Analysis
-
max time kernel
206s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
Bootstrapper.exe
-
Size
800KB
-
MD5
02c70d9d6696950c198db93b7f6a835e
-
SHA1
30231a467a49cc37768eea0f55f4bea1cbfb48e2
-
SHA256
8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
-
SHA512
431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
-
SSDEEP
12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Bootstrapper.exe -
Executes dropped EXE 1 IoCs
pid Process 4748 Solara.exe -
Loads dropped DLL 11 IoCs
pid Process 452 MsiExec.exe 452 MsiExec.exe 1428 MsiExec.exe 1428 MsiExec.exe 1428 MsiExec.exe 1428 MsiExec.exe 1428 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe 4628 MsiExec.exe 452 MsiExec.exe -
Unexpected DNS network traffic destination 24 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 -
Blocklisted process makes network request 2 IoCs
flow pid Process 35 2824 msiexec.exe 37 2824 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 62 pastebin.com 61 pastebin.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 163 api.ipify.org 157 api.ipify.org 159 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-help-search.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\ca\verify\sct.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\rimraf\node_modules\minimatch\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\rimraf\node_modules\brace-expansion\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\eq.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tiny-relative-date\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\utils\pulse-till-done.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\lib\install.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-sized\node_modules\minipass\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\lib\nopt.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\sigstore-utils.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\spdx-expression-parse\scan.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\chalk\source\util.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\safer-buffer\Porting-Buffer.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\git\lib\is.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\normalize-package-data\lib\typos.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\util-deprecate\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\__generated__\google\protobuf\timestamp.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\unique-filename\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\install.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cacache\lib\entry-index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tar\lib\pack.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\binary-extensions\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\readable-stream\lib\_stream_readable.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\models\key.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\npm.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\x509\ext.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-repo.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\is-cidr\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\spdx-correct\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\internal\parse-options.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-json-stream\node_modules\minipass\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\types\sigstore\__generated__\sigstore_bundle.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\events\tests\events-once.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\examples\normal-usage.