Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-01-2025 03:42

General

  • Target

    Bootstrapper (1).exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 38 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 25 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • cURL User-Agent 6 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper (1).exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:888
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1880
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe" --oldBootstrapper "C:\Users\Admin\AppData\Local\Temp\Bootstrapper (1).exe" --isUpdate true
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
          4⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:324
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:4404
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:2888
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:1460
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:4596
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjQ0RkM0QzYtNDA1Ni00NTlDLUJGNUMtMEU4QTUzMUY0QjJGfSIgdXNlcmlkPSJ7OTM5ODc4NjAtMzY5Qi00ODMxLUIxRDYtNjA0RDEwNTREOEFCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntFMUZDQTA2RS03MUNDLTQxQkEtQUNGMC0wNUI5QzM2QUNBNDJ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDk0NTQwMzc5NiIgaW5zdGFsbF90aW1lX21zPSI3MzQiLz48L2FwcD48L3JlcXVlc3Q-
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks system information in the registry
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:3408
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{244FC4C6-4056-459C-BF5C-0E8A531F4B2F}" /silent
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:4416
      • C:\ProgramData\Solara\Solara.exe
        "C:\ProgramData\Solara\Solara.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=3768.1676.15288918268560659114
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • Drops file in Windows directory
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:320
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.265 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=131.0.2903.146 --initial-client-data=0x184,0x188,0x18c,0x160,0x1bc,0x7ff81ca86070,0x7ff81ca8607c,0x7ff81ca86088
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1384
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1840,i,16245688349058868276,4941926421716061883,262144 --variations-seed-version --mojo-platform-channel-handle=1836 /prefetch:2
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4156
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2012,i,16245688349058868276,4941926421716061883,262144 --variations-seed-version --mojo-platform-channel-handle=2136 /prefetch:3
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3832
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2036,i,16245688349058868276,4941926421716061883,262144 --variations-seed-version --mojo-platform-channel-handle=2364 /prefetch:8
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1604
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3608,i,16245688349058868276,4941926421716061883,262144 --variations-seed-version --mojo-platform-channel-handle=3636 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4860
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks system information in the registry
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMjMuMC42MzEyLjEyMyIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMSIgaW5zdGFsbGRhdGV0aW1lPSIxNzM2Nzc2NjI2IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzODEyNDkxNDI3OTAwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjE3OTg2MiIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDk1MjA5Mzc1MiIvPjwvYXBwPjwvcmVxdWVzdD4
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks system information in the registry
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:408
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\MicrosoftEdge_X64_131.0.2903.146.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\MicrosoftEdge_X64_131.0.2903.146.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\EDGEMITMP_4AB6B.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\EDGEMITMP_4AB6B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\MicrosoftEdge_X64_131.0.2903.146.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\EDGEMITMP_4AB6B.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\EDGEMITMP_4AB6B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.265 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{CD86F4A1-C3A6-4773-B32E-18C7E483EDA8}\EDGEMITMP_4AB6B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.146 --initial-client-data=0x240,0x244,0x248,0x21c,0x24c,0x7ff703512918,0x7ff703512924,0x7ff703512930
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:396
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MjQ0RkM0QzYtNDA1Ni00NTlDLUJGNUMtMEU4QTUzMUY0QjJGfSIgdXNlcmlkPSJ7OTM5ODc4NjAtMzY5Qi00ODMxLUIxRDYtNjA0RDEwNTREOEFCfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InszQUFFOUI3MS00QkM2LTQzMzUtQjcxMC0wNDdFNjNFRUExQzN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzMDE3MjI2LUZFMkEtNDI5NS04QkRGLTAwQzNBOUE3RTRDNX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEzMS4wLjI5MDMuMTQ2IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTYyNDgzNjc4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks system information in the registry
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\EdgeUpdate.dat

    Filesize

    12KB

    MD5

    369bbc37cff290adb8963dc5e518b9b8

    SHA1

    de0ef569f7ef55032e4b18d3a03542cc2bbac191

    SHA256

    3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

    SHA512

    4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeComRegisterShellARM64.exe

    Filesize

    182KB

    MD5

    8f7c44e937ecc243d05eab5bb218440b

    SHA1

    57cd89be48efe4cad975044315916cf5060bc096

    SHA256

    bc3cdd57a892ce1841787061e23e526ad46575460cd66c1dc6dcf0f811563d59

    SHA512

    9f0020b81d1945fea12efe1a0a5e59caae4a01432429e065e35c73b15db873253094b2ff1f8903a348446dfc9c9fb658f8bfed8c25bc56e8b546c16304a385a3

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeUpdate.exe

    Filesize

    201KB

    MD5

    70cc35c7fb88d650902e7a5611219931

    SHA1

    85a28c8f49e36583a2fa9969e616ec85da1345b8

    SHA256

    7eca199201273f0bcff1e26778cb535e69c74a69064e7759ff8dad86954d42b1

    SHA512

    3906ddb96b4b1b68b8c2acc940a62c856e8c3415a1b459f17cf2afc09e05751e0086f8e4e5e0ddd8e45cfb61f811bbe4dd96198db68072b45b6379c88d9ea055

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

    Filesize

    215KB

    MD5

    714c34fe6098b45a3303c611c4323eae

    SHA1

    9dc52906814314cad35d3408427c28801b816203

    SHA256

    fbf495968c4a385ff0790e6b65d26610ef917a2b36a5387eff7ae79d7a980ac5

    SHA512

    68a65496275a1511b2d3bd98ac5592cb1c1eb9df0448471a8985cb2f458c66163e6d55545940de72dea80118ff8ec7ba0ad3276f51095f55c1243fb9f3311345

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\MicrosoftEdgeUpdateCore.exe

