Analysis

  • max time kernel
    899s
  • max time network
    772s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/02/2025, 07:57

General

  • Target

    BootstrapperNew (2).exe

  • Size

    2.9MB

  • MD5

    f227cdfd423b3cc03bb69c49babf4da3

  • SHA1

    3db5a97d9b0f2545e7ba97026af6c28512200441

  • SHA256

    cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

  • SHA512

    b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

  • SSDEEP

    49152:xlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:DZXfHaFoCIvqkqXf0FglY1XOe97vLn

Malware Config

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Themida packer 32 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5272
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3048
    • C:\ProgramData\Solara\Solara.exe
      "C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2424.4900.17139665166501546399
        3⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x164,0x168,0x16c,0x140,0x174,0x7ffe6792b078,0x7ffe6792b084,0x7ffe6792b090
          4⤵
            PID:1808
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1660,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=1672 /prefetch:2
            4⤵
              PID:5256
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1844,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=1992 /prefetch:11
              4⤵
                PID:6048
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1984,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:13
                4⤵
                  PID:4644
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3608,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:1
                  4⤵
                    PID:5208
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4828,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4820 /prefetch:14
                    4⤵
                      PID:1392
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4340,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:14
                      4⤵
                        PID:6068
                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4228,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:10
                        4⤵
                          PID:3100
                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4740,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:14
                          4⤵
                            PID:5176
                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4272,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:14
                            4⤵
                              PID:2712
                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=788,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:14
                              4⤵
                                PID:1100
                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=5008,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:14
                                4⤵
                                  PID:4904
                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=764,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4876 /prefetch:14
                                  4⤵
                                    PID:4476
                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4968,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2968 /prefetch:14
                                    4⤵
                                      PID:2876
                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe
                                "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4100
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5672
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
                                  2⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3064
                                • C:\ProgramData\Solara\Solara.exe
                                  "C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"
                                  2⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks whether UAC is enabled
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4904

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Solara\Microsoft.Web.WebView2.Core.dll

                                Filesize

                                557KB

                                MD5

                                b037ca44fd19b8eedb6d5b9de3e48469

                                SHA1

                                1f328389c62cf673b3de97e1869c139d2543494e

                                SHA256

                                11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

                                SHA512

                                fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

                              • C:\ProgramData\Solara\Microsoft.Web.WebView2.Wpf.dll

                                Filesize

                                50KB

                                MD5

                                e107c88a6fc54cc3ceb4d85768374074

                                SHA1

                                a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6

                                SHA256

                                8f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8

                                SHA512

                                b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe

                              • C:\ProgramData\Solara\Monaco\combined.html

                                Filesize

                                14KB

                                MD5

                                2a0506c7902018d7374b0ec4090c53c0

                                SHA1

                                26c6094af2043e1e8460023ac6b778ba84463f30

                                SHA256

                                cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a

                                SHA512

                                4a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b

                              • C:\ProgramData\Solara\Monaco\index.html

                                Filesize

                                14KB

                                MD5

                                610eb8cecd447fcf97c242720d32b6bd

                                SHA1

                                4b094388e0e5135e29c49ce42ff2aa099b7f2d43

                                SHA256

                                107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7

                                SHA512

                                cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331

                              • C:\ProgramData\Solara\Monaco\vs\basic-languages\lua\lua.js

                                Filesize

                                5KB

                                MD5

                                8706d861294e09a1f2f7e63d19e5fcb7

                                SHA1

                                fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

                                SHA256

                                fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

                                SHA512

                                1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.css

                                Filesize

                                171KB

                                MD5

                                6af9c0d237b31c1c91f7faa84b384bdf

                                SHA1

                                c349b06cad41c2997f5018a9b88baedd0ba1ea11

                                SHA256

                                fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0

                                SHA512

                                3bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff

                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.js

                                Filesize

                                2.0MB

                                MD5

                                9399a8eaa741d04b0ae6566a5ebb8106

                                SHA1

                                5646a9d35b773d784ad914417ed861c5cba45e31

                                SHA256

                                93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                                SHA512

                                d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.nls.js

                                Filesize

                                31KB

                                MD5

                                74dd2381ddbb5af80ce28aefed3068fc

                                SHA1

                                0996dc91842ab20387e08a46f3807a3f77958902

                                SHA256

                                fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                                SHA512

