Resubmissions

15/07/2024, 09:16

240715-k8lq3syfqk 9

15/07/2024, 09:06

240715-k28x2a1gpa 9

Analysis

  • max time kernel
    1800s
  • max time network
    1518s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15/07/2024, 09:06

General

  • Target

    SolaraBootstrapper.exe

  • Size

    13KB

  • MD5

    0cc81729f4bd4a6eac95cc442bc8df2a

  • SHA1

    5d5f367e720684dd64cfb5340d9911ec0782fdac

  • SHA256

    92960ae4a38d896418a14a1db5ba1547aa273443790e858d00dac4ce64550c2a

  • SHA512

    f6fc1fca47e4620e24652d8dc2aa88cdd7363172b31122c05d262349aeec88407a2b3fbbc4e4834c359960d4981fb9f674cfbfd9d5743dc917df72a3ebfb3c90

  • SSDEEP

    192:+ZnqvqiVx1BLO77IaqaLHmr/XKTxnTjw1hOPVXmNjA:0nCVxoIaqayzKtnw1h6VKj

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Themida packer 59 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=768.4756.3516070405599029577
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x1b4,0x7ffb23d83cb8,0x7ffb23d83cc8,0x7ffb23d83cd8
          4⤵
            PID:2908
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
            4⤵
              PID:2868
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2240 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2272
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2468 /prefetch:8
              4⤵
                PID:3156
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3080 /prefetch:1
                4⤵
                  PID:4080
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4584 /prefetch:8
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3768
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3568 /prefetch:8
                  4⤵
                    PID:392
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=5056 /prefetch:8
                    4⤵
                      PID:3552
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=5076 /prefetch:8
                      4⤵
                        PID:1088
                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3580 /prefetch:2
                        4⤵
                          PID:2532
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1288 /prefetch:8
                          4⤵
                            PID:2456
                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1912,14072050077155703160,4359860027913883775,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1148 /prefetch:8
                            4⤵
                              PID:676
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3172
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:812

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\2040_582433761\manifest.fingerprint

                            Filesize

                            66B

                            MD5

                            7ce55ac0d7683657fd051e573ad06e30

                            SHA1

                            3bc51fbc6155c4e9d1439587e1c739995054cc52

                            SHA256

                            138e2b36e4c8bec8b00180558843355037d7de99c389f46e6183c4fc5a34c790

                            SHA512

                            f269c5c2ee53ed836bfd1b928b40e1ddb2aaea00e5585c85fecfcb1add71130d4ecfe91d2f2527934ac472c8b432d3475ca02b8f808e7e6014cd49155529d9a2

                          • C:\Users\Admin\AppData\Local\Temp\2040_582433761\manifest.json

                            Filesize

                            43B

                            MD5

                            55cf847309615667a4165f3796268958

                            SHA1

                            097d7d123cb0658c6de187e42c653ad7d5bbf527

                            SHA256

                            54f5c87c918f69861d93ed21544aac7d38645d10a890fc5b903730eb16d9a877

                            SHA512

                            53c71b860711561015c09c5000804f3713651ba2db57ccf434aebee07c56e5a162bdf317ce8de55926e34899812b42c994c3ce50870487bfa1803033db9452b7

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dll

                            Filesize

                            488KB

                            MD5

                            851fee9a41856b588847cf8272645f58

                            SHA1

                            ee185a1ff257c86eb19d30a191bf0695d5ac72a1

                            SHA256

                            5e7faee6b8230ca3b97ce9542b914db3abbbd1cb14fd95a39497aaad4c1094ca

                            SHA512

                            cf5c70984cf33e12cf57116da1f282a5bd6433c570831c185253d13463b0b9a0b9387d4d1bf4dddab3292a5d9ba96d66b6812e9d7ebc5eb35cb96eea2741348f

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.WinForms.dll

                            Filesize

                            37KB

                            MD5

                            4cf94ffa50fd9bdc0bb93cceaede0629

                            SHA1

                            3e30eca720f4c2a708ec53fd7f1ba9e778b4f95f

                            SHA256

                            50b2e46c99076f6fa9c33e0a98f0fe3a2809a7c647bb509066e58f4c7685d7e6

                            SHA512

                            dc400518ef2f68920d90f1ce66fbb8f4dde2294e0efeecd3d9329aa7a66e1ab53487b120e13e15f227ea51784f90208c72d7fbfa9330d9b71dd9a1a727d11f98