    Filesize

    262KB

    MD5

    c8b26176e536e1bce918ae8b1af951a2

    SHA1

    7d31be0c3398d3bad91d2b7c9bc410f4e45f37be

    SHA256

    be6ab7dd506e44a0a9eb0dd531929bd8aa0796d85a0353e6944bc6bf1630b717

    SHA512

    5a362cbabebbffbb0797646576b65e2934a3b0a30306d74078ef2448fea3940df14f0b8f149691a100cc170bd548c9b420dcc8aa41eb1ea0700c9f155626c565

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\NOTICE.TXT

    Filesize

    4KB

    MD5

    6dd5bf0743f2366a0bdd37e302783bcd

    SHA1

    e5ff6e044c40c02b1fc78304804fe1f993fed2e6

    SHA256

    91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

    SHA512

    f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdate.dll

    Filesize

    2.1MB

    MD5

    40cd707dd3011a9845ff9c42256ea7e3

    SHA1

    4045ae709979f75b1cf32142c1137b4be2ab9908

    SHA256

    9f4c7072716e0be1be08207a7024a5e41162e288e677d805be8e5469a8bd4909

    SHA512

    bf1ada8a0d9c3d9f39fb739d05fc4a61f0a7e0e1bb5eb44e6f0f5f58381ee6d80aad89dbc3211b70a6294fc69d5820c70fa8488ef2f793a3710ecff5ee90422e

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_af.dll

    Filesize

    29KB

    MD5

    e91e279752e741b25cf473338d5aac88

    SHA1

    2b8ea61868a26408cd1dd351cca5139a046bbb7b

    SHA256

    5635ecedd84330f070a9d6f4cea8b8b81e9dad8592d336ebfd236b7d67e58acc

    SHA512

    7404cdb82309351a21415b045fc7165137492aa262d00fd0f74bad4262ce10e86c3bde1718c38757b7133e41d044035e731c52cccea285d659c4a570776ae535

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_am.dll

    Filesize

    24KB

    MD5

    bd175cb3dfc1d43944223bd5d7177539

    SHA1

    193623dc372937f31a545344d340360665b8d69a

    SHA256

    bf0d65cebe0c29f15a616a0dda2f1a414e3f96fe7a28ff7876e811855be6621b

    SHA512

    f5742352852837ce16f3cf1655e4d41e301f0351b68c7346457978aa310b95b69b1070741fc2ab8be5ff449f6fd44660df3b15811630efc1420ced1455fcaf5f

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ar.dll

    Filesize

    26KB

    MD5

    42015aafd53012b9c8afa009ee501fa0

    SHA1

    c1fc049feab4fb4b87faf96c31b3d1160f1c1d39

    SHA256

    86858a1807e6cf0b91565ed7a5a15db24720b0a7f60ae41e67dbf9faeb6ef2fa

    SHA512

    9ce323da000b51480ee35973872fc7d181e1f69e820ac737c62c36eaa81eb99965bae39fdd394459adfaf8f746f5dc3b768015e01d8724e2d0718f5286c29389

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_as.dll

    Filesize

    29KB

    MD5

    8a54873d54a41442b62f9fea9492d3a6

    SHA1

    fb19af151b15f4bdb7a555924f1835b0337ff1d7

    SHA256

    af9bdd050b27b8883f72e3596179fe244a6a2e3545950c82889aac7198cf3c32

    SHA512

    7cc0a578586853afd027264c3898cb1460b23a47eab9c79e064b9f327fbdee6e3f9bc7043a5a76a710ada05edae4ac0b47529be3ae67ca9b5afaaa16151797c7

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_az.dll

    Filesize

    29KB

    MD5

    e47db9afb646fb31cc8650837f487134

    SHA1

    f304204c908ea1fe2bcaf76040d5d1f13f1e99e0

    SHA256

    4e03ed7a538793fdcd4c646c62ddd278c46911099e6485bb2644a17ad3a8ecf6

    SHA512

    b2b01c86c78ec3450635c0fdef9666ce302600956e8def3bb02d205ba2a11b3d422520a64361c6f666998bd82b5557ec96cbcaba9e1b712c756e75128c8f9bc0

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_bg.dll

    Filesize

    29KB

    MD5

    5887cd452245dc7bd0389a0ad5db98e0

    SHA1

    6486d0ae59ba338e8bce87b438f86691e955840d

    SHA256

    922a102cae4e74bfc0b402bbb136116eddc71a8adcf7f1268d48006c858d1d60

    SHA512

    0720aaebca04e84d8af2d7b153b0fc51e5651cf664051b8c4b44159ed4c6328eb237ba4f4c97bebedbb1a45ca5c1d0f249cdccac76c6d5619e0e761d12aaaba1

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_bn-IN.dll

    Filesize

    29KB

    MD5

    6aab6d42c7b7a90523a3272ad3916096

    SHA1

    cc638bd6ec6478734b243de2daa4a80f03f37564

    SHA256

    67180722f255985e849ec3ab313dcdc0bf2834bad7b6163a0b14587fdf4b4c66

    SHA512

    ebc17e0ef86b8e5bb938040ad78b299e33d1228c730666526aab27e464626b71ea900cb6dbe074bda5e42e77cd569b083637e233d757b8b0bdee2df2e0c509f2

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_bn.dll

    Filesize

    29KB

    MD5

    abc20df0545611a835dcd895d2832cca

    SHA1

    39e90363156c461e5aef64a714ba43cc61617ee5

    SHA256

    75d8c2e259b4d113c0967615af61e8f54eafb49c498767291627faae9fcf504b

    SHA512

    732f31d175f08c5c69b9cf540e2b0e72b8986b44d1ebfdf0e56eb56b68bea64e6446932a546f1fc30dbbbad4ccaf6bc935177a6348c5280ef786d6d8dfa7b325

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_bs.dll

    Filesize

    29KB

    MD5

    327e92c7a55ec996ce09dfcf8c89e753

    SHA1

    2a51c99519257ddebf0d8280d46e0c0fd416e7a5

    SHA256

    2b61608a7aca43b7ea4374b79acc6e15deb382eef0fa8751c8e57e03e061cab0

    SHA512

    ac3ca0f66b899759f0d23ba64ff291486edb1e1d3bb626ad3efe3e3a6fd2aa4081411546e4849ff1645dcd26161f35defbd8442278e6d6f66311780c60474296