                                8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                              • C:\ProgramData\Solara\Monaco\vs\loader.js

                                Filesize

                                27KB

                                MD5

                                8a3086f6c6298f986bda09080dd003b1

                                SHA1

                                8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                                SHA256

                                0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                                SHA512

                                9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                              • C:\ProgramData\Solara\Newtonsoft.Json.dll

                                Filesize

                                695KB

                                MD5

                                195ffb7167db3219b217c4fd439eedd6

                                SHA1

                                1e76e6099570ede620b76ed47cf8d03a936d49f8

                                SHA256

                                e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                SHA512

                                56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                              • C:\ProgramData\Solara\Solara.exe

                                Filesize

                                619KB

                                MD5

                                91f5d6abf1fc57cb3e6222f10c51bff1

                                SHA1

                                fd1183ba06cf793f12de674d8aa31bd8bfbe1172

                                SHA256

                                c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840

                                SHA512

                                4538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\CertificateRevocation\6498.2024.12.2\crl-set

                                Filesize

                                21KB

                                MD5

                                846feb52bd6829102a780ec0da74ab04

                                SHA1

                                dd98409b49f0cd1f9d0028962d7276860579fb54

                                SHA256

                                124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4

                                SHA512

                                c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                Filesize

                                280B

                                MD5

                                7b030f3ea54cc1ca230877a7c1dfd3c3

                                SHA1

                                aa899fe5f777b0db1f0a51d9fb8ffe5a43665d35

                                SHA256

                                7f23fd18a16ecfef902ee0ceada945cdca5fdc0116ae7e2e1b4533822cc5c6c0

                                SHA512

                                436045210d36fbc78f0cc1d68607122f5debee8a3c89b2ba0425fcf77fba4ac7fc4935b0648d261e8405bf28efaf44c53eb9d6e7a868fef7e92f5ecb22f4dc56

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                Filesize

                                280B

                                MD5

                                70e6242ae9f273a092463ac44c971f63

                                SHA1

                                df68cf49cf3de3a758a187f521db830d1045a5e9

                                SHA256

                                fe4bbf38512ab7ecf73566bc368e6981a39df0651a1f47de7178646e17ff3f89

                                SHA512

                                d3c12e9a776cb1ea18d6e283bc67845510aca4c254fd6dcf24aaba521e961389d1c09fbbfc9db185d45cb28e372d200c223d1e42a0dc7d4c4fb869a4e672bee0

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                                Filesize

                                20B

                                MD5

                                9e4e94633b73f4a7680240a0ffd6cd2c

                                SHA1

                                e68e02453ce22736169a56fdb59043d33668368f

                                SHA256

                                41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                SHA512

                                193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0

                                Filesize

                                8KB

                                MD5

                                cf89d16bb9107c631daabf0c0ee58efb

                                SHA1

                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                SHA256

                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                SHA512

                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                d0d388f3865d0523e451d6ba0be34cc4

                                SHA1

                                8571c6a52aacc2747c048e3419e5657b74612995

                                SHA256

                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                SHA512

                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2

                                Filesize

                                8KB

                                MD5

                                0962291d6d367570bee5454721c17e11

                                SHA1

                                59d10a893ef321a706a9255176761366115bedcb

                                SHA256

                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                SHA512

                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3

                                Filesize

                                8KB

                                MD5

                                41876349cb12d6db992f1309f22df3f0

                                SHA1

                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                SHA256

                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                SHA512

                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                680c8bb9c0c88d45ec6ffd8dfdd6b1ca

                                SHA1

                                a3ff0092164bc15176aeb9a24a9ccb19922be3e1

                                SHA256

                                250a40935d811788992864c3c67b34277d19e6de64a9f43db72aa4869afae5a1

                                SHA512

                                13667fe0f94c8db3d7c86bba828634a7864861bc6b0b08eaa02672488c68b9088aa8a6dac12da084316800ed9539e4f4b7f06a10bf33949247d6c3c5386d90f9

