Resubmissions

23/07/2024, 15:16

240723-snsynawglm 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 15:16

General

  • Target

    https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a10a16&is=669fb896&hm=44de4891ba3327b4cbf5a4c183fba7c0ca27e88d9b2ae30afb1a40b7a55b5ce8&

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 37 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 14 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 44 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
    1⤵
      PID:2548
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4524
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1258666032768356383/1265308732326416424/Solara_roblox.zip?ex=66a10a16&is=669fb896&hm=44de4891ba3327b4cbf5a4c183fba7c0ca27e88d9b2ae30afb1a40b7a55b5ce8&
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcb2746f8,0x7ffdcb274708,0x7ffdcb274718
        2⤵
          PID:1792
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
          2⤵
            PID:3960
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4204
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:8
            2⤵
              PID:4624
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
              2⤵
                PID:5108
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                2⤵
                  PID:4900
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:8
                  2⤵
                    PID:3244
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4104
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                    2⤵
                      PID:932
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                      2⤵
                        PID:2584
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                        2⤵
                          PID:1532
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                          2⤵
                            PID:3624
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5508 /prefetch:8
                            2⤵
                              PID:456
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                              2⤵
                                PID:4520
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5000
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16203545108142071870,5826121885646000332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2204
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1068
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3280
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5212
                                  • C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                    "C:\Users\Admin\Downloads\Solara_roblox\setup.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Maps connected drives based on registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5676
                                    • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:5928
                                      • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                        3⤵
                                        • Event Triggered Execution: Image File Execution Options Injection
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks system information in the registry
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5440
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:1460
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:5632
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:5664
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:1072
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.193.5\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:2916
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0ie0U5REYxQjQzLTZFNTUtNEE2NC04NkZBLURBQTQ5OTY2RTZFRH0iIHVzZXJpZD0iezkxN0E4QzE2LTM3REQtNEM2RS1COEM0LUJFN0IzM0Y5ODIyOH0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9Ins5NjdCNDI5MS0xQTlGLTQ2NEItODlCQi1FRTkwQzJBNDJDOUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE4Ny40MSIgbmV4dHZlcnNpb249IjEuMy4xOTMuNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTI3ODAyMTkyOCIgaW5zdGFsbF90aW1lX21zPSI1OTMiLz48L2FwcD48L3JlcXVlc3Q-
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:1464
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{E9DF1B43-6E55-4A64-86FA-DAA49966E6ED}"
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:5840
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5676.2816.518804286540558753
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • System policy modification
                                      PID:3096
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x17c,0x180,0x184,0x158,0x1b4,0x7ffdb59c0148,0x7ffdb59c0154,0x7ffdb59c0160
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5772
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,5574551596751661565,16021333598696815139,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1784 /prefetch:2
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:1076
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1924,i,5574551596751661565,16021333598696815139,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:3
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5156
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2248,i,5574551596751661565,16021333598696815139,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:8
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:2528
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3524,i,5574551596751661565,16021333598696815139,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:1420
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4168,i,5574551596751661565,16021333598696815139,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5956
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic path win32_VideoController get name
                                      2⤵
                                      • Detects videocard installed
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5852
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      2⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6104
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\Solara_roblox\setup.exe\""
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4300
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5900
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic csproduct get uuid
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5732
                                    • C:\ProgramData\driver1.exe
                                      C:\ProgramData\driver1.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:2328
                                      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        3⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2572
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 460
                                          4⤵
                                          • Program crash
                                          PID:4336
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 488
                                          4⤵
                                          • Program crash
                                          PID:412
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:1860
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:5876
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtoVmZEak1kRkc2RmdLczBOejZlbXJZQ1NnNlRRdkRQb21vbFJheVFYQks0PSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEwNiIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMTQiIGluc3RhbGxkYXRldGltZT0iMTcyMDUzNDgzMCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzY1MDA3Mzg5MjkxMzQzNSI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyODUyNTMwMDciLz48L2FwcD48L3JlcXVlc3Q-
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:4348
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\MicrosoftEdge_X64_126.0.2592.113.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                      2⤵
                                      • Executes dropped EXE
                                      PID:3232
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\EDGEMITMP_7869A.tmp\setup.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\EDGEMITMP_7869A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\MicrosoftEdge_X64_126.0.2592.113.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:4332
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\EDGEMITMP_7869A.tmp\setup.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\EDGEMITMP_7869A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AD28F20A-19B2-46C3-98BA-851B4F835E4C}\EDGEMITMP_7869A.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=126.0.2592.113 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff60742aa40,0x7ff60742aa4c,0x7ff60742aa58
                                          4⤵
                                          • Executes dropped EXE
                                          • Drops file in Program Files directory
                                          PID:4576
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTMuNSIgc2hlbGxfdmVyc2lvbj0iMS4zLjE5My41IiBpc21hY2hpbmU9IjEiIHNlc3Npb25pZD0ie0U5REYxQjQzLTZFNTUtNEE2NC04NkZBLURBQTQ5OTY2RTZFRH0iIHVzZXJpZD0iezkxN0E4QzE2LTM3REQtNEM2RS1COEM0LUJFN0IzM0Y5ODIyOH0iIGluc3RhbGxzb3VyY2U9InRhZ2dlZG1pIiByZXF1ZXN0aWQ9InszRDgxNzg4QS1GRTFDLTREM0ItQkNCMi01MENCRDg5ODdENzd9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:5852
                                  • C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                    "C:\Users\Admin\Downloads\Solara_roblox\setup.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5628
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5628.1124.13100310674184889345
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4484
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x160,0x164,0x168,0x13c,0x194,0x7ffdb59c0148,0x7ffdb59c0154,0x7ffdb59c0160
                                        3⤵
                                        • Executes dropped EXE
                                        PID:3336
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Solara_roblox\setuperr.log
                                    1⤵
                                    • Opens file in notepad (likely ransom note)
                                    PID:6000
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Solara_roblox\setupact.log
                                    1⤵
                                    • Opens file in notepad (likely ransom note)
                                    PID:5812
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2572 -ip 2572
                                    1⤵
                                      PID:1252
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2572 -ip 2572
                                      1⤵
                                        PID:2576
                                      • C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                        "C:\Users\Admin\Downloads\Solara_roblox\setup.exe"
                                        1⤵
                                        • Loads dropped DLL
                                        • Maps connected drives based on registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2632
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=2632.5900.13028703442330372862
                                          2⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • Enumerates system info in registry
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • System policy modification
                                          PID:3328
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x174,0x178,0x17c,0x150,0x74,0x7ffdb59c0148,0x7ffdb59c0154,0x7ffdb59c0160
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5952
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1812 /prefetch:2
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5896
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1940,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1984 /prefetch:3
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5428
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2232,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2292 /prefetch:8
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:4964
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3584,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:4316
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4596,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4588 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:3256
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --webview-exe-name=setup.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4760,i,16951760639212675420,2638392965287739726,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4788 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            PID:5888
                                        • C:\Windows\System32\Wbem\wmic.exe
                                          wmic path win32_VideoController get name
                                          2⤵
                                          • Detects videocard installed
                                          PID:2684
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist
                                          2⤵
                                          • Enumerates processes with tasklist
                                          PID:1328
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\Solara_roblox\setup.exe\""
                                          2⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4336
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3740
                                        • C:\Windows\System32\Wbem\wmic.exe
                                          wmic csproduct get uuid
                                          2⤵
                                            PID:5512
                                        • C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                          "C:\Users\Admin\Downloads\Solara_roblox\setup.exe"
                                          1⤵
                                          • Loads dropped DLL
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4868
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4868.5380.8560226699793293877
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5376
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x164,0x168,0x16c,0x140,0x80,0x7ffdb59c0148,0x7ffdb59c0154,0x7ffdb59c0160
                                              3⤵
                                              • Executes dropped EXE
                                              PID:6068
                                        • C:\Users\Admin\Downloads\Solara_roblox\setup.exe
                                          "C:\Users\Admin\Downloads\Solara_roblox\setup.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5860
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setup.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5860.900.16888085000473445787
                                            2⤵
                                            • Executes dropped EXE
                                            PID:848
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=126.0.6478.183 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\126.0.2592.113\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=126.0.2592.113 --initial-client-data=0x160,0x164,0x168,0x13c,0x194,0x7ffdb59c0148,0x7ffdb59c0154,0x7ffdb59c0160
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1272