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll

                            Filesize

                            43KB

                            MD5

                            34ec990ed346ec6a4f14841b12280c20

                            SHA1

                            6587164274a1ae7f47bdb9d71d066b83241576f0

                            SHA256

                            1e987b22cd011e4396a0805c73539586b67df172df75e3dded16a77d31850409

                            SHA512

                            b565015ca4b11b79ecbc8127f1fd40c986948050f1caefdd371d34ed2136af0aabf100863dc6fd16d67e3751d44ee13835ea9bf981ac0238165749c4987d1ae0

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\index.html

                            Filesize

                            20KB

                            MD5

                            7ed00e10ff463cc9afd05d41fc77ac06

                            SHA1

                            66e162bdbf6df1e1d5b994b8db39fa67ab080783

                            SHA256

                            808f2c68960e6e521975c8c8efaa90a4053cfb207c4042687ea7afdd091543ee

                            SHA512

                            4b598cc17654a866c758c33982e776e522f0177f3c987908a18f62385b393338582efbca149817df7cea66eb8cfaa11d566ebfcb59c88d22156f0f1f4d224285

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\basic-languages\lua\lua.js

                            Filesize

                            5KB

                            MD5

                            8706d861294e09a1f2f7e63d19e5fcb7

                            SHA1

                            fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

                            SHA256

                            fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

                            SHA512

                            1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.css

                            Filesize

                            171KB

                            MD5

                            233217455a3ef3604bf4942024b94f98

                            SHA1

                            95cd3ce46f4ca65708ec25d59dddbfa3fc44e143

                            SHA256

                            2ec118616a1370e7c37342da85834ca1819400c28f83abfcbbb1ef50b51f7701

                            SHA512

                            6f4cb7b88673666b7dc1beab3ec2aec4d7d353e6da9f6f14ed2fee8848c7da34ee5060d9eb34ecbb5db71b5b98e3f8582c09ef3efe4f2d9d3135dea87d497455

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.js

                            Filesize

                            2.0MB

                            MD5

                            9399a8eaa741d04b0ae6566a5ebb8106

                            SHA1

                            5646a9d35b773d784ad914417ed861c5cba45e31

                            SHA256

                            93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                            SHA512

                            d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.nls.js

                            Filesize

                            31KB

                            MD5

                            74dd2381ddbb5af80ce28aefed3068fc

                            SHA1

                            0996dc91842ab20387e08a46f3807a3f77958902

                            SHA256

                            fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                            SHA512

                            8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\loader.js

                            Filesize

                            27KB

                            MD5

                            8a3086f6c6298f986bda09080dd003b1

                            SHA1

                            8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                            SHA256

                            0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                            SHA512

                            9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dll

                            Filesize

                            695KB

                            MD5

                            195ffb7167db3219b217c4fd439eedd6

                            SHA1

                            1e76e6099570ede620b76ed47cf8d03a936d49f8

                            SHA256

                            e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                            SHA512

                            56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\WebView2Loader.dll

                            Filesize

                            133KB

                            MD5

                            a0bd0d1a66e7c7f1d97aedecdafb933f

                            SHA1

                            dd109ac34beb8289030e4ec0a026297b793f64a3

                            SHA256

                            79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                            SHA512

                            2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dll

                            Filesize

                            5.2MB

                            MD5

                            aead90ab96e2853f59be27c4ec1e4853

                            SHA1

                            43cdedde26488d3209e17efff9a51e1f944eb35f

                            SHA256

                            46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                            SHA512

                            f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\bin\path.txt

                            Filesize

                            34B

                            MD5

                            0e2184f1c7464b6617329fb18f107b4f

                            SHA1

                            6f22f98471e33c9db10d6f6f1728e98852e25b8f

                            SHA256

                            dbf5f44e1b84a298dbbcad3c31a617d2f6cfa08eb5d16e05a5c28726c574d4eb

                            SHA512

                            8e745c0215d52e15702551f29efb882a5eba97b5f279ccc29293b1a9b1b8661bf71b548569f9a99fa35c35a15d1b6b288d3c381c1292418c36dc89e2fa0b3a37