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe5914e6.TMP

                                Filesize

                                59B

                                MD5

                                2800881c775077e1c4b6e06bf4676de4

                                SHA1

                                2873631068c8b3b9495638c865915be822442c8b

                                SHA256

                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                SHA512

                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                88b7a042a50305781bbd6fcfb3f46333

                                SHA1

                                33ae42a95983029081a7bc01d63c358d677d1de8

                                SHA256

                                4998905c20a7e44e7f41e1a29feb6552821606eab967b50252a7bc164cf38041

                                SHA512

                                6e4113a50281bdf0226f52fae239e5a440a3413a184bbade2dd9c0540a2e53e98ba96f3356179a5118e71f4a93a8e0be06daa97df4c3199cc3a8683f13fa1776

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                44c549157e0ebf2beb700946a94c4185

                                SHA1

                                a96e71eb7cc22b9b279a31445188a087890abcf2

                                SHA256

                                f3817dc1a6e2d4898b51f0d2a758678005ba64d9296e90a1e87bbd66d013e367

                                SHA512

                                2b7f6010266934ded8708ecf2be7b70b2f9ae6f6143bd817315be314cd995e42a980afd47fbc5447bd5efd02dd3eb02250319a5950f7fc0bf7bfbcbb6aae2aa7

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences~RFe589de1.TMP

                                Filesize

                                6KB

                                MD5

                                c3617073ddf6792dd6858e6a8848d0b2

                                SHA1

                                67b5b82958835807f95ce1c0107bb7d8627703f6

                                SHA256

                                594846836957b0d0a045bd479d38adc9c45a5bd19e0888ca5008e2a290bb8988

                                SHA512

                                f9341dcc4ac89c35d8efc930a0565e256c53d374801f8fac041f6a2c01cb2f4592c116c2c8764e3f010e04b1c6144247590131a6db70124f4f2a17c05e881a17

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                1KB

                                MD5

                                72dc181f20a387cb6e7c2bf108508c1c

                                SHA1

                                b17bff879b92d504a90960e0c6fa6ac73eff56a9

                                SHA256

                                baf4c9c2d4be6ca73d2b01cc5a20c8aa544b686f7d959df6ace4fcd2d4a3fa70

                                SHA512

                                fc05202146f8e81e8d60e7b4fc48793fab43f8e7fd95eeecac966439c78344c551571eddb60b76bfa3fd1644c57dce19a2c23d5129709cbb63632f5743dc9d56

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                2KB

                                MD5

                                050db11fbb9b888c11cc4864815a5c76

                                SHA1

                                b3fee1f0b6e2bb151c2089ce8690e0e598325775

                                SHA256

                                4b9a099bf78403567dd8704e060d236c7ac3e3c4580c98e6098e4326e7a90f1b

                                SHA512

                                198ad774f51b837ea1fb20f1227a54542035c8927467938d2fb5b9599740c9a3459e50764b483764ae42d05059b0994c2683eec35b28d5f2d693bf0b0da0c9db

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                3KB

                                MD5

                                f4b03c217be63f22ee22e40d4090930e

                                SHA1

                                47bdeda5354fe23c208c80cb48137494a92497dc

                                SHA256

                                442651ad3ae54ce2f457a056a8784f0fb595497742a10556218d02f1ec8ee820

                                SHA512

                                a6c2f3e62e2629f25efe1b63546e95f95b27a6082d3879b98e010030c4405fdf85537c547c4f163c093545c2336aea909154fe4a8a1e8d0f3952f6304e65036d

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                4KB

                                MD5

                                1aac94fb0407316a9891984c25b77adc

                                SHA1

                                a18cf9064260974b5f59df5bb7fd4323511a3281

                                SHA256

                                aa2b85959953de33be0f04485b275d939c2bfd61f8364a8ad22664aac97d3b2c

                                SHA512

                                b2a3a1810711dfe76dc13ef435dcd015206f10005b67bf22301bef9e4c2b5884543add45d56a6a38037958d197a110d25cecb346603b85bb8abd1ae47c13adca

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                17KB

                                MD5

                                8f2862eddfb8b17d6023d1c5573fbf79

                                SHA1

                                f0f279430dbbfb00ed5b0bf1d9789e77319ecd88

                                SHA256

                                0b58c1b70925896f78e2047afcd3723a3da7d4abb068824acc83e470fcb20a25

                                SHA512

                                49dffa65baf20ca3e31adba63743056d1511e99aa4074a0f7a455abab3286ed7ed7f6505ca9a0e02afafa4318cfaea8e4e099ac4abc3a52e2ebbb9de65757445

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                Filesize

                                4KB

                                MD5

                                c315f375051a30aa8404807a371a1e1a

                                SHA1

                                096c1f3cfbc72edbcb3d7289298db1ce69b60457

                                SHA256

                                0946d41df0e4060691186bf31892c19262887324a399cdf21406985add4faf20

                                SHA512

                                c582adb2f0df97dc03525ec6aab35f82f2a7217537545a319805717791bb95de98dec4cd9212364c184ebdf8bee6b27f4c3b9583def48fe2082daafaa5e274c9

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe57ff6e.TMP

                                Filesize

                                1KB

                                MD5

                                d75cba57a929510764801b9a08e78ad1

                                SHA1

                                e63d5225ab89d7e128fd89455c5ba5c0c1f87ef5

                                SHA256

                                4f0d881dd0f4f0ed3095be343d047e4d5e2f458ae7b07688368705f9889b9b0e

                                SHA512

                                85ec747ad26a0f4f3ce738ac2eaeb33c2b1465375de66f4059523bffd6d0eaa90064487f11ef735dee03b5d0d6945e842aa6816efda214418a186bcb62328b1c

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\PKIMetadata\21.0.0.0\crs.pb

                                Filesize

                                289KB

                                MD5

                                24a3775317d74ceea8fba6f0cfbce562

                                SHA1

                                fed5009eb51938d0894a9bb7aee8a97873d9b6f3

                                SHA256

                                192b206ad6f649f6c8767f6a3b11d9c5354710602bf0aeb4157eea08d7461ef7

                                SHA512

                                245951359283bff026aad50f7768a9aa59c1926ca7aa441c8f6a3715be34925332eeef4115a442a7841429400105d59d13937ee3aa9b80e83f1982893aefaa8e

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\PKIMetadata\21.0.0.0\ct_config.pb

                                Filesize

                                10KB

                                MD5

                                09b6469de61db3473bdfe04951f08529

                                SHA1

                                d64b455ae9c65d8d8629a128a9f3505ef3df3555

                                SHA256

                                1c435f4448dcf1784637fa9470546d12d7db2420a11cf8b5d6343439dd401c60

                                SHA512

                                049d3c0e05aa3ab1d4d51cc5bd72603f47aa33141bf771cb86baedc19b8973911445ce74256ff1118483175cf4a104262a22ae9431a6366cbd1f7d28553fcbb0

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\PKIMetadata\21.0.0.0\kp_pinslist.pb

                                Filesize

                                11KB

                                MD5

                                2d8bcb7c4b2dc669429bd40f7048f62a

                                SHA1

                                43a332c99105dcfb67893ea167879c3ce6bac8db

                                SHA256

                                7a0866cdd7bd21b8b08d166edb3f6adf8c859b47988b9b3ba3f0eaafabe10ff2

                                SHA512

                                15d3c7c6df2c3c75daf7ea9165687c5a6f8acac3dfe83573e20aa1bd425dde8fc659fc2c1b050b3e8ddb28358a96b9e0c083e61fa5d63ae34fa4b0bb63db8a76

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules

                                Filesize

                                1.8MB

                                MD5

                                d7c9c6d2e1d9ae242d68a8316f41198c

                                SHA1

                                8d2ddccc88a10468e5bffad1bd377be82d053357

                                SHA256

                                f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547

                                SHA512

                                7fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE

                                Filesize

                                24KB

                                MD5

                                aad9405766b20014ab3beb08b99536de

                                SHA1

                                486a379bdfeecdc99ed3f4617f35ae65babe9d47

                                SHA256

                                ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d

                                SHA512

                                bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852

                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\TrustTokenKeyCommitments\2024.12.14.1\keys.json

