Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    724s
  • max time network
    724s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/11/2024, 12:55

General

  • Target

    Bootstrapper.exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • A potential corporate email address has been identified in the URL: [email protected]
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 28 IoCs
  • Themida packer 26 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 20 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Blocklisted process makes network request 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 18 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Gathers network information 2 TTPs 4 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:3276
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3400
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3320
    • C:\Windows\System32\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4724
    • C:\ProgramData\Solara\Solara.exe
      "C:\ProgramData\Solara\Solara.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 995BC19A30DF71C1D552BE6C238F2DE9
      2⤵
      • Loads dropped DLL
      PID:4952
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 15015F6AD5A07308E150408D96B7F695
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2444
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding BA7CB2F997AA39BD96603561510B7713 E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:312
      • C:\Windows\SysWOW64\wevtutil.exe
        "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\System32\wevtutil.exe
          "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow64
          4⤵
            PID:4036
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:3852
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2628
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4884
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:4056
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
        1⤵
          PID:544
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
          1⤵
          • System Location Discovery: System Language Discovery
          PID:4312
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
          1⤵
            PID:936
          • C:\Users\Admin\Desktop\Bootstrapper.exe
            "C:\Users\Admin\Desktop\Bootstrapper.exe"
            1⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1236
            • C:\Windows\SYSTEM32\cmd.exe
              "cmd" /c ipconfig /all
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1620
              • C:\Windows\system32\ipconfig.exe
                ipconfig /all
                3⤵
                • Gathers network information
                PID:3828
            • C:\Program Files\nodejs\node.exe
              "node" -v
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2728
            • C:\ProgramData\Solara\Solara.exe
              "C:\ProgramData\Solara\Solara.exe"
              2⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3032
              • C:\Program Files\nodejs\node.exe
                "node" "C:\ProgramData\Solara\Monaco\fileaccess\index.js" 8e19684d5423489b
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:5012
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=3032.4728.5036980306506814102
                3⤵
                • Enumerates system info in registry
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:4776
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x1d0,0x7ff969813cb8,0x7ff969813cc8,0x7ff969813cd8
                  4⤵
                    PID:1416
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1904,63277534882054293,13628739337322976406,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1968 /prefetch:2
                    4⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    PID:688
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,63277534882054293,13628739337322976406,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2204 /prefetch:3
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4532
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,63277534882054293,13628739337322976406,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2524 /prefetch:8
                    4⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    PID:3468
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1904,63277534882054293,13628739337322976406,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:1
                    4⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    PID:1040
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,63277534882054293,13628739337322976406,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3952 /prefetch:8
                    4⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2956
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1760
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:4060
                • C:\Windows\system32\OpenWith.exe
                  C:\Windows\system32\OpenWith.exe -Embedding
                  1⤵
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  PID:3648
                • C:\Users\Admin\Desktop\Bootstrapper.exe
                  "C:\Users\Admin\Desktop\Bootstrapper.exe"
                  1⤵
                    PID:4428
                    • C:\Windows\SYSTEM32\cmd.exe
                      "cmd" /c ipconfig /all
                      2⤵
                        PID:1896
                        • C:\Windows\system32\ipconfig.exe
                          ipconfig /all
                          3⤵
                          • Gathers network information
                          PID:768
                      • C:\Program Files\nodejs\node.exe
                        "node" -v
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:5080
                      • C:\ProgramData\Solara\Solara.exe
                        "C:\ProgramData\Solara\Solara.exe"
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:3016
                        • C:\Program Files\nodejs\node.exe
                          "node" "C:\ProgramData\Solara\Monaco\fileaccess\index.js" 258a239ad4f0411b
                          3⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1824
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=3016.4144.16493344691109299929
                          3⤵
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:2500
                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x104,0x1d0,0x7ff969813cb8,0x7ff969813cc8,0x7ff969813cd8
                            4⤵
                              PID:3772
                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:3484
                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2212 /prefetch:3
                              4⤵
                                PID:2872
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2680 /prefetch:8
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:2948
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:1
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:4056
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4576 /prefetch:8
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:5212
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1888,15906078797258728308,8155155250877066810,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2492 /prefetch:8
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:5792
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2668
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3364
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                              1⤵
                                PID:1148
                              • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                1⤵
                                • Drops file in Windows directory
                                PID:3084
                              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:1748
                              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                1⤵
                                • System Location Discovery: System Language Discovery
                                PID:5932
                              • C:\Users\Admin\Desktop\Bootstrapper.exe
                                "C:\Users\Admin\Desktop\Bootstrapper.exe"
                                1⤵
                                  PID:3832
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    "cmd" /c ipconfig /all
                                    2⤵
                                      PID:5184
                                      • C:\Windows\system32\ipconfig.exe
                                        ipconfig /all
                                        3⤵
                                        • Gathers network information
                                        PID:5248
                                    • C:\Program Files\nodejs\node.exe
                                      "node" -v
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:784
                                    • C:\ProgramData\Solara\Solara.exe
                                      "C:\ProgramData\Solara\Solara.exe"
                                      2⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks whether UAC is enabled
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:4836
                                      • C:\Program Files\nodejs\node.exe
                                        "node" "C:\ProgramData\Solara\Monaco\fileaccess\index.js" 68cceaf09e924c3a
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5016
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=4836.1020.7153593684772044899
                                        3⤵
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        PID:3860
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x190,0x7ff969813cb8,0x7ff969813cc8,0x7ff969813cd8
                                          4⤵
                                            PID:1960
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:2
                                            4⤵
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            PID:5720
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2208 /prefetch:3
                                            4⤵
                                              PID:5732
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2772 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:5780
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:6012
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4660 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:6108
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3708 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:420
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2944 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:2128
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3680 /prefetch:2
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:6108
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3688 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:2196
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1880,4746676773440159819,4361998019320166398,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=5028 /prefetch:8
                                              4⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              PID:5776
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5936
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:744
                                          • C:\Windows\SysWOW64\DllHost.exe
                                            C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                            1⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3228
                                          • C:\Windows\explorer.exe
                                            C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                            1⤵
                                            • Drops file in Windows directory
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious behavior: AddClipboardFormatListener
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of FindShellTrayWindow
                                            PID:1628
                                          • C:\Windows\system32\msiexec.exe
                                            C:\Windows\system32\msiexec.exe /V
                                            1⤵
                                            • Drops desktop.ini file(s)
                                            • Enumerates connected drives
                                            • Drops file in Program Files directory
                                            • Drops file in Windows directory
                                            • Modifies data under HKEY_USERS
                                            • Modifies registry class
                                            PID:1640
                                            • C:\Windows\system32\srtasks.exe
                                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                              2⤵
                                                PID:2064
                                              • C:\Windows\System32\MsiExec.exe
                                                C:\Windows\System32\MsiExec.exe -Embedding 7ABACCEFD79824601709178DE7652699
                                                2⤵
                                                • Loads dropped DLL
                                                PID:5500
                                              • C:\Windows\syswow64\MsiExec.exe
                                                C:\Windows\syswow64\MsiExec.exe -Embedding 2FF3DB251BF90FE5E4250C8DCCE6971D
                                                2⤵
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:5768
                                              • C:\Windows\syswow64\MsiExec.exe
                                                C:\Windows\syswow64\MsiExec.exe -Embedding 210F8FE5409414DCD567CC6787060A4D E Global\MSI0000
                                                2⤵
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:4548
                                                • C:\Windows\SysWOW64\wevtutil.exe
                                                  "wevtutil.exe" um "C:\Program Files\nodejs\node_etw_provider.man"
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:404
                                                  • C:\Windows\System32\wevtutil.exe
                                                    "wevtutil.exe" um "C:\Program Files\nodejs\node_etw_provider.man" /fromwow64
                                                    4⤵
                                                      PID:5384
                                              • C:\Windows\system32\vssvc.exe
                                                C:\Windows\system32\vssvc.exe
                                                1⤵
                                                • Checks SCSI registry key(s)
                                                PID:5240