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dll

                            Filesize

                            4.4MB

                            MD5

                            d2707360ae563a7a10e27beba85a6cd9

                            SHA1

                            686e830b839fc63a65fdebe78aa90edd687e9257

                            SHA256

                            f69022372a947acb86bae76f312ab518c1eb5df954339a46c4be71b4a8f73557

                            SHA512

                            e9f2a99869936f64e427ad081059e35283bd40f2b0d85bffc23d4ce35277778d8bfe98057e077e62955b0299c3182d173cb91a3d96a3b5690e7de61d01a1e000

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe

                            Filesize

                            90KB

                            MD5

                            d84e7f79f4f0d7074802d2d6e6f3579e

                            SHA1

                            494937256229ef022ff05855c3d410ac3e7df721

                            SHA256

                            dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227

                            SHA512

                            ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            fcd319fd3e43bd5478f9a141ed910598

                            SHA1

                            b6917dc4feb6c4e6cf55a8422128fc124c41c5c9

                            SHA256

                            dda43fac476ca8d4f39ff73e9924554e911a7800e795ad0493871cebe7df45b9

                            SHA512

                            87271be77ba9454b134b5a117a0adc5fb2522f8e13099dba3976de34b93147c5e5f43bdb3fa236c4d2f6e14f9b6a57478a575809ad9ff7f76ea81980fbdadf7b

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            852eb861b6cdbc33728005f85f9b982e

                            SHA1

                            4f89b09435e402878b5ee92eb448ef1eddd989bb

                            SHA256

                            d9e041c1ff1af40dc5b1f363633e9c522904bd3bdb962b37b64f3a9cf7bae0fb

                            SHA512

                            8119da4d89d01283ccc10da463e4ea5a123fa0c19528318a4910e558cfaf4fac3a376a92cb8924df96ffb37e26cbd7657890d4d9afe81d16422b9a8fc3930bc9

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                            Filesize

                            20B

                            MD5

                            9e4e94633b73f4a7680240a0ffd6cd2c

                            SHA1

                            e68e02453ce22736169a56fdb59043d33668368f

                            SHA256

                            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                            SHA512

                            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                            Filesize

                            41B

                            MD5

                            5af87dfd673ba2115e2fcf5cfdb727ab

                            SHA1

                            d5b5bbf396dc291274584ef71f444f420b6056f1

                            SHA256

                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                            SHA512

                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Network Persistent State

                            Filesize

                            935B

                            MD5

                            1122017bebf2a2e99e6d5ae867d90325

                            SHA1

                            8a1798f836736f9e0c4bb20f2e637a18355b505d

                            SHA256

                            a8011e75a3de0adc1ed6f72cf6128ec11c0c7d766e21c3bdcef7747caaa5c6fa

                            SHA512

                            fd51e372da3b8d28d596eb8aca94af5b8bb851a88c2096b28761c0a491e0872953a703364625a4aed147741aa76db9960a8a275edf152dfe32912de18645fbb0

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Network Persistent State~RFe5921c7.TMP

                            Filesize

                            59B

                            MD5

                            2800881c775077e1c4b6e06bf4676de4

                            SHA1

                            2873631068c8b3b9495638c865915be822442c8b

                            SHA256

                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                            SHA512

                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Preferences

                            Filesize

                            3KB

                            MD5

                            67a7d8d57418c6d921f8c7c9b8cdd29f

                            SHA1

                            3c178b426745d89eb1e924d103da6fa12645bcee

                            SHA256

                            74e20440ba65ab2b2447f977d6af5135692d03e517bb361919fe72a56a0d61c8

                            SHA512

                            259cfcb8f569c6818d92c85404b5b66e7bd045e58c8eb8a200a571f7331a9e95768a807f43a17b2e645ed3355e12cba10a8255131b3e1b165176806ac047ca93

