OFE7.tmp\aurelia_setup.tmp" /SL5="$90264,5779210,860672,C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART
          4⤵
          • Adds Run key to start application
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5124
          • C:\Users\Public\Aurelia\Aurelia.exe
            "C:\Users\Public\Aurelia\Aurelia.exe"
            5⤵
            • Looks for VirtualBox drivers on disk
            • Looks for VMWare drivers on disk
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1988
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3912
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic csproduct get uuid
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4124
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "ver"
              6⤵
                PID:5964
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "ver"
                6⤵
                  PID:4324
                • C:\Users\Public\Aurelia\Aurelia.exe
                  C:\Users\Public\Aurelia\Aurelia.exe
                  6⤵
                  • Looks for VirtualBox drivers on disk
                  • Looks for VMWare drivers on disk
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:3504
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:556
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      8⤵
                        PID:708
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "ver"
                      7⤵
                        PID:4876
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "ver"
                        7⤵
                          PID:4180
                        • C:\Users\Public\Aurelia\Aurelia.exe
                          C:\Users\Public\Aurelia\Aurelia.exe
                          7⤵
                          • Looks for VirtualBox drivers on disk
                          • Looks for VMWare drivers on disk
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:4816
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2844
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic csproduct get uuid
                              9⤵
                                PID:3928
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "ver"
                              8⤵
                                PID:5944
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "ver"
                                8⤵
                                  PID:2364
                                • C:\Users\Public\Aurelia\Aurelia.exe
                                  C:\Users\Public\Aurelia\Aurelia.exe
                                  8⤵
                                  • Looks for VirtualBox drivers on disk
                                  • Looks for VMWare drivers on disk
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:3652
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                    9⤵
                                      PID:4600
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic csproduct get uuid
                                        10⤵
                                          PID:3708
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "ver"
                                        9⤵
                                          PID:4696
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "ver"
                                          9⤵
                                            PID:4044
                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                            C:\Users\Public\Aurelia\Aurelia.exe
                                            9⤵
                                            • Looks for VirtualBox drivers on disk
                                            • Looks for VMWare drivers on disk
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:4936
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                              10⤵
                                                PID:1452
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic csproduct get uuid
                                                  11⤵
                                                    PID:1604
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                  10⤵
                                                    PID:920
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                    10⤵
                                                      PID:5924
                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                      10⤵
                                                      • Looks for VirtualBox drivers on disk
                                                      • Looks for VMWare drivers on disk
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:2408
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                        11⤵
                                                          PID:4428
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic csproduct get uuid
                                                            12⤵
                                                              PID:4084
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                            11⤵
                                                              PID:4696
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                              11⤵
                                                                PID:4044
                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                11⤵
                                                                • Looks for VirtualBox drivers on disk
                                                                • Looks for VMWare drivers on disk
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                PID:4180
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                  12⤵
                                                                    PID:64
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic csproduct get uuid
                                                                      13⤵
                                                                        PID:1604
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                      12⤵
                                                                        PID:4340
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                        12⤵
                                                                          PID:4828
                                                                        • C:\Users\Public\Aurelia\Aurelia.exe
                                                                          C:\Users\Public\Aurelia\Aurelia.exe
                                                                          12⤵
                                                                          • Looks for VirtualBox drivers on disk
                                                                          • Looks for VMWare drivers on disk
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          PID:1864
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                            13⤵
                                                                              PID:1668
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic csproduct get uuid
                                                                                14⤵
                                                                                  PID:4352
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                13⤵
                                                                                  PID:1860
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                  13⤵
                                                                                    PID:5200
                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                    C:\Users\Public\Aurelia\Aurelia.exe
                                                                                    13⤵
                                                                                    • Looks for VirtualBox drivers on disk
                                                                                    • Looks for VMWare drivers on disk
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    PID:5536
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                      14⤵
                                                                                        PID:4856
                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                          wmic csproduct get uuid
                                                                                          15⤵
                                                                                            PID:3624
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                          14⤵
                                                                                            PID:4880
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                            14⤵
                                                                                              PID:4088
                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                              14⤵
                                                                                              • Looks for VirtualBox drivers on disk
                                                                                              • Looks for VMWare drivers on disk
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:5284
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                15⤵
                                                                                                  PID:60
                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                    wmic csproduct get uuid
                                                                                                    16⤵
                                                                                                      PID:5184
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                    15⤵
                                                                                                      PID:1832
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                      15⤵
                                                                                                        PID:5480
                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                        15⤵
                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                        • Looks for VMWare drivers on disk
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        PID:2140
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                          16⤵
                                                                                                            PID:4784
                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                              wmic csproduct get uuid
                                                                                                              17⤵
                                                                                                                PID:1804
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                              16⤵
                                                                                                                PID:3060
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                16⤵
                                                                                                                  PID:2896
                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                  16⤵
                                                                                                                  • Looks for VirtualBox drivers on disk
                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Loads dropped DLL
                                                                                                                  PID:5368
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                    17⤵
                                                                                                                      PID:2512
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        wmic csproduct get uuid
                                                                                                                        18⤵
                                                                                                                          PID:2476
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                        17⤵
                                                                                                                          PID:4868
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                          17⤵
                                                                                                                            PID:1304
                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                            17⤵
                                                                                                                            • Looks for VMWare drivers on disk
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            PID:5412
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                              18⤵