                                Filesize

                                6KB

                                MD5

                                b4434830c4bd318dba6bd8cc29c9f023

                                SHA1

                                a0f238822610c70cdf22fe08c8c4bc185cbec61e

                                SHA256

                                272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070

                                SHA512

                                f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335

                              • C:\ProgramData\Solara\SolaraV3.dll

                                Filesize

                                6.4MB

                                MD5

                                fd5fbbc0cb077f4e0cf0a95c4a4ae159

                                SHA1

                                e0a5dee5b66c63888dac139eb45def546db30f33

                                SHA256

                                4427f0651a65b4cb1499b9d150d47795547be6592f8fb5c0553e34be20d7113c

                                SHA512

                                72f2e6dcf20e5c96fad112ad6a6e3611b8a018e2bd7340fd78c74f6b67b1bd8e2cecfec4abcfbf0024d9c682f6d50c54c27ea18ac3c1836b46896f3f45f99570

                              • C:\ProgramData\Solara\WebView2Loader.dll

                                Filesize

                                133KB

                                MD5

                                a0bd0d1a66e7c7f1d97aedecdafb933f

                                SHA1

                                dd109ac34beb8289030e4ec0a026297b793f64a3

                                SHA256

                                79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                SHA512

                                2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                              • C:\ProgramData\Solara\Wpf.Ui.dll

                                Filesize

                                5.2MB

                                MD5

                                aead90ab96e2853f59be27c4ec1e4853

                                SHA1

                                43cdedde26488d3209e17efff9a51e1f944eb35f

                                SHA256

                                46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                SHA512

                                f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                              • C:\ProgramData\Solara\bin\version.txt

                                Filesize

                                5B

                                MD5

                                ab445d6d3a8e97ae94f0cb34f668f884

                                SHA1

                                6d36317c57adbe7a73fff03d3c082607bab2961f

                                SHA256

                                2a72b92efc7de0a134885e6b893c0a7cdd7ed642e251ca53b3a476ac84fef727

                                SHA512

                                a13b328a0725fd7c34f30fc2c8851ab1bf7ab54bacb37c857e40e389fdbe96db2b58edf08bbde79b4eb32b7b8a046be7bfe8a844867a2e73486b738cf83f07ac

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BootstrapperNew (2).exe.log

                                Filesize

                                3KB

                                MD5

                                5733c3b9a719d2ded8760ccebeffd150

                                SHA1

                                971d77338f9745f1977f5593878cd74f70680a68

                                SHA256

                                5b18dcba1a77565d3d2fae4b2a5f5692dc12fa02844959ed93f7e5a0982824ab

                                SHA512

                                3fd0ccd54213024bdf945dd058a8cef0cb0291982a7248fb9f02acc31d4e1904ceb1eff1285a0a9f4608b578adf198e8209c201fa35f24461f05349a6b3a93a9

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                2KB

                                MD5

                                627073ee3ca9676911bee35548eff2b8

                                SHA1

                                4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                SHA256

                                85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                SHA512

                                3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                4093e5ab3812960039eba1a814c2ffb0

                                SHA1

                                b5e4a98a80be72fccd3cc910e93113d2febef298

                                SHA256

                                c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c

                                SHA512

                                f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                34e3230cb2131270db1af79fb3d57752

                                SHA1

                                21434dd7cf3c4624226b89f404fd7982825f8ac6

                                SHA256

                                0f162f27548a84db1638bcf46d03661b5bcb3032e765fafdb597cc107639ba39

                                SHA512

                                3756cb01e82dbda681b562eae74d0b8ef8b3787b126119a51a92c51a78204a7805b9bdd60c00c50a3be23b843e78bb153b656540767069f739ce421b9bc02335

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                944B

                                MD5

                                1a9fa92a4f2e2ec9e244d43a6a4f8fb9

                                SHA1

                                9910190edfaccece1dfcc1d92e357772f5dae8f7

                                SHA256

                                0ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888

                                SHA512

                                5d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64

                              • C:\Users\Admin\AppData\Local\Temp\CONFIG

                                Filesize

                                79B

                                MD5

                                0284fa0391784125ad3b12be8c92c6ae

                                SHA1

                                e4fe938288c6804d9c79947ad2e39939a595e9f3

                                SHA256

                                789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0

                                SHA512

                                9dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vsu1dg0h.cxg.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1039153021\manifest.json

                                Filesize

                                80B

                                MD5

                                9e72659142381870c3c7dfe447d0e58e

                                SHA1

                                ba27ed169d5af065dabde081179476beb7e11de2

                                SHA256

                                72bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2

                                SHA512

                                b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1332459417\manifest.json

                                Filesize

                                114B

                                MD5

                                e6cd92ad3b3ab9cb3d325f3c4b7559aa

                                SHA1

                                0704d57b52cf55674524a5278ed4f7ba1e19ca0c

                                SHA256

                                63dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d

                                SHA512

                                172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\manifest.json

                                Filesize

                                102B

                                MD5

                                2c2e90b63e0f7e54ffc271312a3d4490

                                SHA1

                                4eb9d97e1efc368420691acb2e6df1c61c75f7e4

                                SHA256

                                72dbb7d6b647b664ef64b6a14771c2549c979b9c57712f3f712966edb02d7b2e

                                SHA512

                                9ec9e8a34cc56a694ac845a4344600b479d11347ec5279d955ab4cf55590440f3491e0a1b635ddb9db821630885e5fd63c269fc2a5d1abd0a0d0062ae21dea8b

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_2146586914\manifest.json

                                Filesize

                                43B

                                MD5

                                af3a9104ca46f35bb5f6123d89c25966

                                SHA1

                                1ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8

                                SHA256

                                81bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea

                                SHA512

                                6a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_247354308\manifest.json

                                Filesize

                                76B

                                MD5

                                ba25fcf816a017558d3434583e9746b8

                                SHA1

                                be05c87f7adf6b21273a4e94b3592618b6a4a624

                                SHA256

                                0d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11

                                SHA512

                                3763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-af.hyb

                                Filesize

                                70KB

                                MD5

                                ffa9db945f0f0c15b8bba75a6e064880

                                SHA1

                                49217a9d5bb7a868464403b4e3c82e80df53456c

                                SHA256

                                5487ee44a4cd706d0086522e90c59c76cdf2ac68ce506fd3eae6054b9220c0cf

                                SHA512

                                cc67b2dfbbb009dd3fdb999fe86410425455613c12dac755a3cded435cd25ca4363782d70f3b7bb7c0fdd63e2eb649ae6a4053d929f463b646b43d7dbfda79c0

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-as.hyb

                                Filesize

                                703B

                                MD5

                                8961fdd3db036dd43002659a4e4a7365

                                SHA1

                                7b2fa321d50d5417e6c8d48145e86d15b7ff8321

                                SHA256

                                c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe

                                SHA512

                                531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-hi.hyb

                                Filesize

                                687B

                                MD5

                                0807cf29fc4c5d7d87c1689eb2e0baaa

                                SHA1

                                d0914fb069469d47a36d339ca70164253fccf022

                                SHA256

                                f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42

                                SHA512

                                5324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-nb.hyb

                                Filesize

                                141KB

                                MD5

                                677edd1a17d50f0bd11783f58725d0e7

                                SHA1

                                98fedc5862c78f3b03daed1ff9efbe5e31c205ee

                                SHA256

                                c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0

                                SHA512

                                c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\manifest.json

                                Filesize

                                82B

                                MD5

                                2617c38bed67a4190fc499142b6f2867

                                SHA1

                                a37f0251cd6be0a6983d9a04193b773f86d31da1

                                SHA256

                                d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665

                                SHA512

                                b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0

                              • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\manifest.json

                                Filesize

                                116B

                                MD5

                                2188c7ec4e86e29013803d6b85b0d5bb

                                SHA1

                                5a9b4a91c63e0013f661dfc472edb01385d0e3ce

                                SHA256

                                ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62

                                SHA512

                                37c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656

                              • memory/2424-747-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-387-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-131-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-129-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-843-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-246-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-121-0x000001D7E9DC0000-0x000001D7E9E50000-memory.dmp

                                Filesize

                                576KB

                              • memory/2424-731-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-116-0x000001D7E9300000-0x000001D7E9310000-memory.dmp

                                Filesize

                                64KB

                              • memory/2424-114-0x000001D7E95B0000-0x000001D7E9662000-memory.dmp

                                Filesize

                                712KB

                              • memory/2424-112-0x000001D7E94F0000-0x000001D7E95AA000-memory.dmp

                                Filesize

                                744KB

                              • memory/2424-111-0x000001D7E9880000-0x000001D7E9DBC000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/2424-109-0x000001D7E6C90000-0x000001D7E6D30000-memory.dmp

