Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
SolaraBootstrapper.exe
-
Size
797KB
-
MD5
36b62ba7d1b5e149a2c297f11e0417ee
-
SHA1
ce1b828476274375e632542c4842a6b002955603
-
SHA256
8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c
-
SHA512
fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94
-
SSDEEP
12288:n1mzgHpbzEu8AgpQojA1j855xU9pHIRxSNN:1mzgH385QojA1j855xSHI
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 1720 MsiExec.exe 1720 MsiExec.exe 4076 MsiExec.exe 4076 MsiExec.exe 4076 MsiExec.exe 4076 MsiExec.exe 4076 MsiExec.exe 2868 MsiExec.exe 2868 MsiExec.exe 2868 MsiExec.exe 1720 MsiExec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 29 2172 msiexec.exe 31 2172 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\nodejs\node_modules\npm\node_modules\socks\build\common\util.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\delegates\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\generator\msvs_test.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-pack.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-json-stream\node_modules\minipass\index.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmexec\lib\is-windows.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\lib\put.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\base64-js\index.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-whoami.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\run-script\lib\node-gyp-bin\node-gyp msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\bin\node-gyp-bin\node-gyp msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\git\lib\revs.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\ca\verify\chain.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\get-workspace-nodes.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-fetch\lib\abort-error.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\verify.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\qrcode-terminal\vendor\QRCode\QRUtil.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\error.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-stars.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\models\root.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\edit.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\README.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-package-arg\lib\npa.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\retry\example\dns.js msiexec.exe File created C:\Program Files\nodejs\npm.cmd msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\buffer\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\lib\set-immediate.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-profile.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmversion\lib\version.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\fs\lib\cp\errors.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmaccess\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\yarn msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\installed-package-contents\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\readable-stream\lib\_stream_duplex.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\humanize-ms\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\docs.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cli-columns\color.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\concat-map\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-start.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-query.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\ssri\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\fs-minipass\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\sort.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-profile.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-ci.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\chownr\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\sortAscending.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\readable-stream\lib\internal\streams\lazy_transform.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\minimatch\minimatch.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-install-test.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-sized\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmversion\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\spdx-exceptions\index.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\lib\_stream_transform.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\text-table\example\doubledot.