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Preferences~RFe591f07.TMP

                            Filesize

                            3KB

                            MD5

                            aaef2635598c64e549ab1f41121948c6

                            SHA1

                            3f161da122927aa64b4caa96d26277a6e2c65157

                            SHA256

                            cae6b660a6698d7ac0ad59ce5f84739093138ce04129ed79f1e5d337c0ad5f7c

                            SHA512

                            34715826ac32f7f70fdb8400a6a33aa143852b983f07a0205ae8d1788659c615b53795a3205c5043a0d7b517291009fb4d9ff358332f9d45b26ab83282fc432e

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State

                            Filesize

                            8KB

                            MD5

                            8fd99ea5e491527fcbba8edf2e468bd3

                            SHA1

                            901c6d4b4cef4914e72c154713ddb7743922ad37

                            SHA256

                            f14f825911706566640cd3033e89f1c0ccbef1e438b48fea4b1de24f4f529d4f

                            SHA512

                            a2edbc75ffa8a0914fb61b2ba72d6cc46d713b5d536171284430e898765871415ce459f85721166623a93d21e2361c9c90d65fa611c7d884f523a29775366a70

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State~RFe585937.TMP

                            Filesize

                            8KB

                            MD5

                            9f584b60b97e320c725d950fc5c8dbc4

                            SHA1

                            74d1df810978320a7b4686948f9d8926373cfc2e

                            SHA256

                            260750dd34c3495894bcdb31aacfa4fdc1b21f81b26f3fa18e10b4337468257b

                            SHA512

                            983bf0d6e0d1a576962485aba8f485428ee4ecfacd9bb7e05e5acad0262b467f73c6a23a657bd3be1772f5cb996ecea1d53f3ca3939c9f97fc1c4d6dc34c1202

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Advertising

                            Filesize

                            24KB

                            MD5

                            131857baba78228374284295fcab3d66

                            SHA1

                            180e53e0f9f08745f28207d1f7b394455cf41543

                            SHA256

                            b1666e1b3d0b31e147dc047e0e1c528939a53b419c6be4c8278ee30a0a2dbd49

                            SHA512

                            c84c3794af8a3a80bb8415f18d003db502e8cb1d04b555f1a7eef8977c9f24e188ae28fc4d3223b52eab4046342b2f8fd0d7461130f3636609214a7b57f49cb4

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Analytics

                            Filesize

                            4KB

                            MD5

                            da298eacf42b8fd3bf54b5030976159b

                            SHA1

                            a976f4f5e2d81f80dc0e8a10595190f35e9d324b

                            SHA256

                            3abd2e1010e8824f200878942e0850d6e2620a2f0f15b87d32e2451fdda962ec

                            SHA512

                            5bf24c2df7cc12c91d1fb47802dbac283244c1010baa68bfae9eb5eb8ee25758156bb1e21f6cc3f55e7d71e5c330888ffd41469b2630eb86237c9970d7ede75e

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\CompatExceptions

                            Filesize

                            689B

                            MD5

                            108de320dc5348d3b6af1f06a4374407

                            SHA1

                            90aa226d3c9d50cf4435ecdd2b8b0086d8edeb8b

                            SHA256

                            5b462316a51c918d0bae95959bf827cb9c72bbd84ffb0e43b750aa91fbf3ba53

                            SHA512

                            70f30c45e20b7cddd0cba6476af9338975cec8e40b8b19603af5fa859a34c6eb2138957daaa263633fe65213e2186402d05d9d29ad53e8f311335555116314c2

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Content

                            Filesize

                            6KB

                            MD5

                            97ea4c3bfaadcb4b176e18f536d8b925

                            SHA1

                            61f2eae05bf91d437da7a46a85cbaa13d5a7c7af

                            SHA256

                            72ec1479e9cc7f90cf969178451717966c844889b715dff05d745915904b9554

                            SHA512

                            5a82729fd2dce487d5f6ac0c34c077228bee5db55bf871d300fcbbd2333b1ee988d5f20ef4d8915d601bd9774e6fa782c8580edca24a100363c0cdce06e5503f