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Program Files (x86)\Microsoft\EdgeCore\126.0.2592.113\Installer\setup.exe

                                          Filesize

                                          6.5MB

                                          MD5

                                          4dda37fd043902a07a4d46dd8b5bc4aa

                                          SHA1

                                          aeecafae4cca3b4a1e592d93b045de19d09a328e

                                          SHA256

                                          806500bb5e7a3e4a2a84d4d08e97d1872dc7ee8f8c255e3c6c2d39437c9779ac

                                          SHA512

                                          903280cf47888fcd491b5aa70ffc4de60458fe8fce6e164a02118308cbd36ef0d2e6ecd418d19242d605f9c516598fe723908e28baf702c4c65a284fabc60111

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\EdgeUpdate.dat

                                          Filesize

                                          12KB

                                          MD5

                                          369bbc37cff290adb8963dc5e518b9b8

                                          SHA1

                                          de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                          SHA256

                                          3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                          SHA512

                                          4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                          Filesize

                                          181KB

                                          MD5

                                          5679308b2e276bd371798ac8d579b1f9

                                          SHA1

                                          eb01158489726d54ff605a884d77931df40098e4

                                          SHA256

                                          c9aef2d24f1c77a366b327b869e4103ed8276ea83b2b40942718cc134a1e122f

                                          SHA512

                                          9eb5ef48b47444909b10bf7d96d55c47c02814524df6a479e448e9ff50b9a462ac03c99f57258d0ed8fe3665fb286dde0d9be5a47019fb4d9c68da2b2589e898

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeUpdate.exe

                                          Filesize

                                          200KB

                                          MD5

                                          090901ebefc233cc46d016af98be6d53

                                          SHA1

                                          3c78e621f9921642dbbd0502b56538d4b037d0cd

                                          SHA256

                                          7864bb95eb14e0ae1c249759cb44ad746e448007563b7430911755cf17ea5a77

                                          SHA512

                                          5e415dc06689f65155a7ea13c013088808a65afff12fef664178b2ea37e48b4736261564d72e02b898ced58bfb5b3a1fcdd2c7136c0d841868ec7f4f1c32e883

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                          Filesize

                                          214KB

                                          MD5

                                          8428e306e866fe7972f05b6be814c1cf

                                          SHA1

                                          84ea90405d8d797a6deba68fd6a8efae5a461ce1

                                          SHA256

                                          855e2f2fab4968261704cab9bae294fb7ec8b9c26e4d1708e29e26c454c7b0af

                                          SHA512

                                          bd40fc5fb4eeca9e1671d0a99a7ccd1d1ab3f84abf62e996827a60e471adecf655b5ed146cdaefcb82d29c563e4eeba7c1b2da243218cbca55009064dcad1f21

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\MicrosoftEdgeUpdateCore.exe

                                          Filesize

                                          260KB

                                          MD5

                                          64f7ff56af334d91a50068271bed5043

                                          SHA1

                                          108209fde87705b03d56759fd41486d22a3e24df

                                          SHA256

                                          a98505367c850b6ef6d2df68d24d83643767a6fab8f0dd22cc60509b3363ce51

                                          SHA512

                                          b70c1d2a26f59e94b31beb3151f69d7eb9de8841399b618730d94263cc5402f391cd5cfc6621c8666e5e073e6f8c340d6fd3511f1cb1cbbf6ee75312598f56d7

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\NOTICE.TXT

                                          Filesize

                                          4KB

                                          MD5

                                          6dd5bf0743f2366a0bdd37e302783bcd

                                          SHA1

                                          e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                          SHA256

                                          91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                          SHA512

                                          f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdate.dll

                                          Filesize

                                          2.1MB

                                          MD5

                                          d1175f877ab160902113b3a2250d0d78

                                          SHA1

                                          7fc668cd9ed31d093f7c88dc4803ce3f3f833796

                                          SHA256

                                          5ccf3eedf6f1f57d386cef188f070c72583d9a96ff674ce91e8776ced8e989b5

                                          SHA512

                                          ba1fa4f61c3ed3766e6bd0ae95e36d7505774c463ff81b989e64acaf878cfd59fa41109c696ed16a122e68edc2e0c9f96afd9cfbe92bd7351583719b028c1604

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_af.dll

                                          Filesize

                                          29KB

                                          MD5

                                          3cd709bc031a8d68c10aaa086406a385

                                          SHA1

                                          673fbf3172ec1cee21688423ad49ec3848639d02

                                          SHA256

                                          54dc23402365407bff46318ac0c8cb60c165988f4159a654b5d6013e289f888e

                                          SHA512

                                          04e51aeed7c535616f1db7f92841bcda2bc22f85eb06a7ffc5b626f9f69be0219a042e8ae4a486a2f753b7f65901a082b81f5ba72113d9df9ef123b32367d7d6

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_am.dll

                                          Filesize

                                          24KB

                                          MD5

                                          15abb596e500038ffdf8a1d7d853d979

                                          SHA1

                                          6f8239859ff806c6ad682639ff43cedb6799e6a6

                                          SHA256

                                          19509364513e1849ddc46824c8b3bbc354bfc4b540158e28e18abb10b8537dda

                                          SHA512

                                          c4642146979700898ad3adeb0160c8e9d7bb56c1e224a778d400764750c9d9cbd7c4ee52bec0853cc0e577884515bd40a1b0fd643cc0b66b56d472e0bbb1c23e