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\cacache\node_modules\brace-expansion\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\addon.gypi msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\safer-buffer\tests.js msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\corepack msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\normalize-package-data\lib\safe_format.js msiexec.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIEC8C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBB03.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSIF1AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57b536.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBB63.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC} msiexec.exe File opened for modification C:\Windows\Installer\MSIBF4C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC942.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEDC5.tmp msiexec.exe File created C:\Windows\Installer\e57b53a.msi msiexec.exe File created C:\Windows\Installer\e57b536.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIBB52.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC160.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC190.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC913.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEC0E.tmp msiexec.exe File created C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133693402184069596" chrome.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeEtwSupport = "NodeRuntime" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeRuntime msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\PackageCode = "347C7A52EDBDC9A498427C0BC7ABB536" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\DocumentationShortcuts msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\corepack msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\DeploymentFlags = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\PackageName = "node-v18.16.0-x64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\npm msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Version = "303038464" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductIcon = "C:\\Windows\\Installer\\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPath msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductName = "Node.js" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4264 SolaraBootstrapper.exe 4264 SolaraBootstrapper.exe 2172 msiexec.exe 2172 msiexec.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4264 SolaraBootstrapper.exe Token: SeShutdownPrivilege 4000 msiexec.exe Token: SeIncreaseQuotaPrivilege 4000 msiexec.exe Token: SeSecurityPrivilege 2172 msiexec.exe Token: SeCreateTokenPrivilege 4000 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4000 msiexec.exe Token: SeLockMemoryPrivilege 4000 msiexec.exe Token: SeIncreaseQuotaPrivilege 4000 msiexec.exe Token: SeMachineAccountPrivilege 4000 msiexec.exe Token: SeTcbPrivilege 4000 msiexec.exe Token: SeSecurityPrivilege 4000 msiexec.exe Token: SeTakeOwnershipPrivilege 4000 msiexec.exe Token: SeLoadDriverPrivilege 4000 msiexec.exe Token: SeSystemProfilePrivilege 4000 msiexec.exe Token: SeSystemtimePrivilege 4000 msiexec.exe Token: SeProfSingleProcessPrivilege 4000 msiexec.exe Token: SeIncBasePriorityPrivilege 4000 msiexec.exe Token: SeCreatePagefilePrivilege 4000 msiexec.exe Token: SeCreatePermanentPrivilege 4000 msiexec.exe Token: SeBackupPrivilege 4000 msiexec.exe Token: SeRestorePrivilege 4000 msiexec.exe Token: SeShutdownPrivilege 4000 msiexec.exe Token: SeDebugPrivilege 4000 msiexec.exe Token: SeAuditPrivilege 4000 msiexec.exe Token: SeSystemEnvironmentPrivilege 4000 msiexec.exe Token: SeChangeNotifyPrivilege 4000 msiexec.exe Token: SeRemoteShutdownPrivilege 4000 msiexec.exe Token: SeUndockPrivilege 4000 msiexec.exe Token: SeSyncAgentPrivilege 4000 msiexec.exe Token: SeEnableDelegationPrivilege 4000 msiexec.exe Token: SeManageVolumePrivilege 4000 msiexec.exe Token: SeImpersonatePrivilege 4000 msiexec.exe Token: SeCreateGlobalPrivilege 4000 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeSecurityPrivilege 64 wevtutil.exe Token: SeBackupPrivilege 64 wevtutil.exe Token: SeSecurityPrivilege 3504 wevtutil.exe Token: SeBackupPrivilege 3504 wevtutil.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe Token: SeTakeOwnershipPrivilege 2172 msiexec.exe Token: SeRestorePrivilege 2172 msiexec.