Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2025, 23:26

General

  • Target

    quarantine/fyBqr89.msi

  • Size

    6.2MB

  • MD5

    69d4092b3524bc2bff4e5c73509c3eb9

  • SHA1

    43cb58b5635aea617dd93565c1baa15fde3eb0c0

  • SHA256

    23662f3ca1692692dc1f090acaf814695eddbbf5dba15fd7b2c95f8ef6c47432

  • SHA512

    2085868cba95b6cf87f1c47efff4b95ce930c3ac2706cecb4f8d66b5611c7af11423a9397d17ad581bd9769143c88010f4b278fa332c8655978aaa5d4f34eaff

  • SSDEEP

    196608:kCLvDC8Y0BDC2zU0jRhsk2/0ReXyhNHnIy9c:1LC8dB3fjRhPhReXyHIy

Malware Config

Signatures

  • Looks for VirtualBox drivers on disk 2 TTPs 64 IoCs
  • Looks for VMWare drivers on disk 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 34 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\quarantine\fyBqr89.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1528
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6120
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A6C617CC860CEF5A687B3C3617C937E8 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe
        C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe /VERYSILENT /SUPPRESSMSGBOXES /NORESTART
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Users\Admin\AppData\Local\Temp\is-FIR6C.tmp\aurelia_setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-FIR6C.tmp\aurelia_setup.tmp" /SL5="$301CE,5779210,860672,C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART
          4⤵
          • Adds Run key to start application
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Users\Public\Aurelia\Aurelia.exe
            "C:\Users\Public\Aurelia\Aurelia.exe"
            5⤵
            • Looks for VirtualBox drivers on disk
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1900
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:536
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic csproduct get uuid
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:6116
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "ver"
              6⤵
                PID:5484
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "ver"
                6⤵
                  PID:4352
                • C:\Users\Public\Aurelia\Aurelia.exe
                  C:\Users\Public\Aurelia\Aurelia.exe
                  6⤵
                  • Looks for VirtualBox drivers on disk
                  • Looks for VMWare drivers on disk
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2060
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4736
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic csproduct get uuid
                      8⤵
                        PID:1824
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "ver"
                      7⤵
                        PID:2112
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "ver"
                        7⤵
                          PID:1240
                        • C:\Users\Public\Aurelia\Aurelia.exe
                          C:\Users\Public\Aurelia\Aurelia.exe
                          7⤵
                          • Looks for VirtualBox drivers on disk
                          • Looks for VMWare drivers on disk
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:4504
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:5888
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic csproduct get uuid
                              9⤵
                                PID:1196
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "ver"
                              8⤵
                                PID:3408
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "ver"
                                8⤵
                                  PID:1820
                                • C:\Users\Public\Aurelia\Aurelia.exe
                                  C:\Users\Public\Aurelia\Aurelia.exe
                                  8⤵
                                  • Looks for VirtualBox drivers on disk
                                  • Looks for VMWare drivers on disk
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:4088
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                    9⤵
                                      PID:1864
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic csproduct get uuid
                                        10⤵
                                          PID:2232
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "ver"
                                        9⤵
                                          PID:3080
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "ver"
                                          9⤵
                                            PID:2340
                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                            C:\Users\Public\Aurelia\Aurelia.exe
                                            9⤵
                                            • Looks for VMWare drivers on disk
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:2384
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                              10⤵
                                                PID:5784
                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                  wmic csproduct get uuid
                                                  11⤵
                                                    PID:1404
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                  10⤵
                                                    PID:3024
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                    10⤵
                                                      PID:3516
                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                      10⤵
                                                      • Looks for VirtualBox drivers on disk
                                                      • Looks for VMWare drivers on disk
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      PID:2952
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                        11⤵
                                                          PID:5888
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic csproduct get uuid
                                                            12⤵
                                                              PID:5916
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                            11⤵
                                                              PID:5964
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                              11⤵
                                                                PID:1888
                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                11⤵
                                                                • Looks for VirtualBox drivers on disk
                                                                • Looks for VMWare drivers on disk
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                PID:1988
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                  12⤵
                                                                    PID:2488
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic csproduct get uuid
                                                                      13⤵
                                                                        PID:4784
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                      12⤵
                                                                        PID:5304
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                        12⤵
                                                                          PID:5292
                                                                        • C:\Users\Public\Aurelia\Aurelia.exe
                                                                          C:\Users\Public\Aurelia\Aurelia.exe
                                                                          12⤵
                                                                          • Looks for VirtualBox drivers on disk
                                                                          • Looks for VMWare drivers on disk
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          PID:5932
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                            13⤵
                                                                              PID:2784
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic csproduct get uuid
                                                                                14⤵
                                                                                  PID:2344
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                13⤵
                                                                                  PID:3356
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                  13⤵
                                                                                    PID:4176
                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                    C:\Users\Public\Aurelia\Aurelia.exe
                                                                                    13⤵
                                                                                    • Looks for VirtualBox drivers on disk
                                                                                    • Looks for VMWare drivers on disk
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    PID:4648
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                      14⤵
                                                                                        PID:5068
                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                          wmic csproduct get uuid
                                                                                          15⤵
                                                                                            PID:3860
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                          14⤵
                                                                                            PID:1676
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                            14⤵
                                                                                              PID:5624
                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                              14⤵
                                                                                              • Looks for VirtualBox drivers on disk
                                                                                              • Looks for VMWare drivers on disk
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:556
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                15⤵
                                                                                                  PID:4656
                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                    wmic csproduct get uuid
                                                                                                    16⤵
                                                                                                      PID:1392
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                    15⤵
                                                                                                      PID:1288
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                      15⤵
                                                                                                        PID:1016
                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                        15⤵
                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                        • Looks for VMWare drivers on disk
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        PID:3504
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                          16⤵
                                                                                                            PID:2376
                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                              wmic csproduct get uuid
                                                                                                              17⤵
                                                                                                                PID:2548
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                              16⤵
                                                                                                                PID:912
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                16⤵
                                                                                                                  PID:1172
                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                  16⤵
                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Loads dropped DLL
                                                                                                                  PID:4352
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                    17⤵
                                                                                                                      PID:4640
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        wmic csproduct get uuid
                                                                                                                        18⤵
                                                                                                                          PID:3816
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                        17⤵
                                                                                                                          PID:5368
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                          17⤵
                                                                                                                            PID:2120
                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                            17⤵
                                                                                                                            • Looks for VirtualBox drivers on disk
                                                                                                                            • Looks for VMWare drivers on disk
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            PID:4968
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                              18⤵
                                                                                                                                PID:4088
                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                  wmic csproduct get uuid
                                                                                                                                  19⤵
                                                                                                                                    PID:1392
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                  18⤵
                                                                                                                                    PID:1092
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                    18⤵
                                                                                                                                      PID:5224
                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      18⤵
                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      PID:1988
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                        19⤵
                                                                                                                                          PID:2440
                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                            wmic csproduct get uuid
                                                                                                                                            20⤵
                                                                                                                                              PID:3396