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Cryptomining

                            Filesize

                            1KB

                            MD5

                            16779f9f388a6dbefdcaa33c25db08f6

                            SHA1

                            d0bfd4788f04251f4f2ac42be198fb717e0046ae

                            SHA256

                            75ad2a4d85c1314632e3ac0679169ba92ef0a0f612f73a80fdd0bc186095b639

                            SHA512

                            abd55eff87b4445694b3119176007f71cf71c277f20ea6c4dcadfb027fdce78f7afbcf7a397bd61bd2fa4bc452e03087a9e0e8b9cc5092ec2a631c1ebb00ee25

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Entities

                            Filesize

                            68KB

                            MD5

                            571c13809cc4efaff6e0b650858b9744

                            SHA1

                            83e82a841f1565ad3c395cbc83cb5b0a1e83e132

                            SHA256

                            ab204851f39da725b5a73b040519c2e6aaf52cb7a537c75802cb25248d02ec1b

                            SHA512

                            93ff4625866abf7cd96324528df2f56ecb358235ff7e63438ac37460aeb406a5fb97084e104610bb1d7c2e8693cabedc6239b95449e9abb90252a353038cb2a2

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Fingerprinting

                            Filesize

                            1KB

                            MD5

                            b46196ad79c9ef6ddacc36b790350ca9

                            SHA1

                            3df9069231c232fe8571a4772eb832fbbe376c23

                            SHA256

                            a918dd0015bcd511782ea6f00eed35f77456944981de7fd268471f1d62c7eaa3

                            SHA512

                            61d6da8ee2ca07edc5d230bdcbc5302a2c6e3a9823e95ccfd3896d2e09a0027fece76f2c1ea54e8a8c4fa0e3cf885b35f3ff2e6208bf1d2a2757f2cbcdf01039

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Other

                            Filesize

                            34B

                            MD5

                            cd0395742b85e2b669eaec1d5f15b65b

                            SHA1

                            43c81d1c62fc7ff94f9364639c9a46a0747d122e

                            SHA256

                            2b4a47b82cbe70e34407c7df126a24007aff8b45d5716db384d27cc1f3b30707

                            SHA512

                            4df2ce734e2f7bc5f02bb7845ea801b57dcf649565dd94b1b71f578b453ba0a17c61ccee73e7cff8f23cdd6aa37e55be5cb15f4767ff88a9a06de3623604fbf0

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Mu\Social

                            Filesize

                            355B

                            MD5

                            4c817c4cb035841975c6738aa05742d9

                            SHA1

                            1d89da38b339cd9a1aadfc824ed8667018817d4e

                            SHA256

                            4358939a5a0b4d51335bf8f4adb43de2114b54f3596f9e9aacbdb3e52bef67e6

                            SHA512

                            fa8e1e8aa00bf83f16643bf6a22c63649402efe70f13cd289f51a6c1172f504fedd7b63fc595fb867ecb9d235b8a0ea032b03d861ebb145f0f6a7d5629df8486

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Advertising

                            Filesize

                            2KB

                            MD5

                            326ddffc1f869b14073a979c0a34d34d

                            SHA1

                            df08e9d94ad0fad7cc7d2d815ee7d8b82ec26e63

                            SHA256

                            d4201efd37aec4552e7aa560a943b4a8d10d08af19895e6a70991577609146fb

                            SHA512

                            3822e64ca9cf23e50484afcc2222594b4b2c7cd8c4e411f557abea851ae7cbd57f10424c0c9d8b0b6a5435d6f28f3b124c5bc457a239f0a2f0caf433b01da83f

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Analytics

                            Filesize

                            432B

                            MD5

                            01f1f3c305218510ccd9aaa42aee9850

                            SHA1

                            fbf3e681409d9fb4d36cba1f865b5995de79118c

                            SHA256

                            62d7286cd7f74bdfda830ee5a48bce735ee3661bda8ceac9903b5627cbd0b620

                            SHA512

                            e5b665e981f702a4a211d0569bb0bc42e3c29b76b3f75aaf8dc173f16f18f7c443f5cf0ccf1550df3aa2b151e607969c2c90ab1a6e7a910dfeb83854cea4e690

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Content

                            Filesize

                            48B

                            MD5

                            7b0b4a9aafc18cf64f4d4daf365d2d8d

                            SHA1

                            e9ed1ecbec6cccfefe00f9718c93db3d66851494

                            SHA256

                            0b55eb3f97535752d3c1ef6cebe614b9b67dddfcfd3c709b84c6ecad6d105d43

                            SHA512

                            a579069b026ed2aaef0bd18c3573c77bfb5e0e989c37c64243b12ee4e59635aaa9d9c9746f82dcc16ca85f091ec4372c63e294c25e48dfffbed299567149c4e2

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Cryptomining

                            Filesize

                            32B

                            MD5

                            4ec1eda0e8a06238ff5bf88569964d59

                            SHA1

                            a2e78944fcac34d89385487ccbbfa4d8f078d612

                            SHA256

                            696e930706b5d391eb8778f73b0627ffc2be7f6c9a3e7659170d9d37fc4a97b5

                            SHA512

                            c9b1ed7b61f26d94d7f5eded2d42d40f3e4300eee2319fe28e04b25cdb6dd92daf67828bff453bf5fc8d7b6ceb58cab319fc0daac9b0050e27a89efe74d2734e

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Entities

                            Filesize

                            42KB

                            MD5

                            f446eb7054a356d9e803420c8ec41256

                            SHA1

                            98a1606a2ba882106177307ae11ec76cfb1a07ee

                            SHA256

                            4dc67d4b882621a93ffdb21a198a48a0bc491148c91208cf440af5f0de3ef640

                            SHA512

                            3cc3a521b297e4f48ed4ba29866a5ade380c9f0c06d85bea4140e24b05c6762d645df3d03d0a7058383b559baa3ae34ad3ed2b06017e91a061632862911a823b

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Fingerprinting

                            Filesize

                            172B

                            MD5

                            3852430540e0356d1ba68f31be011533

                            SHA1

                            d3f622450bcf0ced36d9d9c0aad630ebccfcb7ff

                            SHA256

                            f1f413704c32a28a31a646f60cad36cc2da793e143f70eee72ae56f736df8054

                            SHA512

                            7a4faa493c141ea88d6cd933dfc0b50ef6d25983323db2b931c7512e039859d60c4935e56b771264ca72b45c035b1962ad8680d616eaaf04fbc5a6e0b674e435

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Other

                            Filesize

                            91B

                            MD5

                            09cedaa60eab8c7d7644d81cf792fe76

                            SHA1

                            e68e199c88ea96fcb94b720f300f7098b65d1858

                            SHA256

                            c8505ea2fe1b8f81a1225e4214ad07d8d310705be26b3000d7df8234e0d1f975

                            SHA512

                            564f8e5c85208adabb4b10763084b800022bb6d6d74874102e2f49cc8f17899ce18570af1f462aa592a911e49086a2d1c2d750b601eedd2f61d1731689a0a403

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Social

                            Filesize

                            3KB

                            MD5

                            318801ce3611c0d25c65b809dd9b5b3c

                            SHA1

                            b9d07f2aa9da1d83180dc24459093e20fe9cf1d8

                            SHA256

                            2458da5d79b393459520e1319937cfc39caadbc2294f175659fae5df804e1d03

                            SHA512

                            7daff0253da90f35bf00141b53d39c7cadacf451a7ecf1667c4ca6e8aed59a0c4a6b44ddc2afffa690e12c2134eddb9f46f72e4317ce99c307d9e524a5fd1103

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Trust Protection Lists\1.0.0.26\Sigma\Staging

                            Filesize

                            16KB

                            MD5

                            39bdf35ac4557a2d2a4efdeeb038723e

                            SHA1

                            9703ca8af3432b851cb5054036de32f8ba7b083f

                            SHA256

                            04441a10b0b1deee7996e298949ac3b029bd7c24257faf910fe14f9996ba12ae

                            SHA512

                            732337f7b955e6acaf1e3aaa3395bc44c80197d204bd3cbb3e201b6177af6153cc9d7b22ad0e90b36796f92b0022806c32ac763eaec733b234503890900bf284

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\libcurl.dll

                            Filesize

                            522KB

                            MD5

                            e31f5136d91bad0fcbce053aac798a30

                            SHA1

                            ee785d2546aec4803bcae08cdebfd5d168c42337

                            SHA256

                            ee94e2201870536522047e6d7fe7b903a63cd2e13e20c8fffc86d0e95361e671

                            SHA512

                            a1543eb1d10d25efb44f9eaa0673c82bfac5173055d04c0f3be4792984635a7c774df57a8e289f840627754a4e595b855d299070d469e0f1e637c3f35274abe6