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\events\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\run-script\lib\is-windows.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minimatch\dist\cjs\index.js.map msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-stars.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-registry-fetch\lib\errors.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\sigstore\dist\tlog\verify\set.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\generator\xcode.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tuf-js\dist\utils\oid.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\using-npm\developers.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmversion\lib\version.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\generator\gypsh.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\bin\audit.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\using-npm\registry.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-uninstall.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\fastest-levenshtein\esm\mod.d.ts.map msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-collect\node_modules\minipass\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmdiff\lib\format-diff.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\lru-cache\index.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cli-table3\src\table.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\unique-slug\lib\index.js msiexec.exe File created C:\Program Files\nodejs\npx msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cli-table3\src\layout-manager.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\retry\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\socks\typings\common\receivebuffer.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\readable-stream\lib\_stream_duplex.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\node_modules\@npmcli\fs\lib\common\node.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\git\lib\index.js msiexec.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI204E.tmp msiexec.exe File created C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF8BB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFA82.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICD.tmp msiexec.exe File created C:\Windows\Installer\e57ee38.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF1A4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF1C4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F43.tmp msiexec.exe File opened for modification C:\Windows\Installer\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI21D5.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57ee38.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF165.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC} msiexec.exe File opened for modification C:\Windows\Installer\MSIFA52.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAD.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e57ee3c.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI236D.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3320 ipconfig.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133768136353029557" chrome.