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                            19⤵
                                                                                                                                              PID:5756
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                              19⤵
                                                                                                                                                PID:4348
                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                19⤵
                                                                                                                                                • Looks for VirtualBox drivers on disk
                                                                                                                                                • Looks for VMWare drivers on disk
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                PID:4144
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                  20⤵
                                                                                                                                                    PID:5600
                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                      wmic csproduct get uuid
                                                                                                                                                      21⤵
                                                                                                                                                        PID:5284
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                      20⤵
                                                                                                                                                        PID:3492
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                        20⤵
                                                                                                                                                          PID:2404
                                                                                                                                                        • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                          C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                          20⤵
                                                                                                                                                          • Looks for VirtualBox drivers on disk
                                                                                                                                                          • Looks for VMWare drivers on disk
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                          PID:3892
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                            21⤵
                                                                                                                                                              PID:4636
                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                wmic csproduct get uuid
                                                                                                                                                                22⤵
                                                                                                                                                                  PID:4612
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                21⤵
                                                                                                                                                                  PID:4708
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                  21⤵
                                                                                                                                                                    PID:1160
                                                                                                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                    C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                    21⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    PID:5520
                                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                                            1⤵
                                                                                                                            • Checks SCSI registry key(s)
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:448
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Public\Aurelia\Aurelia.exe"
                                                                                                                            1⤵
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:3128
                                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                              2⤵
                                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                                              • Looks for VMWare drivers on disk
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:532
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                3⤵
                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                PID:5456
                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                  wmic csproduct get uuid
                                                                                                                                  4⤵
                                                                                                                                    PID:6064
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                  3⤵
                                                                                                                                    PID:1864
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                    3⤵
                                                                                                                                      PID:5676
                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                      3⤵
                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                                      PID:5380
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                        4⤵
                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                        PID:2468
                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                          wmic csproduct get uuid
                                                                                                                                          5⤵
                                                                                                                                            PID:2068
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                          4⤵
                                                                                                                                            PID:4028
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                            4⤵
                                                                                                                                              PID:2040
                                                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                              4⤵
                                                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                                                              • Looks for VMWare drivers on disk
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              PID:2404
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                5⤵
                                                                                                                                                  PID:3636
                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                    wmic csproduct get uuid
                                                                                                                                                    6⤵
                                                                                                                                                      PID:4060
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                    5⤵
                                                                                                                                                      PID:5956
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:2044
                                                                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                        5⤵
                                                                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                                                                        • Looks for VMWare drivers on disk
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                        PID:2092
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:1824
                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                              wmic csproduct get uuid
                                                                                                                                                              7⤵
                                                                                                                                                                PID:2908
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:4768
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                6⤵
                                                                                                                                                                  PID:4844
                                                                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                  6⤵
                                                                                                                                                                  • Looks for VirtualBox drivers on disk
                                                                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                  PID:3144
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                    7⤵
                                                                                                                                                                      PID:3452
                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                        wmic csproduct get uuid
                                                                                                                                                                        8⤵
                                                                                                                                                                          PID:1196
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                        7⤵
                                                                                                                                                                          PID:4348
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                          7⤵
                                                                                                                                                                            PID:3692
                                                                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                            7⤵
                                                                                                                                                                            • Looks for VirtualBox drivers on disk
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                            PID:2956
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                              8⤵
                                                                                                                                                                                PID:1604
                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                  wmic csproduct get uuid
                                                                                                                                                                                  9⤵
                                                                                                                                                                                    PID:556
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                  8⤵
                                                                                                                                                                                    PID:1200
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                    8⤵
                                                                                                                                                                                      PID:3928
                                                                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                      8⤵
                                                                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                      PID:4372
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:5620
                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                            wmic csproduct get uuid
                                                                                                                                                                                            10⤵
                                                                                                                                                                                              PID:5500
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                            9⤵
                                                                                                                                                                                              PID:5720
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                              9⤵
                                                                                                                                                                                                PID:1404
                                                                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                9⤵
                                                                                                                                                                                                • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                • Looks for VMWare drivers on disk
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                PID:5924
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                    PID:4604
                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                      wmic csproduct get uuid
                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                        PID:5656
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                        PID:5000
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                          PID:1748
                                                                                                                                                                                                        • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                          C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                          • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                          • Looks for VMWare drivers on disk
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                          PID:3780