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\vcruntime140.dll

                            Filesize

                            99KB

                            MD5

                            7a2b8cfcd543f6e4ebca43162b67d610

                            SHA1

                            c1c45a326249bf0ccd2be2fbd412f1a62fb67024

                            SHA256

                            7d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f

                            SHA512

                            e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8

                          • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\zlib1.dll

                            Filesize

                            113KB

                            MD5

                            75365924730b0b2c1a6ee9028ef07685

                            SHA1

                            a10687c37deb2ce5422140b541a64ac15534250f

                            SHA256

                            945e7f5d09938b7769a4e68f4ef01406e5af9f40db952cba05ddb3431dd1911b

                            SHA512

                            c1e31c18903e657203ae847c9af601b1eb38efa95cb5fa7c1b75f84a2cba9023d08f1315c9bb2d59b53256dfdb3bac89930252138475491b21749471adc129a1

                          • memory/768-872-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-447-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-617-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-618-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-427-0x000001FAC6690000-0x000001FAC6742000-memory.dmp

                            Filesize

                            712KB

                          • memory/768-425-0x000001FAC65D0000-0x000001FAC668A000-memory.dmp

                            Filesize

                            744KB

                          • memory/768-628-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-629-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-630-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-631-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-632-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-642-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-653-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-423-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-424-0x000001FAC6A20000-0x000001FAC6F5C000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/768-897-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-420-0x000001FAABD20000-0x000001FAABD3A000-memory.dmp

                            Filesize

                            104KB

                          • memory/768-419-0x00007FFB29E63000-0x00007FFB29E65000-memory.dmp

                            Filesize

                            8KB

                          • memory/768-896-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-697-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-707-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-723-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-733-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-752-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-755-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-756-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-766-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-778-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-788-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-789-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-799-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-895-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-894-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-428-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-587-0x00007FFB29E63000-0x00007FFB29E65000-memory.dmp

                            Filesize

                            8KB

                          • memory/768-574-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-429-0x000001FAADC30000-0x000001FAADC52000-memory.dmp

                            Filesize

                            136KB

                          • memory/768-431-0x000001FAADC20000-0x000001FAADC2E000-memory.dmp

                            Filesize

                            56KB

                          • memory/768-432-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-434-0x000001FAC7160000-0x000001FAC71DE000-memory.dmp

                            Filesize

                            504KB

                          • memory/768-445-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-616-0x00007FFB29E60000-0x00007FFB2A922000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/768-893-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-446-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-448-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-454-0x000001FAC6A10000-0x000001FAC6A1E000-memory.dmp

                            Filesize

                            56KB

                          • memory/768-453-0x000001FACA460000-0x000001FACA498000-memory.dmp

                            Filesize

                            224KB

                          • memory/768-892-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-891-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-846-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-856-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-857-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-867-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-868-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-869-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-870-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-871-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-452-0x000001FAC69B0000-0x000001FAC69B8000-memory.dmp

                            Filesize

                            32KB

                          • memory/768-873-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-874-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-875-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-876-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-877-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-878-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-879-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-880-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-881-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-882-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-883-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-884-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-885-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-886-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-887-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-888-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-889-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/768-890-0x0000000180000000-0x0000000180B57000-memory.dmp

                            Filesize

                            11.3MB

                          • memory/2332-1-0x0000000000BF0000-0x0000000000BFA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2332-0-0x00000000750AE000-0x00000000750AF000-memory.dmp

                            Filesize

                            4KB

                          • memory/2332-2-0x00000000055C0000-0x00000000055CA000-memory.dmp

                            Filesize

                            40KB

                          • memory/2332-3-0x00000000750A0000-0x0000000075851000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2332-5-0x00000000060E0000-0x00000000060F2000-memory.dmp

                            Filesize

                            72KB

                          • memory/2332-421-0x00000000750A0000-0x0000000075851000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2868-474-0x00007FFB4A660000-0x00007FFB4A661000-memory.dmp

                            Filesize

                            4KB