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeRuntime msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\PackageName = "node-v18.16.0-x64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\corepack msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\PackageCode = "347C7A52EDBDC9A498427C0BC7ABB536" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\NodeEtwSupport = "NodeRuntime" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\DocumentationShortcuts msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Version = "303038464" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductIcon = "C:\\Windows\\Installer\\{EFA235B5-C6A1-42E6-9BC9-02A8D56F1CDC}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4089630652-1596403869-279772308-1000\{308B9B19-AFA9-46E4-A65B-E2C69F50F2A6} chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\EnvironmentPath msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\ProductName = "Node.js" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5B532AFE1A6C6E24B99C208A5DF6C1CD\npm msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5B532AFE1A6C6E24B99C208A5DF6C1CD\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4880 Bootstrapper.exe 4880 Bootstrapper.exe 2824 msiexec.exe 2824 msiexec.exe 4748 Solara.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 756 WMIC.exe Token: SeSecurityPrivilege 756 WMIC.exe Token: SeTakeOwnershipPrivilege 756 WMIC.exe Token: SeLoadDriverPrivilege 756 WMIC.exe Token: SeSystemProfilePrivilege 756 WMIC.exe Token: SeSystemtimePrivilege 756 WMIC.exe Token: SeProfSingleProcessPrivilege 756 WMIC.exe Token: SeIncBasePriorityPrivilege 756 WMIC.exe Token: SeCreatePagefilePrivilege 756 WMIC.exe Token: SeBackupPrivilege 756 WMIC.exe Token: SeRestorePrivilege 756 WMIC.exe Token: SeShutdownPrivilege 756 WMIC.exe Token: SeDebugPrivilege 756 WMIC.exe Token: SeSystemEnvironmentPrivilege 756 WMIC.exe Token: SeRemoteShutdownPrivilege 756 WMIC.exe Token: SeUndockPrivilege 756 WMIC.exe Token: SeManageVolumePrivilege 756 WMIC.exe Token: 33 756 WMIC.exe Token: 34 756 WMIC.exe Token: 35 756 WMIC.exe Token: 36 756 WMIC.exe Token: SeIncreaseQuotaPrivilege 756 WMIC.exe Token: SeSecurityPrivilege 756 WMIC.exe Token: SeTakeOwnershipPrivilege 756 WMIC.exe Token: SeLoadDriverPrivilege 756 WMIC.exe Token: SeSystemProfilePrivilege 756 WMIC.exe Token: SeSystemtimePrivilege 756 WMIC.exe Token: SeProfSingleProcessPrivilege 756 WMIC.exe Token: SeIncBasePriorityPrivilege 756 WMIC.exe Token: SeCreatePagefilePrivilege 756 WMIC.exe Token: SeBackupPrivilege 756 WMIC.exe Token: SeRestorePrivilege 756 WMIC.exe Token: SeShutdownPrivilege 756 WMIC.exe Token: SeDebugPrivilege 756 WMIC.exe Token: SeSystemEnvironmentPrivilege 756 WMIC.exe Token: SeRemoteShutdownPrivilege 756 WMIC.exe Token: SeUndockPrivilege 756 WMIC.exe Token: SeManageVolumePrivilege 756 WMIC.exe Token: 33 756 WMIC.exe Token: 34 756 WMIC.exe Token: 35 756 WMIC.exe Token: 36 756 WMIC.exe Token: SeDebugPrivilege 4880 Bootstrapper.exe Token: SeShutdownPrivilege 4752 msiexec.exe Token: SeIncreaseQuotaPrivilege 4752 msiexec.exe Token: SeSecurityPrivilege 2824 msiexec.exe Token: SeCreateTokenPrivilege 4752 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4752 msiexec.exe Token: SeLockMemoryPrivilege 4752 msiexec.exe Token: SeIncreaseQuotaPrivilege 4752 msiexec.exe Token: SeMachineAccountPrivilege 4752 msiexec.exe Token: SeTcbPrivilege 4752 msiexec.exe Token: SeSecurityPrivilege 4752 msiexec.exe Token: SeTakeOwnershipPrivilege 4752 msiexec.exe Token: SeLoadDriverPrivilege 4752 msiexec.exe Token: SeSystemProfilePrivilege 4752 msiexec.exe Token: SeSystemtimePrivilege 4752 msiexec.exe Token: SeProfSingleProcessPrivilege 4752 msiexec.exe Token: SeIncBasePriorityPrivilege 4752 msiexec.exe Token: SeCreatePagefilePrivilege 4752 msiexec.exe Token: SeCreatePermanentPrivilege 4752 msiexec.exe Token: SeBackupPrivilege 4752 msiexec.exe Token: SeRestorePrivilege 4752 msiexec.exe Token: SeShutdownPrivilege 4752 msiexec.