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                            11⤵
                                                                                                                                                                                                              PID:4936
                                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                wmic csproduct get uuid
                                                                                                                                                                                                                12⤵
                                                                                                                                                                                                                  PID:5860
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                11⤵
                                                                                                                                                                                                                  PID:2400
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                    PID:5616
                                                                                                                                                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                    C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                    • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                    • Looks for VMWare drivers on disk
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                    PID:3460
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                      12⤵
                                                                                                                                                                                                                        PID:3120
                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                          wmic csproduct get uuid
                                                                                                                                                                                                                          13⤵
                                                                                                                                                                                                                            PID:3016
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                          12⤵
                                                                                                                                                                                                                            PID:3468
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                            12⤵
                                                                                                                                                                                                                              PID:4788
                                                                                                                                                                                                                            • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                              C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                                              • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                              • Looks for VMWare drivers on disk
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                              PID:2680
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                13⤵
                                                                                                                                                                                                                                  PID:5932
                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                    wmic csproduct get uuid
                                                                                                                                                                                                                                    14⤵
                                                                                                                                                                                                                                      PID:3632
                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                    13⤵
                                                                                                                                                                                                                                      PID:3144
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                      13⤵
                                                                                                                                                                                                                                        PID:3060
                                                                                                                                                                                                                                      • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                        C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                        13⤵
                                                                                                                                                                                                                                        • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                        • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                        PID:5464
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                          14⤵
                                                                                                                                                                                                                                            PID:2952
                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                              wmic csproduct get uuid
                                                                                                                                                                                                                                              15⤵
                                                                                                                                                                                                                                                PID:716
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                              14⤵
                                                                                                                                                                                                                                                PID:1964
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                                                  PID:4600
                                                                                                                                                                                                                                                • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                  C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                                                                  • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                                  • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  PID:4936
                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                    15⤵
                                                                                                                                                                                                                                                      PID:3064
                                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                        wmic csproduct get uuid
                                                                                                                                                                                                                                                        16⤵
                                                                                                                                                                                                                                                          PID:5468
                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                        15⤵
                                                                                                                                                                                                                                                          PID:4736
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                          15⤵
                                                                                                                                                                                                                                                            PID:1472
                                                                                                                                                                                                                                                          • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                            C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                                                                            • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                                            • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                                            PID:1232
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                              16⤵
                                                                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                  wmic csproduct get uuid
                                                                                                                                                                                                                                                                  17⤵
                                                                                                                                                                                                                                                                    PID:5200
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                                  16⤵
                                                                                                                                                                                                                                                                    PID:696
                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                                      PID:1104
                                                                                                                                                                                                                                                                    • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                                      C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                                      16⤵
                                                                                                                                                                                                                                                                      • Looks for VirtualBox drivers on disk
                                                                                                                                                                                                                                                                      • Looks for VMWare drivers on disk
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                                      PID:1116
                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                                        17⤵
                                                                                                                                                                                                                                                                          PID:5068
                                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                            wmic csproduct get uuid
                                                                                                                                                                                                                                                                            18⤵
                                                                                                                                                                                                                                                                              PID:5360
                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                                                              PID:3196
                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "ver"
                                                                                                                                                                                                                                                                              17⤵
                                                                                                                                                                                                                                                                                PID:2076
                                                                                                                                                                                                                                                                              • C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                                                C:\Users\Public\Aurelia\Aurelia.exe
                                                                                                                                                                                                                                                                                17⤵
                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                                                                PID:6044
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                                                  18⤵
                                                                                                                                                                                                                                                                                    PID:5160
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                      wmic csproduct get uuid
                                                                                                                                                                                                                                                                                      19⤵
                                                                                                                                                                                                                                                                                        PID:316

                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v16

                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                  • C:\Config.Msi\e57c1da.rbs

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    d39fc1a2a9bd6980403360bdefecd7f2

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    8cebed5bcaf8713f97b2800bdd32ec47a7c02a7b

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    8ff5c730bcbe27be444eb47aab3a7278b514623eefbb82f60e1174d7db9f3105

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    676e937994ffe6ec02b6999e0a946af862dfb1dbaefb1e4891fbcd051cee15f0161c014ef6e4cafa9b45c0ce64536ec52113b92c74167eb6099627823fca9387

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bam\aurelia_setup.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    6.5MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    05550adb630b1113539470a138719946

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    b4a9760e9c1b2a516b15f853e71c1e37dc85fa94

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    6a5ae434d77e4678b61c5009127e2fac4ca988781c4f2af4581455da7af717c2

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    5827a4778d383ec5387051517f955a7b09fec8c95ca6cbc38dfd89afbd6c63ddc078d58007f8a6fd52c42406b51b0b6691114ebfa42325aa092b663066f368e3

                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-FIR6C.tmp\aurelia_setup.tmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    3.4MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    55d7b5023133d4ebbe3288d481a68b99

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    6b706dee2daca913328ca6e4e5e6a85bc7f8ab0f

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    85c1f72de072ed57e63b35fa7d68a1d100a1685eab6c730632b5635006993929

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    8707cd9d7903522bbc0d6978a766c791740c57b6cf4ceba903175e8a7dd0c4d7f2d8787069ee3ba6abdf895d06448e1a07e8bc06c1d521160465a99efe04cb24

                                                                                                                                                                                                                                                  • C:\Users\Public\Aurelia\Aurelia.exe

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    8.7MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    e0494504708c3df7ba7bb5e68a8f005d