                                                                                                                                PID:5760
                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                  wmic csproduct get uuid
                                                                                                                                  19⤵
                                                                                                                                    PID:6104
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                  18⤵
                                                                                                                                    PID:4704
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                    18⤵
                                                                                                                                      PID:3108
                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      18⤵
                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      PID:1780
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                        19⤵
                                                                                                                                          PID:2056
                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                            wmic csproduct get uuid
                                                                                                                                            20⤵
                                                                                                                                              PID:1592
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                            19⤵
                                                                                                                                              PID:1192
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                              19⤵
                                                                                                                                                PID:1816
                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                19⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                PID:3660
                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                            1⤵
                                                                                                            • Checks SCSI registry key(s)
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:5564
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Public\Aurelia\Aurelia.exe"
                                                                                                            1⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:3148
                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                              2⤵
                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                              • Executes dropped EXE
                                                                                                              • Loads dropped DLL
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:3948
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                3⤵
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:1052
                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                  wmic csproduct get uuid
                                                                                                                  4⤵
                                                                                                                    PID:4156
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                  3⤵
                                                                                                                    PID:3688
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                    3⤵
                                                                                                                      PID:5636
                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                      3⤵
                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:232
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                        4⤵
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:1636
                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                          wmic csproduct get uuid
                                                                                                                          5⤵
                                                                                                                            PID:5212
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                          4⤵
                                                                                                                            PID:1300
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                            4⤵
                                                                                                                              PID:3632
                                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                              4⤵
                                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                                              • Looks for VMWare drivers on disk
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              PID:60
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                5⤵
                                                                                                                                  PID:5124
                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                    wmic csproduct get uuid
                                                                                                                                    6⤵
                                                                                                                                      PID:3748
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                    5⤵
                                                                                                                                      PID:1816
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                      5⤵
                                                                                                                                        PID:5368
                                                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                        5⤵
                                                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Loads dropped DLL
                                                                                                                                        PID:5636
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                          6⤵
                                                                                                                                            PID:4952
                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                              wmic csproduct get uuid
                                                                                                                                              7⤵
                                                                                                                                                PID:5656
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                              6⤵
                                                                                                                                                PID:4764
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                6⤵
                                                                                                                                                  PID:2220
                                                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                  6⤵
                                                                                                                                                  • Looks for VirtualBox drivers on disk
                                                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                  PID:3576
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                    7⤵
                                                                                                                                                      PID:3188
                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                        wmic csproduct get uuid
                                                                                                                                                        8⤵
                                                                                                                                                          PID:4468
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                        7⤵
                                                                                                                                                          PID:3976
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                          7⤵
                                                                                                                                                            PID:4300
                                                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                            7⤵
                                                                                                                                                            • Looks for VirtualBox drivers on disk
                                                                                                                                                            • Looks for VMWare drivers on disk
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            PID:3804
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                              8⤵
                                                                                                                                                                PID:4688
                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                  wmic csproduct get uuid
                                                                                                                                                                  9⤵
                                                                                                                                                                    PID:1776
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                  8⤵
                                                                                                                                                                    PID:3292
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                    8⤵
                                                                                                                                                                      PID:3660
                                                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                      8⤵
                                                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                      PID:5760
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                        9⤵
                                                                                                                                                                          PID:3392
                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                            wmic csproduct get uuid
                                                                                                                                                                            10⤵
                                                                                                                                                                              PID:1980
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                            9⤵
                                                                                                                                                                              PID:4720
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                              9⤵
                                                                                                                                                                                PID:5880
                                                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                9⤵
                                                                                                                                                                                • Looks for VirtualBox drivers on disk