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe 3044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2992 4880 Bootstrapper.exe 83 PID 4880 wrote to memory of 2992 4880 Bootstrapper.exe 83 PID 2992 wrote to memory of 3320 2992 cmd.exe 85 PID 2992 wrote to memory of 3320 2992 cmd.exe 85 PID 4880 wrote to memory of 4076 4880 Bootstrapper.exe 90 PID 4880 wrote to memory of 4076 4880 Bootstrapper.exe 90 PID 4076 wrote to memory of 756 4076 cmd.exe 92 PID 4076 wrote to memory of 756 4076 cmd.exe 92 PID 4880 wrote to memory of 4752 4880 Bootstrapper.exe 96 PID 4880 wrote to memory of 4752 4880 Bootstrapper.exe 96 PID 2824 wrote to memory of 452 2824 msiexec.exe 99 PID 2824 wrote to memory of 452 2824 msiexec.exe 99 PID 2824 wrote to memory of 1428 2824 msiexec.exe 100 PID 2824 wrote to memory of 1428 2824 msiexec.exe 100 PID 2824 wrote to memory of 1428 2824 msiexec.exe 100 PID 2824 wrote to memory of 4628 2824 msiexec.exe 102 PID 2824 wrote to memory of 4628 2824 msiexec.exe 102 PID 2824 wrote to memory of 4628 2824 msiexec.exe 102 PID 4628 wrote to memory of 3560 4628 MsiExec.exe 103 PID 4628 wrote to memory of 3560 4628 MsiExec.exe 103 PID 4628 wrote to memory of 3560 4628 MsiExec.exe 103 PID 3560 wrote to memory of 928 3560 wevtutil.exe 105 PID 3560 wrote to memory of 928 3560 wevtutil.exe 105 PID 4880 wrote to memory of 4748 4880 Bootstrapper.exe 109 PID 4880 wrote to memory of 4748 4880 Bootstrapper.exe 109 PID 3044 wrote to memory of 4480 3044 chrome.exe 114 PID 3044 wrote to memory of 4480 3044 chrome.exe 114 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 4300 3044 chrome.exe 115 PID 3044 wrote to memory of 2780 3044 chrome.exe 116 PID 3044 wrote to memory of 2780 3044 chrome.exe 116 PID 3044 wrote to memory of 3824 3044 chrome.exe 117 PID 3044 wrote to memory of 3824 3044 chrome.exe 117 PID 3044 wrote to memory of 3824 3044 chrome.exe 117 PID 3044 wrote to memory of 3824 3044 chrome.exe 117 PID 3044 wrote to memory of 3824 3044 chrome.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3320
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\System32\Wbem\WMIC.exewmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")3⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding C5683479D102323A634D921E880C5B1C2⤵
- Loads dropped DLL
PID:452
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C78D0EC3F5A10818B5AB96C927E8C0F52⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 368445E0396D1F02351421B7A790C3A1 E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\System32\wevtutil.exe"wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow644⤵PID:928
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcfc8dcc40,0x7ffcfc8dcc4c,0x7ffcfc8dcc582⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2208,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:32⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1408,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4564,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3728,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4912,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5164,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5192,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5744,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5912,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5708,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Modifies registry class
PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4384,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5204,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5064,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3500,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4424 /prefetch:12⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5644,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3492,i,12543442192861390818,4281319755326302814,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55a14c24a5cc36cb8ef06b4efbfdd0aff