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

    Filesize

    30KB

    MD5

    e0d2675c6de1b8d4e5e463246529a304

    SHA1

    132dace535b9cdc7a4e5f6137407d5becb23c4c6

    SHA256

    4af082aa0193b9b15622eba1f6165d0b6032b4dab17ba16a8a9affb267ebec34

    SHA512

    afafc1ca5abc636066ee98a6c68356d68f506fe3734a4b3e68073eed1f2ddc51840464e91d3cd3b28648fcc26b9457ef6484100f9543739220ad75a9eecb1e90

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ca.dll

    Filesize

    30KB

    MD5

    bfac1c3869df5375aedb24458cf321b7

    SHA1

    848232c155c7dca65f6cb22d27a72f2c78e964d8

    SHA256

    a9f5cf25b9512e1d30ecb769a5eeb694888b72b7f05b78c417814802c5aedbd7

    SHA512

    732270e8e8036f8ec59c214ca3804c6c67420bcf5fd633347c764f90b06b25fd73a0c7aa75ec42461ae3d3570fbfec5c5a7eee10e8d494b805b7c7e0d4aa227e

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_cs.dll

    Filesize

    28KB

    MD5

    c5681c3b4a8145d3b6cbf51e3f0b12fb

    SHA1

    908a0546ce091906aa5e7728660b838bf1e619e4

    SHA256

    2b47a6c19ec492149eca6afb03ca82ac1418a727f35cb641bce9f22136dd3459

    SHA512

    06c850119b5199bfcec41abe2b5e6929e0a960b69337c6048e0dbdd37ca56401885785de96cec235093a4d6536d9de55178a4c739a6ebd5e34514e12635b6d31

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_cy.dll

    Filesize

    28KB

    MD5

    3206ad1fbe5c53d278607da7767b1996

    SHA1

    6964da8787c299e71f8428b22ed8ff6909912034

    SHA256

    9ea2727ca92f74c7c35ea22287f13ef262241a905567b908e2860f19e044a848

    SHA512

    38281ab3590a2e6210d1d9c0d1f5a4a3ef19772065f87d94570bb448fb83ea0579aa8bac9e94b05ba2b6bb2bb882f1be6d45c921c52ca2f0608056512fb3338c

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_da.dll

    Filesize

    29KB

    MD5

    7f0ce1bf90bc88d5fb4d32d359063868

    SHA1

    59d8ba8397c325ed7b2dcd6a262906795549af6c

    SHA256

    1147a2cac674209b9087f7c81c09000a2177bb7d42d0d518e3c93d8a9ee2d7fb

    SHA512

    5cd723cad43388c7e2db4452caa20c07e73a676c82bfaca27a293ab70acdbb115fd82c7a65dee3e6c6d8969c4b99e90ce832760b6f7ab47e9a4f631ce53813d7

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_de.dll

    Filesize

    31KB

    MD5

    d9eb30f1811161a6903901f1ff316ebd

    SHA1

    7ce5e34af30e821a0bbb7074da57636c1be15d6f

    SHA256

    73b4fab09f7f224b2527dffdb617b7f852c78eca8989d493ba2fa2201b1becf3

    SHA512

    9d2e2a44fd027c30836254de1ec99fdff4bad2d3488f25d88a9f80f5f994dd5c660903dd3586dca85fa9e1a269ac8c51b5a060156fa65dc1df0d8137bf878c82

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_el.dll

    Filesize

    31KB

    MD5

    85dadb4cac0d76fd821346c411d5c3d0

    SHA1

    999dc0bd7250f71465f5098dde263a7a82ba7b3c

    SHA256

    1392f864c486e4b4b6859d900b12182f5ad5ec90e183808ab7ed0049aedd807d

    SHA512

    649833bf473139db879c2c7218567c49ad6436e3af1efdc7d9e9d48b8d3347e2bfacd6140a59d7973fa9df9cc9cab0e042bdaa7dbf32846bdf6b812b7ecaef07

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_en-GB.dll

    Filesize

    27KB

    MD5

    5d4f7ab307f71d761a7f0e193f4b2ca1

    SHA1

    a3580268a98ad5242c7c56fa759f39276b6149de

    SHA256

    e2f0a11b5269b08261397e2ba8e2a5e44d5bf2e042a1cb91ad395d7c274b44d8

    SHA512

    307c489db833e4f2c74ab5201909ad2c53c691e0409f5abc29540a84d1c5ae146a072fecaa0ac886c83e4521fecc58ae5b0ff4331f3b37f39114d1fdea731021

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_en.dll

    Filesize

    27KB

    MD5

    cfb71031c56d9e8b9490d01fbe86302c

    SHA1

    9e11ecf5efc88e0beee1db46620bebc73f86dd21

    SHA256

    b18e14d0e24546193822b83996c5b311500ca213beb4d497cbd1dda9dac9db2f

    SHA512

    9cf993ea53673e416eead78d45a6d700b74001b69b1b987d479e77348ea8dc151f4ba6d6b1220db21ce792f9da51b9c83f33663621f9350b848a766ceae92370

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_es-419.dll

    Filesize

    29KB

    MD5

    b25a10d8b739ac2eac10b7b7fc7a61d5

    SHA1

    ec993d8113e4c0a4a1b36920a8991521e4f7eb57

    SHA256

    cad0cef66ad1097dc11e6396d0a0fb11ec1734acfde15e9eae402ba0d068615f

    SHA512

    315971e819d2c3dc5fc30ffe2275c3608125f1e4f14dbeb39aa0fd014291dec0c5efb3e02628bf345c92ea0faaa38e30d4ed5c3793995afff9cb9c933f234513

