Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:01

General

  • Target

    SolaraBootstrapper.exe

  • Size

    12KB

  • MD5

    06f13f50c4580846567a644eb03a11f2

  • SHA1

    39ee712b6dfc5a29a9c641d92c7467a2c4445984

  • SHA256

    0636e8f9816b17d7cff26ef5d280ce1c1aae992cda8165c6f4574029258a08a9

  • SHA512

    f5166a295bb0960e59c176eefa89c341563fdf0eec23a45576e0ee5bf7e8271cc35eb9dd56b11d9c0bbe789f2eac112643108c46be3341fa332cfcf39b4a90b9

  • SSDEEP

    192:cDnQvi7auc35nuKdhAWVIanaLvmr/XKTxnTc1BREVXLGDlNjA:cDn97auc35tAKIanayzKto1jEVQzj

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 20 IoCs
  • Registers COM server for autorun 1 TTPs 33 IoCs
  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of FindShellTrayWindow
      PID:2464
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff928e6ab58,0x7ff928e6ab68,0x7ff928e6ab78
      2⤵
        PID:4788
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:2
        2⤵
          PID:3216
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
          2⤵
            PID:3676
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
            2⤵
              PID:2200
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
              2⤵
                PID:532
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
                2⤵
                  PID:2348
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3640 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
                  2⤵
                    PID:5040
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                    2⤵
                      PID:1384
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                      2⤵
                        PID:408
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4704 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                        2⤵
                          PID:4364
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4536 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                          2⤵
                            PID:1980
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                            2⤵
                              PID:448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4656 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                              2⤵
                                PID:4912
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                2⤵
                                  PID:700
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5212 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
                                  2⤵
                                    PID:4964
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4576 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
                                    2⤵
                                      PID:2288
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3308 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:1
                                      2⤵
                                        PID:4472
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                        2⤵
                                          PID:3404
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5456 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                          2⤵
                                            PID:2144
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5264 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                            2⤵
                                              PID:2988
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                              2⤵
                                                PID:4140
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5708 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                                2⤵
                                                  PID:2140
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4612 --field-trial-handle=1972,i,6829645853372053789,5208529377673726826,131072 /prefetch:8
                                                  2⤵
                                                    PID:4040
                                                  • C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe
                                                    "C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Checks whether UAC is enabled
                                                    • Drops file in Program Files directory
                                                    • Enumerates system info in registry
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3752
                                                    • C:\Program Files (x86)\Roblox\Versions\version-d8aa63d3654646d0\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
                                                      MicrosoftEdgeWebview2Setup.exe /silent /install
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      PID:4216
                                                      • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeUpdate.exe
                                                        "C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                                        4⤵
                                                        • Sets file execution options in registry
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Checks system information in the registry
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2988
                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Modifies registry class
                                                          PID:700
                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Modifies registry class
                                                          PID:4280
                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Registers COM server for autorun
                                                            • Modifies registry class
                                                            PID:1248
                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Registers COM server for autorun
                                                            • Modifies registry class
                                                            PID:960
                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Registers COM server for autorun
                                                            • Modifies registry class
                                                            PID:5000
                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzRBNDk0REUtNTVERS00REZGLUFCMkYtRkZCMUFEMjlEN0UwfSIgdXNlcmlkPSJ7OUUxNUVEMDMtRTYxRS00QURGLUE0OTAtMzBBQjRENTEyQzRCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntCNDM0MENBRi05OEIxLTQxMDYtOTY2Mi0wRTU5QjIzNzEyQzh9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4NS4yOSIgbmV4dHZlcnNpb249IjEuMy4xNzEuMzkiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxOTc5NDM5MjUiIGluc3RhbGxfdGltZV9tcz0iNDE2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Checks system information in the registry
                                                          PID:4960
                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{C4A494DE-55DE-4DFF-AB2F-FFB1AD29D7E0}" /silent
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          PID:4376
                                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                  1⤵
                                                    PID:4284
                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Checks system information in the registry
                                                    • Modifies data under HKEY_USERS
                                                    PID:872
                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNzEuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNzEuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzRBNDk0REUtNTVERS00REZGLUFCMkYtRkZCMUFEMjlEN0UwfSIgdXNlcmlkPSJ7OUUxNUVEMDMtRTYxRS00QURGLUE0OTAtMzBBQjRENTEyQzRCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGRkVDNjcyMC1BMTc2LTQwNTUtQjMzMC0yRERFQjlENzQ4QkZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTEwLjAuNTQ4MS4xMDQiIG5leHR2ZXJzaW9uPSIxMTAuMC41NDgxLjEwNCIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMDEzNTM0NzgiLz48L2FwcD48L3JlcXVlc3Q-
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Checks system information in the registry
                                                      PID:3872
                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\MicrosoftEdge_X64_125.0.2535.51.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\MicrosoftEdge_X64_125.0.2535.51.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      PID:4796
                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\EDGEMITMP_A79FD.tmp\setup.exe
                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\EDGEMITMP_A79FD.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\MicrosoftEdge_X64_125.0.2535.51.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Drops file in Program Files directory
                                                        PID:4624
                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\EDGEMITMP_A79FD.tmp\setup.exe
                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\EDGEMITMP_A79FD.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=125.0.6422.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BE8809F6-723A-45BE-9647-2698EDB04275}\EDGEMITMP_A79FD.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=125.0.2535.51 --initial-client-data=0x118,0x114,0x138,0x12c,0x238,0x7ff6c4ac4b18,0x7ff6c4ac4b24,0x7ff6c4ac4b30
                                                          4⤵
                                                          • Executes dropped EXE
                                                          PID:1376