SHA1ecea296f4b63759c1b5845873f07d121646eaf45
SHA256e49d7f5c6060d56f21781613e3ed0282d25cf7aa9ba6d98f57c86e93e633a64b
SHA512a68bc2dc35b55b0ff26bebfc4b9db19f1d94e3e91b0edae294433fd47fe4f8588d8a4cf1f81c31111941f4d06d4347c20cd6f1fd6b894aba112d9474f7abb388
-
Filesize
10KB
MD51d51e18a7247f47245b0751f16119498
SHA178f5d95dd07c0fcee43c6d4feab12d802d194d95
SHA2561975aa34c1050b8364491394cebf6e668e2337c3107712e3eeca311262c7c46f
SHA5121eccbe4ddae3d941b36616a202e5bd1b21d8e181810430a1c390513060ae9e3f12cd23f5b66ae0630fd6496b3139e2cc313381b5506465040e5a7a3543444e76
-
Filesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
Filesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
Filesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
Filesize
771B
MD5e9dc66f98e5f7ff720bf603fff36ebc5
SHA1f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b
SHA256b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79
SHA5128027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b
-
Filesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json
Filesize1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
Filesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
Filesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
Filesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
Filesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts
Filesize4KB
MD5f0bd53316e08991d94586331f9c11d97
SHA1f5a7a6dc0da46c3e077764cfb3e928c4a75d383e
SHA256dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef
SHA512fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839
-
Filesize
771B
MD51d7c74bcd1904d125f6aff37749dc069
SHA121e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab
SHA25624b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9
SHA512b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778
-
Filesize
168B
MD5db7dbbc86e432573e54dedbcc02cb4a1
SHA1cff9cfb98cff2d86b35dc680b405e8036bbbda47
SHA2567cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9
SHA5128f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
133KB
MD5c6f770cbb24248537558c1f06f7ff855
SHA1fdc2aaae292c32a58ea4d9974a31ece26628fdd7
SHA256d1e4a542fa75f6a6fb636b5de6f7616e2827a79556d3d9a4afc3ecb47f0beb2b
SHA512cac56c58bd01341ec3ff102fe04fdb66625baad1d3dd7127907cd8453d2c6e2226ad41033e16ba20413a509fc7c826e4fdc0c0d553175eb6f164c2fc0906614a
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
649B
MD5673abd661ab55ce7db3ced10064986da
SHA11e08448597d5f5ea1664ae7a9deb1d9b09b9bd64
SHA2565b4219416652a0b6ce9586e7991a70fd5133de49c90c74d72bae055cb9b16c3a
SHA51226b8140eb6dad8ee8650bd6d616bfa586e4c87af64bc60e828eac44927ff2f11945049233a9be0054b61de2eae5837008f5d09402930b7b1031dce6a8aed9283
-
Filesize
24KB
MD52c92288016ce3a327c2230ee1dc04ba2
SHA18cd9f721e5a0f19059854030773f76bbafa0036c
SHA2563b7b2d0aac6717a3735156eee99212f28528d0dd86d7ba3f6e527535d1f6d398
SHA512e60e33852a8af310cc8be770afc64a10c63b1711292770d4c7024842e534953de358567da3264e20c393199b1df43e1a98723a1f8bd657dea9a55a6cacb2f0ba
-
Filesize
860KB
MD5f46408e0572c51d4e189bd50af536db3
SHA1235743eba8fe51da83aef5197e482e6f9381b2b3
SHA2564dfa913e55425496c9b8eefe772318c78e2a1b54769fcab01d722d7cadc3c038
SHA512b535237e1f19afdb2e0e45c4b0d074bd11d016f88ae9466dbeb194d779e5e1d2976b109bbdee9be40c7ca5bbec2c3878187996b1db825ee082e65cf72eb5eb9d
-
Filesize
16KB
MD561e4576e6aa91cd435fe92f085fb0a3c
SHA1fa21a6bad3a461c8f0e27b75913c8f1cbe0b2b62
SHA25678d8aca4e50e6ba58890b68f8c3d6e562ff0b16516a0c3df56be18b69dca6aa9
SHA512b250c2940f7ca24b763bfcd4d39d0022d6441bad54c415b9848ef949f8871f219289f044301de03313bf8cfa53bb2797c5590acc1b32889b0641f7a13b710bfe