                                                                                                                                                                                • Looks for VMWare drivers on disk
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                PID:5128
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                  10⤵
                                                                                                                                                                                    PID:1136
                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                      wmic csproduct get uuid
                                                                                                                                                                                      11⤵
                                                                                                                                                                                        PID:4316
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                      10⤵
                                                                                                                                                                                        PID:5544
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                        10⤵
                                                                                                                                                                                          PID:4060
                                                                                                                                                                                        • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                          C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                          10⤵
                                                                                                                                                                                          • Looks for VirtualBox drivers on disk
                                                                                                                                                                                          • Looks for VMWare drivers on disk
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                          PID:3188
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                            11⤵
                                                                                                                                                                                              PID:748
                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                wmic csproduct get uuid
                                                                                                                                                                                                12⤵
                                                                                                                                                                                                  PID:4004
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                11⤵
                                                                                                                                                                                                  PID:2296
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                    PID:4700
                                                                                                                                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                    C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                    • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                    • Looks for VMWare drivers on disk
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                    PID:1052
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                      12⤵
                                                                                                                                                                                                        PID:1376
                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                          wmic csproduct get uuid
                                                                                                                                                                                                          13⤵
                                                                                                                                                                                                            PID:1980
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                          12⤵
                                                                                                                                                                                                            PID:5108
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                            12⤵
                                                                                                                                                                                                              PID:5492
                                                                                                                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                              • Looks for VMWare drivers on disk
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                              PID:4420
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                13⤵
                                                                                                                                                                                                                  PID:5696
                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                    wmic csproduct get uuid
                                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                                      PID:1584
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                    13⤵
                                                                                                                                                                                                                      PID:5460
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                      13⤵
                                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                        13⤵
                                                                                                                                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                        • Looks for VMWare drivers on disk
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                        PID:5396
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                          14⤵
                                                                                                                                                                                                                            PID:5180
                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                              wmic csproduct get uuid
                                                                                                                                                                                                                              15⤵
                                                                                                                                                                                                                                PID:5948
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                              14⤵
                                                                                                                                                                                                                                PID:2260
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                                  PID:1316
                                                                                                                                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                                                  • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                  PID:5580
                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                    15⤵
                                                                                                                                                                                                                                      PID:5704
                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                        wmic csproduct get uuid
                                                                                                                                                                                                                                        16⤵
                                                                                                                                                                                                                                          PID:2008
                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                                          PID:4616
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                                            PID:2156
                                                                                                                                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                                                            • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                            • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                            PID:4780
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                              16⤵
                                                                                                                                                                                                                                                PID:5800
                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                  wmic csproduct get uuid
                                                                                                                                                                                                                                                  17⤵
                                                                                                                                                                                                                                                    PID:3952
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                  16⤵
                                                                                                                                                                                                                                                    PID:6004
                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                      PID:4308
                                                                                                                                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                      16⤵
                                                                                                                                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                      PID:2184
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                        17⤵
                                                                                                                                                                                                                                                          PID:3104
                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                            wmic csproduct get uuid
                                                                                                                                                                                                                                                            18⤵
                                                                                                                                                                                                                                                              PID:1196
                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                              PID:1640
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                              17⤵
                                                                                                                                                                                                                                                                PID:4452