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_es.dll

    Filesize

    29KB

    MD5

    6c3d219e2169f5566a8bed031b21bdc4

    SHA1

    073a61c02b87e37e87fd3c8e609a56828ec49a47

    SHA256

    3a841555813f21928fdd45003a3f694a87074869b001b3e063eb97ad35d8fe17

    SHA512

    2b57d8325ada86a1ea01df0c7d0122875450f913bc8c21d8a7dd44ac7037a170e2f4fc92c13c58980aa9371a7bdfdfee34b9e188e16ad0b89181f7f901467152

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_et.dll

    Filesize

    28KB

    MD5

    27d45a84e2b94a60d5a821597fdad6dc

    SHA1

    2125fe5fbaa2db280a859ef3a7d27ba21efec036

    SHA256

    65f3cd75a7121dc3d417a9c3180bb52b485b5e7d0ac3b483fa355d13515f970a

    SHA512

    eddccfeee69b7a53adf32e72724ec8ba1668d1927322ce61429a4c663cf3d17e3f6f59fe1930b96f78faa70d30edfd7845ba53cc161f06a4e67ad43d11cd576e

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_eu.dll

    Filesize

    29KB

    MD5

    d8323f3db20d104441f548decfd022ba

    SHA1

    de7f58b9ee7cbcad73433a17ff55385fd7e91035

    SHA256

    d07d8eb066e953af02a6e3a160232a73c1b66bb54d93d6b2ebc1557d1d322358

    SHA512

    7de3a803131086c3368d4acada0b6a29ef4ed4102a151eb000056c233da4853c97e394c98d6fd856714758ee17a0cc4c3df061a1b5d2b2b3e3bf95447bb729a5

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_fa.dll

    Filesize

    28KB

    MD5

    6ba182cbb744541288629a2464ba99e6

    SHA1

    366751e425128654514dc82112238a7d6f4c9908

    SHA256

    cca362dd297b8d8e20893cf4da8cf9efc9848f97a04a9d69cabff67ae947607d

    SHA512

    ab3da91d7ab7150100b580d7b25a5fe9cea67affb1c4ac9e479b70e2d17ebb14a0745bf62ffb3792b8ce4cbea130cbd0012053a5dba7930252e2c09b763ea658

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_fi.dll

    Filesize

    28KB

    MD5

    e7a774a7b404ab800efbdf7ea52e7ead

    SHA1

    3f0476821281614b9ee32faa5c534de5f6dc21f9

    SHA256

    1e1f09beed91a6a84535a1cf2b4df5e416cbbf785546f798d736009e31f95691

    SHA512

    85091f8bf809e88e248f4a899682f15586a083d1bb94cb5674da0e463716fa927ebef578519b653ac4ced381f98c4cf7a409c1ed52927dcf7fce4813008ce900

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_fil.dll

    Filesize

    29KB

    MD5

    1223e486deb013055cb0b7729681b9ed

    SHA1

    b5b43fa89f066a9b6ceb47389c05b69ea6a784ba

    SHA256

    fae283a78757cdc548c728a38cb041db4ffe538c5ee7d2aa2f55e3469f95fa25

    SHA512

    8862d2f4778bfd0659dcf9dfb992072767af30dea46b34d626580ab8183a765d0c0f95a7070f0aa36e694d9e559f843672000aeaa4d8abdca60ff83da5a2b857

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_fr-CA.dll

    Filesize

    30KB

    MD5

    9fea64a22d045d8edc38a9b8480a9c12

    SHA1

    e3342e26166a43a21729b8aadeca653c03dc0528

    SHA256

    2f324851f0ccd101884b78fe1eb07c2da2932a68015eb8cfb4c801e288c8771b

    SHA512

    a3601640cf961c88efa476125a71786a109d23355922eda45b5be8824ccce650d703546c5c8c281308dce208edabbeea5cbc3b44ed678d9d36970c4e5f236c0f

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_fr.dll

    Filesize

    30KB

    MD5

    498dddf273f0f2973b1c4581e820f10c

    SHA1

    aa048015a3ed6ebf9b4848a9cc54beb5e39eedd7

    SHA256

    9ec8cec72404794a2b2a738502c7f531d976d8c99a57d2b5d2f0f2e818e35e04

    SHA512

    3596b20469daece28496a13b02ae0c1cd9265fc0046e1fffc384b8a16a4869402831386679c3e9cdfe03903df0b191d2fdc04cc531104c9c0d84bef24eb4d60e

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ga.dll

    Filesize

    29KB

    MD5

    81d35302b31bef2a99e154eb64abbaa0

    SHA1

    ea72f2aa526ea299d5515921fa0ac8f502ce3cde

    SHA256

    0133af05b669f957174a22b0b568a17a9bef1e387f52ae157766fae42d4e647d

    SHA512

    4d1df9684e7247ec0d8fbfdcfdb6ac5b2811de649c5b7ee4a20e5733307cdf5855ff767ebcb12ba15b33be58d82bacf9a02522126d927304e11f8e64261b46bc

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_gd.dll

    Filesize

    30KB

    MD5

    2e88f4aec46a293b3ec9bca2d7d2fe73

    SHA1

    ba34b9635832b2704942d7cd8578c8d70f0ffd2e

    SHA256

    f7278ba46204bfa387eff0e72fb2a8dd32ccea154fb268a8c39b03ad5334cf38

    SHA512

    b7f655cdaa3a34a8e0e00186cc49986cf283785a133af87ae47c3a3614f0d15d5b51b4091ff33bd0fc445815665edd37d378a9665d3831d2281b0bf6cc933c87

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_gl.dll

    Filesize

    29KB

    MD5

    2dcb17e8da6ed1a62a53029940592cbc

    SHA1

    b12941091cd1a554cd23d38dffbf75ec8ff57848

    SHA256

    a6770040c2f93ffc5c542dcdb1e7ea529d6036920957a9709153d80d360b178d

    SHA512

    0c82b39c7128d81739f64346948784c60d2cc409b637d5ca79825ef12766c10861ac3c119a5f232b12f52e50d3ba6818532968c75fbf455e75bd3be83c931f10

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_gu.dll

    Filesize

    29KB

    MD5

    571b69e1a8f9cac5eca53ba624aae924

    SHA1

    89798cdf858a4ee42ab4ffc01055c0463b6c4c0a

    SHA256

    37e67d7511d261ba1e022c9019d1b223d6d092260f97b471fbe2259ac5af6d3b

    SHA512

    961834f77c2683332b7a650360c09fb08e7efedf4249e48662b9a4fb9534bdba687eb9320da1a3aafe6a9c30d624c4bb94b55e1bf086a970354df61f2065e181

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_hi.dll

    Filesize

    29KB

    MD5

    4e8b170283c3f3d182eca7ce97e71a08

    SHA1

    93d86d961014b12c1a376effb3c568318db1ecc6

    SHA256

    0eb7739ad2863ccc13fa5cdb805189634728a7613918cd54bfe53a06d9c26cf9

    SHA512

    76a384ede88986c03e659c61e5409446bb472fa50c2e2e6f6e907f74e675ef0c5e932d950733ee6dc0c167881bc948d7ba9771bb77f31db3fb540277afb829fc

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_hr.dll

    Filesize

    29KB

    MD5

    54df61c0431c61851d8b61427f2cd68e

    SHA1

    84c99b724a2a5f321fd161d3beceb894e377a121

    SHA256

    6e96de38195de0095c6ab16696ccde2577a65e8c23d07f31e9f3c9f52d76c7ab

    SHA512

    46bea4f17fb327bce8bc6cb5329b7086a772a6eae07a8f2f34309a42acbb9f3dadd675d9c8d9f9e72c85149b48419fb5807acebbcee5bee150c754f94e98d7c4

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_hu.dll

    Filesize

    29KB

    MD5

    6b201af2eae546c9b638e38cabd9676d

    SHA1

    626b2029d573f371dbeb7b7878779383adc6253d

    SHA256

    c849d765c73a969ac10acff6195edd9339054b93a15152e5d1eb1fd1b5017b06

    SHA512

    1c35c169cf16a37a5537d0911af7da64ce9a0f999e76464f3410ebb224b9e65bc71deaa253e549b196c52409127b55cbb2e4a39bf9731b3ee76dae560b74fc2c

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_id.dll

    Filesize

    28KB

    MD5

    17162657113e9d8d7c1763bfc0ec991d

    SHA1

    f2507d9d1516bbcfbe408186894474c592f141a3

    SHA256

    60d759405a83ec4bb64144ed61b0e9a704bfb3b74e8f956277df71a38b19fc9e

    SHA512

    450e90b4c8ee384994cd6f56677dcacff258eb12442af3fea3a977d7d00b943a1b1f6b12769d4a02aeadc4f4c3b82a06cf8a667ce6691ace5d479d1261a1a629

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_is.dll

    Filesize

    28KB

    MD5

    625060f019c3bb8f1d49a9b128e1e4e6

    SHA1

    0e22bd7e23fed0e856a09bfaf5ee105a3dd27edd

    SHA256

    6117fb49f06f4d8e7268de9e41862a940fd36600e23f670f3c77ec0adb27257b

    SHA512

    962910c5a438b0289eea0402a262b8b7920255a1dabafdcc477cbebcc36a1c31b69784947c794bf720e16c0798cd958616a763e67c42327a94f7e66daa63a07c

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_it.dll

    Filesize

    30KB

    MD5

    258b52e60a1e353b6117917154c7b24d

    SHA1

    c109ef8d1382991b02fe953679bf3fed063e9e82

    SHA256

    2362d8f1e8f2c92e43659d73052f2a43dabf95121f852d6d04471710f2c7109c

    SHA512

    fdaf605922e728f87d7d916f75a83f78f4549dbb35f9d2e7717d369cd658075655a1b903e705b5cb609880033c080e4b3135902fcaba7a8a96c2904f05d53164

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_iw.dll

    Filesize

    25KB

    MD5

    973e14a5557248bdc2cd3a5fa3540a77

    SHA1

    66818135e202fc53711053ceba04ecc8b9b28506

    SHA256

    0af05d8af74609c9436ed0dcd3df52f7ef3dea8b786c85376c57c0cf128b3045

    SHA512

    e8c271f52fee4f249c27c4c344b5ecbab796227aabeb36b0b7a7d82d5463bcaa707b1f8ea47b863f2d87b35fe9b361ae2e2b7d1c16a4eed0ce0d530e1e34b26a

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ja.dll

    Filesize

    24KB

    MD5

    dd5aa26cf2d67f50540da8e552f792a7

    SHA1

    0b14b06a2beb63fde2c1bc86c49a5117287de2c7

    SHA256

    b11af70867ab588c412cb5d5cc36ec888e74a50f508eb31a28db559aa00f8a35

    SHA512

    9bc1d7965a66ddbe7dc3fefbf2eb445a0857f83a28b2b3e120de80b03b51e87e6acd20569f2b002bb7adc41cbfe147572306094d83c8ffceb44f7a8417d89e0b

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ka.dll

    Filesize

    29KB

    MD5

    3cba4b52b099039d2fbed395a3bc7568

    SHA1

    1a5204510d2c02d02ce361c7a3295498a60efabe

    SHA256

    79d4684d4d365b2c89f16fa0522f66031a1037cb4ad2a33050ed97a1df825990

    SHA512

    6ea41e61e4fa8cbd73e693db860a84bb4c6389b0aa5aace965a9567f6c16ae23fd51c018c6d96a1c08500a3cfe6327cc4c9ca9aa6bf9ad0b2f0d0c71e8922e05

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_kk.dll

    Filesize

    28KB

    MD5

    6543ba7290488f5e3f68675a598255fb

    SHA1

    7359895f909776c5f14f6e5ed0fa11cd50853cd5

    SHA256

    df016969fc3ae57abbe8fa9f811364cd84612af0e819284b4d1acce981f6c21e

    SHA512

    90f376c59d67d89bcd646895209c0fca92866f9866e1cee7a51745077ad05f730cea2624837baf1e5ba92365ff46955ece98938849b87ed7f89a92897949d0f1

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_km.dll

    Filesize

    27KB

    MD5

    4d101ce3ce6be285845e8f8bae548097

    SHA1

    195f314bcbee9cc373136334b5089e855e71286c

    SHA256

    3f11a2020839f5993e6e3cb9b5e7c5c659753cfa49257d3ebc015da6a8ead94a

    SHA512

    c31214e9aacfe7056be1f7ca6399270e644acef060d208d805b59bc6635772592ae166b06d038e2eb74218c451ef0fdbb09dc7e2ef6d23b751cbd6ae935cdf6d

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_kn.dll

    Filesize

    29KB

    MD5

    cd6084bee91407a5bb932cad81ca0636

    SHA1

    c9e56e6d15b413a8061ba38d05ff402b30688684

    SHA256

    01551c5de82d4d9b262735ecdc39fd6c4ea5a94acb9cb1dc4cea0e3bcfe7ee9f

    SHA512

    4d1cfa478050c87ff0c7d0b17ab7c23fc6bc400214b121bc86fc217b7b8b764c8109bdb15a3790822295556a7d8706aaeb8ff642b24d2fbd582b2ede61a76a7f

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_ko.dll

    Filesize

    23KB

    MD5

    e73046fc5427ed78ca02c7f50136efdc

    SHA1

    df58d20768edc25637ad8fa38f71d25a86633725

    SHA256

    49e0f43057c404a4ff5a2bc306f70c3728412b887e07870cdfd1f6eb3836ee88

    SHA512

    fce94d5a6b8f99a5af8f30314a0a7a5a3a557fefc630b907e5266c9f397bf6dd1a8211fa9d6535f75a0db7016ae20a3b295c4780383516d7a234225b798be584

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_kok.dll

    Filesize

    28KB

    MD5

    735d775e6772b5072227a3efc91d6f5d

    SHA1

    b302aecc725b87d3b0402be8d5b30c35084f2d81

    SHA256

    11c257e800ef3021c2d6147999f5192b28e48a0ff9d486be5e47c181744c15a1

    SHA512

    8dcd0e07b90ceb6d6f39af9077bd85eba46506791491eda63b05471a7f984c2d1b67cc1335f788682ade2124b32e8b5b436bf717f6b5e2de8276dddbdab3fd34

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_lb.dll

    Filesize

    30KB

    MD5

    8fc766f256ccd06f09106c10f9a20edb

    SHA1

    867c9da84a0e61a8b4787bd3618ed25aea80360b

    SHA256

    7cec1855457e12c2adcdc3790856f775fcac27bc4911258937f8b08ef0a0d1f8

    SHA512

    4f545d4914ab62743d2a0c6a461c03597d38b6a8ceff85b154629d2676f41b9cde7efe2e8131d2749321e56e7ac7d90e4f958917a989170bf505840bfba059d9

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_lo.dll

    Filesize

    27KB

    MD5

    f59fdfea8b8be13fbf3ee855f0f840fc

    SHA1

    32743d1ccc6702bdcb8e4e1320c60ce3ae0c3a36

    SHA256

    ca296d434902c4146ad1828ab96679d937d8edb85adf0184de00732d86e49d08

    SHA512

    fbf31397247f434d67f1f02751a12ecce46253e43218dff701c86ef3990d8ec8cbe50dc94b32810ec665e42246277ca14846ecc77350d0fb4a706b5d03c1484c

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_lt.dll

    Filesize

    28KB

    MD5

    f4bb4677d5baafb96c2489db597ef7ef

    SHA1

    ddb9566fa8f2206df5b2a6e71870b08a4ef3e418

    SHA256

    2a0e85a66fa811b55b5fda8dbb45b5db4ea01a32cfc927e22809ad5f3c8bebfd

    SHA512

    4beb5fa5ff8643622bb6c971a84f0af33328a98fc6caebc44f02d243c3aa5fb30f390dc65921fc1aabe7099b94a8c4e748c82543670053ff6d20a3c0a15a513c

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_lv.dll

    Filesize

    29KB

    MD5

    f4d4b8ca1664b954595d872cd6ccccd7

    SHA1

    288231017312ede121141f94ba89051fb6f3c3f1

    SHA256

    ec7072699b9c3954d0eae183312d4041299a1f2cdccde2ed8de3fe96837745ed

    SHA512

    b1474c0c4e87f499d8f1b3a83b8b001c72a48656781e8c3df87cd0a5eb2a6d9fec5abdf56922eac3fade2df232322e804f315874d983fa256941d4e03ecb93d8

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_mi.dll

    Filesize

    28KB

    MD5

    b112ac05613a1942f009db22c776170b

    SHA1

    3124e35610322ba8eec2779f4d4904a569e093ef

    SHA256

    9c1f34a7971ad37522136dfe3e9bb8c6939b69e9adc2ecea44ae495ade165419

    SHA512

    d47455653a9f1d69b0c63040eac6bbdbb8b3f72060862c1adc2bd589bbe20c04f25272e69324b0249a79eba4f089a3e68e787ee80a4d992df160597186d3ca89

  • C:\Program Files (x86)\Microsoft\Temp\EUD6C8.tmp\msedgeupdateres_mk.dll

    Filesize

    29KB

    MD5

    3824b848b8d27996e03b77e47d683ad5

    SHA1

    2112959b86d3699f7748120e9ce704a4b1d3d85d

    SHA256

    42ddac6cb468b4d938fac198019dfcf36b33bb8b370755425a6a5950d226878b

    SHA512

    cdfb37d6ffb0f344dbfb95af7cee8f0d7f420a1a98f934ced93ee0c349b1f2661e8331f4ea373a7bd535df89b783ec662935c9dec8f86c31c91bc6383af01028