                                                  Network

                                                  MITRE ATT&CK Matrix ATT&CK v13

                                                  Persistence

                                                  Boot or Logon Autostart Execution

                                                  2
                                                  T1547

                                                  Registry Run Keys / Startup Folder

                                                  2
                                                  T1547.001

                                                  Privilege Escalation

                                                  Boot or Logon Autostart Execution

                                                  2
                                                  T1547

                                                  Registry Run Keys / Startup Folder

                                                  2
                                                  T1547.001

                                                  Defense Evasion

                                                  Virtualization/Sandbox Evasion

                                                  1
                                                  T1497

                                                  Modify Registry

                                                  2
                                                  T1112

                                                  Discovery

                                                  Query Registry

                                                  5
                                                  T1012

                                                  Virtualization/Sandbox Evasion

                                                  1
                                                  T1497

                                                  System Information Discovery

                                                  6
                                                  T1082

                                                  Command and Control

                                                  Web Service

                                                  1
                                                  T1102

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\EdgeUpdate.dat
                                                    Filesize

                                                    12KB

                                                    MD5

                                                    369bbc37cff290adb8963dc5e518b9b8

                                                    SHA1

                                                    de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                                    SHA256

                                                    3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                                    SHA512

                                                    4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeComRegisterShellARM64.exe
                                                    Filesize

                                                    179KB

                                                    MD5

                                                    7a160c6016922713345454265807f08d

                                                    SHA1

                                                    e36ee184edd449252eb2dfd3016d5b0d2edad3c6

                                                    SHA256

                                                    35a14bd84e74dd6d8e2683470243fb1bb9071178d9283b12ebbfb405c8cd4aa9

                                                    SHA512

                                                    c0f1d5c8455cf14f2088ede062967d6dfa7c39ca2ac9636b10ed46dfbea143f64106a4f03c285e89dd8cf4405612f1eef25a8ec4f15294ca3350053891fc3d7e

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeUpdate.exe
                                                    Filesize

                                                    201KB

                                                    MD5

                                                    4dc57ab56e37cd05e81f0d8aaafc5179

                                                    SHA1

                                                    494a90728d7680f979b0ad87f09b5b58f16d1cd5

                                                    SHA256

                                                    87c6f7d9b58f136aeb33c96dbfe3702083ec519aafca39be66778a9c27a68718

                                                    SHA512

                                                    320eeed88d7facf8c1f45786951ef81708c82cb89c63a3c820ee631c52ea913e64c4e21f0039c1b277cfb710c4d81cd2191878320d00fd006dd777c727d9dc2b

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                    Filesize

                                                    212KB

                                                    MD5

                                                    60dba9b06b56e58f5aea1a4149c743d2

                                                    SHA1

                                                    a7e456acf64dd99ca30259cf45b88cf2515a69b3

                                                    SHA256

                                                    4d01f5531f93ab2af9e92c4f998a145c94f36688c3793845d528c8675697e112

                                                    SHA512

                                                    e98088a368d4c4468e325a1d62bee49661f597e5c1cd1fe2dabad3911b8ac07e1cc4909e7324cb4ab39f30fa32a34807685fcfba767f88884ef84ca69a0049e7

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\MicrosoftEdgeUpdateCore.exe
                                                    Filesize

                                                    257KB

                                                    MD5

                                                    c044dcfa4d518df8fc9d4a161d49cece

                                                    SHA1

                                                    91bd4e933b22c010454fd6d3e3b042ab6e8b2149

                                                    SHA256

                                                    9f79fe09f57002ca07ae0b2a196e8cc002d2be6d5540ee857217e99b33fa4bb2

                                                    SHA512

                                                    f26b89085aa22ac62a28610689e81b4dfe3c38a9015ec56dfeaff02fdb6fa64e784b86a961509b52ad968400faa1ef0487f29f07a41e37239fe4c3262a11ac2c

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\NOTICE.TXT
                                                    Filesize

                                                    4KB

                                                    MD5

                                                    6dd5bf0743f2366a0bdd37e302783bcd

                                                    SHA1

                                                    e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                                    SHA256

                                                    91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                                    SHA512

                                                    f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdate.dll
                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    965b3af7886e7bf6584488658c050ca2

                                                    SHA1

                                                    72daabdde7cd500c483d0eeecb1bd19708f8e4a5

                                                    SHA256

                                                    d80c512d99765586e02323a2e18694965eafb903e9bc13f0e0b4265f86b21a19

                                                    SHA512

                                                    1c57dc7b89e7f13f21eaec7736b724cd864c443a2f09829308a4f23cb03e9a5f2a1e5bcdc441301e33119767e656a95d0f9ede0e5114bf67f5dce6e55de7b0a4

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_af.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    567aec2d42d02675eb515bbd852be7db

                                                    SHA1

                                                    66079ae8ac619ff34e3ddb5fb0823b1790ba7b37

                                                    SHA256

                                                    a881788359b2a7d90ac70a76c45938fb337c2064487dcb8be00b9c311d10c24c

                                                    SHA512

                                                    3a7414e95c2927d5496f29814556d731aef19efa531fb58988079287669dfc033f3e04c8740697571df76bfecfe3b75659511783ce34682d2a2ea704dfa115b3

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_am.dll
                                                    Filesize