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Config.Msi\e57ff81.rbs

                                                Filesize

                                                1.0MB

                                                MD5

                                                f5e0748eb2d67f57e38efd016e5437b1

                                                SHA1

                                                a8fd12454ea7e20240fc2a5e9adfd7f9f46df843

                                                SHA256

                                                14c6145cb0f5573b7109acbd8ad63986bad3f510cfdb9a6eab244720009d5d09

                                                SHA512

                                                82adbf2c1ce6183251698ba511d84189a23753b77356063da83e7db16ce46f8c50d4e4a36108b9da65d0181ac6999c16be0e903a4739d6f38631a92c629c573e

                                              • C:\Config.Msi\e61d90c.rbs

                                                Filesize

                                                1.6MB

                                                MD5

                                                7869ccd33d721573b09c87762c66ebf6

                                                SHA1

                                                8cbd0989a4bfb9aea3e20477ac397df1f4972508

                                                SHA256

                                                0535a65468129190d9fd4d3d88b9252515ce822e6bd5dab56acd6052644eab9f

                                                SHA512

                                                16dc4d22138365148733333fef35e0d8d3e0129c55a6e8ca58af2d36e259e49b3d88fbf80e5eea00fbc32394d15cb9a185a4aaa5e6c342bd3b7db3fa7578081f

                                              • C:\Config.Msi\e61d90d.rbf

                                                Filesize

                                                966B

                                                MD5

                                                ec413344d1ad73327020d171694fb045

                                                SHA1

                                                d656badac522cddd394d36aa8ffdd1601d344bc9

                                                SHA256

                                                6f16517f13e3c460fb5e05eef6718832c86932604fab80abeccde3667e074d78

                                                SHA512

                                                9e3dd5bc35b5434c7b6c34e42e19ba2a2272fcbd2fcb52cba0e2881f9b8edc5bc737a5bb1bcfb93c7cc48d19c503e7cc09606cbb58eecf500b1477a5fe41ca35

                                              • C:\Config.Msi\e61d90e.rbf

                                                Filesize

                                                982B

                                                MD5

                                                0e9a6bf8c74f2f11df68892759ce9495

                                                SHA1

                                                0072cb148cbc3faadc008ad60005c28020c83505

                                                SHA256

                                                e4b43c8a8c1ea7a86cbfed52b68c152cd00d7447e01bcbce88b84470f9fa7773

                                                SHA512

                                                4dba6d7a3317f6aebce4c9567ebe8a11ce28f33d34f87c508766910cee8520728e486fc2bb7c13bcd201fad9f18c0651b32274be9c02cc7b927d3ba486d065d6

                                              • C:\Config.Msi\e61d90f.rbf

                                                Filesize

                                                949B

                                                MD5

                                                c87ece8e8e43cb567b13d64c116213a1

                                                SHA1

                                                faadc4376b59567c22d599f100dcc3c847210cdd

                                                SHA256

                                                31df1c15b6968d4bc9c14773e7861187220f5b854038391dde77ec583edbadd6

                                                SHA512

                                                4a59684a6a2455049f368d377dc26cab83f03e900b00e94a7b859ca5a064950d86e2957bae3286ed111fbbc9d62bf35a38941e29b4b46b27334a7b32337d404e

                                              • C:\Config.Msi\e61d910.rbf

                                                Filesize

                                                940B

                                                MD5

                                                683fff0221a1d6d0a21b9e32120578bf

                                                SHA1

                                                04dded7c27509baac32bec20cf38bf4dc02ca0df

                                                SHA256

                                                40910243aa61083330de828a18e4ddb9478d335071de9e9c87407dc7efd4054f

                                                SHA512

                                                d96417692a8a53e7143855343050fd51496d517e9fca68b78ee52c17edba5b0183eb3bf5bfdb879707433ff4523bcad34e3ec839bbf08ee5e91d0e61f93cbc5e

                                              • C:\Program Files\nodejs\node_etw_provider.man

                                                Filesize

                                                10KB

                                                MD5

                                                1d51e18a7247f47245b0751f16119498

                                                SHA1

                                                78f5d95dd07c0fcee43c6d4feab12d802d194d95

                                                SHA256

                                                1975aa34c1050b8364491394cebf6e668e2337c3107712e3eeca311262c7c46f

                                                SHA512

                                                1eccbe4ddae3d941b36616a202e5bd1b21d8e181810430a1c390513060ae9e3f12cd23f5b66ae0630fd6496b3139e2cc313381b5506465040e5a7a3543444e76

                                              • C:\Program Files\nodejs\node_etw_provider.man

                                                Filesize

                                                8KB

                                                MD5

                                                d3bc164e23e694c644e0b1ce3e3f9910

                                                SHA1

                                                1849f8b1326111b5d4d93febc2bafb3856e601bb

                                                SHA256

                                                1185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4

                                                SHA512

                                                91ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\LICENSE.md

                                                Filesize

                                                818B

                                                MD5

                                                2916d8b51a5cc0a350d64389bc07aef6

                                                SHA1

                                                c9d5ac416c1dd7945651bee712dbed4d158d09e1

                                                SHA256

                                                733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04

                                                SHA512

                                                508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\aggregate-error\license

                                                Filesize

                                                1KB

                                                MD5

                                                5ad87d95c13094fa67f25442ff521efd

                                                SHA1

                                                01f1438a98e1b796e05a74131e6bb9d66c9e8542

                                                SHA256

                                                67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec

                                                SHA512

                                                7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSE

                                                Filesize

                                                754B

                                                MD5

                                                d2cf52aa43e18fdc87562d4c1303f46a

                                                SHA1

                                                58fb4a65fffb438630351e7cafd322579817e5e1

                                                SHA256

                                                45e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0

                                                SHA512

                                                54e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmhook\LICENSE.md

                                                Filesize

                                                771B

                                                MD5

                                                e9dc66f98e5f7ff720bf603fff36ebc5

                                                SHA1

                                                f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b

                                                SHA256

                                                b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79

                                                SHA512

                                                8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmorg\LICENSE

                                                Filesize

                                                730B

                                                MD5

                                                072ac9ab0c4667f8f876becedfe10ee0

                                                SHA1

                                                0227492dcdc7fb8de1d14f9d3421c333230cf8fe

                                                SHA256

                                                2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013

                                                SHA512

                                                f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                d116a360376e31950428ed26eae9ffd4