                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v16

                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                              • C:\Config.Msi\e57a569.rbs

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                1c5ac9835ecc16776a8014b791f09c94

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6f5c6e9fbc87caf3d6b65c1470366b3c95c06c0e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                294c078f060741a7df1964ccedefbca0a433689011d940bfa1f8dcd5bb723eca

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                45e8af5a2970850d8c2d744a4f92efc1fcff9a665ebcea5cc9dbb9a221427f66db15c3d37dc056ab12760db4d6ef110f62b14d6e5697d1f3afccaba9f42aa962

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6.5MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                05550adb630b1113539470a138719946

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                b4a9760e9c1b2a516b15f853e71c1e37dc85fa94

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                6a5ae434d77e4678b61c5009127e2fac4ca988781c4f2af4581455da7af717c2

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                5827a4778d383ec5387051517f955a7b09fec8c95ca6cbc38dfd89afbd6c63ddc078d58007f8a6fd52c42406b51b0b6691114ebfa42325aa092b663066f368e3

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-7OFE7.tmp\aurelia_setup.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                3.4MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                55d7b5023133d4ebbe3288d481a68b99

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                6b706dee2daca913328ca6e4e5e6a85bc7f8ab0f

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                85c1f72de072ed57e63b35fa7d68a1d100a1685eab6c730632b5635006993929

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                8707cd9d7903522bbc0d6978a766c791740c57b6cf4ceba903175e8a7dd0c4d7f2d8787069ee3ba6abdf895d06448e1a07e8bc06c1d521160465a99efe04cb24

                                                                                                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                8.7MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e0494504708c3df7ba7bb5e68a8f005d

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                414d7e6886405e969a89c490cdf6030cdeea362b

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ff08761c5aaaff84aa6a0c216e6b486bfb823e2107717986c7c657b8e5b933b5

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                a4924cd7de04f5f430478a25bde70d5810e46bc48dab7f9d02166539b692f773e743db827b0f215ff3914057539a348957b5ccdab6b256dc26d6bde57fe7cb3b

                                                                                                                                                                                                                              • C:\Users\Public\Aurelia\vcruntime140.dll

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                117KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                caf9edded91c1f6c0022b278c16679aa

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                4812da5eb86a93fb0adc5bb60a4980ee8b0ad33a

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                02c6aa0e6e624411a9f19b0360a7865ab15908e26024510e5c38a9c08362c35a

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                32ac84642a9656609c45a6b649b222829be572b5fdeb6d5d93acea203e02816cf6c06063334470e8106871bdc9f2f3c7f0d1d3e554da1832ba1490f644e18362

                                                                                                                                                                                                                              • C:\Windows\Installer\MSIA663.tmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                215KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                8931e35055fd15b1acce7d7f24a23c36

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                39b10e3171aaa4db9f8f14275b587fb82589d0ea

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                2b05bdcae15519ed4f61d1504f3226c2bcf04d358f3c54472b1d9b0aa3016860

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                2350f7935324565069aa747b4d3a7e416934ace1bf34a898d534dd316c829c1bd0601200fd84b7a3f60674a3e160f52949689a98c22766f271e1140dedc76c22

                                                                                                                                                                                                                              • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                24.1MB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                27907715b7f47793f90f392bbe3e32eb

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                c7119036f21b59a56d3c574de462fee0e9303b4b

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                ef9a5989832d36882e383a73b45e833126361c2e9d96ee5a6677b6df2b63ef99

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                b9d8e82e00345c37c23d2485846f93d62a09aefc1a541c387bf324b2589941b3ab780485bd36744c9a76c27a62064f35ff1c3bc2506914ebbbc6b52978dd1401

                                                                                                                                                                                                                              • \??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6cb51faa-c3f1-42f5-943f-ff1e1645fd3e}_OnDiskSnapshotProp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                e4336184a87050f3874a0e23c611511e

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                58bfd569d747800119c9221e46886698397d270e

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                08b6ef2a47b9b88348ddaef7d8ad8726cd03ef10b8ec72074787d143b81a0af6

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                eeeac4a9f523826d5391bf4d0903b0f19b0cd968d2a89234e1621d5d2f99b5cf5d371a010459ff78c7f99400d44cb0792ab8ea7f6257b014303aa6ce06e66d04

                                                                                                                                                                                                                              • memory/1988-63-0x0000018933040000-0x0000018933055000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                              • memory/1988-68-0x0000018933060000-0x0000018933069000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                36KB

                                                                                                                                                                                                                              • memory/1988-57-0x0000000180000000-0x00000001805D6000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                5.8MB

                                                                                                                                                                                                                              • memory/1988-86-0x0000018934930000-0x0000018934959000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                164KB

                                                                                                                                                                                                                              • memory/1988-81-0x0000018934910000-0x0000018934925000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                              • memory/1988-111-0x0000018934960000-0x000001893496B000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                44KB

                                                                                                                                                                                                                              • memory/1988-115-0x0000018934970000-0x0000018934990000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                128KB

                                                                                                                                                                                                                              • memory/1988-120-0x0000018934990000-0x00000189349C2000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                200KB

                                                                                                                                                                                                                              • memory/3652-16-0x00000000004A0000-0x0000000000582000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                904KB

                                                                                                                                                                                                                              • memory/3948-91-0x0000016ACF6F0000-0x0000016ACF705000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                              • memory/3948-96-0x0000016ACF710000-0x0000016ACF719000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                36KB

                                                                                                                                                                                                                              • memory/3948-106-0x0000016ACF740000-0x0000016ACF769000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                164KB

                                                                                                                                                                                                                              • memory/3948-101-0x0000016ACF720000-0x0000016ACF735000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                84KB