                                                    24KB

                                                    MD5

                                                    f6c1324070b6c4e2a8f8921652bfbdfa

                                                    SHA1

                                                    988e6190f26e4ca8f7ea3caabb366cf1edcdcbbf

                                                    SHA256

                                                    986b0654a8b5f7b23478463ff051bffe1e9bbdeb48744e4aa1bd3d89a7520717

                                                    SHA512

                                                    63092cf13e8a19966181df695eb021b0a9993afe8f98b1309973ea999fdf4cd9b6ffd609968d4aa0b2cde41e872688a283fd922d8b22cb5ad06339fe18221100

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_ar.dll
                                                    Filesize

                                                    26KB

                                                    MD5

                                                    570efe7aa117a1f98c7a682f8112cb6d

                                                    SHA1

                                                    536e7c49e24e9aa068a021a8f258e3e4e69fa64f

                                                    SHA256

                                                    e2cc8017bc24e73048c7ee68d3787ed63c3898eec61299a9ca1bab8aeaa8da01

                                                    SHA512

                                                    5e963dd55a5739a1da19cec7277dc3d07afdb682330998fd8c33a1b5949942019521967d8b5af0752a7a8e2cf536faa7e62982501170319558ceaa21ed657ae8

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_as.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    a8d3210e34bf6f63a35590245c16bc1b

                                                    SHA1

                                                    f337f2cbec05b7e20ca676d7c2b1a8d5ae8bf693

                                                    SHA256

                                                    3b82de846ad028544013383e3c9fb570d2a09abf2c854e8a4d641bd7fc3b3766

                                                    SHA512

                                                    6e47ffe8f7c2532e7854dcae3cbd4e6533f0238815cb6af5ea85087c51017ea284542b988f07692d0297ebab1bad80d7613bf424ff532e10b01c8e528ab1043a

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_az.dll
                                                    Filesize

                                                    29KB

                                                    MD5

                                                    7937c407ebe21170daf0975779f1aa49

                                                    SHA1

                                                    4c2a40e76209abd2492dfaaf65ef24de72291346

                                                    SHA256

                                                    5ab96e4e6e065dbce3b643c6be2c668f5570984ead1a8b3578bbd2056fbad4e9

                                                    SHA512

                                                    8670746941660e6573732077f5ed1b630f94a825cf4ac9dbe5018772eaac1c48216334757a2aeaa561034b4d907162a370b8f0bae83b34a09457fafe165fb5d7

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_bg.dll
                                                    Filesize

                                                    29KB

                                                    MD5

                                                    8375b1b756b2a74a12def575351e6bbd

                                                    SHA1

                                                    802ec096425dc1cab723d4cf2fd1a868315d3727

                                                    SHA256

                                                    a12df15afac4eb2695626d7a8a2888bdf54c8db671043b0677180f746d8ad105

                                                    SHA512

                                                    aec4bb94fde884db79a629abcff27fd8afb7f229d055514f51fa570fb47a85f8dfc9a54a8f69607d2bcaf82fae1ec7ffab0b246795a77a589be11fad51b24d19

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_bn-IN.dll
                                                    Filesize

                                                    29KB

                                                    MD5

                                                    a94cf5e8b1708a43393263a33e739edd

                                                    SHA1

                                                    1068868bdc271a52aaae6f749028ed3170b09cce

                                                    SHA256

                                                    5b01fe11016610d5606f815281c970c86025732fc597b99c031a018626cd9f3c

                                                    SHA512

                                                    920f7fed1b720afdb569aec2961bd827a6fc54b4598c0704f65da781d142b1707e5106a459f0c289e0f476b054d93c0b733806af036b68f46377dde0541af2e7

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_bn.dll
                                                    Filesize

                                                    29KB

                                                    MD5

                                                    7dc58c4e27eaf84ae9984cff2cc16235

                                                    SHA1

                                                    3f53499ddc487658932a8c2bcf562ba32afd3bda

                                                    SHA256

                                                    e32f77ed3067d7735d10f80e5a0aa0c50c993b59b82dc834f2583c314e28fa98

                                                    SHA512

                                                    bdec1300cf83ea06dfd351fe1252b850fecea08f9ef9cb1207fce40ce30742348db953107ade6cdb0612af2e774345faf03a8a6476f2f26735eb89153b4256dc

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_bs.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    e338dccaa43962697db9f67e0265a3fc

                                                    SHA1

                                                    4c6c327efc12d21c4299df7b97bf2c45840e0d83

                                                    SHA256

                                                    99b1b7e25fbc2c64489c0607cef0ae5ff720ab529e11093ed9860d953adeba04

                                                    SHA512

                                                    e0c15b166892433ef31ddf6b086680c55e1a515bed89d51edbdf526fcac71fb4e8cb2fadc739ac75ae5c2d9819fc985ca873b0e9e2a2925f82e0a456210898f9

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_ca-Es-VALENCIA.dll
                                                    Filesize

                                                    29KB

                                                    MD5

                                                    2929e8d496d95739f207b9f59b13f925

                                                    SHA1

                                                    7c1c574194d9e31ca91e2a21a5c671e5e95c734c

                                                    SHA256

                                                    2726c48a468f8f6debc2d9a6a0706b640b2852c885e603e6b2dec638756160df

                                                    SHA512

                                                    ea459305d3c3fa7a546194f649722b76072f31e75d59da149c57ff05f4af8f38a809066054df809303937bbca917e67441da2f0e1ea37b50007c25ae99429957

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_ca.dll
                                                    Filesize