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ar.dll

                                          Filesize

                                          26KB

                                          MD5

                                          61c48f913b2502e56168cdf475d4766a

                                          SHA1

                                          2bf4c5ffbfa6d5c5eaf84de074f3ad7555b56d5d

                                          SHA256

                                          8fd703a50d9cb19e9249cf4a4409da71104c6a16475b9725306cd13c260cefd1

                                          SHA512

                                          d8ba17df865bff6e2785986d9a8310ec7b0e530e389bf7baa719e95b7effa84b58c7102d5f9711fbaebdd2bbcb3cd66760f9eeed92c1aeef06b85d3724028d2f

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_as.dll

                                          Filesize

                                          29KB

                                          MD5

                                          2ba6aaea03cf5f98f63a400a9ca127ab

                                          SHA1

                                          807c98ab6fe2f45fa43a8817f0adf8abeec75641

                                          SHA256

                                          509cb950d7f5d8f99adff84e6e381001f14571529571419fd5452b48e24c7291

                                          SHA512

                                          d4b91512b586dbc1cd0c63aaa7bf82900ba80de2b3e265b0200f0a4e2bf0c0a3916675fb72f9bc0b4eaa5d9cc07ade94c8210ad2156fea6d3d2416a5cbf98c24

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_az.dll

                                          Filesize

                                          29KB

                                          MD5

                                          d624c5abfca9e775c6d27b636ca460c4

                                          SHA1

                                          8726c57cf5887367c8aa32a1de5298521d5fe273

                                          SHA256

                                          7023866e9644a1edb50f0f388bc3f2aeaab561822e6b7d75ec5c66b151f126c0

                                          SHA512

                                          92d0d5605336c329359f7c4aa7eeaf972f21877ac61f377e7a2f3c6d66f5d6882be649b765e4122043212381034b4131d44ae996dfc1df4a2e248babcb076c30

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_bg.dll

                                          Filesize

                                          29KB

                                          MD5

                                          6ff52c5cdc434e4513c4d4b8ec23e02d

                                          SHA1

                                          56b7b73e3cf2cf13fa509593f7c5aebb73639b83

                                          SHA256

                                          414269530f9ecb045e2049266ee0b58df99ac37de75e0e127899eb3218371555

                                          SHA512

                                          adc3b5593a69dcd0a894ed6bc1160fdbb0d0e9e96e83ca4430ef28e9115d6023f54f3e3fac3cba1ff4497e486991dc4e7e40c7b75ce7796a5044f1ccc5411371

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_bn-IN.dll

                                          Filesize

                                          29KB

                                          MD5

                                          c52c76a02dbfbadd6d409fcc9df8dd16

                                          SHA1

                                          d406010ac12ed41e6cdc75eaa2daa231a1d6df6a

                                          SHA256

                                          91843e7eb2f1a9e14f51f2b552d8390cf7846b4406b97ca98b105beb40fc461a

                                          SHA512

                                          28b24bbe03f79a7e4ad51e0e15a664cd783b527255ff0952d43086071e494e7e45ae50d8c378f69abb22942eda2e8dcf8421e2922dcff9ff9cb851745750d2ee

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_bn.dll

                                          Filesize

                                          29KB

                                          MD5

                                          eea17b09a2a3420ee57db365d5a7afae

                                          SHA1

                                          dc43580f87f67a28c6fa0b056f41c2c0c98a054e

                                          SHA256

                                          b86d6df0b608cbab18ea53c31a9a17c09c86e90e8592f3269af0517c9756c07d

                                          SHA512

                                          53a199b1bd82ddde65fd6c9bb007867bfa3b2c39e07817a7aff39b7596f00a76bc5dc23687c7fb41b75b00b30ddfdb38a76c740c38bfe41dc21e1fa2d698469f

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_bs.dll

                                          Filesize

                                          28KB

                                          MD5

                                          1a3815be8fc2a375042e271da63aaa8d

                                          SHA1

                                          a831ce72e5fe3c9477dee3defc1e8f1d3a11aaa1

                                          SHA256

                                          e753e2315e26bc7b8334077846dc91a85fd89f1e483b305af8aaac5b596585db

                                          SHA512

                                          9642fdc3cb49c6d0e4b1c4e1d636007234b126f48da1fe77f586cb8f9403bdc786b54d4bcdbc6175214b7d06a1879f2c809d3fb7e1b920ab36b29a12afe92fb4

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                          Filesize

                                          30KB

                                          MD5

                                          253afd1816718afa7fd3af5b7ecf430d

                                          SHA1

                                          36e9d69eb57331a676b0cb71492ab35486b68d95

                                          SHA256

                                          53325e46247a616a84442abbc914b8fa08b67800ab55d5625e43a58b19d44767

                                          SHA512

                                          649b292b80dde95c195b968b51dd168f6f5513b179a35832b5e759795f04e6e6f326a34f6f7db37d12b8c322ccae197455565491c2484b8237c82e1bb2e77ad6

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ca.dll

                                          Filesize

                                          29KB

                                          MD5

                                          7653243e1a6fbb6c643dbc5b32701c74

                                          SHA1

                                          fc537eccc1da0775d145b21db9474ef2996e383d

                                          SHA256

                                          9df1383dfa81c5064acd9130555dbaf2e7413b6e2bc72b1d2340a6013387061c

                                          SHA512

                                          d7834c02a3891afbba040c943ed4255041a6c241d76ac138ad0c04baf589aaa355067395c606e910ef6b91d64042bf9f5c39bd01320d9eaf4ef850a24c17d1d8

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_cs.dll

                                          Filesize

                                          28KB

                                          MD5

                                          a2c7099965d93899ff0373786c8aad20

                                          SHA1

                                          cfb9420e99cc61fb859ccb5d6da9c03332777591

                                          SHA256

                                          1343867f317fe3fc5a2328d427737d41964188aba50a9739fd0ec98319fec192

                                          SHA512

                                          d2d1cd41bc425a1aa4c491d65ba9c4ced9dcb600f1d60af76151216f8eda310049002e5ca360d1df8f59d6334ad87b950c67a20a6d1c7f8a2ea322c9980b6a8f

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_cy.dll

                                          Filesize

                                          28KB

                                          MD5

                                          8fc86afdc203086ba9be1286e597881c

                                          SHA1

                                          6515d925fbfb655465061d8ee9d8914cc4f50f63

                                          SHA256

                                          e8dfc22e5a028ad5d423634bf4ed96b90841fda6ff69c35469509f9a988a3269

                                          SHA512

                                          cbfcdea1b4cb5f404553ada87de1240a3746306563f5f200582a21be656b43c0a0e5dcf25cd5ac49bbbe72abcf8147e62aa8a5e0a810bd6fbc7a1eab3e6029eb

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_da.dll

                                          Filesize

                                          29KB

                                          MD5

                                          414adfaec51543500e86dec02ee0f88c

                                          SHA1

                                          0ad5efb3e8b6213a11e71187023193fafc4c3c26

                                          SHA256

                                          32684d2337a351ba37411962710983538341012e6526a9129161507aea0a72bd

                                          SHA512

                                          fddc2123237a9357667bbe6b91f93b5a9ba276533b9c16d98adfa01045fca375a7aef5cf83e175c55382a387a16062661a4797da81f39881ab379c7863e2b054

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_de.dll

                                          Filesize

                                          30KB

                                          MD5

                                          d263b293ee07e95487f63e7190fb6125

                                          SHA1

                                          48020bb9e9f49408c1ce280711aa8f7aaa600fe2

                                          SHA256

                                          c4a3198c15489ed873dde5f8a6df708cfc4a6d8722f3f1f63793863098509af3

                                          SHA512

                                          69a851e77124e55f3ee4e3fde169f647731a514dfd16a22013a0ea520b9d6eb9f2aacc9c48a2a812eb8285f46db1a27d196c409587f4549f4e122fdb59ffe1b6

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_el.dll

                                          Filesize

                                          31KB

                                          MD5

                                          8708b47ba556853c927de474534da5d4

                                          SHA1

                                          a60c932bef60bef01e7015d889e325524666aeff

                                          SHA256

                                          720074fb92fc405dc7a5305e802e2ecb7d948de58c814b0ebb2c02a0052a6894

                                          SHA512

                                          58d7f419b26a95c986009af9e235fbaca67bf6b1883d8c586c802262fd9fbeaff56b051bf8de8e26f2e4ddeb803bbd4f87c84b1e02f5a43b6614231c59ab258a

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_en-GB.dll

                                          Filesize

                                          27KB

                                          MD5

                                          511646c2809c41bcea4431e372bc91fb

                                          SHA1

                                          5b83f1c9de6bfa6f18ccfecf3190a80af310d681

                                          SHA256

                                          719a5c47d3452e3dfda300788aafeba963c588cfea31d1fb1021f846bd6742cc

                                          SHA512

                                          0b45cadd82dd534ba9d4556498817c712bd608b645faee74034c8c48cc39c13c0a8530826690a5c5ef42eb36e3f15f3b97e75625eea8902f12c21291df4cd211

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_en.dll

                                          Filesize

                                          27KB

                                          MD5

                                          ec991a4becce773db11c6f4e640abacc

                                          SHA1

                                          298b5289e2712ab77cecfb727c9c8d47740f6fd3

                                          SHA256

                                          800fc7987f7ac32267e84122eb94d8a21b83c481c2a34b03d832d57debc2b930

                                          SHA512

                                          3e6066cb89abafe963337bbdc371b941ac21b69ceaa19f394512c84c0c06ce9d03141a146144d24172ab6e94f5900071b5b3f38c49f3a079c03bec24bd0418ec

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_es-419.dll

                                          Filesize

                                          29KB

                                          MD5

                                          9309baaa10c227af2773000a793a3540

                                          SHA1

                                          55032c43f7a7eafb19bca097e3de430aad3913a4

                                          SHA256

                                          a35fa7145fd3bfbc0d71cfe1bdefcb506cd02f0939dbeca83644978af8f896ac

                                          SHA512

                                          21a05fe75d6115a7a49e779c9156ec25880393b30f69fdb80dc0dbe1c3bb401790c8e62525c0e6625b141cecb970b8d650527d73d2d86afa5056177957c44c24

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_es.dll

                                          Filesize

                                          29KB

                                          MD5

                                          1c48f6a58fabc2b115dab7dccfae763a

                                          SHA1

                                          c60db12b55074013293dd332d2736d251beaeb8e

                                          SHA256

                                          0f6775450c40baea4e72d1eb45cff7c1daf2ac1210006bf7afcc91975467c086

                                          SHA512

                                          a84a0ffba4f389698941a497ca6e63c6c632d2eeca788bcf970ea35f1083076950b59b9baeecab7ae17d06847f4675f748cc25b904b03f679801dfb3e2755c13

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_et.dll

                                          Filesize

                                          28KB

                                          MD5

                                          d591a3987492132f6ccd7968a8176290

                                          SHA1

                                          78a79e0e3935dee509938c9a3b095ef486283793

                                          SHA256

                                          02380099a6a942004b0b0042f071108f4896884d19ec7c4cc1264200a8e0aa6f

                                          SHA512

                                          7487a0e63a17cca85a127c8880e33c30fb192fb83bd05dad67cb4a3b9ad6ba84b594194f7126acbfb22ead2c00d3bb776557a0fa012ee1b7d43d88de2c7eabb1

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_eu.dll

                                          Filesize

                                          28KB

                                          MD5

                                          67624d2a8017a9c5fbaa22c02fb6d1b4

                                          SHA1

                                          b39c26cb632d6e9cbdbe6f0490e80c11a94782e4

                                          SHA256

                                          eb0033a91d64a80aaa66bd088692a8d089169524253b6286b5604ea1aaf0bc8f

                                          SHA512

                                          f2fb8edb244d781a77c67ab85c40f0521ee80f0349ce897860542b6f32e134043afdccd50cd17e86c234000493f5c3b1b75950d1eb12e4d088b9fc7e012f06d0

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_fa.dll

                                          Filesize

                                          27KB

                                          MD5

                                          0b3cbfb6bc674960c6da5c47689e45d0

                                          SHA1

                                          f91aa435a0bb4fefa3f7568d8f7b0e2022fc95f4

                                          SHA256

                                          eca2354e58a321a78bcb21c24beefa050758c08e86218c55c12434c8ce715942

                                          SHA512

                                          3a0e819ec96ec05bf0eb7119687be1a408330703a3c888e49a19fc0bb8ee62f45b1c9a9f24d7593e0355177445e566d6cba62d0b7d437b139eb08b274d3bf13e

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_fi.dll

                                          Filesize

                                          28KB

                                          MD5

                                          73650ec3b5bf0ac418d06ff2cad961c5

                                          SHA1

                                          5580915cc24402c72c49834cd9bfbd7c845de468

                                          SHA256

                                          6817e994def058448407b6320f325f75dea6e2e561ffc747d0486a716d08384d

                                          SHA512

                                          c08b069993790440f1baed5fbfc07368e9564d9bf0c16007968569b433b0b18ae6e8184f3073d522e92b6a7b4454ac21998b8f4fe80946273710097c659e2639

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_fil.dll

                                          Filesize

                                          29KB

                                          MD5

                                          6f2865bdc505a8216aadea20c0a0c6a6

                                          SHA1

                                          a93b8db9aa8f2b2887ad43fa050f98584e3db06b

                                          SHA256

                                          95b158fd84806d0dadb3d9a90f7b8a78040c1ecee5ff4dd266d407848c9f3a77

                                          SHA512

                                          fc9ccad02d6c04e6d2e76b06d5cd60c486b4a2ffcca1cdc638cbeceabfeaf258c8dbcd5ea7fd3f7e2d288577c90565de7005c88638531ff24bfbaf2fba704c69