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    414d7e6886405e969a89c490cdf6030cdeea362b

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    ff08761c5aaaff84aa6a0c216e6b486bfb823e2107717986c7c657b8e5b933b5

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    a4924cd7de04f5f430478a25bde70d5810e46bc48dab7f9d02166539b692f773e743db827b0f215ff3914057539a348957b5ccdab6b256dc26d6bde57fe7cb3b

                                                                                                                                                                                                                                                  • C:\Users\Public\Aurelia\vcruntime140.dll

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    117KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    caf9edded91c1f6c0022b278c16679aa

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    4812da5eb86a93fb0adc5bb60a4980ee8b0ad33a

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    02c6aa0e6e624411a9f19b0360a7865ab15908e26024510e5c38a9c08362c35a

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    32ac84642a9656609c45a6b649b222829be572b5fdeb6d5d93acea203e02816cf6c06063334470e8106871bdc9f2f3c7f0d1d3e554da1832ba1490f644e18362

                                                                                                                                                                                                                                                  • C:\Windows\Installer\MSIC2E3.tmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    215KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    8931e35055fd15b1acce7d7f24a23c36

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    39b10e3171aaa4db9f8f14275b587fb82589d0ea

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    2b05bdcae15519ed4f61d1504f3226c2bcf04d358f3c54472b1d9b0aa3016860

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    2350f7935324565069aa747b4d3a7e416934ace1bf34a898d534dd316c829c1bd0601200fd84b7a3f60674a3e160f52949689a98c22766f271e1140dedc76c22

                                                                                                                                                                                                                                                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    24.1MB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    d3bedaa2429cbabb1fbb93f5362da2c5

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    df2ef6783d9d461d9266370954fda771ee6d435c

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    601a0820947766f7833531058f1322ca14316301b50b9bba0e881e1c7d5218ac

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    472d6ac30619692669eec678b5e0d0343deb705b726330110695010c82b2d99b9da3ceb3413a1df4ff06bb7c3da7a2bdce9b8f1396c7ff482ebd1137502f2e69

                                                                                                                                                                                                                                                  • \??\Volume{2c8433d4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{d8832a7a-e28a-441b-994b-4e4db145c43c}_OnDiskSnapshotProp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                    2dc518b85fc4f057cfb05376868e6490

                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                    8c0fe865cd2de26c10e40b8ddcf795c275041114

                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                    521046f1e0989bf1b7752699d1af32867e5e09f8a39b218dd31f71ab2a44b02a

                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                    f04bae7fa05cec3b5d2882af2b89828d93e145f6a94442fd87b587b442686aa402268e8c8351caaa39ec36c7d27c0aaf2c2fce00fc674bb18766478068ffcf86

                                                                                                                                                                                                                                                  • memory/532-106-0x0000016A3F4B0000-0x0000016A3F4D9000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                  • memory/532-91-0x0000016A3F460000-0x0000016A3F475000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                                                  • memory/532-96-0x0000016A3F480000-0x0000016A3F489000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    36KB

                                                                                                                                                                                                                                                  • memory/532-101-0x0000016A3F490000-0x0000016A3F4A5000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                                                  • memory/1900-68-0x000002A1C32F0000-0x000002A1C32F9000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    36KB

                                                                                                                                                                                                                                                  • memory/1900-57-0x0000000180000000-0x00000001805D6000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    5.8MB

                                                                                                                                                                                                                                                  • memory/1900-78-0x000002A1C3D70000-0x000002A1C3D99000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    164KB

                                                                                                                                                                                                                                                  • memory/1900-73-0x000002A1C3D50000-0x000002A1C3D65000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                                                  • memory/1900-64-0x000002A1C32D0000-0x000002A1C32E5000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                                                  • memory/1900-111-0x000002A1C3DA0000-0x000002A1C3DAB000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    44KB

                                                                                                                                                                                                                                                  • memory/1900-115-0x000002A1C41B0000-0x000002A1C41D0000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    128KB

                                                                                                                                                                                                                                                  • memory/1900-120-0x000002A1C41D0000-0x000002A1C4202000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    200KB

                                                                                                                                                                                                                                                  • memory/3612-16-0x0000000000FF0000-0x00000000010D2000-memory.dmp

                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                    904KB