                                                    30KB

                                                    MD5

                                                    39551d8d284c108a17dc5f74a7084bb5

                                                    SHA1

                                                    6e43fc5cec4b4b0d44f3b45253c5e0b032e8e884

                                                    SHA256

                                                    8dbd55ed532073874f4fe006ef456e31642317145bd18ddc30f681ce9e0c8e07

                                                    SHA512

                                                    6fa5013a9ce62deca9fa90a98849401b6e164bbad8bef00a8a8b228427520dd584e28cba19c71e2c658692390fe29be28f0398cb6c0f9324c56290bb245d06d2

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_cs.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    16c84ad1222284f40968a851f541d6bb

                                                    SHA1

                                                    bc26d50e15ccaed6a5fbe801943117269b3b8e6b

                                                    SHA256

                                                    e0f0026ddcbeafc6c991da6ba7c52927d050f928dba4a7153552efcea893a35b

                                                    SHA512

                                                    d3018619469ed25d84713bd6b6515c9a27528810765ed41741ac92caf0a3f72345c465a5bda825041df69e1264aada322b62e10c7ed20b3d1bcde82c7e146b7e

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_cy.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    34d991980016595b803d212dc356d765

                                                    SHA1

                                                    e3a35df6488c3463c2a7adf89029e1dd8308f816

                                                    SHA256

                                                    252b6f9bf5a9cb59ad1c072e289cc9695c0040b363d4bfbcc9618a12df77d18e

                                                    SHA512

                                                    8a6cbcf812af37e3ead789fbec6cba9c4e1829dbeea6200f0abbdae15efd1eda38c3a2576e819d95ed2df0aafd2370480daa24a3fe6aeb8081a936d5e1f8d8ed

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_da.dll
                                                    Filesize

                                                    28KB

                                                    MD5

                                                    d34380d302b16eab40d5b63cfb4ed0fe

                                                    SHA1

                                                    1d3047119e353a55dc215666f2b7b69f0ede775b

                                                    SHA256

                                                    fd98159338d1f3b03814af31440d37d15ab183c1a230e6261fbb90e402f85d5f

                                                    SHA512

                                                    45ce58f4343755e392037a9c6fc301ad9392e280a72b9d4b6d328866fe26877b2988c39e05c4e7f1d5b046c0864714b897d35285e222fd668f0d71b7b10e6538

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_de.dll
                                                    Filesize

                                                    30KB

                                                    MD5

                                                    aab01f0d7bdc51b190f27ce58701c1da

                                                    SHA1

                                                    1a21aabab0875651efd974100a81cda52c462997

                                                    SHA256

                                                    061a7cdaff9867ddb0bd3de2c0760d6919d8d2ca7c7f889ec2d32265d7e7a75c

                                                    SHA512

                                                    5edbda45205b61ac48ea6e874411bb1031989001539650de6e424528f72ec8071bd709c037c956450bb0558ee37d026c26fdb966efceb990ed1219f135b09e6e

                                                  • C:\Program Files (x86)\Microsoft\Temp\EU3C77.tmp\msedgeupdateres_en.dll
                                                    Filesize

                                                    27KB

                                                    MD5

                                                    4a1e3cf488e998ef4d22ac25ccc520a5

                                                    SHA1

                                                    dc568a6e3c9465474ef0d761581c733b3371b1cd

                                                    SHA256

                                                    9afbbe2a591250b80499f0bf02715f02dbcd5a80088e129b1f670f1a3167a011

                                                    SHA512

                                                    ce3bffb6568ff2ef83ef7c89fd668f6b5972f1484ce3fbd5597dcac0eaec851d5705ed17a5280dd08cd9812d6faec58a5561217b897c9209566545db2f3e1245

                                                  • C:\Program Files (x86)\Roblox\Versions\RobloxStudioInstaller.exe
                                                    Filesize

                                                    5.3MB

                                                    MD5

                                                    0469bb703f1233c733ba4e8cb45afda2

                                                    SHA1

                                                    a07afd7ecf1d0b740b0e2eddfcde79dcf6e1767f

                                                    SHA256

                                                    00314da401908da37ebfe9b642506cab81a4467c092719fcf007be045bc4a9e0

                                                    SHA512

                                                    342c9629e705eb78c7bd52b3efe4a92b6a8bece9933956390450600635e4c0511ca96ccaa25e6920e9d25ccdf444dabfea7b09f8fbcba2f371655f87633b6d67

                                                  • C:\Program Files (x86)\Roblox\Versions\version-d8aa63d3654646d0\WebView2RuntimeInstaller\MicrosoftEdgeWebview2Setup.exe
                                                    Filesize

                                                    1.5MB

                                                    MD5

                                                    610b1b60dc8729bad759c92f82ee2804

                                                    SHA1

                                                    9992b7ae7a9c4e17a0a6d58ffd91b14cbb576552

                                                    SHA256

                                                    921d51979f3416ca19dca13a057f6fd3b09d8741f3576cad444eb95af87ebe08

                                                    SHA512

                                                    0614c4e421ccd5f4475a690ba46aac5bbb7d15caea66e2961895724e07e1ec7ee09589ca9394f6b2bcfb2160b17ac53798d3cf40fb207b6e4c6381c8f81ab6b4

                                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log
                                                    Filesize

                                                    104KB

                                                    MD5

                                                    ebe9adb4cf333b99426a92269d5e247b

                                                    SHA1

                                                    27c50e2ce156aed0f6518f3deb83c011c2a1c3f9

                                                    SHA256

                                                    887a7826f4abf18f6ea07bec74d95945d65287d8200fb460c75cfea3f32f670d

                                                    SHA512

                                                    e5fd0beef506a1b0bfd23281f490b2a3775cf955bbf3d896630b5666d98de530880953b93ca86296388a6bd9566bc2672fd39f6f26e0af76af55ae613b0515cd