-
Filesize
36KB
MD55ac1ff71d57f1deb954cd1ca9dd8aba8
SHA1909f3b2ebb361143356d3d681b1921c14358985d
SHA2562e0b46f2c7f300841c9b09839bd475306b41831ebb5005be0350ed230fb867f5
SHA512cc2af490952a161b05c8f33a78690c97c40cf599f89a36184122827da84cc3a46bd51b4f17bd0e50225e27482964ca55495109059378cd84f5e125c3b8d53179
-
Filesize
52KB
MD591150db02969c59308c50f529cb48122
SHA190d779451538247c48aceef4007c4a42f3704d59
SHA256d0256bedd7e56716ff177adde64d41eaf0da3b545b6a980414a2f85d81037a25
SHA5125e3c8671fb3cf087729cb04974751bb3d90085ee1943448a4c86bb38578ce50415419ba73fa012f702c001dfc815c4ed629531196d8bff38dd08f42bf5779c3a
-
Filesize
77KB
MD52e9dbafcaf5a07454923305e1bf04b74
SHA10882752f86c810b74a15970eaa877d13f4632a14
SHA2564a2eeaf0627cf5004719d01ee37535072c1aa9fd551c7c4479550e44aca70f86
SHA512bb8be2658e896e9863c1c011418ed0ab1ae6a0e74036add7530fbe86432744867495123890c35742fe982139480c802800fb4ee1c301b8f6d2542c648da373f3
-
Filesize
39KB
MD5b7f65437aba9d4074b6265a29185fd46
SHA1e250c9de636322d339a4d9beb2ea982abdb53271
SHA2563fdb6bb134fb6c9c19e93b2a8b7b19c94ad2cf60b9ab47d27266daf122918983
SHA512c7fadf909d859181b9b3e23c99230fe569babbf1dc8a515e93a1021f8082c1ddca2754d59af2abcda8890e645d16a015fa926a5f49a76c322aa59c8f7514bebf
-
Filesize
104KB
MD5a9effa7f8b2d289946f449ebe8639603
SHA1c51744860e32b35ed4fdd41f3a763a5270ca9f48
SHA256f58825c1478e4fb4a549779ffe59a2fc2612c36f222fd2585e8561fe463645a5
SHA5127fec41092285e97e439ab193f64184eaa24c3ac609ee9bd7ba5a4855794ebebe8a9463098aefcb23011c39663c4107eff6e73b72baf7684513388507d7dc4144
-
Filesize
144KB
MD5b2a1268cd6b5b4ae8afd6bdf6a7b0a8c
SHA1887706b220ea11b3a07776a93dba21fc80d7edcb
SHA256b65d6053a12b8e7c5b741c46d5a3e6fea452ddfa19cc3aeda3715d5450bdc67a
SHA5124ee3ad78e9a184474f241a2ae5b31158574b356cfb6f862375497b0cd717bc81942aaa0f28fd45db9e161ad3f6a166cc61a9c1f51c95fbd52b5ef2167f36a389
-
Filesize
27KB
MD5dc654d5da1a531fdb3b1bedb619b0182
SHA149d3de45bea7c279cf0ffe4cbc43c24779d1877a
SHA256b395c195a5854253500b3b210e585ec801a47b49ce7b90fa5a9717df387598fa
SHA51238952929cbf8e103cad50007cb492c93a7feb8d9d1853773883e2771cc97e50d6a514cb6347c912e7945d126a35677cca854ce8542e2210d7e59799238bae8fd
-
Filesize
29KB
MD5d9e7fec1daaed28de513e1b9b9d420c4
SHA12b3b731502ea58fd59d6b303f7cd457bcc1ea6bd
SHA256c78d258c43609fd6d550370f434f11c33705fb8729c0a36d0b844adbf8b904fa
SHA512120e6966fe8baffb816052a2d32eb0f25df0ae18c4f3997ee87ae8c54e74a6fcb71202fef803fddb393794e8cd28c8515932b86ec1edd6e9fa90058008d92ab6
-
Filesize
20KB
MD501544cec8ea1384b58d63e4c1955b9ea
SHA1bda9a87449eee2fd053b56a7844e00b1460eea52
SHA256f4d9c14f01e2caa05f3aee0e1c6b4bd282584365271ae8d484bb9c074e6b039a
SHA512f45d85a0230e51b1942ffc2e133512b622ce0b07e4687e1227a3fb4feff3d269a75d7253add58b158eb03b88972117a38ed38db5bd225d2dab39255e004c713b
-
Filesize
1KB
MD5555876547b19ee8bd5005516b73ec57d
SHA1fed6e3037ead6702b866ec7c7ee8b7ded8888125
SHA2567989f71a9922a5a54c54ecb3b2675f4226a00442a9ca14e0c879cf48bf332f4c
SHA512ba26575c47d3679c96f293505ab4c612136d087d357ec7da78169df1f23a7ea55fa0a20090ca62bdec4b054623ee07cc1619de25563113bfa82bb37838cca2aa
-
Filesize
10KB
MD5e56e8fb729a23ec7d4e0bc749b4e7203
SHA1369e13a8900906a5feecd06e3a623ad40cf55e5b
SHA25699778138b38ade0162c959002838e72e20a728aa92e5f8bcf6930b556d0914d4
SHA5127c0ecc6dc91e2e9bcb7fb59dff96ebf4ddc8f34afe2fb05070b207ad61f4f408fe3a2bb235bd8c2afbab0e8b4d55f9929faaa20448d59f4822017808ea1b5bfc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5caa57fdf0b9736dbdd8a15e979576aa4
SHA112cc44c5e2e561f4070f7127baf2e023692aabb7
SHA256384fb8c95991883a71dafc251fc983b738f2e5e5e100b772c6cd6f65ee25d79d
SHA512e58b63c4f2bad112284c8000bc08ebb4c04356d7763a19834a04560c44771f1035665af02e088cbfe7c841b7aaa46a975f4bd94449fe50ab6abdfa32b0c63102
-