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_fr-CA.dll

                                          Filesize

                                          30KB

                                          MD5

                                          93aa56aa0165d137e497c4b77965a6b5

                                          SHA1

                                          5e1396c24c76dcf8dad5d97e57cfed7372e7b8be

                                          SHA256

                                          aaeaff8fae26262cdb2ccf1faf84bd202ff2a90d9fc95575770bc53bccee2c54

                                          SHA512

                                          adb8e9aaf493a62a930398682522b8e9411a645d85493ba4e601d6f4eebd48fba982c6df8c5d01a78cc135d03bd3aa912fb71c3c8e26d1d99feb898e0a422a42

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_fr.dll

                                          Filesize

                                          30KB

                                          MD5

                                          a4aa60f4891441bd2522d577f14164f9

                                          SHA1

                                          19f8a517c449b65967a1ae8b1b6a7f492ad0199e

                                          SHA256

                                          7768c2b03810cdb491986f349992d32717c4c14df6266d5f70fa89aeb01c5a60

                                          SHA512

                                          0a26fc4bddbcb0078f9ad0c5c9417b74f7c30c6a20e1272edbc20a3b0db29ea17dbc3c9224d2f131570444ce4fbf6f20b0b96e720d2b53c882b8735f444091c5

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ga.dll

                                          Filesize

                                          29KB

                                          MD5

                                          302403f155be43251104dadaf07f1c1a

                                          SHA1

                                          2f4a21b1e7aed5792b269ebe7a81dd29c3a6182f

                                          SHA256

                                          3b6dd91cdb5cd4abedff8940c8a9e0f38cb3f8c49084ecbfcd59b788229f3230

                                          SHA512

                                          742c2bd0cd9bc7fb75ee1fea45e434fcb40aed839f2854e17267382278269dcca640b3599823b0e4d04350bef0a0450bfad627586ee49f031d1922d73bc74fd9

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_gd.dll

                                          Filesize

                                          30KB

                                          MD5

                                          47fcec572a8eea3510596c079c431412

                                          SHA1

                                          732395d8698191610bfb751e1466a868bca9b839

                                          SHA256

                                          4a8c39680f188b75691e80ab5938e34aff83639c06a9722e30555c1cb8a927c7

                                          SHA512

                                          1f18528128b6675f51a91c137e328ea06009636ef5c1970a8a4816437f445bdbf96428a3d310b04cfaf61d0a4adea7a4efd4f9bbd4dadb3f320366f39e40fc7e

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_gl.dll

                                          Filesize

                                          29KB

                                          MD5

                                          492d2c11ad558129c9c687641bfafb33

                                          SHA1

                                          c713926e13f062106937419975defd7e69228b35

                                          SHA256

                                          0879c36a3c750ac9bdc4d73ed0ffb23d9c67e6d486291d56d3c5bb60073677c4

                                          SHA512

                                          08d0e4664f07f05f3dea2dfa3d64815067b41cd63701b948b43016369a64151ae515f8c877460037b0f5306c8b080756321d2d6195fd392d86d0e9cc61bc1856

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_gu.dll

                                          Filesize

                                          28KB

                                          MD5

                                          fae86d2dc9b09f0d8c0192e2bb53d929

                                          SHA1

                                          e5d0dc95449d533785367d088ef5a357ebb7dc08

                                          SHA256

                                          5d0f9f75e78fa5c0b0bd2406d6c671675492d92d3dc2515314bc79ba3132e540

                                          SHA512

                                          01c7ae01172d98fc6cbc92510b2bafdc56f794f290139e3bf87952bc98b27b338e31899dafcd36f965e7240133183c5dfd6cf6085468fa779813121a27d7cbbe

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_hi.dll

                                          Filesize

                                          28KB

                                          MD5

                                          8d88faed698fbd4895ad6786acdea245

                                          SHA1

                                          88cea6fe82ac4970a2dafd971277d458b5aef61d

                                          SHA256

                                          c1b2203965c8fb10f6faf65d591400a2da7443d0cba36aa8bde147e1ff6aa0a1

                                          SHA512

                                          0a6eacb240a75135a7c651e524888462be350116ec19522c079fccca31a26904266e38add42eec5ef1036dcaa05ccdf9faf9d3b91923018d1aefbe8d63d1a27f

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_hr.dll

                                          Filesize

                                          29KB

                                          MD5

                                          d9f0084ca7d58e6cbc12b7111b9f4be1

                                          SHA1

                                          e96bd472daffd3569551f15eb602a7ce66da8935

                                          SHA256

                                          2d45ff287b4dfe4db12cf83a88ddca14b560d991ef28dc6f5078b44d2603fd90

                                          SHA512

                                          ba7e017b6cfb11a7e1f4a22c28ac8b4d4dc571a91c32ab6d63a87ef9dec334fee0062c5c764c662b6f8f89b80758a7dc1781858d0455ab3eba455c8d83134418

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_hu.dll

                                          Filesize

                                          29KB

                                          MD5

                                          aace1b6afd05113ffe736206e32e8544

                                          SHA1

                                          48fe1f61e565f99ecf6365ddc6c2c24b2f38db5d

                                          SHA256

                                          e395b29108a3a93fcf7411311d4f478f847f0d8337d4a2cefd64ae6bbfd21110

                                          SHA512

                                          be7ae77ce69e6ada5a6169a0efb858723428084f9b7818482f2eaf7d5243d24b9c8131ea01e3f94cc9766d7462e5dae0ce5437247907f764ecff011c866bfd81

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_id.dll

                                          Filesize

                                          28KB

                                          MD5

                                          469423bc5ecca0db996ad9fe789fd58e

                                          SHA1

                                          dc68d62d25ed917f836036911efd5067f9062c18

                                          SHA256

                                          a25d798ed22ad51682aa90f66e5cca638ae095f4141eba6ef7ca45eb1ef217f6

                                          SHA512

                                          360717c97b2f582843de19d819a5dda2cb2f8090c6542c0d87ae1a27cbf154cfd0b845d7f816ca236e65ce17013bb8ca640a5af2c9e5fe4fef05e94405491df7

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_is.dll

                                          Filesize

                                          28KB

                                          MD5

                                          5dbbd22cda9cd2e19aae769dc7b083b0

                                          SHA1

                                          53fd1812647e5e413531d8e67e7970d3e22dac03

                                          SHA256

                                          973c96fdecc4a157782414eebb1b17a94b146efe1a97b707043953d0ff1d03aa

                                          SHA512

                                          774a5873117c98096e8826f7b03a8ddfd2cd7a1f815ee855a591f86f68bfd6bdf537ed49c9d4094fe931aa592da3eeefe0ded3625a9b811aa2a55a129dd7d9ec

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_it.dll

                                          Filesize

                                          30KB

                                          MD5

                                          2f7b11cd7db9f173d040519ef0336ac3

                                          SHA1

                                          95e753d8bf61ef56dba6807bf730a42d390da401

                                          SHA256

                                          8f7b44e60f4450655d963cec393fff3fab4f283672a8dbc8109d1ad967671171

                                          SHA512

                                          ea60bff57fd53ab2cad475d753066d108c2108e41e7e4abb6b1bca153d04e07dfbba386ba73efe9b8a84032c9bb4b35b3c655280b43ee93637c5b388d1dd187f

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_iw.dll

                                          Filesize

                                          25KB

                                          MD5

                                          54519f24fcf06916c6386f642ebaf8a5

                                          SHA1

                                          2a33c7770c49bb3046a2a78a0457d6dcb3a23f02

                                          SHA256

                                          1b0adf22a09097ce9ac5d102e0f102e6d3f2238c21b6d38fbec3c269bbf87c44

                                          SHA512

                                          704684c706c9a40cdae8a68615a8a9782b29d177bb5c58e8c01e37c139296d6f1d48a446ec211d746aaf341b06a9148e246dd79b0a8a9098de0f66c68ae74eef

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ja.dll

                                          Filesize

                                          24KB

                                          MD5

                                          12de274382418dd99d1125101d1d63b6

                                          SHA1

                                          4a9b0be76a7136f3b64c7bc53724dc2acc798c23

                                          SHA256

                                          7e4f333b20f272bd86182fb3fa191e8ac6bc84c301e28886edbcb92e6e5e1eb2

                                          SHA512

                                          9b05f97ca079d30560b09ca22efdb314dc7e36cf601d672a260f4c064d7841776891374a18d8ba1fcb4238fb854187b95c2d5643f428277e076b734ff477267c

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_ka.dll

                                          Filesize

                                          29KB

                                          MD5

                                          e0eacb57da5404523e0351b0cc24c648

                                          SHA1

                                          49ce11a94c2751b7c44914ceda1627fb63651199

                                          SHA256

                                          1a269d41990cc81b01b77f0981ff4e9ee31fab50cbe9f0ef437044b40ff72c79

                                          SHA512

                                          735c37d267091491f55d80837bc4879a7a2d6dfaec6c3d2873770cd7706a39f29672eefa2f8a27c6038f84069517a8172cf929f48e637a9c65803e5f49525d54

                                        • C:\Program Files (x86)\Microsoft\Temp\EU5A7F.tmp\msedgeupdateres_kk.dll

                                          Filesize

                                          28KB

                                          MD5

                                          f1c5f5604f5c2c0cfdc696866f60c6c3

                                          SHA1

                                          25643fc3eef898f4288205c711b693daaf8e78ee

                                          SHA256

                                          e46eb23160f9e87a0d5aab8fee0e1d1aafe7299964864a2c59e9b9f718105406

                                          SHA512

                                          0b562af8b178af10af225649e6c043bb848cfff81a5fa19cac9614eb8f793a97de25aab302bba69c7c35353dfd62baa0cadcc3635c773be1fc10d180241dab44

                                        • C:\Program Files\MsEdgeCrashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          2eefd605823d93aa74da4395e905e18b

                                          SHA1

                                          e7ce6955c2c889c24bb266f27d92b9413bfc7378

                                          SHA256

                                          1694ac6f574ff440e7e89b21de56548a2d0994bf2203d2deaeba254ebbd21107

                                          SHA512

                                          398b679640b720dd7de0ef023b463fe4a3f4798fc28fd28bf9c61af72df4271877792f992827c26be5c432674d9a45998e1a637befccd1590100b4748b8c82c1

                                        • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                          Filesize

                                          209KB

                                          MD5

                                          2bd514eec57426296cdbc77bb43c8315

                                          SHA1

                                          bb044444c8fea7df0d9f80a5034fd42b7034ed48

                                          SHA256

                                          7d18f81424dc41ceab5ce73eaac1a9c87cc7cb36542fd909892c55651cc6e088

                                          SHA512

                                          e64373017dbd75609b6361c98e6d450235ddd402a4de4e6bc232932f85eb9df54640c3bd8a3cead038637f89a5d887e58286f73b63284bc3f15658b439f13643

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          75c9f57baeefeecd6c184627de951c1e

                                          SHA1

                                          52e0468e13cbfc9f15fc62cc27ce14367a996cff

                                          SHA256

                                          648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f

                                          SHA512

                                          c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          10fa19df148444a77ceec60cabd2ce21

                                          SHA1

                                          685b599c497668166ede4945d8885d204fd8d70f

                                          SHA256

                                          c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b

                                          SHA512

                                          3518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          186B

                                          MD5

                                          094ab275342c45551894b7940ae9ad0d

                                          SHA1

                                          2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                          SHA256

                                          ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                          SHA512

                                          19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          dd9580d5badd23ac950fd86c60adb909

                                          SHA1

                                          e1e16b514346c2c3cf6330f1529d1bd72dae6850

                                          SHA256

                                          3c6717b1e6192ba1deccb8c3962aa5c3ef3fec44773b2ad1cfb785b34e43848f

                                          SHA512

                                          cc52de2c24468942db95892358077863759dbd35b0963f08252a1cf6e708b8fdd1fa2331a9b9dab63f76e2b65dc23909ef2fb198f08f4a3e4e7e6a5b44936ee0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a490d9923723a996a0564f1d16c42ac5

                                          SHA1

                                          c5734555f65c25c2f68d56b2d0aa2bfb11463056

                                          SHA256

                                          1a89cbc1cd1b1937b6475667f45ab26f071cdd146e92914619fc1022c3c6bdc6

                                          SHA512

                                          edb83e0cb6d19fac27c623ccdd05d6dd6077ef95a1141970507df264a8a615fab8e9d3885e2529117bd1bdd0e1b07f5f27590d41a833737bc9545d47200821c7

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          41a06f3f61ed086623c44be096502202

                                          SHA1

                                          6ef156b4d971d44b29a586dca7e9ea1783e1b5d1

                                          SHA256

                                          27c07fd22c13c00fce0378f42a9f4f73cdd499a160dc1516e5dcf072f63ae3fa

                                          SHA512

                                          7e11250de7b17d3f72f4237af7622a7f82b0f892d355a853f1c6f6eefc5abd4778d646997edcad28f3101f43d31c8b92b00da2965c29d670699302f60fdc59ff

                                        • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

                                          Filesize

                                          1.6MB

                                          MD5

                                          2aeb55b75f68b4ea3f949cae0ceba066

                                          SHA1

                                          daf6fe3b0cb87b4e0ad28d650fc9a190ad192b1c

                                          SHA256

                                          22484fdf3008a593e7ca188863d423b8b2a345391120ed296ce8b156cfa983ab

                                          SHA512

                                          3b6a6d6c87b8d9ab06fac72fa38067df4c7d4385d37d391d7ad58a623215681fc0366621ce3ce5c08af25e11cc468b18844ea5f7c8ccb71473c956c29d20188c

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_otuq2krq.0wf.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\9d103501-252c-408a-8ca5-4985e3aa503d.tmp

                                          Filesize

                                          16KB

                                          MD5

                                          08d954bd8a22ab05de79c9faeea6ee8b

                                          SHA1

                                          e62092bab94520a76388a6160aed1d9edd500fd8

                                          SHA256

                                          134699548fb0e2d87dd37f1b0e3767ff48125ebb39732639fad27dee562916cb

                                          SHA512

                                          00ffea0a02faa61b24222d847d87108f559e1dfad2a51502959ee08bbc1b28723d02dc9c0d8952e28c29d7163ba6352059a12ff16695a854421516c8ab26eca5

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          7eddcefc30ff7d79bb58b0d113225df1

                                          SHA1

                                          36c2a21bd60d9d67f0edaebbae92472e9a23ed43

                                          SHA256

                                          bbe5f92c5a12e770992138150d285a148e4eff572f9f8cc69c0e625db805814d

                                          SHA512

                                          970d87a077ee607c7618f546c951d69327ca991a66309c9ef3431e86565e1548b11571f66d299fc5988d0af1600a71edddf64928d2730e2a6460bf96c4d5c864

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          cd896df1aa683b2f4ed746eb4a18409b

                                          SHA1

                                          c7620debb83ed66222c71f535b0a4e767b3490ec

                                          SHA256

                                          463ea4d4aa0d5c5b3e61cf08ffe5424563ac2ad55b28d38ea258e8569e6800fb

                                          SHA512

                                          6107ec39851f3b668ec9973fb13466cca243f400d0d39d9e758d1bcab73ebb0d6713657d787a887e537a82e560833ee57b12425c55ce54182c04fb9269f9a719

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          21541e9b2cc7e852ff540a6332c6d36f

                                          SHA1

                                          6fb8b289ec85225959226d2dc0a48d1947efe1ba

                                          SHA256

                                          4547a65450cccade7981c9a4f9c3d0a550f3ba61dca4770f093c533dd514410e

                                          SHA512

                                          23a336ff837420a7f78c0b48e11d149dd594d2cbee3dc6ace3dbd3f0486c913c440ad5ce96c600b7dec1b502a3bb3d63ee44f8e43c4d39db3a0f47ab8d481379

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          48B

                                          MD5

                                          e24bbb8fbd8daaef9688a3bff789cd76

                                          SHA1

                                          edc253bc18bb3fe42500ef83ef443ed5e0371f9f

                                          SHA256

                                          00018a4dddeb37994e64c6e8fd23e3d898c178edfb3536c07f42ff9c11916149

                                          SHA512

                                          25d2e39598a34fbeb7c8b835b412e1bff119e7cb91fc0aad29b1336d0d866c4fe45765c6070a55cbf8c78d4d1362bd85d4cdafdcd4ac6bb15329fab35a812d87

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          96B

                                          MD5

                                          3451e3d32c658f976197f41b3f5b79b1

                                          SHA1

                                          52a55958705637df7a7bc633b304cfe4754ddc7e

                                          SHA256

                                          3e471f6e0440ef164fbce6c44a4fa5fd0def48ff3af46b67306a8bafa7883d56

                                          SHA512

                                          e54a3cdb0480898cc8c5e3eadb093f6e998f1ec21786788a0ba0e64af3cd37a789e7e0b6994ca6fad6d9ef7b743c0327692ada13da3f4cb165b16489093a1eb9

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\Network Persistent State

                                          Filesize

                                          111B

                                          MD5

                                          285252a2f6327d41eab203dc2f402c67

                                          SHA1

                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                          SHA256

                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                          SHA512

                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\Network Persistent State~RFe59a908.TMP

                                          Filesize

                                          59B

                                          MD5

                                          2800881c775077e1c4b6e06bf4676de4

                                          SHA1

                                          2873631068c8b3b9495638c865915be822442c8b

                                          SHA256

                                          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                          SHA512

                                          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\TransportSecurity

                                          Filesize

                                          188B

                                          MD5

                                          f3d76a6ecc2c2c6f65c654327cda0e2f

                                          SHA1

                                          8614a47f9bca22f19ba13f4ddce41bc391590081

                                          SHA256

                                          6a92086b7e48ab7e21bc7d3ff431fc0f3fca76dd9e5e08d0e0036a096a6416a7

                                          SHA512

                                          0af489402b4cd68c6eb9ecf2941b616f82f76c05e3f1ee0ae31df337a507fe91018c051b2be70af6eb9cbf2831ff12563aa6da6e2e23d6331d0f3bed5194354d

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Network\fa6e11b3-9c38-4e9f-8a48-c5b22fe58688.tmp

                                          Filesize

                                          40B

                                          MD5

                                          20d4b8fa017a12a108c87f540836e250

                                          SHA1

                                          1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                          SHA256

                                          6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                          SHA512

                                          507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a1e569aee0285c4b5bcf00b6f2535c62

                                          SHA1

                                          802ee904040855ac1200c93becbd3b94eb159423

                                          SHA256

                                          61b07190d54f8daf7951048adfeb2b4175c12243c531f5b907e65bbf61574766

                                          SHA512

                                          4629feb56e7e50b770eb5e1fdd87f542c7b19b2aa90404e87d2a5069d653f58ee02549444c8d9dfe7a9405a88a778fd65e8cd368a95c50d0c02386b9a618661b

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          ea53f21dfbde7f425c24b7b5f811cf6d

                                          SHA1

                                          93849e6674d6e703405551f59aa8534807258dad

                                          SHA256

                                          441d6011e0ce49502d9b8fad8c04c0e9cf71878592082e908cb472f2a8a77815

                                          SHA512

                                          52e624c0cb108fb581a3996d161642d5d947d4633d5a47fdf6fc786836f30b8399cf2dae9c36f9f9ac9f06c304ea1c213303cb3a9e28a0b7e89f161956ab753d

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Preferences~RFe59a8f8.TMP

                                          Filesize

                                          6KB

                                          MD5

                                          5ee998e40c91daacab3b51d022b39c9b

                                          SHA1

                                          4b4a0a25c2ccc6466e91999adb6ae6e2c7901574

                                          SHA256

                                          00d552064287044d46d6144e72af18417c9a7c686175649e862a041d9b32ea4d

                                          SHA512

                                          c80cfcf33887aa727248270a15517c480780b1aeed5ece8f1e55c7429120a8f09bae3e707595b02b3e126155e25f954890dc57f437982b438644c5f1da47657d

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001

                                          Filesize

                                          41B

                                          MD5

                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                          SHA1

                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                          SHA256

                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                          SHA512

                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\GrShaderCache\data_0

                                          Filesize

                                          8KB

                                          MD5

                                          cf89d16bb9107c631daabf0c0ee58efb

                                          SHA1

                                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                          SHA256

                                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                          SHA512

                                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\GrShaderCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          d0d388f3865d0523e451d6ba0be34cc4

                                          SHA1

                                          8571c6a52aacc2747c048e3419e5657b74612995

                                          SHA256

                                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                          SHA512

                                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\GrShaderCache\data_2

                                          Filesize

                                          8KB

                                          MD5

                                          0962291d6d367570bee5454721c17e11

                                          SHA1

                                          59d10a893ef321a706a9255176761366115bedcb

                                          SHA256

                                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                          SHA512

                                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\GrShaderCache\data_3

                                          Filesize

                                          8KB

                                          MD5

                                          41876349cb12d6db992f1309f22df3f0

                                          SHA1

                                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                                          SHA256

                                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                          SHA512

                                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State

                                          Filesize

                                          2KB

                                          MD5

                                          a2c11142e417cca536f9110beb403766

                                          SHA1

                                          5df98162e3eba9cb4a771354b8621d0f0ec655f3

                                          SHA256

                                          1cd477cafb779e8e4515999a4c22aa09fd9144da534f559b133fc9f600a22406

                                          SHA512

                                          509e60e1ffdfae8a38aa7e3f1d8f049583757c980a77bb796af6a26de542352cf4b1bd864dab967e786ddc52dcb4d7a8962ee580b6105ca0b76a71d4e272bcba

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State

                                          Filesize

                                          3KB

                                          MD5

                                          ac91f39ab2d9d1f86b7085e3270439e9

                                          SHA1

                                          7a2efd2b3d962b0fcc5ab6fdd678f46a8098e293

                                          SHA256

                                          c1ef241f9a4d9ae49defd1998b4645c6cbb351a40185bec60cb6e238bd4eafe1

                                          SHA512

                                          3e7973969caeed69f69095ab1d0c4f26e2d4912b889f3ed26c08bc5af41de423fbc56d2e029789137a94822d55957eae1d3f9eb76b0567633253531ea7cca33d

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State

                                          Filesize

                                          4KB

                                          MD5

                                          fd36f5794492eada2341bc98b36a9619

                                          SHA1

                                          ef869e729f69fe4989a0764e448a9db47496729e

                                          SHA256

                                          199853d2cbbfd6aceee7950b66c3447b2860def729f0f74cd102c9307e688399

                                          SHA512

                                          67606a13d1b684d6b881b849c8ea83ddafd7a9d786be5dafba78b6b424d17dc98666465b8731b9deb82ee0dd5029c51f4366b58054f08d7c909025046eb26bdc

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State

                                          Filesize

                                          17KB

                                          MD5

                                          02b1757aee211c6b8d56903746f4bd7f

                                          SHA1

                                          19892358329b71e2295abcb88fa5f7c5db55e28a

                                          SHA256

                                          528309c95b091c63561fb9dfad9e1bd8016293a6a141273c0fa8136470474c08

                                          SHA512

                                          0f68d23c90f09e91c119707cac8dfeadc5a07dcc2c895d202b92a70243588843452c2e3ca001d4dc3ba8cd3ceb17180ff2766a6350db6f487a386f0549a81b08

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State

                                          Filesize

                                          1KB

                                          MD5

                                          d7a469aae4b585986dfd366b7cb1fc1d

                                          SHA1

                                          6e1c2583fdbe14a4873fdea112db27efc9ed9317

                                          SHA256

                                          d26200a339636c51dba21ecee2c8f149484ff57aafd11a28e20c25ededb3e7fa

                                          SHA512

                                          0b3fd3d8173790eb433e34c3f6544682c69cd15be2599a1683b46cb9474c44534381d4d17804704b459bae3720b7e335515c6e44ecbc5bdfaee8626cef8efc83

                                        • C:\Users\Admin\AppData\Roaming\setup.exe\EBWebView\Local State~RFe5969fb.TMP

                                          Filesize

                                          1KB

                                          MD5

                                          57010676448a115fad5e00b13b2f85ef

                                          SHA1

                                          d4cb6e1fd0220e20fea7e1c05e3df92c787a54b7

                                          SHA256

                                          d5b346143c7fbde94aea2215780dd12852225c2866af83321cb307ec3148272b

                                          SHA512

                                          d48e8db10a3bbe0a27716972f9bdaa44619d488b52fc27bc8316e846cb0c8ecd17227ffe864752e95dae18a4f39a14cf72905125ce36503736380be93cd36284

                                        • C:\Users\Admin\Downloads\Solara_roblox.zip

                                          Filesize

                                          15.2MB

                                          MD5

                                          325eaa719d119aa8a559410b7af339fd

                                          SHA1

                                          3fcad09ac80ab0e9c056eab70b55887ea4245df3

                                          SHA256

                                          3f767ffe96383bc3850ccecde867a3d4395b647947c9a3f004fbbc4894302136

                                          SHA512

                                          d76e0fd995621f9267aa5dd25e23bdcd2247fd3732f268f8afc2e382f703e009e97fbfa1022f3d69aa851a1e261267614d923ae2a311fe1177ea3b4036f77e35

                                        • memory/1076-376-0x00007FFDD8260000-0x00007FFDD8261000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1420-453-0x00007FFDD8260000-0x00007FFDD8261000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2328-596-0x00007FF7E3770000-0x00007FF7E42CD000-memory.dmp

                                          Filesize

                                          11.4MB

                                        • memory/2528-417-0x00007FFDD9950000-0x00007FFDD9951000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2528-418-0x00007FFDD82A0000-0x00007FFDD82A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2572-597-0x0000000000F20000-0x0000000000F9E000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/2572-595-0x0000000000F20000-0x0000000000F9E000-memory.dmp

                                          Filesize

                                          504KB

                                        • memory/2572-776-0x0000000003DD0000-0x00000000041D0000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/2572-777-0x0000000003DD0000-0x00000000041D0000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/2572-778-0x00007FFDD9B30000-0x00007FFDD9D25000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/2572-780-0x0000000075640000-0x0000000075855000-memory.dmp

                                          Filesize

                                          2.1MB

                                        • memory/4300-534-0x000001C3E9020000-0x000001C3E9042000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4524-783-0x0000000002840000-0x0000000002C40000-memory.dmp

                                          Filesize

                                          4.0MB

                                        • memory/4524-784-0x00007FFDD9B30000-0x00007FFDD9D25000-memory.dmp

                                          Filesize

                                          2.0MB

                                        • memory/4524-786-0x0000000075640000-0x0000000075855000-memory.dmp

                                          Filesize

                                          2.1MB

                                        • memory/4524-781-0x0000000000AB0000-0x0000000000AB9000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/5440-263-0x0000000000C30000-0x0000000000C64000-memory.dmp

                                          Filesize

                                          208KB

                                        • memory/5440-300-0x0000000074520000-0x0000000074745000-memory.dmp

                                          Filesize

                                          2.1MB

                                        • memory/5440-348-0x0000000000C30000-0x0000000000C64000-memory.dmp

                                          Filesize

                                          208KB

                                        • memory/5440-264-0x0000000074520000-0x0000000074745000-memory.dmp

                                          Filesize

                                          2.1MB