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                                    Filesize

                                                    2KB

                                                    MD5

                                                    a07fe8e64ee415b05c40c409d76d70a5

                                                    SHA1

                                                    4df3d42a5d890becf8f4faabca14eedc6596939a

                                                    SHA256

                                                    ebf01288fa2583c7fce01bd4e6072d021fa1480c47ba6ebdb5e354e96a398566

                                                    SHA512

                                                    c4aae6fcaed6c08b1a67669013eb31d7af8b3bf500d393fc4898880d06981e5a6a488cfd38474659d9fdcbc2a4dcf7c1af22fdc482162388182968e74bf6c216

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0d8d3cfb-2c9b-4b92-884a-5b7e9b480571.tmp
                                                    Filesize

                                                    356B

                                                    MD5

                                                    141bf6ee3b8b50fbbf18fb68752e571e

                                                    SHA1

                                                    5550d58dfe7b9724a23261bf1a360cc17e4f4340

                                                    SHA256

                                                    fc8e4508322ebcf757ea7e4558d203f0cf6802af51db410cc6f9ea3825d6664d

                                                    SHA512

                                                    fc58631ef2934c3cc58da31632fd475f195481e21964feb9b7b93db7b162ec57187a71a96a67271e3bb8cb5627c3621fdb5194c7f9f95b2f7c685cc92c6918e4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                    Filesize

                                                    3KB

                                                    MD5

                                                    5dffce800d047bf77b17adc84c990b19

                                                    SHA1

                                                    e45f18cefb02be58920cb1ae7db1936945f273ee

                                                    SHA256

                                                    e9594803c99540a6e8801c41666572e55255724b706475557c4c01f231dc9cac

                                                    SHA512

                                                    0fc534efc237f3f8bf125c595f9429796643a0dce171bc86d42f69762c4757c146cfd4ff5a0963d8d39203312e4b52d080449b64446d10638ce3113720f50a2b

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                    Filesize

                                                    1KB

                                                    MD5

                                                    a1613362fc04644f6711287ffbe527d7

                                                    SHA1

                                                    e527ad0999c99733c525042eb7d28b6476a729b9

                                                    SHA256

                                                    a1e7c57a32963d3c93bfe2534e8c32deb83428424d151977b03501b8f8162cf9

                                                    SHA512

                                                    fb0b477df64bf800e5ee185e4ab05b809e0cbd80008bce10810738caba8764fe6577dfff50b7a23147e3e59d750cf76b4e354a92da6cf7c01b3347ef8ce39e72

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                    Filesize

                                                    1KB

                                                    MD5

                                                    46c70a5230a3bdba73e2ae74b900b719

                                                    SHA1

                                                    2659bbcd198c08f3c20cdb619a4a57ac69c4ec75

                                                    SHA256

                                                    c38680a852f5868e8207597e5f4bc7ed8071b49ce0975b40dec086b2ad899fd0

                                                    SHA512

                                                    3be13cb3cd4ef9d703a7d7f9b01e65d00461df50317e36e963ef207fa56ea35488b7573da6e4ecbbbcac2935a389535a1c0ba2c59a8f200d12f2b35b38772412

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                    Filesize

                                                    1KB

                                                    MD5

                                                    422b0435d9a25f1dfc7346a6ae3744d8

                                                    SHA1

                                                    3bd3b10e166998d35629f8efb811f3cd4c1df4bc

                                                    SHA256

                                                    5ad6acbe3c034b69aaa76f7b34c65716d5626170e622678987313f3dfb656b9a

                                                    SHA512

                                                    a73bbe5ccb416c0134850fcd65934fdf6b96d7d650d9f48955f527c58bca572e81ab7e7c2758f8b402a3d7d758ae1287c81c70a3c8ce38f46ca32a3b04839c8d

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                                    Filesize

                                                    1KB

                                                    MD5

                                                    c32976b371f63528795f163e355b8d59

                                                    SHA1

                                                    4853637b59136b67b0c7873d0a9795f047e65231

                                                    SHA256

                                                    b71a26fcf59c0143712ad13468cbe339d69273d3c2f0cef96ccebd7d2a4970b0

                                                    SHA512

                                                    d715cec931f4df8d2e1b50ea3d53249e30a0b7752642c4038540658daa9bef191996f69cee17057a3edbe229001f54f5fd45b242c716d78fdfac70179b7eeca5

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a93e2c98-903c-4824-bc08-fce7a8197b81.tmp
                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                    Filesize

                                                    7KB

                                                    MD5

                                                    0821f9474940f0f49918753f18496b71

                                                    SHA1

                                                    234a8dca5e9f822253962e476760706cb2c4f0ca

                                                    SHA256

                                                    2f3565119e91cc13615e4e6c39c26e9b584852b0a662b067ed2db7792c966a1a

                                                    SHA512

                                                    66dad6eb5e37c7da35e8c0de6e35c9a84846b2cb45a838daa32a6056df421aeaf344b1e57181bf47d26584c26e6413dbb2ed18612d3487bf0a1fa6dcbbf943a7

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                    Filesize