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe 3972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4000 4264 SolaraBootstrapper.exe 93 PID 4264 wrote to memory of 4000 4264 SolaraBootstrapper.exe 93 PID 4264 wrote to memory of 4000 4264 SolaraBootstrapper.exe 93 PID 2172 wrote to memory of 1720 2172 msiexec.exe 96 PID 2172 wrote to memory of 1720 2172 msiexec.exe 96 PID 2172 wrote to memory of 4076 2172 msiexec.exe 98 PID 2172 wrote to memory of 4076 2172 msiexec.exe 98 PID 2172 wrote to memory of 4076 2172 msiexec.exe 98 PID 2172 wrote to memory of 2868 2172 msiexec.exe 102 PID 2172 wrote to memory of 2868 2172 msiexec.exe 102 PID 2172 wrote to memory of 2868 2172 msiexec.exe 102 PID 2868 wrote to memory of 64 2868 MsiExec.exe 103 PID 2868 wrote to memory of 64 2868 MsiExec.exe 103 PID 2868 wrote to memory of 64 2868 MsiExec.exe 103 PID 64 wrote to memory of 3504 64 wevtutil.exe 105 PID 64 wrote to memory of 3504 64 wevtutil.exe 105 PID 3972 wrote to memory of 4008 3972 chrome.exe 109 PID 3972 wrote to memory of 4008 3972 chrome.exe 109 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 2564 3972 chrome.exe 111 PID 3972 wrote to memory of 4496 3972 chrome.exe 112 PID 3972 wrote to memory of 4496 3972 chrome.exe 112 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113 PID 3972 wrote to memory of 432 3972 chrome.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\msiexec.exe"msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 2BE2A84269EB08819C4485E312D3D7542⤵
- Loads dropped DLL
PID:1720
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AC28D638E2E9089FA2030B09DA9D2E022⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7A1781B30C90CFD766623AC599C30953 E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow644⤵
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff10b3cc40,0x7fff10b3cc4c,0x7fff10b3cc582⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1860 /prefetch:22⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1936,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2020 /prefetch:32⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4912,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5064,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4908,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5144,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5460,i,15526575551677898899,12130502425360625299,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Modifies registry class
PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:4748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff10b3cc40,0x7fff10b3cc4c,0x7fff10b3cc582⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5eb9397dc1b98109a09d04e2d7761a3d4
SHA1642b52e1259f0c52e6f041352d1688ce29f6c2cd
SHA256414d82a350aa66beedbf6fa68e0deebe0a42a961441802a9909103dcf3d8915c
SHA51209383f6b48342564660cfb1b5275f8404151a3105bc6f2e4f974e7de68e8cca8767d499fe641f1b5a4268a34df13cbaa3c2a911d40d2041af762d437ec043bec
-
Filesize
10KB
MD51d51e18a7247f47245b0751f16119498
SHA178f5d95dd07c0fcee43c6d4feab12d802d194d95
SHA2561975aa34c1050b8364491394cebf6e668e2337c3107712e3eeca311262c7c46f
SHA5121eccbe4ddae3d941b36616a202e5bd1b21d8e181810430a1c390513060ae9e3f12cd23f5b66ae0630fd6496b3139e2cc313381b5506465040e5a7a3543444e76
-
Filesize
8KB
MD5d3bc164e23e694c644e0b1ce3e3f9910
SHA11849f8b1326111b5d4d93febc2bafb3856e601bb
SHA2561185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4
SHA51291ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854
-
Filesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
Filesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
Filesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
Filesize
771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
Filesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json
Filesize1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
Filesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
Filesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
Filesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
Filesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts
Filesize4KB
MD5f0bd53316e08991d94586331f9c11d97
SHA1f5a7a6dc0da46c3e077764cfb3e928c4a75d383e
SHA256dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef
SHA512fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839
-
Filesize
771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
Filesize
168B
MD5db7dbbc86e432573e54dedbcc02cb4a1
SHA1cff9cfb98cff2d86b35dc680b405e8036bbbda47
SHA2567cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9
SHA5128f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec
-
Filesize
40B
MD5efc82f8314de2fb0909127cebb38a019
SHA1ffeb52cdf0bffa888270847d4981cc96ba448c14
SHA2569836d53d4914279fb42e48acea940dc78d94b2ba4866e0731a528c65ff131d2a
SHA51289d234d0dbecccda14e5fadb343a7b80a4ce464e270d1e17488b66bf707da13c0f0de30ce9f4a20746c5951c31fe776e9d618712fa6a842749555dd1cc2b0866
-
Filesize
649B
MD559014143c2915c62ce74043901213d66
SHA183e44e4f019e1c5f9e4c6fc3fe4d9c75cca1a901
SHA2569ad91ed68c8bf1fc2ffc6a0cc3845ba9f104dbd34ba9b967d59c3c0fe72c5b01
SHA5126f417112df4d02c9e1685bb94916f4fbd39399c4be3f499e66a0c8b02ca1cdf5c511babfc7b4a4267f6e5947266f50d9632c6a8e24c8746b50b74dac0f6b80e6