                                Filesize

                                640KB

                              • memory/2424-823-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-821-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-819-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-808-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-720-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-439-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-428-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-331-0x000001D7EE7C0000-0x000001D7EE836000-memory.dmp

                                Filesize

                                472KB

                              • memory/2424-333-0x000001D7EDCA0000-0x000001D7EDCBE000-memory.dmp

                                Filesize

                                120KB

                              • memory/2424-130-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-768-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-779-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-396-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-384-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-781-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-132-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-360-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-353-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-362-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-364-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/2424-793-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/3100-741-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-742-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-739-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-734-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-735-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-733-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-740-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-744-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-745-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/3100-743-0x0000023358E90000-0x0000023358E91000-memory.dmp

                                Filesize

                                4KB

                              • memory/4004-34-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4004-31-0x000002A3C6F00000-0x000002A3C6F22000-memory.dmp

                                Filesize

                                136KB

                              • memory/4004-37-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4004-33-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4004-32-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4904-335-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/4904-334-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/4904-336-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/4904-337-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/4904-359-0x0000000180000000-0x000000018109B000-memory.dmp

                                Filesize

                                16.6MB

                              • memory/5208-270-0x00007FFE92E20000-0x00007FFE92E21000-memory.dmp

                                Filesize

                                4KB

                              • memory/5256-161-0x00007FFE92E20000-0x00007FFE92E21000-memory.dmp

                                Filesize

                                4KB

                              • memory/5256-354-0x0000015086160000-0x0000015086191000-memory.dmp

                                Filesize

                                196KB

                              • memory/5272-18-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-0-0x00007FFE734F3000-0x00007FFE734F5000-memory.dmp

                                Filesize

                                8KB

                              • memory/5272-9-0x0000025675120000-0x000002567512A000-memory.dmp

                                Filesize

                                40KB

                              • memory/5272-8-0x00000256757D0000-0x00000256758D0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/5272-16-0x0000025675900000-0x0000025675908000-memory.dmp

                                Filesize

                                32KB

                              • memory/5272-6-0x0000025675790000-0x00000256757C8000-memory.dmp

                                Filesize

                                224KB

                              • memory/5272-12-0x00000256758D0000-0x00000256758E6000-memory.dmp

                                Filesize

                                88KB

                              • memory/5272-14-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-19-0x00007FFE734F3000-0x00007FFE734F5000-memory.dmp

                                Filesize

                                8KB

                              • memory/5272-20-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-21-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-22-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-15-0x0000025675130000-0x000002567513A000-memory.dmp

                                Filesize

                                40KB

                              • memory/5272-49-0x000002564ACE0000-0x000002564AD92000-memory.dmp

                                Filesize

                                712KB

                              • memory/5272-51-0x000002564ADA0000-0x000002564ADBE000-memory.dmp

                                Filesize

                                120KB

                              • memory/5272-52-0x000002567FF50000-0x000002567FF5A000-memory.dmp

                                Filesize

                                40KB

                              • memory/5272-54-0x000002567FFB0000-0x000002567FFC2000-memory.dmp

                                Filesize

                                72KB

                              • memory/5272-13-0x0000025675140000-0x000002567514A000-memory.dmp

                                Filesize

                                40KB

                              • memory/5272-126-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-11-0x0000025675780000-0x0000025675788000-memory.dmp

                                Filesize

                                32KB

                              • memory/5272-10-0x0000025675750000-0x0000025675776000-memory.dmp

                                Filesize

                                152KB

                              • memory/5272-128-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-7-0x0000025674B90000-0x0000025674B9E000-memory.dmp

                                Filesize

                                56KB

                              • memory/5272-5-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-4-0x0000025674B70000-0x0000025674B78000-memory.dmp

                                Filesize

                                32KB

                              • memory/5272-3-0x0000025671020000-0x0000025671030000-memory.dmp

                                Filesize

                                64KB

                              • memory/5272-2-0x00007FFE734F0000-0x00007FFE73FB2000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/5272-1-0x000002566E760000-0x000002566EA42000-memory.dmp

                                Filesize

                                2.9MB