                                                    7KB

                                                    MD5

                                                    fa25bdb87201e75d4692ec68d64c3c24

                                                    SHA1

                                                    ec29b3558fc4aedcc50ebf457087eb7e2f3601c7

                                                    SHA256

                                                    d07f7529a54ebf21a60bf1cd818a957972cf72beb591c85349979ed223ba1661

                                                    SHA512

                                                    b0cb4360306a0afbcbbc45cca2298a0fca050617ca385b30cc993c5dbe2e65fff3ebd8418f8a28f853f79904d1fee1d1fd8bf2ba786b20ab9e01a1630a0c1627

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
                                                    Filesize

                                                    16KB

                                                    MD5

                                                    6e7ba7935678669b74d9ae0e8b304ffb

                                                    SHA1

                                                    781574bb1ecc372b345b307d41a965cd0cc1404c

                                                    SHA256

                                                    5950c0c83a0ef153e4e8dd270ef17ea01797dd7c21997260939a45681c2bfcc4

                                                    SHA512

                                                    185d607b8d4f6be178e5ac8a9a6828fd79e5f9bfe4ea8da7cc5f18cc3b6a86850d35b1dd1b86f583c83af5e4184eb7eb247e4acaf967b040c0fe6d92f652606e

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                    Filesize

                                                    260KB

                                                    MD5

                                                    45a67bdb80db9a74b4255e61d25cd2fd

                                                    SHA1

                                                    f81cf22492ef6f2bfa38ebaeb4fc12cd79f281cb

                                                    SHA256

                                                    4b92d1026bd9d30ce900509b7c59e5dc86ff0877e3968beca13976d92ead9833

                                                    SHA512

                                                    468e7a78edaec7055bae4d231d7c0a99b1bde69525496a09616d3a37a08d31b2801c9082f1f6245b9bf04431170e7d349f5b8d7f56013120fab68c7aca9bb7b4

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                    Filesize

                                                    260KB

                                                    MD5

                                                    743d2effbc96f5683260a5716a0a5a3e

                                                    SHA1

                                                    02801005f1e590371cb5fa99a51d95d476330df0

                                                    SHA256

                                                    41c74c94104b2ffb3a8d86d1e08c11ba281ce272fc0fce43a8ad5c3f3351d328

                                                    SHA512

                                                    5d8a4f0a6b67679e4a0bdd41511b586f45bb7e8393e68e7a2415d6a2b53ad90f0c1559947f7bff206a42663cf2566a14e2cd57286bdfd8149954ad98fcb9a306

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
                                                    Filesize

                                                    101KB

                                                    MD5

                                                    d9a91ade7b56ffbdab81083a7ff4feaa

                                                    SHA1

                                                    0b9513b4562e0ec4f15123a49153755a1e14d950

                                                    SHA256

                                                    496c12992413bb4d2e4b1b3b26d70c708f5a94908a851d3b97ae744bae7af2b8

                                                    SHA512

                                                    fac63ddba77b3594d235d16051184e7385774c0d59accaf664f3b456977b2b6bebd0759fd5a89e30a89c2ec3b87a063f322ed7bc6c61f18e951658501b5f444a

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe582b70.TMP
                                                    Filesize

                                                    89KB

                                                    MD5

                                                    28a89cb409480e91053a975c9b3708e3

                                                    SHA1

                                                    4ea7e938353a819316aababefe036544296c0ffd

                                                    SHA256

                                                    cb97bdd142b70b6357954c6cf0b4ea76ed5647b836caa64374ea859e9bbefc86

                                                    SHA512

                                                    2a3b5bd3063c3e96a8b4000c4a3d56a794491a3fa84cea215632ca5fb011d7549d33ebd110b36390c2765c895b6ca922381c57dc76bfaaa40945d80b2df34849

                                                  • C:\Users\Admin\AppData\Local\Roblox\Downloads\roblox-player\de55b55ef62fb1b17eb3c103f4fc0cef
                                                    Filesize

                                                    5.7MB

                                                    MD5

                                                    de55b55ef62fb1b17eb3c103f4fc0cef

                                                    SHA1

                                                    37dd8656942325f787227b65fc829508d48723a8

                                                    SHA256

                                                    62f90bf759c32cd1d916627a4456b547a90641e7e94e3cbb2be6ff2033275f0b

                                                    SHA512

                                                    7c312975a4825ddaaea32ffd48a80a5216a2a385c4556811a16accceee743122c396a41fd5a5b442689603ddbd4a3d0806c29f4e1b251fa824b9fb69abcf81b6

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dll
                                                    Filesize

                                                    488KB

                                                    MD5

                                                    851fee9a41856b588847cf8272645f58

                                                    SHA1

                                                    ee185a1ff257c86eb19d30a191bf0695d5ac72a1

                                                    SHA256

                                                    5e7faee6b8230ca3b97ce9542b914db3abbbd1cb14fd95a39497aaad4c1094ca

                                                    SHA512

                                                    cf5c70984cf33e12cf57116da1f282a5bd6433c570831c185253d13463b0b9a0b9387d4d1bf4dddab3292a5d9ba96d66b6812e9d7ebc5eb35cb96eea2741348f

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll
                                                    Filesize

                                                    43KB

                                                    MD5

                                                    34ec990ed346ec6a4f14841b12280c20

                                                    SHA1

                                                    6587164274a1ae7f47bdb9d71d066b83241576f0

                                                    SHA256

                                                    1e987b22cd011e4396a0805c73539586b67df172df75e3dded16a77d31850409

                                                    SHA512

                                                    b565015ca4b11b79ecbc8127f1fd40c986948050f1caefdd371d34ed2136af0aabf100863dc6fd16d67e3751d44ee13835ea9bf981ac0238165749c4987d1ae0

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\get-intrinsic\.nycrc
                                                    Filesize

                                                    139B

                                                    MD5

                                                    d0104f79f0b4f03bbcd3b287fa04cf8c

                                                    SHA1

                                                    54f9d7adf8943cb07f821435bb269eb4ba40ccc2

                                                    SHA256

                                                    997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a

                                                    SHA512

                                                    daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\has-proto\.eslintrc
                                                    Filesize

                                                    43B

                                                    MD5

                                                    c28b0fe9be6e306cc2ad30fe00e3db10

                                                    SHA1

                                                    af79c81bd61c9a937fca18425dd84cdf8317c8b9

                                                    SHA256

                                                    0694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641

                                                    SHA512

                                                    e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\hasown\.nycrc
                                                    Filesize

                                                    216B

                                                    MD5

                                                    c2ab942102236f987048d0d84d73d960

                                                    SHA1

                                                    95462172699187ac02eaec6074024b26e6d71cff

                                                    SHA256

                                                    948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a

                                                    SHA512

                                                    e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\vary\LICENSE
                                                    Filesize

                                                    1KB

                                                    MD5

                                                    13babc4f212ce635d68da544339c962b

                                                    SHA1

                                                    4881ad2ec8eb2470a7049421047c6d076f48f1de

                                                    SHA256

                                                    bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400

                                                    SHA512

                                                    40e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\WebView2Loader.dll
                                                    Filesize

                                                    133KB

                                                    MD5

                                                    a0bd0d1a66e7c7f1d97aedecdafb933f

                                                    SHA1

                                                    dd109ac34beb8289030e4ec0a026297b793f64a3

                                                    SHA256

                                                    79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                                    SHA512

                                                    2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dll
                                                    Filesize

                                                    5.2MB

                                                    MD5

                                                    aead90ab96e2853f59be27c4ec1e4853

                                                    SHA1

                                                    43cdedde26488d3209e17efff9a51e1f944eb35f

                                                    SHA256

                                                    46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                                    SHA512

                                                    f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.dll
                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    114498719219c2427758b1ad9a11a991

                                                    SHA1

                                                    742896c8ec63ddbf15bab5c1011eff512b9af722

                                                    SHA256

                                                    913059869dca00dfa49bcf2691b384eb9804739d9148e3671cf1d6b89c828c42

                                                    SHA512

                                                    4f36ea0c5e8af8087ecf92fa49e157dcc94a1cc68563fc97b3fe026b92c0abdbe640bf347c24a666f59b60380367f85daab1a15e2c4902921e63e1b741c01452

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe
                                                    Filesize

                                                    85KB

                                                    MD5

                                                    5e1bc1ad542dc2295d546d25142d9629

                                                    SHA1

                                                    dd697d1faceee724b5b6ae746116e228fe202d98

                                                    SHA256

                                                    9cc1a5b9fd49158f5cca4b28475a518cb60330e0cad98539d2a56d9930bdf9f9

                                                    SHA512

                                                    dc9dbecec37e47dd756cd00517f1bfe5b27832bd43c77f365defc649922cb7967eb7e5de76d79478b6ebfd99a1cc2e7e6b5119a05a42fd51a1c091b6f00f2456

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\Default\Extension State\CURRENT
                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
                                                    Filesize

                                                    41B

                                                    MD5

                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                    SHA1

                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                    SHA256

                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                    SHA512

                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\Default\Shared Dictionary\cache\index
                                                    Filesize

                                                    24B

                                                    MD5

                                                    54cb446f628b2ea4a5bce5769910512e

                                                    SHA1

                                                    c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                    SHA256

                                                    fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                    SHA512

                                                    8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\GraphiteDawnCache\data_0
                                                    Filesize

                                                    8KB

                                                    MD5

                                                    cf89d16bb9107c631daabf0c0ee58efb

                                                    SHA1

                                                    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                    SHA256

                                                    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                    SHA512

                                                    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\GraphiteDawnCache\data_1
                                                    Filesize

                                                    264KB

                                                    MD5

                                                    17bd7672040db656308d76d6e66a3095

                                                    SHA1

                                                    8ed1945d141244a8807a94d78f9150f4a311a31f

                                                    SHA256

                                                    73c89191d5808f65ddf660bff7827dd0aaa68747418749c5f2835bb824a0e665

                                                    SHA512

                                                    c3c8fdb9212f7187715454a64f4888f8cbe4805b8d0f754875fc11d623df27976c62eb58c64f35399d6e63d3094262ab9169c0255653d177feced62d8d6aa0b0

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\GraphiteDawnCache\data_2
                                                    Filesize

                                                    8KB

                                                    MD5

                                                    0962291d6d367570bee5454721c17e11

                                                    SHA1

                                                    59d10a893ef321a706a9255176761366115bedcb

                                                    SHA256

                                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                    SHA512

                                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\XcHvYYrNa.exe.WebView2\EBWebView\GraphiteDawnCache\data_3
                                                    Filesize

                                                    8KB

                                                    MD5

                                                    41876349cb12d6db992f1309f22df3f0

                                                    SHA1

                                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                    SHA256

                                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                    SHA512

                                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\libcurl.dll
                                                    Filesize

                                                    522KB

                                                    MD5

                                                    e31f5136d91bad0fcbce053aac798a30

                                                    SHA1

                                                    ee785d2546aec4803bcae08cdebfd5d168c42337

                                                    SHA256

                                                    ee94e2201870536522047e6d7fe7b903a63cd2e13e20c8fffc86d0e95361e671

                                                    SHA512

                                                    a1543eb1d10d25efb44f9eaa0673c82bfac5173055d04c0f3be4792984635a7c774df57a8e289f840627754a4e595b855d299070d469e0f1e637c3f35274abe6

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\vcruntime140.dll
                                                    Filesize

                                                    99KB

                                                    MD5

                                                    7a2b8cfcd543f6e4ebca43162b67d610

                                                    SHA1

                                                    c1c45a326249bf0ccd2be2fbd412f1a62fb67024

                                                    SHA256

                                                    7d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f

                                                    SHA512

                                                    e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\zlib1.dll
                                                    Filesize

                                                    113KB

                                                    MD5

                                                    75365924730b0b2c1a6ee9028ef07685

                                                    SHA1

                                                    a10687c37deb2ce5422140b541a64ac15534250f

                                                    SHA256

                                                    945e7f5d09938b7769a4e68f4ef01406e5af9f40db952cba05ddb3431dd1911b

                                                    SHA512

                                                    c1e31c18903e657203ae847c9af601b1eb38efa95cb5fa7c1b75f84a2cba9023d08f1315c9bb2d59b53256dfdb3bac89930252138475491b21749471adc129a1

                                                  • C:\Users\Admin\Downloads\RobloxPlayerInstaller.exe
                                                    Filesize

                                                    5.4MB

                                                    MD5

                                                    1f1ae0eb12231c472e7ab91a6df69b75

                                                    SHA1

                                                    3c0b44b3b18df2b9be602b551828b27604ef51fe

                                                    SHA256

                                                    4f62cee70845d868afed5b5ad66d7fdc582e6f9b6b69e6d5e9c52a1e24105b60

                                                    SHA512

                                                    470162197814bcefa52a24e1e88264827e4a6aaa0a110a41f35cd9c392bdcf6bd7deb25bf5c9ccbb994ba01b8a7851d7f5025ed5b9ad9f4ba94eabcf7f103abd

                                                  • \??\pipe\crashpad_4048_UUJIWATVKCBORXDZ
                                                    MD5

                                                    d41d8cd98f00b204e9800998ecf8427e

                                                    SHA1

                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                    SHA256

                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                    SHA512

                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                  • memory/2464-1892-0x00007FF932100000-0x00007FF932BC1000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1913-0x0000022EA44A0000-0x0000022EA44D8000-memory.dmp
                                                    Filesize

                                                    224KB

                                                  • memory/2464-1914-0x0000022EA4470000-0x0000022EA447E000-memory.dmp
                                                    Filesize

                                                    56KB

                                                  • memory/2464-1893-0x0000022E9F4C0000-0x0000022E9F57A000-memory.dmp
                                                    Filesize

                                                    744KB

                                                  • memory/2464-1897-0x0000022E85BE0000-0x0000022E85BEE000-memory.dmp
                                                    Filesize

                                                    56KB

                                                  • memory/2464-1891-0x0000022E9F940000-0x0000022E9FE7C000-memory.dmp
                                                    Filesize

                                                    5.2MB

                                                  • memory/2464-1908-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1889-0x0000022E83F00000-0x0000022E83F1A000-memory.dmp
                                                    Filesize

                                                    104KB

                                                  • memory/2464-2570-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1887-0x00007FF932103000-0x00007FF932105000-memory.dmp
                                                    Filesize

                                                    8KB

                                                  • memory/2464-1909-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1895-0x0000022E9F580000-0x0000022E9F5FE000-memory.dmp
                                                    Filesize

                                                    504KB

                                                  • memory/2464-2362-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1910-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1911-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1985-0x00007FF932100000-0x00007FF932BC1000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1965-0x00007FF932103000-0x00007FF932105000-memory.dmp
                                                    Filesize

                                                    8KB

                                                  • memory/2464-1912-0x0000022EA42C0000-0x0000022EA42C8000-memory.dmp
                                                    Filesize

                                                    32KB

                                                  • memory/2464-2286-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1915-0x0000000180000000-0x0000000180ACA000-memory.dmp
                                                    Filesize

                                                    10.8MB

                                                  • memory/2464-1916-0x00007FF942580000-0x00007FF9425A4000-memory.dmp
                                                    Filesize

                                                    144KB

                                                  • memory/2988-2500-0x0000000000BC0000-0x0000000000BF5000-memory.dmp
                                                    Filesize

                                                    212KB

                                                  • memory/2988-2520-0x0000000073990000-0x0000000073BA0000-memory.dmp
                                                    Filesize

                                                    2.1MB

                                                  • memory/2988-2501-0x0000000073990000-0x0000000073BA0000-memory.dmp
                                                    Filesize

                                                    2.1MB

                                                  • memory/3672-0-0x000000007502E000-0x000000007502F000-memory.dmp
                                                    Filesize

                                                    4KB

                                                  • memory/3672-3-0x0000000075020000-0x00000000757D0000-memory.dmp
                                                    Filesize

                                                    7.7MB

                                                  • memory/3672-5-0x0000000006260000-0x0000000006272000-memory.dmp
                                                    Filesize

                                                    72KB

                                                  • memory/3672-2-0x0000000003260000-0x000000000326A000-memory.dmp
                                                    Filesize

                                                    40KB

                                                  • memory/3672-1888-0x0000000075020000-0x00000000757D0000-memory.dmp
                                                    Filesize

                                                    7.7MB

                                                  • memory/3672-1-0x0000000000EA0000-0x0000000000EAA000-memory.dmp
                                                    Filesize

                                                    40KB