  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

    Filesize

    66KB

    MD5

    3fd97a818cec31c95169c3b7f1f8e05e

    SHA1

    19172155a6cb95ed3dacae9b02f5a0088612e53a

    SHA256

    740e17f9ec567ab8c3bbb99efad2bf9240314753ccbfa7b9921b306ab12a0bbb

    SHA512

    019e7530780998d8cf0ed959dfb59ceef0560960ea17e8d077ede72ab61ac503775868210e1d073c9112f030625ff79a1d042d7089744eb3e9a1c63c67c0ca02

  • C:\ProgramData\Solara\Solara.exe

    Filesize

    613KB

    MD5

    efa26a96b7af259f6682bc888a8b6a14

    SHA1

    9800a30228504c30e7d8aea873ded6a7d7d133bb

    SHA256

    18f4dca864799d7cd00a26ae9fb7eccf5c7cf3883c51a5d0744fd92a60ca1953

    SHA512

    7ca4539ab544aee162c7d74ac94b290b409944dd746286e35c8a2712db045d255b9907d1ebea6377d1406ddd87f118666121d0ec1abe0e9415de1bba6799f76e

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

    Filesize

    280B

    MD5

    3d191bcf6d4bb6efca24cb89c1cfbead

    SHA1

    997253dbdd7220b3f6e360b2f669d2dcc6d9935a

    SHA256

    8755d95bd66cb742247fd07fa33664011844c594e65b69b0c2001d80e0def2fe

    SHA512

    884cfbff3bef0076209eddc5c3fb2d515bda87580c3c504f517d8ae13fbf844f3bed18a19c3e279acb3d535138f725efbf1dd45b8210e29e880cda6202a949ff

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

    Filesize

    2B

    MD5

    d751713988987e9331980363e24189ce

    SHA1

    97d170e1550eee4afc0af065b78cda302a97674c

    SHA256

    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

    SHA512

    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_0

    Filesize

    8KB

    MD5

    cf89d16bb9107c631daabf0c0ee58efb

    SHA1

    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

    SHA256

    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

    SHA512

    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_1

    Filesize

    264KB

    MD5

    d0d388f3865d0523e451d6ba0be34cc4

    SHA1

    8571c6a52aacc2747c048e3419e5657b74612995

    SHA256

    902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

    SHA512

    376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_2

    Filesize

    8KB

    MD5

    0962291d6d367570bee5454721c17e11

    SHA1

    59d10a893ef321a706a9255176761366115bedcb

    SHA256

    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

    SHA512

    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_3

    Filesize

    8KB

    MD5

    41876349cb12d6db992f1309f22df3f0

    SHA1

    5cf26b3420fc0302cd0a71e8d029739b8765be27

    SHA256

    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

    SHA512

    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    3KB

    MD5

    b9da003deeee82c417e375486cb4cb9e

    SHA1

    6a5d296ea9d8558cea8193a2f9a8a5568b88c790

    SHA256

    1c840dad346506609ec0d1aee8859dc9da8c163d9d1638746c7dd9d08339ed15

    SHA512

    6dcd3a1dfc2902c913ebcddfe4656d43abaa73afe0a97ea0e461d25ec5dac11a926794622eadfb770857ee70f24d8d12da51176681d73a49c470739042e66ee8

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    1KB

    MD5

    ea6f63c319a68ded1643011264fd5345

    SHA1

    2a786e7dff388246dca87e0bb295a328e7b37107

    SHA256

    109b7d25df71b8b98ad35c0f9a5f658ff2aac5adac930b2437e1896d941d1dfc

    SHA512

    fcf1a759f3c86640e7b4e15669619532db383c70aff433e8b9d5206b7ec135622169e3a4838ef7d1ffb808df3d3750ef9ceb2e16f769441caf358ff4ed9e04cc

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    2KB

    MD5

    3a55925c15d010661550eadf941b7e28

    SHA1

    099d92255c88fa8139314f0e1d87844512303c95

    SHA256

    69a2304f9c8536557fc1b401a63c8d1df28c846903095a8a82508b0c4d2096ce

    SHA512

    b9c7ab9ef96f3c3076c1282021e8e3c04fda5ecc22b01b74fdd1673359efc00405e16bff3c21d6e492d3d73975e030e251fe873ae40dbe9c6d424e98461913e8

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    16KB

    MD5

    b5c712e376a49d223685a56cfb05041a

    SHA1

    a5ec7e17cbe06a9cac35f2908d787440fb221712

    SHA256

    97534ab26a6f295fda129a4475fd92e5fd954806a0d2fcd382d87eefd000e25e

    SHA512

    d7c99fe143c78b47b2811e5e32cff21c286bb64ef993cd8fe423e82e10678684741d08262c5127ed535d6b599aa25a145b846f7ee9f5d31997311f0a7eaed839

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe595f8b.TMP

    Filesize

    1KB

    MD5

    a271262f1ce687bfd0f644712a0b6dd8

    SHA1

    157a66b30ef9463c99157bad9da160ce82766f46

    SHA256

    7d7e405e19e527912453701273b32c11ad3a761cc14b423c6f92dfb1358e38f1

    SHA512

    9eb438f1b4b0c1be3cecc695cacc04f9e496ab934763652dcb77206bf07d428c8016338bd7e90bc16936ac1f9d0dbc3ae691fd013f6b504d0663cdd266f1a3b9

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe

    Filesize

    2.9MB

    MD5

    ec429587b94b0288039bf1492e3350af

    SHA1

    acfd0ea4f9d321a898fed79e2e8e41e04620625b

    SHA256

    c372c94338eaaa7ab2eb7c5b6d1c9fc5658ec62da7f5fcd04e2d4c72d900ea9f

    SHA512

    79090e46a9f6e2cc4728aa4cb5e48eab80d18151ae3257cbede4d685b80d40b56e2ef57a4ab37ddf90ccd67e5cd54a728f559fcf9fc32c6971bb88468c1ec88d

  • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

    Filesize

    1.6MB

    MD5

    b49d269a231bcf719d6de10f6dcf0692

    SHA1

    5de6eb9c7091df08529692650224d89cae8695c3

    SHA256

    bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e

    SHA512

    8f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f

  • C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat

    Filesize

    280B

    MD5

    79af22ac4a6c6e3fbcea9efce60bdbeb

    SHA1

    77085ed6d8532ec623fd5fffa4915795cf4eef34

    SHA256

    d98db90c89d6928e66694645a3f40352a1fc234daafac9a67022007558666823

    SHA512

    2d863c1fae31ba024a61befe99bb9cd5dcb5657c50458066ad5ab2bc3288d2aa61ffa58802821279f43da33d0bc43968f1c90cc79de5b283f533db60ccfcbb26

  • memory/324-212-0x00000000008A0000-0x00000000008D5000-memory.dmp

    Filesize

    212KB

  • memory/324-242-0x0000000074840000-0x0000000074A66000-memory.dmp

    Filesize

    2.1MB

  • memory/324-266-0x00000000008A0000-0x00000000008D5000-memory.dmp

    Filesize

    212KB

  • memory/324-213-0x0000000074840000-0x0000000074A66000-memory.dmp

    Filesize

    2.1MB

  • memory/1604-423-0x00007FF83FF50000-0x00007FF83FF51000-memory.dmp

    Filesize

    4KB

  • memory/1604-425-0x00007FF83F9F0000-0x00007FF83F9F1000-memory.dmp

    Filesize

    4KB

  • memory/2200-33-0x000001936EBC0000-0x000001936EBCA000-memory.dmp

    Filesize

    40KB

  • memory/2200-31-0x000001936EC60000-0x000001936EC76000-memory.dmp

    Filesize

    88KB

  • memory/2200-24-0x00000193692A0000-0x00000193692A8000-memory.dmp

    Filesize

    32KB

  • memory/2200-267-0x000001933BEF0000-0x000001933BFA2000-memory.dmp

    Filesize

    712KB

  • memory/2200-271-0x000001933BFA0000-0x000001933BFBE000-memory.dmp

    Filesize

    120KB

  • memory/2200-272-0x000001937FF50000-0x000001937FF5A000-memory.dmp

    Filesize

    40KB

  • memory/2200-274-0x000001937FFB0000-0x000001937FFC2000-memory.dmp

    Filesize

    72KB

  • memory/2200-23-0x000001934F0F0000-0x000001934F100000-memory.dmp

    Filesize

    64KB

  • memory/2200-34-0x000001936EC90000-0x000001936EC98000-memory.dmp

    Filesize

    32KB

  • memory/2200-25-0x000001936EBE0000-0x000001936EC18000-memory.dmp

    Filesize

    224KB

  • memory/2200-30-0x000001936EC50000-0x000001936EC58000-memory.dmp

    Filesize

    32KB

  • memory/2200-22-0x000001934EA40000-0x000001934ED22000-memory.dmp

    Filesize

    2.9MB

  • memory/2200-32-0x000001936EBD0000-0x000001936EBDA000-memory.dmp

    Filesize

    40KB

  • memory/2200-29-0x000001936EC20000-0x000001936EC46000-memory.dmp

    Filesize

    152KB

  • memory/2200-28-0x000001936EBB0000-0x000001936EBBA000-memory.dmp

    Filesize

    40KB

  • memory/2200-27-0x000001936FAA0000-0x000001936FBA0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-26-0x000001936EBA0000-0x000001936EBAE000-memory.dmp

    Filesize

    56KB

  • memory/3712-1-0x00000240E2120000-0x00000240E21EE000-memory.dmp

    Filesize

    824KB

  • memory/3712-6-0x00007FF822DE3000-0x00007FF822DE5000-memory.dmp

    Filesize

    8KB

  • memory/3712-21-0x00007FF822DE0000-0x00007FF8238A2000-memory.dmp

    Filesize

    10.8MB

  • memory/3712-4-0x00000240FF2B0000-0x00000240FF2D2000-memory.dmp

    Filesize

    136KB

  • memory/3712-2-0x00007FF822DE0000-0x00007FF8238A2000-memory.dmp

    Filesize

    10.8MB

  • memory/3712-0-0x00007FF822DE3000-0x00007FF822DE5000-memory.dmp

    Filesize

    8KB

  • memory/3768-336-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-330-0x00000144C6C30000-0x00000144C716C000-memory.dmp

    Filesize

    5.2MB

  • memory/3768-339-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-338-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-545-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-543-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-335-0x00000144C6A30000-0x00000144C6AC0000-memory.dmp

    Filesize

    576KB

  • memory/3768-333-0x00000144AD070000-0x00000144AD080000-memory.dmp

    Filesize

    64KB

  • memory/3768-332-0x00000144C6870000-0x00000144C6922000-memory.dmp

    Filesize

    712KB

  • memory/3768-331-0x00000144C67B0000-0x00000144C686A000-memory.dmp

    Filesize

    744KB

  • memory/3768-337-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-522-0x0000000180000000-0x0000000181096000-memory.dmp

    Filesize

    16.6MB

  • memory/3768-329-0x00000144AB200000-0x00000144AB29C000-memory.dmp

    Filesize

    624KB

  • memory/4156-542-0x00000260DFB80000-0x00000260DFD1F000-memory.dmp

    Filesize

    1.6MB

  • memory/4156-349-0x00007FF83FC80000-0x00007FF83FC81000-memory.dmp

    Filesize

    4KB

  • memory/4860-451-0x00007FF83FC80000-0x00007FF83FC81000-memory.dmp

    Filesize

    4KB