Filesize
356B
MD5842d5d404eb14c939b54e2df6f9633ba
SHA1a5f42b8583ede3aca099d2007ccc6dd332442879
SHA256ef6bff1fded961614f12ec4fa7172613401477070fb4e1bfb0c20cff1a42f33f
SHA512e6982dac7755444fd1a5e06050ca0bbda4e721ad86f860c03ed9bd76a9191655f28e9ad672018c4a8a299fd494126aa44a744f29375c6c4c9203b82c4bd6fc1b
-
Filesize
1KB
MD53337bc0e908e357dde08a5c80024ea86
SHA1055f75dbcf3915ebb0839735da9c4b22b4fdefc9
SHA2560ae3a69ed383621da4d2ecc330288b1e98e92577d108913cd5f90d4c19c4b353
SHA51288e84edeb4b31039fc58993b072db8304f3cec18d5d8a81108b838da436fe80969391f4703e87fad189624d77edce39708931da929039d5b094f399325b1c1ba
-
Filesize
1KB
MD56ce55f53e118c0fc38c3eb25f9e963e6
SHA1893240cf8acb8c1b54679fc763176135b2d17828
SHA256dc6bb7fcede748df2844332555abb3e17d56df0c8a1b32f02e084c84943d64f2
SHA512e8e993a99c42cb9b7b0b3aae0a65cb01d1c4c246f64a8d315c7f9a582abd7ee692bb11277460eb6374a0756c78ed8da1472a284de36588387043f1143e405047
-
Filesize
10KB
MD5bfb8b57de8bc65feda1556633c5b2ef9
SHA1f6d2736ee76eef96a87d36324d962c517d3817e3
SHA256dcebb3e6ebada875abd1b4ec1ac186967b44de71fdb86692a2362d543c82e699
SHA512920ae6552525492c9bc595a98a45acad9e5a52a789ba19c77fd87bd3904842fe967affa99baffedb421ef3a0c11c1f7096db5fef5fc3d239f67b3637ba3ff688
-
Filesize
9KB
MD53883cf425cd8a0507e0b2a643e0c54aa
SHA1f6b5d8522a47f4f1f99d9421f652fe8821243301
SHA256c2b5bef8b968d4fd6b5afcdfc283b6f2664981a18f6228ec7b514833d7d75099
SHA512e7770830e1c7e1e4ede55c6a7e46a84402832b8d6d2b073ad3e11de953a179ea135efbf94756cb06808bf374c614baeb5320102f995641f6b4af112ed9a1621d
-
Filesize
9KB
MD578ccc7127306c303e30760ff8e0d98cf
SHA1d6117325b081a1be8bc731f0db9fca10d270d5ef
SHA256344bfb3039d4c413536e3596ba833a52d6a49d655de9cd7d8343a78df8df93c0
SHA51209f3f0c0f36d96126158bf74609bf77fc3041c6f9a1b23cd636119f89ce0c6daf721370518c427ff690f21cda97cdb47a2c51b3f55b6928232a5517d41d29390
-
Filesize
10KB
MD5e1bce96ec74f1ec47d8a1255c69251ef
SHA1fcc8c2e592be8215f7db3d77695c47209d0dd4e1
SHA256e16677d64f6c85e1e52e217482799a395fcc6ecd6eb0581d940e943624465102
SHA512ce4091dc4cbc2584ff23d4962a9926f6816a94392d006816bed503d3b079908ed69dd2ad27a13651543e02a7ac3ea4b9dd7bfd69d45a3a2f882482d6a638eae6
-
Filesize
10KB
MD5fd2025891e7a5078ebc9a40e8b70d0cc
SHA16f1072df615fa708f71ef70f74e677410beb7a96
SHA25641c201ee077e369bfdcf6029990efa966dca819cc15d8befb24f1f7f2624f1ae
SHA512bb1e5b08a08507b9b69c3d0fb8a2f86103527df865b136436f82e4b647ea971f5b45f43f7289b93d8c21dc2546be6151023ade818fa08fddb5c021bcb17dcc5a
-
Filesize
15KB
MD50e6a83a66a4318e8a6d01b3260e4b8f0
SHA1838d4b5b3b5e4424c7560fd80ca677f6997f25b8
SHA2561ef8709ab00b859497ab1f78e4f350e87a6867e193e9e9655631c16fad7e38cc
SHA5122fd2c390558c573ad3916e3c73f9ba49eedf8d304edb7ac6e48ace49da505a22574e4f9f16a5eeed8f1feeabace3cd68db3a03f630bacc8880146180ed1fc86e
-
Filesize
234KB
MD59e352c0b0019118835e7e03fb757faf0
SHA199572f6dee022b40db8fb6b594e4315dcd6c1432
SHA2565118d49ab1fb3e17ab46ee63c09828244c2407608a98ed3ec58179cc6bdb1790
SHA51233f71c26c98a922c3faccac24d0b0eb41469236bdfd430d49cce0fae188d4c572e2eeff6eb86cb1b7658661be003f74d48c04c20a2d01e1525bca42c00bbfd54
-
Filesize
234KB
MD53edb5f957ead619c6f19766537b4447f
SHA1db4bac1e18b141ea694819b3deaabae2715ef0c9
SHA256856ea4e336820036398f52bdd1fb3ed2a865bbe4acdc0fee631acf08850267c6
SHA5129ca5369968ebbfd61c10ba386c4b42a19d32ed28c545c557722032e90d1099f0e15c33e86cc134abba15f5bdd3627fc31473e4844775c0a97e3b44af0f659090
-
Filesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
Filesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
297KB
MD57a86ce1a899262dd3c1df656bff3fb2c
SHA133dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541
SHA256b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c
SHA512421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec