Analysis

  • max time kernel
    178s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 09:40

General

  • Target

    Bootstrapper.exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 37 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 16 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • cURL User-Agent 8 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:3800
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.15.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.15.exe" --oldBootstrapper "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe" --isUpdate true
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3916
        • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
          4⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:2752
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:292
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:4060
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:2496
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:4252
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Nzk1QTMzMTctNDVBMi00RDEwLTlBQUEtRUMwQzlEOUJCNkIxfSIgdXNlcmlkPSJ7REMyMDE5MDUtMTVDNi00QzA4LTlFNUUtNTNGMzZCMjU5MTk2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntFRUQ5MkI0NS1DQUE2LTQ2RUEtQkU4OC00NjY2N0JGM0ZCNDB9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjQzIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTQ0MzY2Mzk2IiBpbnN0YWxsX3RpbWVfbXM9IjgxNiIvPjwvYXBwPjwvcmVxdWVzdD4
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks system information in the registry
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:1388
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{795A3317-45A2-4D10-9AAA-EC0C9D9BB6B1}" /silent
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:4288
      • C:\ProgramData\Solara\Solara.exe
        "C:\ProgramData\Solara\Solara.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4124
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=4124.4032.1493838309014610450
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks system information in the registry
          • Enumerates system info in registry
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4212
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.265 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=131.0.2903.146 --initial-client-data=0x160,0x164,0x168,0x15c,0x138,0x7ffce2206070,0x7ffce220607c,0x7ffce2206088
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4880
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1832,i,1117605424056594868,1241989847254552146,262144 --variations-seed-version --mojo-platform-channel-handle=1828 /prefetch:2
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:296
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1900,i,1117605424056594868,1241989847254552146,262144 --variations-seed-version --mojo-platform-channel-handle=1968 /prefetch:3
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2188
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2372,i,1117605424056594868,1241989847254552146,262144 --variations-seed-version --mojo-platform-channel-handle=2384 /prefetch:8
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2216
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.146\msedgewebview2.exe" --type=renderer --string-annotations=is-enterprise-managed=no --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3544,i,1117605424056594868,1241989847254552146,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:1
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            PID:3160
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks system information in the registry
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Nzk1QTMzMTctNDVBMi00RDEwLTlBQUEtRUMwQzlEOUJCNkIxfSIgdXNlcmlkPSJ7REMyMDE5MDUtMTVDNi00QzA4LTlFNUUtNTNGMzZCMjU5MTk2fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7Rjk3QjM0NTEtQUEwMi00NTM4LTgwMDAtN0Q2RDZGN0Q5QkJGfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjgiIHBoeXNtZW1vcnk9IjgiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxMDEiIGluc3RhbGxkYXRldGltZT0iMTcyODI5Mjg0OSIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzcyNzY1NDUzNTMyMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxNTA1NDY0NzEiLz48L2FwcD48L3JlcXVlc3Q-
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks system information in the registry
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4640
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\MicrosoftEdge_X64_131.0.2903.146.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\MicrosoftEdge_X64_131.0.2903.146.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\EDGEMITMP_E4C9C.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\EDGEMITMP_E4C9C.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\MicrosoftEdge_X64_131.0.2903.146.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\EDGEMITMP_E4C9C.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\EDGEMITMP_E4C9C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.265 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{FC5BCECC-F739-4F4C-9CB3-70A2CB1CC36A}\EDGEMITMP_E4C9C.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.146 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff755412918,0x7ff755412924,0x7ff755412930
          4⤵
          • Executes dropped EXE
          PID:3156
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7Nzk1QTMzMTctNDVBMi00RDEwLTlBQUEtRUMwQzlEOUJCNkIxfSIgdXNlcmlkPSJ7REMyMDE5MDUtMTVDNi00QzA4LTlFNUUtNTNGMzZCMjU5MTk2fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4REE4OTQwQi0yNTUzLTQyODItOUVBQi0wMjU1RDZFRDc2OUF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-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-
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks system information in the registry
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:5032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.146\Installer\setup.exe

    Filesize

    6.6MB

    MD5

    e8e8b726812f34db032aca8b97d8ae7f

    SHA1

    cfc2f7ddc42bcd55bc1de597dbd228faef9573c0

    SHA256

    46e9e7a54c7cb4b0f6f3eba955827af81cfd62bc7ba2b374c21ba7e802d820a7

    SHA512

    f26ae84b91c2f3cfb8b531c4ddcee86e3a95744d4d52162b54b055827952c78c3fcd138f1508babbab68c04b87138a74d9b81ae7ccc6919b2c4f482f71dc1d6d

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\EdgeUpdate.dat

    Filesize

    12KB

    MD5

    369bbc37cff290adb8963dc5e518b9b8

    SHA1

    de0ef569f7ef55032e4b18d3a03542cc2bbac191

    SHA256

    3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

    SHA512

    4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeComRegisterShellARM64.exe

    Filesize

    182KB

    MD5

    8f7c44e937ecc243d05eab5bb218440b

    SHA1

    57cd89be48efe4cad975044315916cf5060bc096

    SHA256

    bc3cdd57a892ce1841787061e23e526ad46575460cd66c1dc6dcf0f811563d59

    SHA512

    9f0020b81d1945fea12efe1a0a5e59caae4a01432429e065e35c73b15db873253094b2ff1f8903a348446dfc9c9fb658f8bfed8c25bc56e8b546c16304a385a3

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeUpdate.exe

    Filesize

    201KB

    MD5

    70cc35c7fb88d650902e7a5611219931

    SHA1

    85a28c8f49e36583a2fa9969e616ec85da1345b8

    SHA256

    7eca199201273f0bcff1e26778cb535e69c74a69064e7759ff8dad86954d42b1

    SHA512

    3906ddb96b4b1b68b8c2acc940a62c856e8c3415a1b459f17cf2afc09e05751e0086f8e4e5e0ddd8e45cfb61f811bbe4dd96198db68072b45b6379c88d9ea055

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

    Filesize

    215KB

    MD5

    714c34fe6098b45a3303c611c4323eae

    SHA1

    9dc52906814314cad35d3408427c28801b816203

    SHA256

    fbf495968c4a385ff0790e6b65d26610ef917a2b36a5387eff7ae79d7a980ac5

    SHA512

    68a65496275a1511b2d3bd98ac5592cb1c1eb9df0448471a8985cb2f458c66163e6d55545940de72dea80118ff8ec7ba0ad3276f51095f55c1243fb9f3311345

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\MicrosoftEdgeUpdateCore.exe

    Filesize

    262KB

    MD5

    c8b26176e536e1bce918ae8b1af951a2

    SHA1

    7d31be0c3398d3bad91d2b7c9bc410f4e45f37be

    SHA256

    be6ab7dd506e44a0a9eb0dd531929bd8aa0796d85a0353e6944bc6bf1630b717

    SHA512

    5a362cbabebbffbb0797646576b65e2934a3b0a30306d74078ef2448fea3940df14f0b8f149691a100cc170bd548c9b420dcc8aa41eb1ea0700c9f155626c565

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\NOTICE.TXT

    Filesize

    4KB

    MD5

    6dd5bf0743f2366a0bdd37e302783bcd

    SHA1

    e5ff6e044c40c02b1fc78304804fe1f993fed2e6

    SHA256

    91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

    SHA512

    f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdate.dll

    Filesize

    2.1MB

    MD5

    40cd707dd3011a9845ff9c42256ea7e3

    SHA1

    4045ae709979f75b1cf32142c1137b4be2ab9908

    SHA256

    9f4c7072716e0be1be08207a7024a5e41162e288e677d805be8e5469a8bd4909

    SHA512

    bf1ada8a0d9c3d9f39fb739d05fc4a61f0a7e0e1bb5eb44e6f0f5f58381ee6d80aad89dbc3211b70a6294fc69d5820c70fa8488ef2f793a3710ecff5ee90422e

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_af.dll

    Filesize

    29KB

    MD5

    e91e279752e741b25cf473338d5aac88

    SHA1

    2b8ea61868a26408cd1dd351cca5139a046bbb7b

    SHA256

    5635ecedd84330f070a9d6f4cea8b8b81e9dad8592d336ebfd236b7d67e58acc

    SHA512

    7404cdb82309351a21415b045fc7165137492aa262d00fd0f74bad4262ce10e86c3bde1718c38757b7133e41d044035e731c52cccea285d659c4a570776ae535

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_am.dll

    Filesize

    24KB

    MD5

    bd175cb3dfc1d43944223bd5d7177539

    SHA1

    193623dc372937f31a545344d340360665b8d69a

    SHA256

    bf0d65cebe0c29f15a616a0dda2f1a414e3f96fe7a28ff7876e811855be6621b

    SHA512

    f5742352852837ce16f3cf1655e4d41e301f0351b68c7346457978aa310b95b69b1070741fc2ab8be5ff449f6fd44660df3b15811630efc1420ced1455fcaf5f

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ar.dll

    Filesize

    26KB

    MD5

    42015aafd53012b9c8afa009ee501fa0

    SHA1

    c1fc049feab4fb4b87faf96c31b3d1160f1c1d39

    SHA256

    86858a1807e6cf0b91565ed7a5a15db24720b0a7f60ae41e67dbf9faeb6ef2fa

    SHA512

    9ce323da000b51480ee35973872fc7d181e1f69e820ac737c62c36eaa81eb99965bae39fdd394459adfaf8f746f5dc3b768015e01d8724e2d0718f5286c29389

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_as.dll

    Filesize

    29KB

    MD5

    8a54873d54a41442b62f9fea9492d3a6

    SHA1

    fb19af151b15f4bdb7a555924f1835b0337ff1d7

    SHA256

    af9bdd050b27b8883f72e3596179fe244a6a2e3545950c82889aac7198cf3c32

    SHA512

    7cc0a578586853afd027264c3898cb1460b23a47eab9c79e064b9f327fbdee6e3f9bc7043a5a76a710ada05edae4ac0b47529be3ae67ca9b5afaaa16151797c7

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_az.dll

    Filesize

    29KB

    MD5

    e47db9afb646fb31cc8650837f487134

    SHA1

    f304204c908ea1fe2bcaf76040d5d1f13f1e99e0

    SHA256

    4e03ed7a538793fdcd4c646c62ddd278c46911099e6485bb2644a17ad3a8ecf6

    SHA512

    b2b01c86c78ec3450635c0fdef9666ce302600956e8def3bb02d205ba2a11b3d422520a64361c6f666998bd82b5557ec96cbcaba9e1b712c756e75128c8f9bc0

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_bg.dll

    Filesize

    29KB

    MD5

    5887cd452245dc7bd0389a0ad5db98e0

    SHA1

    6486d0ae59ba338e8bce87b438f86691e955840d

    SHA256

    922a102cae4e74bfc0b402bbb136116eddc71a8adcf7f1268d48006c858d1d60

    SHA512

    0720aaebca04e84d8af2d7b153b0fc51e5651cf664051b8c4b44159ed4c6328eb237ba4f4c97bebedbb1a45ca5c1d0f249cdccac76c6d5619e0e761d12aaaba1

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_bn-IN.dll

    Filesize

    29KB

    MD5

    6aab6d42c7b7a90523a3272ad3916096

    SHA1

    cc638bd6ec6478734b243de2daa4a80f03f37564

    SHA256

    67180722f255985e849ec3ab313dcdc0bf2834bad7b6163a0b14587fdf4b4c66

    SHA512

    ebc17e0ef86b8e5bb938040ad78b299e33d1228c730666526aab27e464626b71ea900cb6dbe074bda5e42e77cd569b083637e233d757b8b0bdee2df2e0c509f2

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_bn.dll

    Filesize

    29KB

    MD5

    abc20df0545611a835dcd895d2832cca

    SHA1

    39e90363156c461e5aef64a714ba43cc61617ee5

    SHA256

    75d8c2e259b4d113c0967615af61e8f54eafb49c498767291627faae9fcf504b

    SHA512

    732f31d175f08c5c69b9cf540e2b0e72b8986b44d1ebfdf0e56eb56b68bea64e6446932a546f1fc30dbbbad4ccaf6bc935177a6348c5280ef786d6d8dfa7b325

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_bs.dll

    Filesize

    29KB

    MD5

    327e92c7a55ec996ce09dfcf8c89e753

    SHA1

    2a51c99519257ddebf0d8280d46e0c0fd416e7a5

    SHA256

    2b61608a7aca43b7ea4374b79acc6e15deb382eef0fa8751c8e57e03e061cab0

    SHA512

    ac3ca0f66b899759f0d23ba64ff291486edb1e1d3bb626ad3efe3e3a6fd2aa4081411546e4849ff1645dcd26161f35defbd8442278e6d6f66311780c60474296

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

    Filesize

    30KB

    MD5

    e0d2675c6de1b8d4e5e463246529a304

    SHA1

    132dace535b9cdc7a4e5f6137407d5becb23c4c6

    SHA256

    4af082aa0193b9b15622eba1f6165d0b6032b4dab17ba16a8a9affb267ebec34

    SHA512

    afafc1ca5abc636066ee98a6c68356d68f506fe3734a4b3e68073eed1f2ddc51840464e91d3cd3b28648fcc26b9457ef6484100f9543739220ad75a9eecb1e90

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ca.dll

    Filesize

    30KB

    MD5

    bfac1c3869df5375aedb24458cf321b7

    SHA1

    848232c155c7dca65f6cb22d27a72f2c78e964d8

    SHA256

    a9f5cf25b9512e1d30ecb769a5eeb694888b72b7f05b78c417814802c5aedbd7

    SHA512

    732270e8e8036f8ec59c214ca3804c6c67420bcf5fd633347c764f90b06b25fd73a0c7aa75ec42461ae3d3570fbfec5c5a7eee10e8d494b805b7c7e0d4aa227e

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_cs.dll

    Filesize

    28KB

    MD5

    c5681c3b4a8145d3b6cbf51e3f0b12fb

    SHA1

    908a0546ce091906aa5e7728660b838bf1e619e4

    SHA256

    2b47a6c19ec492149eca6afb03ca82ac1418a727f35cb641bce9f22136dd3459

    SHA512

    06c850119b5199bfcec41abe2b5e6929e0a960b69337c6048e0dbdd37ca56401885785de96cec235093a4d6536d9de55178a4c739a6ebd5e34514e12635b6d31

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_cy.dll

    Filesize

    28KB

    MD5

    3206ad1fbe5c53d278607da7767b1996

    SHA1

    6964da8787c299e71f8428b22ed8ff6909912034

    SHA256

    9ea2727ca92f74c7c35ea22287f13ef262241a905567b908e2860f19e044a848

    SHA512

    38281ab3590a2e6210d1d9c0d1f5a4a3ef19772065f87d94570bb448fb83ea0579aa8bac9e94b05ba2b6bb2bb882f1be6d45c921c52ca2f0608056512fb3338c

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_da.dll

    Filesize

    29KB

    MD5

    7f0ce1bf90bc88d5fb4d32d359063868

    SHA1

    59d8ba8397c325ed7b2dcd6a262906795549af6c

    SHA256

    1147a2cac674209b9087f7c81c09000a2177bb7d42d0d518e3c93d8a9ee2d7fb

    SHA512

    5cd723cad43388c7e2db4452caa20c07e73a676c82bfaca27a293ab70acdbb115fd82c7a65dee3e6c6d8969c4b99e90ce832760b6f7ab47e9a4f631ce53813d7

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_de.dll

    Filesize

    31KB

    MD5

    d9eb30f1811161a6903901f1ff316ebd

    SHA1

    7ce5e34af30e821a0bbb7074da57636c1be15d6f

    SHA256

    73b4fab09f7f224b2527dffdb617b7f852c78eca8989d493ba2fa2201b1becf3

    SHA512

    9d2e2a44fd027c30836254de1ec99fdff4bad2d3488f25d88a9f80f5f994dd5c660903dd3586dca85fa9e1a269ac8c51b5a060156fa65dc1df0d8137bf878c82

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_el.dll

    Filesize

    31KB

    MD5

    85dadb4cac0d76fd821346c411d5c3d0

    SHA1

    999dc0bd7250f71465f5098dde263a7a82ba7b3c

    SHA256

    1392f864c486e4b4b6859d900b12182f5ad5ec90e183808ab7ed0049aedd807d

    SHA512

    649833bf473139db879c2c7218567c49ad6436e3af1efdc7d9e9d48b8d3347e2bfacd6140a59d7973fa9df9cc9cab0e042bdaa7dbf32846bdf6b812b7ecaef07

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_en-GB.dll

    Filesize

    27KB

    MD5

    5d4f7ab307f71d761a7f0e193f4b2ca1

    SHA1

    a3580268a98ad5242c7c56fa759f39276b6149de

    SHA256

    e2f0a11b5269b08261397e2ba8e2a5e44d5bf2e042a1cb91ad395d7c274b44d8

    SHA512

    307c489db833e4f2c74ab5201909ad2c53c691e0409f5abc29540a84d1c5ae146a072fecaa0ac886c83e4521fecc58ae5b0ff4331f3b37f39114d1fdea731021

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_en.dll

    Filesize

    27KB

    MD5

    cfb71031c56d9e8b9490d01fbe86302c

    SHA1

    9e11ecf5efc88e0beee1db46620bebc73f86dd21

    SHA256

    b18e14d0e24546193822b83996c5b311500ca213beb4d497cbd1dda9dac9db2f

    SHA512

    9cf993ea53673e416eead78d45a6d700b74001b69b1b987d479e77348ea8dc151f4ba6d6b1220db21ce792f9da51b9c83f33663621f9350b848a766ceae92370

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_es-419.dll

    Filesize

    29KB

    MD5

    b25a10d8b739ac2eac10b7b7fc7a61d5

    SHA1

    ec993d8113e4c0a4a1b36920a8991521e4f7eb57

    SHA256

    cad0cef66ad1097dc11e6396d0a0fb11ec1734acfde15e9eae402ba0d068615f

    SHA512

    315971e819d2c3dc5fc30ffe2275c3608125f1e4f14dbeb39aa0fd014291dec0c5efb3e02628bf345c92ea0faaa38e30d4ed5c3793995afff9cb9c933f234513

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_es.dll

    Filesize

    29KB

    MD5

    6c3d219e2169f5566a8bed031b21bdc4

    SHA1

    073a61c02b87e37e87fd3c8e609a56828ec49a47

    SHA256

    3a841555813f21928fdd45003a3f694a87074869b001b3e063eb97ad35d8fe17

    SHA512

    2b57d8325ada86a1ea01df0c7d0122875450f913bc8c21d8a7dd44ac7037a170e2f4fc92c13c58980aa9371a7bdfdfee34b9e188e16ad0b89181f7f901467152

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_et.dll

    Filesize

    28KB

    MD5

    27d45a84e2b94a60d5a821597fdad6dc

    SHA1

    2125fe5fbaa2db280a859ef3a7d27ba21efec036

    SHA256

    65f3cd75a7121dc3d417a9c3180bb52b485b5e7d0ac3b483fa355d13515f970a

    SHA512

    eddccfeee69b7a53adf32e72724ec8ba1668d1927322ce61429a4c663cf3d17e3f6f59fe1930b96f78faa70d30edfd7845ba53cc161f06a4e67ad43d11cd576e

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_eu.dll

    Filesize

    29KB

    MD5

    d8323f3db20d104441f548decfd022ba

    SHA1

    de7f58b9ee7cbcad73433a17ff55385fd7e91035

    SHA256

    d07d8eb066e953af02a6e3a160232a73c1b66bb54d93d6b2ebc1557d1d322358

    SHA512

    7de3a803131086c3368d4acada0b6a29ef4ed4102a151eb000056c233da4853c97e394c98d6fd856714758ee17a0cc4c3df061a1b5d2b2b3e3bf95447bb729a5

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_fa.dll

    Filesize

    28KB

    MD5

    6ba182cbb744541288629a2464ba99e6

    SHA1

    366751e425128654514dc82112238a7d6f4c9908

    SHA256

    cca362dd297b8d8e20893cf4da8cf9efc9848f97a04a9d69cabff67ae947607d

    SHA512

    ab3da91d7ab7150100b580d7b25a5fe9cea67affb1c4ac9e479b70e2d17ebb14a0745bf62ffb3792b8ce4cbea130cbd0012053a5dba7930252e2c09b763ea658

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_fi.dll

    Filesize

    28KB

    MD5

    e7a774a7b404ab800efbdf7ea52e7ead

    SHA1

    3f0476821281614b9ee32faa5c534de5f6dc21f9

    SHA256

    1e1f09beed91a6a84535a1cf2b4df5e416cbbf785546f798d736009e31f95691

    SHA512

    85091f8bf809e88e248f4a899682f15586a083d1bb94cb5674da0e463716fa927ebef578519b653ac4ced381f98c4cf7a409c1ed52927dcf7fce4813008ce900

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_fil.dll

    Filesize

    29KB

    MD5

    1223e486deb013055cb0b7729681b9ed

    SHA1

    b5b43fa89f066a9b6ceb47389c05b69ea6a784ba

    SHA256

    fae283a78757cdc548c728a38cb041db4ffe538c5ee7d2aa2f55e3469f95fa25

    SHA512

    8862d2f4778bfd0659dcf9dfb992072767af30dea46b34d626580ab8183a765d0c0f95a7070f0aa36e694d9e559f843672000aeaa4d8abdca60ff83da5a2b857

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_fr-CA.dll

    Filesize

    30KB

    MD5

    9fea64a22d045d8edc38a9b8480a9c12

    SHA1

    e3342e26166a43a21729b8aadeca653c03dc0528

    SHA256

    2f324851f0ccd101884b78fe1eb07c2da2932a68015eb8cfb4c801e288c8771b

    SHA512

    a3601640cf961c88efa476125a71786a109d23355922eda45b5be8824ccce650d703546c5c8c281308dce208edabbeea5cbc3b44ed678d9d36970c4e5f236c0f

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_fr.dll

    Filesize

    30KB

    MD5

    498dddf273f0f2973b1c4581e820f10c

    SHA1

    aa048015a3ed6ebf9b4848a9cc54beb5e39eedd7

    SHA256

    9ec8cec72404794a2b2a738502c7f531d976d8c99a57d2b5d2f0f2e818e35e04

    SHA512

    3596b20469daece28496a13b02ae0c1cd9265fc0046e1fffc384b8a16a4869402831386679c3e9cdfe03903df0b191d2fdc04cc531104c9c0d84bef24eb4d60e

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ga.dll

    Filesize

    29KB

    MD5

    81d35302b31bef2a99e154eb64abbaa0

    SHA1

    ea72f2aa526ea299d5515921fa0ac8f502ce3cde

    SHA256

    0133af05b669f957174a22b0b568a17a9bef1e387f52ae157766fae42d4e647d

    SHA512

    4d1df9684e7247ec0d8fbfdcfdb6ac5b2811de649c5b7ee4a20e5733307cdf5855ff767ebcb12ba15b33be58d82bacf9a02522126d927304e11f8e64261b46bc

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_gd.dll

    Filesize

    30KB

    MD5

    2e88f4aec46a293b3ec9bca2d7d2fe73

    SHA1

    ba34b9635832b2704942d7cd8578c8d70f0ffd2e

    SHA256

    f7278ba46204bfa387eff0e72fb2a8dd32ccea154fb268a8c39b03ad5334cf38

    SHA512

    b7f655cdaa3a34a8e0e00186cc49986cf283785a133af87ae47c3a3614f0d15d5b51b4091ff33bd0fc445815665edd37d378a9665d3831d2281b0bf6cc933c87

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_gl.dll

    Filesize

    29KB

    MD5

    2dcb17e8da6ed1a62a53029940592cbc

    SHA1

    b12941091cd1a554cd23d38dffbf75ec8ff57848

    SHA256

    a6770040c2f93ffc5c542dcdb1e7ea529d6036920957a9709153d80d360b178d

    SHA512

    0c82b39c7128d81739f64346948784c60d2cc409b637d5ca79825ef12766c10861ac3c119a5f232b12f52e50d3ba6818532968c75fbf455e75bd3be83c931f10

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_gu.dll

    Filesize

    29KB

    MD5

    571b69e1a8f9cac5eca53ba624aae924

    SHA1

    89798cdf858a4ee42ab4ffc01055c0463b6c4c0a

    SHA256

    37e67d7511d261ba1e022c9019d1b223d6d092260f97b471fbe2259ac5af6d3b

    SHA512

    961834f77c2683332b7a650360c09fb08e7efedf4249e48662b9a4fb9534bdba687eb9320da1a3aafe6a9c30d624c4bb94b55e1bf086a970354df61f2065e181

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_hi.dll

    Filesize

    29KB

    MD5

    4e8b170283c3f3d182eca7ce97e71a08

    SHA1

    93d86d961014b12c1a376effb3c568318db1ecc6

    SHA256

    0eb7739ad2863ccc13fa5cdb805189634728a7613918cd54bfe53a06d9c26cf9

    SHA512

    76a384ede88986c03e659c61e5409446bb472fa50c2e2e6f6e907f74e675ef0c5e932d950733ee6dc0c167881bc948d7ba9771bb77f31db3fb540277afb829fc

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_hr.dll

    Filesize

    29KB

    MD5

    54df61c0431c61851d8b61427f2cd68e

    SHA1

    84c99b724a2a5f321fd161d3beceb894e377a121

    SHA256

    6e96de38195de0095c6ab16696ccde2577a65e8c23d07f31e9f3c9f52d76c7ab

    SHA512

    46bea4f17fb327bce8bc6cb5329b7086a772a6eae07a8f2f34309a42acbb9f3dadd675d9c8d9f9e72c85149b48419fb5807acebbcee5bee150c754f94e98d7c4

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_hu.dll

    Filesize

    29KB

    MD5

    6b201af2eae546c9b638e38cabd9676d

    SHA1

    626b2029d573f371dbeb7b7878779383adc6253d

    SHA256

    c849d765c73a969ac10acff6195edd9339054b93a15152e5d1eb1fd1b5017b06

    SHA512

    1c35c169cf16a37a5537d0911af7da64ce9a0f999e76464f3410ebb224b9e65bc71deaa253e549b196c52409127b55cbb2e4a39bf9731b3ee76dae560b74fc2c

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_id.dll

    Filesize

    28KB

    MD5

    17162657113e9d8d7c1763bfc0ec991d

    SHA1

    f2507d9d1516bbcfbe408186894474c592f141a3

    SHA256

    60d759405a83ec4bb64144ed61b0e9a704bfb3b74e8f956277df71a38b19fc9e

    SHA512

    450e90b4c8ee384994cd6f56677dcacff258eb12442af3fea3a977d7d00b943a1b1f6b12769d4a02aeadc4f4c3b82a06cf8a667ce6691ace5d479d1261a1a629

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_is.dll

    Filesize

    28KB

    MD5

    625060f019c3bb8f1d49a9b128e1e4e6

    SHA1

    0e22bd7e23fed0e856a09bfaf5ee105a3dd27edd

    SHA256

    6117fb49f06f4d8e7268de9e41862a940fd36600e23f670f3c77ec0adb27257b

    SHA512

    962910c5a438b0289eea0402a262b8b7920255a1dabafdcc477cbebcc36a1c31b69784947c794bf720e16c0798cd958616a763e67c42327a94f7e66daa63a07c

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_it.dll

    Filesize

    30KB

    MD5

    258b52e60a1e353b6117917154c7b24d

    SHA1

    c109ef8d1382991b02fe953679bf3fed063e9e82

    SHA256

    2362d8f1e8f2c92e43659d73052f2a43dabf95121f852d6d04471710f2c7109c

    SHA512

    fdaf605922e728f87d7d916f75a83f78f4549dbb35f9d2e7717d369cd658075655a1b903e705b5cb609880033c080e4b3135902fcaba7a8a96c2904f05d53164

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_iw.dll

    Filesize

    25KB

    MD5

    973e14a5557248bdc2cd3a5fa3540a77

    SHA1

    66818135e202fc53711053ceba04ecc8b9b28506

    SHA256

    0af05d8af74609c9436ed0dcd3df52f7ef3dea8b786c85376c57c0cf128b3045

    SHA512

    e8c271f52fee4f249c27c4c344b5ecbab796227aabeb36b0b7a7d82d5463bcaa707b1f8ea47b863f2d87b35fe9b361ae2e2b7d1c16a4eed0ce0d530e1e34b26a

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ja.dll

    Filesize

    24KB

    MD5

    dd5aa26cf2d67f50540da8e552f792a7

    SHA1

    0b14b06a2beb63fde2c1bc86c49a5117287de2c7

    SHA256

    b11af70867ab588c412cb5d5cc36ec888e74a50f508eb31a28db559aa00f8a35

    SHA512

    9bc1d7965a66ddbe7dc3fefbf2eb445a0857f83a28b2b3e120de80b03b51e87e6acd20569f2b002bb7adc41cbfe147572306094d83c8ffceb44f7a8417d89e0b

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ka.dll

    Filesize

    29KB

    MD5

    3cba4b52b099039d2fbed395a3bc7568

    SHA1

    1a5204510d2c02d02ce361c7a3295498a60efabe

    SHA256

    79d4684d4d365b2c89f16fa0522f66031a1037cb4ad2a33050ed97a1df825990

    SHA512

    6ea41e61e4fa8cbd73e693db860a84bb4c6389b0aa5aace965a9567f6c16ae23fd51c018c6d96a1c08500a3cfe6327cc4c9ca9aa6bf9ad0b2f0d0c71e8922e05

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_kk.dll

    Filesize

    28KB

    MD5

    6543ba7290488f5e3f68675a598255fb

    SHA1

    7359895f909776c5f14f6e5ed0fa11cd50853cd5

    SHA256

    df016969fc3ae57abbe8fa9f811364cd84612af0e819284b4d1acce981f6c21e

    SHA512

    90f376c59d67d89bcd646895209c0fca92866f9866e1cee7a51745077ad05f730cea2624837baf1e5ba92365ff46955ece98938849b87ed7f89a92897949d0f1

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_km.dll

    Filesize

    27KB

    MD5

    4d101ce3ce6be285845e8f8bae548097

    SHA1

    195f314bcbee9cc373136334b5089e855e71286c

    SHA256

    3f11a2020839f5993e6e3cb9b5e7c5c659753cfa49257d3ebc015da6a8ead94a

    SHA512

    c31214e9aacfe7056be1f7ca6399270e644acef060d208d805b59bc6635772592ae166b06d038e2eb74218c451ef0fdbb09dc7e2ef6d23b751cbd6ae935cdf6d

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_kn.dll

    Filesize

    29KB

    MD5

    cd6084bee91407a5bb932cad81ca0636

    SHA1

    c9e56e6d15b413a8061ba38d05ff402b30688684

    SHA256

    01551c5de82d4d9b262735ecdc39fd6c4ea5a94acb9cb1dc4cea0e3bcfe7ee9f

    SHA512

    4d1cfa478050c87ff0c7d0b17ab7c23fc6bc400214b121bc86fc217b7b8b764c8109bdb15a3790822295556a7d8706aaeb8ff642b24d2fbd582b2ede61a76a7f

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_ko.dll

    Filesize

    23KB

    MD5

    e73046fc5427ed78ca02c7f50136efdc

    SHA1

    df58d20768edc25637ad8fa38f71d25a86633725

    SHA256

    49e0f43057c404a4ff5a2bc306f70c3728412b887e07870cdfd1f6eb3836ee88

    SHA512

    fce94d5a6b8f99a5af8f30314a0a7a5a3a557fefc630b907e5266c9f397bf6dd1a8211fa9d6535f75a0db7016ae20a3b295c4780383516d7a234225b798be584

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_kok.dll

    Filesize

    28KB

    MD5

    735d775e6772b5072227a3efc91d6f5d

    SHA1

    b302aecc725b87d3b0402be8d5b30c35084f2d81

    SHA256

    11c257e800ef3021c2d6147999f5192b28e48a0ff9d486be5e47c181744c15a1

    SHA512

    8dcd0e07b90ceb6d6f39af9077bd85eba46506791491eda63b05471a7f984c2d1b67cc1335f788682ade2124b32e8b5b436bf717f6b5e2de8276dddbdab3fd34

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_lb.dll

    Filesize

    30KB

    MD5

    8fc766f256ccd06f09106c10f9a20edb

    SHA1

    867c9da84a0e61a8b4787bd3618ed25aea80360b

    SHA256

    7cec1855457e12c2adcdc3790856f775fcac27bc4911258937f8b08ef0a0d1f8

    SHA512

    4f545d4914ab62743d2a0c6a461c03597d38b6a8ceff85b154629d2676f41b9cde7efe2e8131d2749321e56e7ac7d90e4f958917a989170bf505840bfba059d9

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_lo.dll

    Filesize

    27KB

    MD5

    f59fdfea8b8be13fbf3ee855f0f840fc

    SHA1

    32743d1ccc6702bdcb8e4e1320c60ce3ae0c3a36

    SHA256

    ca296d434902c4146ad1828ab96679d937d8edb85adf0184de00732d86e49d08

    SHA512

    fbf31397247f434d67f1f02751a12ecce46253e43218dff701c86ef3990d8ec8cbe50dc94b32810ec665e42246277ca14846ecc77350d0fb4a706b5d03c1484c

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_lt.dll

    Filesize

    28KB

    MD5

    f4bb4677d5baafb96c2489db597ef7ef

    SHA1

    ddb9566fa8f2206df5b2a6e71870b08a4ef3e418

    SHA256

    2a0e85a66fa811b55b5fda8dbb45b5db4ea01a32cfc927e22809ad5f3c8bebfd

    SHA512

    4beb5fa5ff8643622bb6c971a84f0af33328a98fc6caebc44f02d243c3aa5fb30f390dc65921fc1aabe7099b94a8c4e748c82543670053ff6d20a3c0a15a513c

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_lv.dll

    Filesize

    29KB

    MD5

    f4d4b8ca1664b954595d872cd6ccccd7

    SHA1

    288231017312ede121141f94ba89051fb6f3c3f1

    SHA256

    ec7072699b9c3954d0eae183312d4041299a1f2cdccde2ed8de3fe96837745ed

    SHA512

    b1474c0c4e87f499d8f1b3a83b8b001c72a48656781e8c3df87cd0a5eb2a6d9fec5abdf56922eac3fade2df232322e804f315874d983fa256941d4e03ecb93d8

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_mi.dll

    Filesize

    28KB

    MD5

    b112ac05613a1942f009db22c776170b

    SHA1

    3124e35610322ba8eec2779f4d4904a569e093ef

    SHA256

    9c1f34a7971ad37522136dfe3e9bb8c6939b69e9adc2ecea44ae495ade165419

    SHA512

    d47455653a9f1d69b0c63040eac6bbdbb8b3f72060862c1adc2bd589bbe20c04f25272e69324b0249a79eba4f089a3e68e787ee80a4d992df160597186d3ca89

  • C:\Program Files (x86)\Microsoft\Temp\EU244C.tmp\msedgeupdateres_mk.dll

    Filesize

    29KB

    MD5

    3824b848b8d27996e03b77e47d683ad5

    SHA1

    2112959b86d3699f7748120e9ce704a4b1d3d85d

    SHA256

    42ddac6cb468b4d938fac198019dfcf36b33bb8b370755425a6a5950d226878b

    SHA512

    cdfb37d6ffb0f344dbfb95af7cee8f0d7f420a1a98f934ced93ee0c349b1f2661e8331f4ea373a7bd535df89b783ec662935c9dec8f86c31c91bc6383af01028

  • C:\Program Files\MsEdgeCrashpad\settings.dat

    Filesize

    280B

    MD5

    5496b40df2c6e5bb4a57df59c64802e5

    SHA1

    3e196709fd036f2e3d5f6cd9f164708d4dff1c8a

    SHA256

    1c3b0e7b3e88c6ef667c53bc7a8cab02cff286e52e5d16c685e0743bb3798c72

    SHA512

    b092ac5093b48a7d9aeb499b69fecc93e629410e0ef21edd102111811244152cbafb4cbc65da4cf08824dfdd0441f7e2104e9a14bb9e91c5f99efdd971c1ecfc

  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

    Filesize

    94KB

    MD5

    7c296a98610fa59f4bf0597c696a4645

    SHA1

    0ee5fa644bb2a5c2af029a67d10855fddc904909

    SHA256

    a09aba440f202f5343d20f5d41ead6b8362aa55f10344da8c40e0431bfbdc80a

    SHA512

    542a66404aaae05318ede4a8d9040d80b15964cf31eacf319b52916e0cedf1f70c48eb62fd9236f9670cab5fb3a0b1ec6fd97301ac9553c2ae1c136f2432f6ac

  • C:\ProgramData\Solara\Solara.exe

    Filesize

    613KB

    MD5

    efa26a96b7af259f6682bc888a8b6a14

    SHA1

    9800a30228504c30e7d8aea873ded6a7d7d133bb

    SHA256

    18f4dca864799d7cd00a26ae9fb7eccf5c7cf3883c51a5d0744fd92a60ca1953

    SHA512

    7ca4539ab544aee162c7d74ac94b290b409944dd746286e35c8a2712db045d255b9907d1ebea6377d1406ddd87f118666121d0ec1abe0e9415de1bba6799f76e

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

    Filesize

    280B

    MD5

    ee6ca2507b4d68f91cdb80da19e2c45a

    SHA1

    af7f743c5ffe1d0b4261192a10fb26c89cd1c1c9

    SHA256

    06882e67df5fb693f89b3798ad6dda4c276560264755dec058d445a489246a62

    SHA512

    921df907db1f05c7cb90d9582f4b99f02408a1c671b4ac8d6700e0d32ba006a552a84c5923e9a6b83a61065f2fe2e34aef890d56596de8eb93632cfe3d41f1a9

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

    Filesize

    2B

    MD5

    d751713988987e9331980363e24189ce

    SHA1

    97d170e1550eee4afc0af065b78cda302a97674c

    SHA256

    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

    SHA512

    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_0

    Filesize

    44KB

    MD5

    296fe300b5fc59744861b63f0758af87

    SHA1

    e57b6bd2c001efdc0cb0e1bb8592ef7823c090dd

    SHA256

    5a7639020c76ed796959b81139cda01029bf6c1b0ef3c4388572c2c6d7afd15c

    SHA512

    7b7db082d33d5fba02395484da14c9ac0e48a535aef96ffd3dc5f0304cf0722944498a86b75aff2550a2fa4422afaf4f5b8412973f38587537c5adb7620c1cdc

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_1

    Filesize

    264KB

    MD5

    d0d388f3865d0523e451d6ba0be34cc4

    SHA1

    8571c6a52aacc2747c048e3419e5657b74612995

    SHA256

    902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

    SHA512

    376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_2

    Filesize

    8KB

    MD5

    0962291d6d367570bee5454721c17e11

    SHA1

    59d10a893ef321a706a9255176761366115bedcb

    SHA256

    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

    SHA512

    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\GrShaderCache\data_3

    Filesize

    4.0MB

    MD5

    a8851c29490db5ab3227b38c66693ce8

    SHA1

    ffa3d99c8285aa0cdd225cbfdf48b623c4f7cda0

    SHA256

    8d103f6bbbd45db7270643d99e4976389655cdcd33593a3671a742f592c89e91

    SHA512

    feb0e0e492c495789858645287b589bbd1f9ae7ae3fdc9646ff585ceb0655a55df13a5f5179c83557afc94648af1273bf99a3661fb1996c9b5e693c86fdc0772

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    1KB

    MD5

    3a34a4efc6a21d7269d88bf1bdc80a0f

    SHA1

    75db068fefc4c338d656506897e20e4be621a70b

    SHA256

    e81f5b875b9ab33ec09c26170d48186dcf7256f123fc254b3117fd119b3b428b

    SHA512

    16c466fd826cf0d08c23894ab8ba01913a5bd91f4634c2eb6c89b6c443253331d912fa0bbe8fb77c90a94cfa69a5659ece9121074ad9b5e34246360a743f08fd

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    2KB

    MD5

    0ee764d079fb02987e8a965de0d2902b

    SHA1

    cede7c66bf1bffba249da366d404695c29107a53

    SHA256

    b3c9759ffddb2f8a7317b9dbf4aac076512e642946d069c1e07dfe30403d46a2

    SHA512

    169d7c075cf6e8269d4bf0f45f43134aa88fe56f586e78b544b2abd894e53833b3f9238304c625f6f6d0b4882bdbae1a86c738f343ae187f584c399bb862b788

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    3KB

    MD5

    e36c2bfd4a6a8a783dfac8ae33252a32

    SHA1

    6d9fa55f01c9d4367df09f063e41a265e042ddb4

    SHA256

    c34441c55cabc6097f67a88ee648fc4218bfe66dce9af07fa2f228dfbe6b8081

    SHA512

    15d524698b2949395274c0a83f1e0c5b16879b466c522359b9acc1807be4e11d7eca2fbec0e77acc5c40d4e7b323afa1c67bd1883658b7b3a955948198d2380b

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

    Filesize

    3KB

    MD5

    f0d8462b4e4bd839a33866684af4cbe2

    SHA1

    bac1914764dc78f636323a341a6113ccbb396956

    SHA256

    2609fdb5eba4a7d6f5311c1e1b175a4984278a9a581d15a2116b31e9d64ba9de

    SHA512

    0aae44fdf53ba67e189950bbf63dbab94b54c67425672d3b7c72b7a83e73fa11ada6becb7582e32b6c721c5abdcc0e3caeae67236f7d277c12b0564196907e0b

  • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe59f294.TMP

    Filesize

    1KB

    MD5

    070023f457572092fdf38ff4649bab1f

    SHA1

    fdf41340fafe8aa9614a4fa1d0c4c4aebd788907

    SHA256

    7b1e84e78dfee102bf13f75269484b5fe3d39da36ad40f2e2e2bf54483e01ef8

    SHA512

    4efa723df4f76404b61ef4df36a1d408593281c7dc5b86cdf27b3ad621263c8426fe278b5cca56364b75f197b5d0b0adc16d90a0e1fa9e51b51f1dae4a4b8633

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.15.exe

    Filesize

    2.9MB

    MD5

    e5833801199a03b60c657c6b96aa3d34

    SHA1

    6f6914731a21481bf2dd779ee04a753993ec06c3

    SHA256

    f6de5d95a94c8780de0da6b1fe3a7534d20756ef1fb0800b664afd29f96a9f7a

    SHA512

    e0b638880793662d360ccb921c91bc40cb675f6b5cfef8c67580ed2885a335e11bf9373dad94dd14c1a7e9b2894bdbdb1aa1fa01586406ee249c71a2918d7bb1

  • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

    Filesize

    1.6MB

    MD5

    b49d269a231bcf719d6de10f6dcf0692

    SHA1

    5de6eb9c7091df08529692650224d89cae8695c3

    SHA256

    bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e

    SHA512

    8f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f

  • memory/296-545-0x0000021B0BD80000-0x0000021B0BF21000-memory.dmp

    Filesize

    1.6MB

  • memory/296-385-0x00007FFD02D60000-0x00007FFD02D61000-memory.dmp

    Filesize

    4KB

  • memory/1364-26-0x000002879A0B0000-0x000002879A0B8000-memory.dmp

    Filesize

    32KB

  • memory/1364-25-0x000002879A070000-0x000002879A096000-memory.dmp

    Filesize

    152KB

  • memory/1364-30-0x00000287FF830000-0x00000287FF838000-memory.dmp

    Filesize

    32KB

  • memory/1364-20-0x00000287FF810000-0x00000287FF818000-memory.dmp

    Filesize

    32KB

  • memory/1364-29-0x000002879A060000-0x000002879A06A000-memory.dmp

    Filesize

    40KB

  • memory/1364-18-0x00000287FA9F0000-0x00000287FACD2000-memory.dmp

    Filesize

    2.9MB

  • memory/1364-286-0x00000287E70C0000-0x00000287E7172000-memory.dmp

    Filesize

    712KB

  • memory/1364-290-0x00000287E7170000-0x00000287E718E000-memory.dmp

    Filesize

    120KB

  • memory/1364-291-0x00000287FF840000-0x00000287FF84A000-memory.dmp

    Filesize

    40KB

  • memory/1364-293-0x00000287FF900000-0x00000287FF912000-memory.dmp

    Filesize

    72KB

  • memory/1364-21-0x00000287FF860000-0x00000287FF898000-memory.dmp

    Filesize

    224KB

  • memory/1364-28-0x000002879A0A0000-0x000002879A0AA000-memory.dmp

    Filesize

    40KB

  • memory/1364-27-0x000002879A0C0000-0x000002879A0D6000-memory.dmp

    Filesize

    88KB

  • memory/1364-19-0x00000287FC9C0000-0x00000287FC9D0000-memory.dmp

    Filesize

    64KB

  • memory/1364-24-0x000002879A050000-0x000002879A05A000-memory.dmp

    Filesize

    40KB

  • memory/1364-23-0x000002879A130000-0x000002879A230000-memory.dmp

    Filesize

    1024KB

  • memory/1364-22-0x00000287FF820000-0x00000287FF82E000-memory.dmp

    Filesize

    56KB

  • memory/2216-450-0x00007FFD03650000-0x00007FFD03651000-memory.dmp

    Filesize

    4KB

  • memory/2216-456-0x00007FFD03660000-0x00007FFD03661000-memory.dmp

    Filesize

    4KB

  • memory/3160-417-0x00007FFD02D60000-0x00007FFD02D61000-memory.dmp

    Filesize

    4KB

  • memory/3520-2-0x00007FFCE6AF0000-0x00007FFCE75B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3520-0-0x00007FFCE6AF3000-0x00007FFCE6AF5000-memory.dmp

    Filesize

    8KB

  • memory/3520-1-0x000001C1430B0000-0x000001C14317E000-memory.dmp

    Filesize

    824KB

  • memory/3520-17-0x00007FFCE6AF0000-0x00007FFCE75B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3520-4-0x000001C144F30000-0x000001C144F52000-memory.dmp

    Filesize

    136KB

  • memory/4040-225-0x0000000074A00000-0x0000000074C26000-memory.dmp

    Filesize

    2.1MB

  • memory/4040-224-0x0000000000AB0000-0x0000000000AE5000-memory.dmp

    Filesize

    212KB

  • memory/4040-232-0x0000000074A00000-0x0000000074C26000-memory.dmp

    Filesize

    2.1MB

  • memory/4040-285-0x0000000000AB0000-0x0000000000AE5000-memory.dmp

    Filesize

    212KB

  • memory/4124-354-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-356-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-357-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-350-0x0000011DFF950000-0x0000011DFFA02000-memory.dmp

    Filesize

    712KB

  • memory/4124-347-0x0000011DE51B0000-0x0000011DE524C000-memory.dmp

    Filesize

    624KB

  • memory/4124-355-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-351-0x0000011DE55F0000-0x0000011DE5600000-memory.dmp

    Filesize

    64KB

  • memory/4124-349-0x0000011DFF7E0000-0x0000011DFF89A000-memory.dmp

    Filesize

    744KB

  • memory/4124-523-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-524-0x0000011DFF8A0000-0x0000011DFF916000-memory.dmp

    Filesize

    472KB

  • memory/4124-525-0x0000011DE6E90000-0x0000011DE6EAE000-memory.dmp

    Filesize

    120KB

  • memory/4124-353-0x0000011DE7060000-0x0000011DE70F0000-memory.dmp

    Filesize

    576KB

  • memory/4124-348-0x0000011E00000000-0x0000011E0053C000-memory.dmp

    Filesize

    5.2MB

  • memory/4124-546-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB

  • memory/4124-548-0x0000000180000000-0x00000001810FC000-memory.dmp

    Filesize

    17.0MB