                                                SHA1

                                                192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b

                                                SHA256

                                                c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5

                                                SHA512

                                                5221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSE

                                                Filesize

                                                802B

                                                MD5

                                                d7c8fab641cd22d2cd30d2999cc77040

                                                SHA1

                                                d293601583b1454ad5415260e4378217d569538e

                                                SHA256

                                                04400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be

                                                SHA512

                                                278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.js

                                                Filesize

                                                16KB

                                                MD5

                                                bc0c0eeede037aa152345ab1f9774e92

                                                SHA1

                                                56e0f71900f0ef8294e46757ec14c0c11ed31d4e

                                                SHA256

                                                7a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5

                                                SHA512

                                                5f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\LICENSE

                                                Filesize

                                                780B

                                                MD5

                                                b020de8f88eacc104c21d6e6cacc636d

                                                SHA1

                                                20b35e641e3a5ea25f012e13d69fab37e3d68d6b

                                                SHA256

                                                3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706

                                                SHA512

                                                4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\promise-all-reject-late\LICENSE

                                                Filesize

                                                763B

                                                MD5

                                                7428aa9f83c500c4a434f8848ee23851

                                                SHA1

                                                166b3e1c1b7d7cb7b070108876492529f546219f

                                                SHA256

                                                1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7

                                                SHA512

                                                c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts

                                                Filesize

                                                4KB

                                                MD5

                                                f0bd53316e08991d94586331f9c11d97

                                                SHA1

                                                f5a7a6dc0da46c3e077764cfb3e928c4a75d383e

                                                SHA256

                                                dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef

                                                SHA512

                                                fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839

                                              • C:\Program Files\nodejs\node_modules\npm\node_modules\treeverse\LICENSE

                                                Filesize

                                                771B

                                                MD5

                                                1d7c74bcd1904d125f6aff37749dc069

                                                SHA1

                                                21e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab

                                                SHA256

                                                24b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9

                                                SHA512

                                                b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778

                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.url

                                                Filesize

                                                168B

                                                MD5

                                                db7dbbc86e432573e54dedbcc02cb4a1

                                                SHA1

                                                cff9cfb98cff2d86b35dc680b405e8036bbbda47

                                                SHA256

                                                7cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9

                                                SHA512

                                                8f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec

                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.url

                                                Filesize

                                                133B

                                                MD5

                                                35b86e177ab52108bd9fed7425a9e34a

                                                SHA1

                                                76a1f47a10e3ab829f676838147875d75022c70c

                                                SHA256

                                                afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319

                                                SHA512

                                                3c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62

                                              • C:\ProgramData\Solara\Monaco\fileaccess\index.js

                                                Filesize

                                                6KB

                                                MD5

                                                0e709bfb5675ff0531c925b909b58008

                                                SHA1

                                                25a8634dd21c082d74a7dead157568b6a8fc9825

                                                SHA256

                                                ed94fd8980c043bad99599102291e3285323b99ce0eb5d424c00e3dea1a34e67

                                                SHA512

                                                35968412e6ed11ef5cd890520946167bcef2dc6166489759af8bb699f08256355708b1ab949cce034d6cc22ed79b242600c623121f2c572b396f0e96372740cd

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\body-parser\index.js

                                                Filesize

                                                2KB

                                                MD5

                                                b9e991c0e57c4d5adde68a2f4f063bc7

                                                SHA1

                                                0cb6b9eb7b310c37e5950bbcaf672943657c94b5

                                                SHA256

                                                9c6c900e7e85fb599c62d9b9e4dfd2ea2f61d119dce5ed69ac3a8da828819241

                                                SHA512

                                                3bbd31eed55c32435b01fe7356d39749e95f8f49222115ada841e751ad36227e6f427efdc4e8bad36d8ccd37c2e92c01fa67c24c23f52023df8c1e1be1a3b4f6

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\body-parser\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                826bd4315438573ba1a6d88ae2a2aa65

                                                SHA1

                                                3e27986a947e7d10488739c9afb75f96b646c4c5

                                                SHA256

                                                0fd31ad69fdcf1e2a94530f9db9c93e96709b690393a14711643123f678ee956

                                                SHA512

                                                2e98ba8e57cb0950e45d20365d16e86ad94a60cfd4cf103b7d55dae02de677985d37c0f771e16ae0a628cb3b59adce8a9e1742cffc298f18cb7d935d72536e6d

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\debug\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                71a7656944ffe50cc27ebe02491ae49b

                                                SHA1

                                                8ebf0f80660d982fc68f00f82855696157e74b10

                                                SHA256

                                                6c3d2c892db282317913ce7c340dd2edccd326bcafd18b644b8738144967d6ee

                                                SHA512

                                                5b0010b41304e212a22d2c89eff65ce410b000c71c4ab8c7fdba8f549ba0629fe27f37c142058b041fb889bc73e00959ad58f673866ee7d29724687da3c3f320

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\debug\src\debug.js

                                                Filesize

                                                4KB

                                                MD5

                                                74bdccf347345d27fe8a4ac3add99c60

                                                SHA1

                                                a2b8a915c86fc750f56a7137860f19ec1182ee21

                                                SHA256

                                                d8d1c1d6c387ab67c3f28d78fd0b20b9becd69442db9d3efe110ca464b509c8a

                                                SHA512

                                                c2d47efee2a4442be6375d623f46b4c7ee9552c132b9229eb284bdd98629edd02664167805b0af9b3faaa9b1906e9ed0c5e383396d4995cef7051f9a450e1b99

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\debug\src\index.js

                                                Filesize

                                                263B

                                                MD5

                                                dd13897ea2eed92695bb7e4e744a9148

                                                SHA1

                                                182314d32e789e4f9c29e3150ae392f1630f171c

                                                SHA256

                                                9a34fedeb2d269c46ed94e6f13039eb0d16d866dd460ec66fa3acd78122fa9fe

                                                SHA512

                                                0b53bc984178336ac516601e72d477d2beeef6936800da17d3a79c153e0036f7428517ebd75d296729f65856c7e07749029f5aa192b2ac071efc4d3e39750a32

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\debug\src\node.js

                                                Filesize

                                                5KB

                                                MD5

                                                25807a97fbb1fcc42a013abc7d7768c4

                                                SHA1

                                                f24d52cbc9144b011def218234ff7b50e7ddcb19

                                                SHA256

                                                a3e83594a4ce88997e2e4fc66bc942b17b9d736290ad62560c7f09d6d0989ad0

                                                SHA512

                                                8d316b63700126d7c8965a886e9b35a332d3f7e68d28f2264d235c0afad28066f877f25821e1983ddde5f2d5052716cc73338779b41b6f4d1b90ad33dc3e9f24

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\depd\index.js

                                                Filesize

                                                10KB

                                                MD5

                                                002a1f3e813cc05d9e3cc011f6601628

                                                SHA1

                                                1690c27457637ec234d6b7658f1b96e547a0eb99

                                                SHA256

                                                4d587a5662e20a7bb9bfe6555afe5987e1b80303a819b447394f37a93297ee91

                                                SHA512

                                                ea1ad9bcf09a73a10dd1fd8a66daac12f87725e16ad27e7beff6d9fda937579976cd5d7ed6439c4122b16178c3ffdf410d6c7a54918f94bc98fa7950adf3bd54

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\depd\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                7f0a9d228c79f0ee4b89fc6117f1c687

                                                SHA1

                                                3c10082c1464a6f589aa10cda88285e780ebf857

                                                SHA256

                                                5a3659bcc2e47b25ebf9f23f38eb9452a58920bfe4b59410bfa6fe84639a3b99

                                                SHA512

                                                7bdd7259bcb8d79aa41777f03d3a3f8a29b60c2d25104072edba9febeb813e12ef78d31573637702decddbaa97d8fec263bc413bd27dd660ded17d644458cbc2

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\ee-first\package.json

                                                Filesize

                                                859B

                                                MD5

                                                3ed21090e07ef5dd57729a77c4291cb9

                                                SHA1

                                                7ffe61f87f94a558fabc177cad5c9b90b16481cf

                                                SHA256

                                                a4eece6ff6b38bf7ac107323f381cc60500097a9cbdd473f5d5b45e68822cb89

                                                SHA512

                                                54de61c6ab428104f9a559ecd3df7868ab7f1b5c8b85a3f658c8dab13d435bd0766c6b48178a1d5bd083b0829f6461158e303538c7d08761b201b17f7c9940b3

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\encodeurl\index.js

                                                Filesize

                                                1KB

                                                MD5

                                                b90cf71779f72e14be703a4e494e968c

                                                SHA1

                                                842f42d9ee581d91ac82a7fa018f61bb3f8ef63a

                                                SHA256

                                                1d0a4e941c1504dcd9bc6cfbb77f7b44d93e56a29cba6f2ccebd78d501a51c16

                                                SHA512

                                                8db5d9a938f397c11c75c77c0cbe6eb609c5d4f81a590f221163fe3291cd0cb2a6286ba8935c8f8cfdabecec9f7e49a5bfa836dc777e936271fbe0daea7414e6

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\encodeurl\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                453a9bb10c91e0ec44f305b14e30ce82

                                                SHA1

                                                73c01b81f34a9978b158df2744ef8c45251d6193

                                                SHA256

                                                30b1a43843675f42033fd6c77c19b20ad4344844f0bd5526c586081e93a48fe8

                                                SHA512

                                                d81ee5f2394493a5f93918ecae6581f82ee529fbbd257e0dc10ea68f09c39d0d19e3a6b0e9560eb1250d88a9b1f591d6469f28404410b16b580cbe179e37da0f

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\escape-html\index.js

                                                Filesize

                                                1KB

                                                MD5

                                                0c95e46d0f08bd96b93cfbea66888afc

                                                SHA1

                                                dfbb19c79eb0ca7ff2625fb1975a35cf47be378a

                                                SHA256

                                                42a7f91883d0c5ce9292dda4e017e1f8664d34b09276d89fb6f3859c29d1ca9b

                                                SHA512

                                                fbeb545274e55f0dface8407a563878083e8d2edc16320a31802e7b4c1dbf6d37f20b772c7436cb1810adb524ef86b3378b6b76a35e0967b6cae58340c58d4ad

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\escape-html\package.json

                                                Filesize

                                                434B

                                                MD5

                                                e9c758769fec9883d5ce3d30b8ee1047

                                                SHA1

                                                f9d3fd64a0196e77965489ce9b81fe4ce3a9ecb1

                                                SHA256

                                                bd320a3e9d23249f5f7d3ce72f2fa426e28a6b2704bd2b281d0c92806a1f5223

                                                SHA512

                                                e54bbb849368a53c620b65d0e4a847869dea8fbb767f3559315d9e031c11f23df4ac9d746b7883caf3f693c748e1b9c90f8789519891ed179399341cd49dcae2

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\express\index.js

                                                Filesize

                                                224B

                                                MD5

                                                866e37a4d9fb8799d5415d32ac413465

                                                SHA1

                                                3f41478fdab31acabab8fa1d26126483a141ffb6

                                                SHA256

                                                4d2f5afc192178c5b0dc418d2da5826d52a8b6998771b011aede7fdba9118140

                                                SHA512

                                                766d2e202dd5e520ac227e28e3c359cca183605c52b4e4c95c69825c929356cea772723a9af491a3662d3c26f7209e89cc3a7af76f75165c104492dc6728accc

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\express\lib\application.js

                                                Filesize

                                                14KB

                                                MD5

                                                15cf9c2f48c7ba6583c59d28908e3e27

                                                SHA1

                                                19c7718f6a3d0f9dcd4ca692c19718ec29aae092

                                                SHA256

                                                5901b32f609ba349351bf7406dbdc0c4c57b77ce6f7215ea67ccca5ac2a28e88

                                                SHA512

                                                c063277a59b83dffc085116769475ec5cce1c47c167b9bd2246e8bda04f0ebc2773b5f06e3b44fc5ed057e043f6d33e77741f34d15e22542134e3865574a29be

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\express\lib\express.js

                                                Filesize

                                                2KB

                                                MD5

                                                d467bc485eddf6d38278bc6b1dc16389

                                                SHA1

                                                e233882de62eb095b3cae0b2956e8776e6af3d6a

                                                SHA256

                                                2f25585c03c3050779c8f5f00597f8653f4fb8a97448ef8ef8cb21e65ba4d15d

                                                SHA512

                                                2add66b4f2e8ce463449ca8f2eac19363844b6ab159a41b42163028c57f07a4245ebefe759a6f90e8685b5bd239c969fe99366eff89378cb8b92b8a703dacd61

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\express\package.json

                                                Filesize

                                                2KB

                                                MD5

                                                3b5b76b70b0a549dce72c5a02756d2a8

                                                SHA1

                                                07786baebb5c52882e28a8bd281c9a36d63dd116

                                                SHA256

                                                bdd67333ab62b0bfeb10ecbbb23936db57b743a3eec580a354591fdf63334859

                                                SHA512

                                                bb266dfa725421fb26d26fda0f45a5fa5cd832667b05f27ceaf4e7fc1e032aeea8700493cfdd2941c3c38cd166eee1000d2b9ae3ddef375714e25a2027a943a3

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\finalhandler\index.js

                                                Filesize

                                                6KB

                                                MD5

                                                d50e9637775204f194d629000189f69c

                                                SHA1

                                                50d1a1725cb273b0a8e30433dabc43d65f55169b

                                                SHA256

                                                96900b458b12085ea16f228151439d9a7bae6b5d45248e355ad617f4dc213540

                                                SHA512

                                                563a8375e3ab7936162a9d209800f8b41c416c1500fe24de817871c3e5489e8faf5a4dcb7fb239f697a8736432356e60ecf1578d0aafc0de80d6e0ae90c34aad

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\finalhandler\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                3d09ac571e0b6eaf8fdb9806118b6d30

                                                SHA1

                                                eb758bb6a7d3e4f32f0fa2f941265678539e74f1

                                                SHA256

                                                243d853d4386c4132508ae9a99e5176b25be7f5cb6967bc1bab241f20e937e72

                                                SHA512

                                                0207cf364e3eac974cae61ec68fe3975fd1f1eb6150f51293ce67f62dbb0f27a3d9c193101ef282dcd099fc653ca73cd3c875c18e5e266964038e3334697b5b4

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\merge-descriptors\index.js

                                                Filesize

                                                1KB

                                                MD5

                                                b4d3859e603602c87a45682862055af0

                                                SHA1

                                                e95cb1c14d70be457eba2ce61b2f4e90a13b21b1

                                                SHA256

                                                88564234b9eeb2f0fe2cc5d03f617a97eb4802f126bdd21aa223c3c87c02531c

                                                SHA512

                                                b17bb8c8b652f27d8037ed60f28b0d19a68e77bcc45d1e2be7dd304c942f6e85570e9720011f983fb8783d670eb66c0c3174d5fd90690b2aa79c2b402adcd00a

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\merge-descriptors\package.json

                                                Filesize

                                                931B

                                                MD5

                                                570e06d8ce0167e07a32ba70fdd56795

                                                SHA1

                                                39dc652dfa419d46d6fed0835444c603c57077f8

                                                SHA256

                                                45ebe570483c48b6460767fc4a0bb69e4dee4bf4becc645b0e0627172a30a580

                                                SHA512

                                                9c8ddf41b3207016935affce00108d87f176a9e473a01f03f1110456397c88ee2fbaf34f9e497e6cbff2b65c4f4c7f254a5129b4c1eaa2b85fbebffb8fe43777

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\ms\index.js

                                                Filesize

                                                2KB

                                                MD5

                                                ae157c9a8e70902576c2d8a06dbcde32

                                                SHA1

                                                0d10ee921436fa5ff5988445cc67676219dfffbe

                                                SHA256

                                                4bd92209cb9dacf3e3773e725acb7aaec43ea9e78540324e4d0f73e5ce9adef7

                                                SHA512

                                                4c2f31f1f2a297ab6c55a21d58a5c26cad22c1ed1913e7a48605111d217257ae2d9f26ea889e8610e011ba9b9c487c91ecdb4cea3437534faf905e8fb89ba248

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\ms\package.json

                                                Filesize

                                                704B

                                                MD5

                                                cbd55880a650b56c3d5acddbbdbee9bc

                                                SHA1

                                                4d354da7ece1c7d5689b8104f3b6f3dcbac7790e

                                                SHA256

                                                30fbfaa3840b2f63978ad4bcd7ed8dc24d277b818e4755fe93eda8cb1bc8b74c

                                                SHA512

                                                e329a6f6a38dd33bd60334a8dec4a91aa6e7dab28f0893240374ae6a303c12646399d821403e3b80eb51317d1808e6abf30bd91b0bd99951f96815a22ba105c7

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\on-finished\index.js

                                                Filesize

                                                4KB

                                                MD5

                                                b1c3d24b92f25989b8aefc7f6aaa91ba

                                                SHA1

                                                3f69307bd04cc4dfe71cd13616509f443b48f923

                                                SHA256

                                                8e16bae14ec63bac9cdbb50572a7b53061fee914712f5e803ff03c44e8845276

                                                SHA512

                                                4225c714bec718d7cc59cd2c91a07a77e41cce3ab52502bf9b5b9ccd7d0ce88c040e0a765e5b2c3576ac8f101dc00fff94f8c7ac7586111a545b228831a11ed0

                                              • C:\ProgramData\Solara\Monaco\fileaccess\node_modules\on-finished\package.json

                                                Filesize

                                                1KB

                                                MD5

                                                436846dd0f4348ac2ee93c9c5eb291e4

                                                SHA1

                                                777e9cd400b42dee1199eacfb325876caeaff3cc

                                                SHA256

                                                c812eca4b0dee2317cb446124cb27ae8e5b993c8fdd0144886b629ef6ef53fc1

                                                SHA512

                                                d261e261bc9d2e5a39a50c6b072e6da995764769abdc4f9f3cf219cc2296c0e45ee194c3f4f431a248fd1d46d90745ad0b576d2fcb24e59d9208804b9c1532d7

                                              • C:\ProgramData\Solara\Monaco\fileaccess\package.json

                                                Filesize

                                                53B

                                                MD5

                                                b9f2ca8a50d6d71642dd920c76a851e5

                                                SHA1

                                                8ca43e514f808364d0eb51e7a595e309a77fdfce

                                                SHA256

                                                f44555af79dfa01a68ae8325382293fc68cd6c61d1d4eb9b8f7a42c651c51cde

                                                SHA512

                                                81b6352bbabd0bffbc50bfcd0cd67dc3c2a7d63bda0bf12421410c0ec8047af549a4928b5c5c3e89ead99aa9240bddb461c618c49287c15d9d4d3a899e8f596a

                                              • C:\ProgramData\Solara\Newtonsoft.Json.dll

                                                Filesize

                                                695KB

                                                MD5

                                                195ffb7167db3219b217c4fd439eedd6

                                                SHA1

                                                1e76e6099570ede620b76ed47cf8d03a936d49f8

                                                SHA256

                                                e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                                SHA512

                                                56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                              • C:\ProgramData\Solara\Solara.exe

                                                Filesize

                                                133KB

                                                MD5

                                                c6f770cbb24248537558c1f06f7ff855

                                                SHA1

                                                fdc2aaae292c32a58ea4d9974a31ece26628fdd7

                                                SHA256

                                                d1e4a542fa75f6a6fb636b5de6f7616e2827a79556d3d9a4afc3ecb47f0beb2b

                                                SHA512

                                                cac56c58bd01341ec3ff102fe04fdb66625baad1d3dd7127907cd8453d2c6e2226ad41033e16ba20413a509fc7c826e4fdc0c0d553175eb6f164c2fc0906614a

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                b679a0892f493a3e8c056711df032690

                                                SHA1

                                                24a074fbf29d39c6bff1b8950b63b5ac46c1b984

                                                SHA256

                                                793df88436a8aa22957e51d9ca70ad35377e25d940159cd63f0913fc63b33ba5

                                                SHA512

                                                523295679f684a101cb1b9f132367b3cbcffc55323ab741f0f8113def5375d99b1cdb7826b3759e770dbd91cdb980468b64cfe16ad6c68f050f602d9c14da41d

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                60c92bb0640409f0c34ba95997985c5c

                                                SHA1

                                                5bf42e17a27ff5bacf2488aa1bcfba0c670ac28d

                                                SHA256

                                                2b6c128d9e9fe31228a52f67813cae06f2862ef140672d1a2cc2d58c1451b908

                                                SHA512

                                                7c936d77b5211387fa69e1d81cfdff5fbc408b723b701d6f44c0df6b4da6f47642c4ef842fac030e0d9f226cfa0a8c11e00a37081c883c03899cb32eabf199ea

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                b2e0c809b71d97e951a537cff754568b

                                                SHA1

                                                b5b82483f8c63f287277aae8e7bc4030ed1e6a51

                                                SHA256

                                                9d3927490fdb9bd826c56fe2ede535892122eb2bc71b2643524a69ca7debb771

                                                SHA512

                                                a35c513cd01716d8dae99605e93ee98ef7291621d004734d83bf62e9912e835a0657ebba6ecb364c449d76ea930a6ffbc9fe3fc386bb61e593fd338611aaa2fe

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                3d418c53a88a533b1668aa0cdb3b835e

                                                SHA1

                                                07f2a73f442ba82be66c5c0fed8422082dc39602

                                                SHA256

                                                ab9e8bf179dfbfa44cc30a570c2789e07764a738b8d5a0a80e989d8898ad5700

                                                SHA512

                                                356ab6f0229ec3cae93829fc03b0d6de13651a8cfd4b0e4e86268fc3f80a054f01bc0a02c508de232c62bf644747c9685b033a86d7c7f421ecfb0559d3ce0deb

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\GPUCache\data_0

                                                Filesize

                                                8KB

                                                MD5

                                                cf89d16bb9107c631daabf0c0ee58efb

                                                SHA1

                                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                SHA256

                                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                SHA512

                                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\GPUCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                e20bc6313426fb1c906ce79e7c518273

                                                SHA1

                                                4c1237e5804ff00763cda8e05f73fc309f81bb3f

                                                SHA256

                                                36b2605c153c0f649593aac14ef908e5a899b46583ed6ed60bd0969b6ca18542

                                                SHA512

                                                742b0388fda98eca32b9074ac0166f1a02e4404737209adfe3ca132c8ed8df81e05851f33a052b96b30fecc2ac430392d17ee6fad8b61cc98c3ab79e5e617e0a

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\GPUCache\data_3

                                                Filesize

                                                8KB

                                                MD5

                                                41876349cb12d6db992f1309f22df3f0

                                                SHA1

                                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                SHA256

                                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                SHA512

                                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                                                Filesize

                                                41B

                                                MD5

                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                SHA1

                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                SHA256

                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                SHA512

                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network Persistent State

                                                Filesize

                                                914B

                                                MD5

                                                917c84b4bff19ac35ec1ed579a76ede7

                                                SHA1

                                                57cd94ffbf329838ab1bb59969738cadecd29e5a

                                                SHA256

                                                ab26ca76ba5bdcdd05d61c7198826917f221432f7b878edbd7ebfaa7c042ad67

                                                SHA512

                                                2d7ad0c7f3efaa68f8be2992a83af6dc8b78e2541042a19b86196cfcd91a30d592379685e62d7c6cd873ccc054b065dc3407c9d4068a43d168dda231be926ea7

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network Persistent State

                                                Filesize

                                                824B

                                                MD5

                                                e3fd62515f7b3ab399006fdeabc8ca0d

                                                SHA1

                                                bac9d02a8df5f4c9629f86e0771a163e64645a96

                                                SHA256

                                                343f8655b72dfea7df53599523a7dd221d31ca0f5d835aa6059589c64d5b2e84

                                                SHA512

                                                062205d2fb083c18b342dbfcf043a32807971d1b0aa3f15cac6df982dfcd56b46bf0dd0cee34ad43b44321d68858e0693ae375e92fc16dfe860f6ff8d0801b88

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network Persistent State

                                                Filesize

                                                914B

                                                MD5

                                                1c3ef5b12a248bf1fdde959df57fc27f

                                                SHA1

                                                b91360d35530507beb925668cdecaff1cfb545cb

                                                SHA256

                                                6d8f74f29f584fc0213bfc1127a39c86846165a28b963ee77e86fe6e59e9ac3b

                                                SHA512

                                                bee72d6564ccd548b7707d27f32e9d41feda5e25bec6e73a5ebc4108e76b6a0f7c9c5d505914022724e9cd2931a1d7ba535765dc6472762980ed3a75615db9ea

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network Persistent State~RFe5e8839.TMP

                                                Filesize

                                                59B

                                                MD5

                                                2800881c775077e1c4b6e06bf4676de4

                                                SHA1

                                                2873631068c8b3b9495638c865915be822442c8b

                                                SHA256

                                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                SHA512

                                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                3KB

                                                MD5

                                                fba5c9954e9eeebdbe43bf56a57473e9

                                                SHA1

                                                6e545e96b76d0cd972e1c6295e96f5780477debc

                                                SHA256

                                                825fdef38d0529fa71ea090ad246fc2856586b37d62d68b178f9286ae1ec1b38

                                                SHA512

                                                37187bb5062238946b4395b57a904b18784686e56f19399977ea99c6bc3e969355e1f7241eb67b4f9078f857c99bdcb3abed53b8b00bd303838cbd2074d5aa67

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                1209e06aec3a4bd9e59b6c7640bf5180

                                                SHA1

                                                a91d742f9c322cd7335e086bd7270fc556da5e33

                                                SHA256

                                                a94a67ff724a73918af59c6c9a4ad42e3a008b4aedcb03b937313eec265f6713

                                                SHA512

                                                b629bb5924ec9ed6cdb9cfe146541c5b8e67fd71e6e8f5f8db7bd1bb3b1d50dd91a3a6bd03f5bb98e189fde8bbd485030fb2d3dc4035682399075bc32ab067ec

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                3da2d990844a6c91443b7b428ef4f05e

                                                SHA1

                                                ad55395806ad6f86c50b1aae60675f84537982c8

                                                SHA256

                                                9b2fe2031890813a6ab56e42b9257e1183e123f6559bc2ac3e57e3eb22f1b19b

                                                SHA512

                                                f1a3de0a487ca1118a1248bd723ae75e473fff20b36d126e7e91367cfd4d69a339f01e788809c2b87bea2449fbc8cf56e62b1ad0a7bd6c580689afbe9128de6a

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                86b1f50d9a3c892dd779629df521c4cd

                                                SHA1

                                                95e8b02c54e41fffa16bf37b736dc0aba855c4ae

                                                SHA256

                                                26e3b997e547626bffd760a8a2b16e8e6c9957972ec5a567d3ca4a7506f943b4

                                                SHA512

                                                c35e625a72ce3987719daddfb967504de1d94efb2769afb00369429a537cea72fa80c4450951621f0b6b7f2ed1c3f25282251feed71d4fe5f61df204216e6014

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                3bac06f1df861b3d993ae7964ea7080e

                                                SHA1

                                                ad9947fd88ca98ef8fc818b55b6d8437648d7b9a

                                                SHA256

                                                67b2721cbe2432ff68aa76140e16d3f540670c28e6ad1781bb9b027547349119

                                                SHA512

                                                38bd9231ae35297031e6b6dd860ef98969f58511416bd149fcc4040e9640de2c781e30f981574717fce776bcd1475551b65dbef0b48150ba7157b260cc5de320

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences~RFe5e5bf9.TMP

                                                Filesize

                                                3KB

                                                MD5

                                                94da8f0b764f2063959b122f0eb8f796

                                                SHA1

                                                8393a721b9772a3321a65d833203f4d7df7305c3

                                                SHA256

                                                b214d8e011517745989e8c54535dc389a684d22fcb5138d2a9833280603a6e38

                                                SHA512

                                                45423d8875b547f961e7c6461863d295566bf50b7b3cf9853b2fe6ac938b0d6d5f5f26962b21f17009ed6fd20f18814be661a55a5c8fbbdb4e0825a7dc169913

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\TransportSecurity

                                                Filesize

                                                704B

                                                MD5

                                                8f14d311d29b48610d890d89cd15b73e

                                                SHA1

                                                34b43251dccdd20906f0c466f31d336897952eff

                                                SHA256

                                                9a70d4b31ee21930d2e10e6b94beebbeaf0deeea888ab40be6cd23c3cd258785

                                                SHA512

                                                3aed963fb57e0de3492bd8c37705eac59e9f64000989802f521460e07b5c26d270074fbf4e48d3cdd3fb38fdac4e187846ed494d96f7d0ae752b373069d86fe5

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\TransportSecurity

                                                Filesize

                                                706B

                                                MD5

                                                7ead43efb3e875154b428d2e55552be3

                                                SHA1

                                                c4c9937fbd861e10ddfef2f237af1b1a2d9d079f

                                                SHA256

                                                05a54d55475f3bf979f8cd5d499803535a13110ea82c3acf63c9f31da5eca9ed

                                                SHA512

                                                e7c49945247ece8a9c88f064d01b93edb586b8adce4b94e18b79599ad478dbd810ae30f7b264c6a980c16047726aecfbc882afcefdc28a49d0fc3e2177ca4de3

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\b19475ff-b71c-4687-82f0-89b6d31c714b.tmp

                                                Filesize

                                                1B

                                                MD5

                                                5058f1af8388633f609cadb75a75dc9d

                                                SHA1

                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                SHA256

                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                SHA512

                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                206702161f94c5cd39fadd03f4014d98

                                                SHA1

                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                SHA256

                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                SHA512

                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                aefd77f47fb84fae5ea194496b44c67a

                                                SHA1

                                                dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                SHA256

                                                4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                SHA512

                                                b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\GPUCache\data_2

                                                Filesize

                                                8KB

                                                MD5

                                                0962291d6d367570bee5454721c17e11

                                                SHA1

                                                59d10a893ef321a706a9255176761366115bedcb

                                                SHA256

                                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                SHA512

                                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                9KB

                                                MD5

                                                594de69b77ba8cea03ad138a1cda4836

                                                SHA1

                                                60625cba2488de65865432bbf67f3d745b91910a

                                                SHA256

                                                e357c8648822ad1e4ca0340c01bf089826d484465e11d042519b67aac5fe2db3

                                                SHA512

                                                8650d5a7a40aa28b36135a1245f059f15b8cec37550b4559c2cff4152cfa582b5f24a774c86328dedf1672ec02a0ef0a2b58527b1ac46db02398126a903f5ffc

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\bb055dd1-cf64-4ac5-9f37-fd29e95c53fe.tmp

                                                Filesize

                                                8KB

                                                MD5

                                                d7ec1590252ecdffaf5c8e34a72dcf70

                                                SHA1

                                                fa9e4e7c5a5dc4c436409a8356394e61c8c0a555

                                                SHA256

                                                045144977cedcf8251426c553c8b38f01660bee66104df7ad2a7f6c119be2f7d

                                                SHA512

                                                4421e28acbebdffc6562eb312f9b9dac4ff8897c8818c9309829d12e00e88413b846e4cde907cf7b66f68b8f7af07c72cb99bb01284eaf576e0abf587747d5e8

                                              • C:\ProgramData\Solara\SolaraV3.dll

                                                Filesize

                                                6.8MB

                                                MD5

                                                c3d8a566119d8fee7fb2d0db4dea86e4

                                                SHA1

                                                c8094d474337ccf4dda2b1888a8235f73c20eaf3

                                                SHA256

                                                ca8df8f0b5d9981ed0e284f809472e8013252e59bed1a0f08c98a4b0726920ee

                                                SHA512

                                                0cd41d5d7c90e4f780dd92b03ac0938dbbf082c5658ee660c31986cd8e9d9c68f386b9989373cdd25c34a21943c266495c4f4c85b44487bb97d0edebb96555f7

                                              • C:\ProgramData\Solara\Wpf.Ui.dll

                                                Filesize

                                                5.2MB

                                                MD5

                                                aead90ab96e2853f59be27c4ec1e4853

                                                SHA1

                                                43cdedde26488d3209e17efff9a51e1f944eb35f

                                                SHA256

                                                46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                                SHA512

                                                f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                              • C:\ProgramData\Solara\bin\version.txt

                                                Filesize

                                                5B

                                                MD5

                                                a550e39a1b99146581652915aa853a6b

                                                SHA1

                                                3509c9a74b8fbdce7069149a65b86c70d1fb37c0

                                                SHA256

                                                f637e389c425692bb6ea379c4bdebef58ae2aea6aef7d28488816613e7bf9374

                                                SHA512

                                                4a62903c599ca8cc0ed9f48c9dfbf1cadc4953e2c87a9c5fdd71bfd8f689809c9223bf51f0190e177eb477cd7322c64812c8b4061065346d22a95b79d1c52104

                                              • C:\SolaraTab\main.lua

                                                Filesize

                                                37B

                                                MD5

                                                066abfe20ec7d291490b4579263f2835

                                                SHA1

                                                481c6a2c1b9e9cf6720e3b137bce243baa2c8b01

                                                SHA256

                                                2912fcfef3899f650b85ac157fcf706a08b512b0c6dc9b7ab857dddf797492e5

                                                SHA512

                                                c0b42952c90d14b4ebd81b5a1f8424df13020f423563a01c7a9d57156f2388b2e395996d0f6e2079aafb3115ace27edc27d1a6fb61f8ebfead59ab07bc9d025f

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Bootstrapper.exe.log

                                                Filesize

                                                1KB

                                                MD5

                                                b9aa6d2ae7fda3d4487a6b9d0b40c3da

                                                SHA1

                                                3d17d741be40d1b10e2c984c2fd4573c371ddc4d

                                                SHA256

                                                dcbcdbab49c35e623c96dd82e13a2bfcb434dbfd511c1451f8c8bb5d4efb7d0a

                                                SHA512

                                                c387d9bebe8a74f8129eacc8c53393e7c12bfd48966204c574f5c8d971b490a1f48c65643c71fed02fb8568033fe789b527c44d15be951cc274bfbf812e3d0f9

                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\70385b48-845f-4f55-9568-30bca2914fdd.down_data

                                                Filesize

                                                555KB

                                                MD5

                                                5683c0028832cae4ef93ca39c8ac5029

                                                SHA1

                                                248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                SHA256

                                                855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                SHA512

                                                aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                Filesize

                                                10KB

                                                MD5

                                                b947845393e45e20d9b4ed2c3771cd6f

                                                SHA1

                                                e58b852ebb7b0bd8304a655409b346b76c049193

                                                SHA256

                                                c872713127c09097b2d5e67699c2e1e7b3ce4b8d8ddf040247793f934f8603e2

                                                SHA512

                                                b7261ff61519763144c7a0146379454d861353155f3b6181cfefeaa08b4a251d67b072bc9e5b9cf560559977a0cd82b5751e55e89bc7e8c75f86d47d6f8fe7ee

                                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                                Filesize

                                                11KB

                                                MD5

                                                b058dc8bb1b012d746801594c46f237b

                                                SHA1

                                                be2033bdcf90dfa155268948e0ac19dfdd80f15b

                                                SHA256

                                                a54c426f3980e41e824e7e180a002127dfdf6732da96c24428bf36f3de1ff4d0

                                                SHA512

                                                3f99a4a0569af6621f298bd53d940d07ab6bbd50e624a5812c069ce14c7a7eb13657b5f43267655850c06ad82f2d0a34326ceb76051559082a7a4bee2560d8e7

                                              • C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi

                                                Filesize

                                                30.1MB

                                                MD5

                                                0e4e9aa41d24221b29b19ba96c1a64d0

                                                SHA1

                                                231ade3d5a586c0eb4441c8dbfe9007dc26b2872

                                                SHA256

                                                5bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d

                                                SHA512

                                                e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913

                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                Filesize

                                                2B

                                                MD5

                                                f3b25701fe362ec84616a93a45ce9998

                                                SHA1

                                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                SHA256

                                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                SHA512

                                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                              • C:\Windows\Installer\MSI308.tmp

                                                Filesize

                                                122KB

                                                MD5

                                                9fe9b0ecaea0324ad99036a91db03ebb

                                                SHA1

                                                144068c64ec06fc08eadfcca0a014a44b95bb908

                                                SHA256

                                                e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9

                                                SHA512

                                                906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176

                                              • C:\Windows\Installer\MSI358.tmp

                                                Filesize

                                                211KB

                                                MD5

                                                a3ae5d86ecf38db9427359ea37a5f646

                                                SHA1

                                                eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                                SHA256

                                                c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                                SHA512

                                                96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                              • C:\Windows\Installer\MSIB59.tmp

                                                Filesize

                                                297KB

                                                MD5

                                                7a86ce1a899262dd3c1df656bff3fb2c

                                                SHA1

                                                33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

                                                SHA256

                                                b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

                                                SHA512

                                                421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

                                              • memory/688-3025-0x000002B71AF40000-0x000002B71B0EC000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/688-3275-0x000002B71AF40000-0x000002B71B0EC000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/688-2898-0x00007FF9914D0000-0x00007FF9914D1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/1544-2808-0x0000027F9DA70000-0x0000027F9DB22000-memory.dmp

                                                Filesize

                                                712KB

                                              • memory/1544-2803-0x0000027F831C0000-0x0000027F831E4000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/1544-2805-0x0000027F9DE00000-0x0000027F9E33C000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/1544-2806-0x0000027F9D9B0000-0x0000027F9DA6A000-memory.dmp

                                                Filesize

                                                744KB

                                              • memory/2948-3326-0x0000025704B40000-0x0000025704CEC000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/3016-3419-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3403-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3375-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3366-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3354-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3351-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3348-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3336-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3307-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3280-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3279-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3282-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3016-3281-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-3265-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2882-0x0000020669290000-0x0000020669298000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/3032-2876-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2877-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2880-0x0000020668EB0000-0x0000020668EC0000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/3032-2878-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2875-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-3081-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2881-0x0000020669B00000-0x0000020669B90000-memory.dmp

                                                Filesize

                                                576KB

                                              • memory/3032-3033-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2884-0x000002066CE50000-0x000002066CE88000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/3032-2885-0x000002066CE20000-0x000002066CE2E000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/3032-2990-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-2874-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-3048-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-3110-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3032-3045-0x0000000180000000-0x0000000181168000-memory.dmp

                                                Filesize

                                                17.4MB

                                              • memory/3448-2387-0x0000016FCC820000-0x0000016FCC832000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/3448-0-0x00007FF970EF3000-0x00007FF970EF5000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/3448-2810-0x00007FF970EF0000-0x00007FF9719B2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3448-2385-0x0000016FCC790000-0x0000016FCC79A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/3448-32-0x00007FF970EF0000-0x00007FF9719B2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3448-5-0x0000016FB4000000-0x0000016FB4022000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/3448-3-0x00007FF970EF0000-0x00007FF9719B2000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/3448-2-0x00007FF970EF3000-0x00007FF970EF5000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/3448-1-0x0000016FB2100000-0x0000016FB21CE000-memory.dmp

                                                Filesize

                                                824KB

                                              • memory/3468-3026-0x00000238A2D40000-0x00000238A2EEC000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/3484-3325-0x000001ED85F40000-0x000001ED860EC000-memory.dmp

                                                Filesize

                                                1.7MB

                                              • memory/5792-3399-0x0000028094C30000-0x0000028094DDC000-memory.dmp

                                                Filesize

                                                1.7MB