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
216B
MD5cf32577348cc61ef58d0e06681b39e02
SHA1dcb7f4d656ec65b04d3c2fd37d6d40070591ae92
SHA256051a383fd1bbb68e0b5e5d7b622e3e9b73aa48d603d6e345a086751282a7f2af
SHA512d256b6f1ccf384d2422377bad793d1130d76fb4f321ff1f6492a334ea4a62a26bc81cedeeb06df214d3e1a824f96482564a2842d8f85adec717ca0fe6745c80a
-
Filesize
2KB
MD5c6acb5d735d02b1f413a724d1e054db9
SHA1f8b1cee8fecad434776b586af000a739fb1e1ab2
SHA25624902622798aa347f341f2c5862857a9923171b1c02b58fa65464696258b967c
SHA512b05bb9c4b8699a7e3195c7bfd61f0b1a9cb830ab4342e0c35d271920adac74e0fbf492e7839cbc730a1bd6757d4a0e9ce182542c6d06858d777b78bafc0149e6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5209c42f25d990d7552e6dfcbc9e94e6f
SHA11d35e969b62821f4d8cea1a7719bfa63e6d862e9
SHA256271801919a68c576c5e0904301d84e27c33bb5e7bd90099764430d09ff038032
SHA5126dffebe315a5f3c207f77131dbe83418a1529b04d81f5256666384703cae7f32f2fa410d8f0c6a9006e6ae8dff36bcaf2db6178c3350bd871dffdf15d0ab4394
-
Filesize
356B
MD598350e9543941a774d84868e26dae9a6
SHA1ff72e987802ab722ab719cd18fcfd1fc4f2c46f1
SHA256e93164f7fb60a4abd7c08078170351e3fc81ca0543782a16205c43cb8f853ecf
SHA5128b54c761cab56c089ff479c3a80b332a847df1c30997ca5e66c3e8b51b16b24125491f45112fe90be6f7d9508df49c913184e11c45f38474222e3c67df90d4cb
-
Filesize
9KB
MD5230348af390131855c9d5b856e9ae5af
SHA12a2128366bc2a199e457798c5c3daa9d584862cb
SHA25644ed628d4b2d3fd00f63293a4fde7bae6afa7280a6e2f69573251ce0ecce8ebd
SHA512df1088cbb1f89dec868cb1d1634c4ce470c945f4a1a24b21fbc51c21eb7ca86aadb0f06974db448132e932377f4f0014c397fc17593f282aae2e302b66680a04
-
Filesize
9KB
MD5ce393662bd301836ea3ec93581901a24
SHA1741db932e24c6effa8d138171bc28f55a70433ab
SHA256781b930925d8fa669bb9632ea83151d1480584e128d10aeafeae1e87794fb970
SHA5123342f5bbf99a2d2ca66a45009c0ed5b9756cd1d3f919be58f08e52e35c12b43ba6b313853b31b034eaf0b0a129af40a56ef5bcaf175bb8ff60f5fadb37d4c75f
-
Filesize
9KB
MD5be85f8cd4194c13ec09d31c01abd30ac
SHA1a0fccbb8dfd42afb18f72d14d7eb975539d6597b
SHA2568c72aacd44e896d5aa34fb4973a9832485d2e50ec82d11418a30434af6f89cd6
SHA51278c27f3eb560498024adac03f505858f10c6085ab0f240f7da3f41ca62ff61f3a2746a358711ea23b289d96b17c5a8c605f540adde4bf0b31f967b27cc044658
-
Filesize
9KB
MD5a1f7d8cae038785d24f199b14a6045e0
SHA1c550740463a55687a3591c0f739e024e6b9f7b26
SHA25610a7e002935484b3a644b05fafdb47d7d6347a5995e668ac39d7b0d6a7bd7b0b
SHA5126d9b2c7f20c2a26dd5d569f9a6824da710f50ede03450a790a00a9fc6fe9e18bb0a879316570312dbbe892af9fe469c865e8ddff1eadcecc70c88e794e0db724
-
Filesize
15KB
MD5d326d9e651924fed696f89faa1abe4fa
SHA1056b2697eaac3967dab689b275be99704f45f943
SHA256b34da72d6b2e69b4f914cb0d05bca177acf1daacdf78285f221a19f61f2f1418
SHA5121393512091d5d044303da6d5f281e2717cb0a434a8e56912e777fa65986685cfe00fa926ede365ab8c802eae7c07edbd723874a4c6ce0926349f2d39b2733a4f
-
Filesize
199KB
MD5748774e1b4a54085d4e56140c63c08e2
SHA1cf00e349a78d020017a76c32c7363c7b25387142
SHA2562a296492c624dc3bf6be407a6076f02bfefea3e928185d0b041509344e008536
SHA512a25e025599e22ff1b0e20db75e035f70545816a5d1d11b39e641a08ca09361dd042e5e14f4ceed8a12c706175b697290aa00c1b11a7762a42b96abb2b9af2074
-
Filesize
199KB
MD5d19943de8394af4c74a524c835edc98c
SHA116f1ee40bd2d6133143de321186f39510f63a18a
SHA256651376eb0dd4b55a70d74794bd004759d746ba20b17fdc2b904106aa12b21648
SHA5128f9db0647fc2726df66c78cd56cda24a2cbaba9fc2198ab9891d0b46cfede887188000615cb684d02d2270bcecf98bbc9df5e0f5fb7398d43f8fff300080334d
-
Filesize
199KB
MD5a9bd25ff0a41193c8e45da882cbd33d9
SHA1aa39d6488fdf0ae7f95c6d67fc906b49b32d6368
SHA25623f13d0f00f81a329599b95e7b5839d58163a08b7baad9651b81bee8a2fe0bd7
SHA512681e1e253491ef3fc80010f13ea04098873b7d991c7650f9c2764ff24b5425b2d35e9d5b1d9e23161cd7002f1501c76a5fb325046641b8dc53eea4a2d2424d73
-
Filesize
199KB
MD5fe5fc7675144d7ec7e8ddd41990bc3bd
SHA15ada431c495818f96cfbbc2417aabd87250c8eaf
SHA256ccc6a57a6472f18006b5824a2d5e9135c03bb7bd8abc5de13cb9bc9e002af941
SHA512157890215904d06bc369521eb7f4ff038038c6bbfa255fb92b22ccfc7ee047a5487a97a2610041169345bdfae80c6391f7922d7189820c2de05ffafe783abb81
-
Filesize
264KB
MD5cde1e8c933c5ce201b63dcedbbf2f550
SHA145f9ac3d0d4c98a7a7543bf14fadf02e4ce69439
SHA256134abecfd38125a6f6a7eb818a4de3b8a5b753069c8456941b0ac2597e0ddf36
SHA512fef798a379a045b33544f2704661684232b9eeffd8ed9cea47536872561b8fffab9eb58c552bc69e47fdb5c9de9e01b24addda72e29bfa33e648e3c9a83daba7
-
Filesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
Filesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
297KB
MD57a86ce1a899262dd3c1df656bff3fb2c
SHA133dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541
SHA256b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c
SHA512421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec