Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2025, 14:54

General

  • Target

    https://gofile.io/d/lOIlIh

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:10591

goods-retention.gl.at.ply.gg:10591

features-steam.gl.at.ply.gg:10591

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    MicrosoftTeams.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • cURL User-Agent 8 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/lOIlIh
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd34718
      2⤵
        PID:4748
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
        2⤵
          PID:2388
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3424
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
          2⤵
            PID:4932
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
            2⤵
              PID:672
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:3624
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:1
                2⤵
                  PID:4532
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                  2⤵
                    PID:1780
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3780
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                    2⤵
                      PID:4684
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5684 /prefetch:8
                      2⤵
                        PID:2308
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                        2⤵
                          PID:1644
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2056
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:1
                          2⤵
                            PID:3600
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:1
                            2⤵
                              PID:5760
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                              2⤵
                                PID:5152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2938686676370221519,17868027231303567023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                                2⤵
                                  PID:5140
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4388
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3668
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:5320
                                    • C:\Program Files\7-Zip\7zFM.exe
                                      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\BootstrapperNew.zip"
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:5620
                                    • C:\Users\Admin\Downloads\BootstrapperNew\BootstrapperNew.exe
                                      "C:\Users\Admin\Downloads\BootstrapperNew\BootstrapperNew.exe"
                                      1⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5792
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAbQB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGIAbABuACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAawBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGYAYQB5ACMAPgA="
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5904
                                      • C:\Users\Admin\AppData\Local\Temp\hehehaw.exe
                                        "C:\Users\Admin\AppData\Local\Temp\hehehaw.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5964
                                      • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                        "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                        2⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:6032
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:428
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:6052
                                        • C:\ProgramData\Solara\Solara.exe
                                          "C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of SetWindowsHookEx
                                          PID:6012
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=6012.1616.7040340983294305748
                                            4⤵
                                            • Enumerates system info in registry
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            PID:5948
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x188,0x18c,0x190,0x164,0x198,0x7fff9217b078,0x7fff9217b084,0x7fff9217b090
                                              5⤵
                                                PID:5864
                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1720,i,6682573148134509728,16641165878135834291,262144 --variations-seed-version --mojo-platform-channel-handle=1716 /prefetch:2
                                                5⤵
                                                  PID:5524
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2044,i,6682573148134509728,16641165878135834291,262144 --variations-seed-version --mojo-platform-channel-handle=2020 /prefetch:3
                                                  5⤵
                                                    PID:3528
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2308,i,6682573148134509728,16641165878135834291,262144 --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:8
                                                    5⤵
                                                      PID:5600
                                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3704,i,6682573148134509728,16641165878135834291,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:1
                                                      5⤵
                                                        PID:6252
                                              • C:\Users\Admin\Downloads\BootstrapperNew\BootstrapperNew.exe
                                                "C:\Users\Admin\Downloads\BootstrapperNew\BootstrapperNew.exe"
                                                1⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3956
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAbQB1ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGIAbABuACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAawBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGYAYQB5ACMAPgA="
                                                  2⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5848
                                                • C:\Users\Admin\AppData\Local\Temp\hehehaw.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\hehehaw.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6124
                                                • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5572
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
                                                    3⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6784
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
                                                    3⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:6984

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\ProgramData\SolaraTemp.zip

                                                Filesize

                                                10.0MB

                                                MD5

                                                70dee78ca006688aa02c252d11305977

                                                SHA1

                                                b76593c496accf25d1e464c89ccf05dff10255a6

                                                SHA256

                                                7c118309fd4847882a153f300ace21f951851d2d64acd74ee40b37178477e325

                                                SHA512

                                                08decdef55c0d983f9b763d1c142d213060e505706206ae9039a6d9869884d8c5cb9f461dcfecd47e8aeab5efbd98664fbfb17c0ffb41b04420e05a8a7e51db3

                                              • C:\ProgramData\Solara\Microsoft.Web.WebView2.Core.dll

                                                Filesize

                                                557KB

                                                MD5

                                                b037ca44fd19b8eedb6d5b9de3e48469

                                                SHA1

                                                1f328389c62cf673b3de97e1869c139d2543494e

                                                SHA256

                                                11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

                                                SHA512

                                                fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

                                              • C:\ProgramData\Solara\Microsoft.Web.WebView2.WinForms.dll

                                                Filesize

                                                37KB

                                                MD5

                                                c7000faa6c6040188c8cd8ef28b6deda

                                                SHA1

                                                07a23c50092e5c1fd9c9df87e26b65df25d37b24

                                                SHA256

                                                e4f695b72f99024e3ee5d5f26a367e664f4e120bd5d90aa87a8bc0509c365ec8

                                                SHA512

                                                eaee01031477454823974546055965df8d75c5115b25ab07b15ca608a20e8c21154ebb8c707a74213ebad04c2bf34a5f5563306e6da502235372c60672144022

                                              • C:\ProgramData\Solara\Microsoft.Web.WebView2.Wpf.dll

                                                Filesize

                                                50KB

                                                MD5

                                                e107c88a6fc54cc3ceb4d85768374074

                                                SHA1

                                                a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6

                                                SHA256

                                                8f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8

                                                SHA512

                                                b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe

                                              • C:\ProgramData\Solara\Monaco\combined.html

                                                Filesize

                                                14KB

                                                MD5

                                                2a0506c7902018d7374b0ec4090c53c0

                                                SHA1

                                                26c6094af2043e1e8460023ac6b778ba84463f30

                                                SHA256

                                                cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a

                                                SHA512

                                                4a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b

                                              • C:\ProgramData\Solara\Monaco\index.html

                                                Filesize

                                                14KB

                                                MD5

                                                610eb8cecd447fcf97c242720d32b6bd

                                                SHA1

                                                4b094388e0e5135e29c49ce42ff2aa099b7f2d43

                                                SHA256

                                                107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7

                                                SHA512

                                                cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331

                                              • C:\ProgramData\Solara\Monaco\vs\basic-languages\lua\lua.js

                                                Filesize

                                                5KB

                                                MD5

                                                8706d861294e09a1f2f7e63d19e5fcb7

                                                SHA1

                                                fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

                                                SHA256

                                                fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

                                                SHA512

                                                1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

                                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.css

                                                Filesize

                                                171KB

                                                MD5

                                                6af9c0d237b31c1c91f7faa84b384bdf

                                                SHA1

                                                c349b06cad41c2997f5018a9b88baedd0ba1ea11

                                                SHA256

                                                fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0

                                                SHA512

                                                3bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff

                                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.js

                                                Filesize

                                                2.0MB

                                                MD5

                                                9399a8eaa741d04b0ae6566a5ebb8106

                                                SHA1

                                                5646a9d35b773d784ad914417ed861c5cba45e31

                                                SHA256

                                                93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                                                SHA512

                                                d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                                              • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.nls.js

                                                Filesize

                                                31KB

                                                MD5

                                                74dd2381ddbb5af80ce28aefed3068fc

                                                SHA1

                                                0996dc91842ab20387e08a46f3807a3f77958902

                                                SHA256

                                                fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                                                SHA512

                                                8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                                              • C:\ProgramData\Solara\Monaco\vs\loader.js

                                                Filesize

                                                27KB

                                                MD5

                                                8a3086f6c6298f986bda09080dd003b1

                                                SHA1

                                                8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                                                SHA256

                                                0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                                                SHA512

                                                9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                                              • C:\ProgramData\Solara\Newtonsoft.Json.dll

                                                Filesize

                                                695KB

                                                MD5

                                                195ffb7167db3219b217c4fd439eedd6

                                                SHA1

                                                1e76e6099570ede620b76ed47cf8d03a936d49f8

                                                SHA256

                                                e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                                SHA512

                                                56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                              • C:\ProgramData\Solara\Solara.exe

                                                Filesize

                                                619KB

                                                MD5

                                                91f5d6abf1fc57cb3e6222f10c51bff1

                                                SHA1

                                                fd1183ba06cf793f12de674d8aa31bd8bfbe1172

                                                SHA256

                                                c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840

                                                SHA512

                                                4538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                ac85ad551cf266ad1fc9a041b7445292

                                                SHA1

                                                03a5efc6dd20e61e38a298516e918c02b294e1a0

                                                SHA256

                                                ed34e9e42c62efd6ee6f739a3669a351af393397346780b7dfa7225403687401

                                                SHA512

                                                82469f57d56150a8d54bdb180b3e7ea1287b5e70080af923e4335fc2ffd2c2b34cd53b90004de90fdd84ae6b97d5227b81907335e0186a46063ac397eca71a68

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                99c22d35d8f2e40323779e3cf63f4f5b

                                                SHA1

                                                8d58f0f28dd82e8b1b6287dcaa946bf618e09287

                                                SHA256

                                                d0b012af58695ec93f27ad754e2e3888afd1da7d81254d909221cace3fd4a4e2

                                                SHA512

                                                bdd9f66b495b66fb5d892fa3a5f91b98ac550011e35f8da3905341d73e27d51befcb041a4189b6a8e32705cf20ef24cb145e096952b9dd5ced3660c5dc99907b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                                                Filesize

                                                20B

                                                MD5

                                                9e4e94633b73f4a7680240a0ffd6cd2c

                                                SHA1

                                                e68e02453ce22736169a56fdb59043d33668368f

                                                SHA256

                                                41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                SHA512

                                                193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Cache\Cache_Data\data_0

                                                Filesize

                                                44KB

                                                MD5

                                                b4b6732d45f135fe7bcd420af7889547

                                                SHA1

                                                d40ffa51815167c377b5a7219a42f0df2df5c659

                                                SHA256

                                                8fa7653b27f4c796f12e93241abd03caba7373fe68166a91a4b79cd9065279a6

                                                SHA512

                                                44566d4d41b6e968debb4e0cf39e14285916097008c5ed87079baeae84f61bd7aedba125e33c6ce8353b26577d1be7f37185a86d1848b256065719b916520096

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0

                                                Filesize

                                                8KB

                                                MD5

                                                cf89d16bb9107c631daabf0c0ee58efb

                                                SHA1

                                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                SHA256

                                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                SHA512

                                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                d0d388f3865d0523e451d6ba0be34cc4

                                                SHA1

                                                8571c6a52aacc2747c048e3419e5657b74612995

                                                SHA256

                                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                SHA512

                                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2

                                                Filesize

                                                8KB

                                                MD5

                                                0962291d6d367570bee5454721c17e11

                                                SHA1

                                                59d10a893ef321a706a9255176761366115bedcb

                                                SHA256

                                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                SHA512

                                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3

                                                Filesize

                                                8KB

                                                MD5

                                                41876349cb12d6db992f1309f22df3f0

                                                SHA1

                                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                SHA256

                                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                SHA512

                                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

                                                Filesize

                                                41B

                                                MD5

                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                SHA1

                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                SHA256

                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                SHA512

                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State

                                                Filesize

                                                1KB

                                                MD5

                                                97dbf3cc858059190aa65251dc25c56b

                                                SHA1

                                                b14c57c692d84feaa72a5f88db3d13689ee507cc

                                                SHA256

                                                859a106d0346f5be3ad2898b82c0be1c67c14b4621e7d0dd0ae66252c0a7ecab

                                                SHA512

                                                668558319cacf0109349560652d88736eead54acc80f0d1cc2449c40e954b0c52234dcac2ecebb447d6b807db47c749ee695fa598befc9b40ee77feba768477b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe59bba5.TMP

                                                Filesize

                                                59B

                                                MD5

                                                2800881c775077e1c4b6e06bf4676de4

                                                SHA1

                                                2873631068c8b3b9495638c865915be822442c8b

                                                SHA256

                                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                SHA512

                                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                1d55294a273ec6d100dc8d1dfc7d217f

                                                SHA1

                                                9328dae8133adcd0c9c1b293ea6668b5c265b393

                                                SHA256

                                                7754b907241ab3c6d460e05f317202cc7208f64d5432f90510c7a3c2189874ff

                                                SHA512

                                                2ce741931ccef4b1d9c665dee1b686030cdf2ae3f3bebe2b7ae95f7c542dccb8bf0933867da815357efb5e48ee5194c2314d32c7f5e87885b60169660c74619b

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                a290f84d2773a75ec7767ecf25f020e4

                                                SHA1

                                                3a4816919477c84c9f4e76d4051ffd751736e467

                                                SHA256

                                                d4f99f27fa17b68d118143668aa8ec7ee9c51cef505415e4461e27fd3f64db7e

                                                SHA512

                                                c49e346bd9aec6c6975bd7f28002ee3eb3d6fd9c4f20825d6dd148d6d698a2cd97bb35ac4f277c7f5eb82655f06c6cc2369c6bd5d3872c25659a4f4b543f9748

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\c16574ed-bb5d-4191-a831-468590e74275.tmp

                                                Filesize

                                                6KB

                                                MD5

                                                663633edfe5e5770c9c0460f4d16f081

                                                SHA1

                                                985d871576424d85522dc52060bfbaba96d89548

                                                SHA256

                                                23862e705ce06d6bc80452722b2ba5d674b3776add852e4a8033f2217300cef7

                                                SHA512

                                                ad34957e1734a5bca46acc1d842868e1d3c4b5fb6a2a7697a7b68560992c0103ec9a650e2e56d1378550815ec5825a3f87b5a22291b001034e0c232d5b412508

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                1KB

                                                MD5

                                                b820d40c97e2a7302aef17e6218b8d84

                                                SHA1

                                                ccdea664536e1a3894bd96d4497c3e0a2b1d1b98

                                                SHA256

                                                d7b8b623bc82f102b9038d531f2a037d17a3e5809c128a5c8bf6ab3b9ecd824b

                                                SHA512

                                                b059984d3f03679d13434bc1ea04434eb0a6422e0bb1fbb978a2ce4b6a8079046b4cb1c88f8dadcef110a872d9115a27866ff2b90c74189226792cdfa38007cb

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                2KB

                                                MD5

                                                c86b5c038ec23e283458b969022151c6

                                                SHA1

                                                98e044b55700d53a60a075f8e373e3a6a5c8debf

                                                SHA256

                                                3f5ff6cf10a5aaf532bc7027aefd2df9fac3dc726ab9406df4348f63316c4a2c

                                                SHA512

                                                5b497788067ddb5cf07894225004c80d43f25fdb7fbe597d56a6f85f2af0c02cd72d11130fef93a124fabd91b599d55ecf33face31cdebb4e4d304498e76544d

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                3KB

                                                MD5

                                                96563b99f4fe2802e9ea955028c65fd1

                                                SHA1

                                                53ca0d2c108a893a19a1cb229d4d1a094399e194

                                                SHA256

                                                3ddf1465457a1eb7b6f72c4b20cf89917c1b827c7c468ed415a8b92c388b0d8e

                                                SHA512

                                                d69c131c7d6929cd2ef6027ce83b88778d527556dbde1547fa93d5eaf4c514b7d9ffe3cf0144d6ede78cffc6406f7038a86d20f0183b9897002282a801f1af61

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                4KB

                                                MD5

                                                ace1362158b74f15d92761d07f51b86f

                                                SHA1

                                                e79419981022aa902647dd6aed79beb8210bff68

                                                SHA256

                                                8bdc57b905e9fb11a423c4fd9a8b87dfc4614d78e03c6c74c1251a803c689b7a

                                                SHA512

                                                f69e63d1ad86e1f50ffa9c38b946068bd3fe682758b004fd48b7cc15d15fcf76d3d948cd76e1e6aeeb833d8fa04e13772d75db4ff502f1b5c4050e7876f69fdf

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                4KB

                                                MD5

                                                5abe355da95a03ea1a5b1888fbec7d04

                                                SHA1

                                                54c456c13d7a9bfba723adf66278d6b7c735c0a6

                                                SHA256

                                                5559a9094ae712292cc6aeb7b2614da29b9fb8292d432427facc11205f9b7293

                                                SHA512

                                                e40f62532babf4e3e1f558281876c676e0a5f3fc9e7702637ed94927a3a370e540d337ca189cbee6971b3c8f91f1ba1374721b6f03477e872aba4e777e0b3492

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                                Filesize

                                                4KB

                                                MD5

                                                1b59bd9145f0e75ce6ccad7a5f8e7c69

                                                SHA1

                                                075938cd01d6da191f152b4a7d044b2e46a68f6f

                                                SHA256

                                                a6de3368379f7d248b47be73ce3de87228d2b5c37a030612058c8f93bbb17b0e

                                                SHA512

                                                c0099b0795af790f06788169f8ab1695bff9181e467581b674a99562ce96c7f380f4e4f742d52794f2e22b605bfc4495acd3938795608fb167271dc9c875ad60

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe59166c.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                41fe43d2ac38821bb6e9f28afafc86d6

                                                SHA1

                                                f6157de0100fe6960a063e25e6e5254ab9448a81

                                                SHA256

                                                b14b958dada44de7554a4e264c83ec1ad376902ccd76363ec06709c32e2599b7

                                                SHA512

                                                3297a46d52e8f94b20de87c08e6534afbb8c16147c9613eee66b11746fa4645b5210badc9928cf83074886fa03703cf01f29c85ec03509c60bb5f1cf59c979e6

                                              • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe596b62.TMP

                                                Filesize

                                                4KB

                                                MD5

                                                409bd449744b52cadac8e8b05a227f2b

                                                SHA1

                                                416a6ace6a0202fc268c9b657b7dcfe24946b3d6

                                                SHA256

                                                8c57e52fb56549d9b90c1ea92af9ecdb2b90cbafd717e7290b99ea0b9d9943e7

                                                SHA512

                                                2f195babd4d6f402d4108f1d19ced32feac2d8afcb7302fcfd9bd85bfc7ab32a9bbc9e0b92062810e6660e8b66c7473f105b78a739914915f30a122632113d98

                                              • C:\ProgramData\Solara\SolaraV3.dll

                                                Filesize

                                                6.4MB

                                                MD5

                                                b0914d647a3b6c303a86a894b1259248

                                                SHA1

                                                3698197a1ab8d731371c81354ae03fe4ce71fb6f

                                                SHA256

                                                9bfd22fbe424bb730df0f1fefd82932834cfca67176f749699bdd4bfe55534ff

                                                SHA512

                                                a34506beccd72b8bd5542e4a4ca54db221a609a1c7c63b7d6375a14e322fbf9642bd76e58dd2cdcc39210b1f0505ab501697998c94b093e7009af14d3c0d4232

                                              • C:\ProgramData\Solara\WebView2Loader.dll

                                                Filesize

                                                133KB

                                                MD5

                                                a0bd0d1a66e7c7f1d97aedecdafb933f

                                                SHA1

                                                dd109ac34beb8289030e4ec0a026297b793f64a3

                                                SHA256

                                                79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                                SHA512

                                                2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                              • C:\ProgramData\Solara\Wpf.Ui.dll

                                                Filesize

                                                5.2MB

                                                MD5

                                                aead90ab96e2853f59be27c4ec1e4853

                                                SHA1

                                                43cdedde26488d3209e17efff9a51e1f944eb35f

                                                SHA256

                                                46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                                SHA512

                                                f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                              • C:\ProgramData\Solara\bin\ALGA

                                                Filesize

                                                152B

                                                MD5

                                                a5216bdbb061104f4226e454893a2e1e

                                                SHA1

                                                675faa2435994610b115e2298befc81c49053e37

                                                SHA256

                                                b503bd550bff4baa81e18aac93202145a16cab7c242b7730bf34e481057f2749

                                                SHA512

                                                af464ff332257d1be3354097da0d4d9d9a8bd8aab29d9c8d13477aea60b860cc46d69d5fab6e9b87eea9439d806707122c083fbe3471ff6440d229efd377bad8

                                              • C:\ProgramData\Solara\bin\DLCTBL_FRTS

                                                Filesize

                                                129KB

                                                MD5

                                                d47d57e75f95f4fb9516cae4acb8a764

                                                SHA1

                                                59507a9a78dfd570c2ae7111dfd652dd1124b924

                                                SHA256

                                                cfc56dcbdcf90a8a5a8f2beba87ab7e9ca9d12ff3115dacfd32eb98739b7156e

                                                SHA512

                                                b5501dc382af7bc8bf0a6399bd8fca9efe0842b32cb97831c07381f571ff956e98f98e909b3a176f7cf0ec6b35bbfbb501a16e49b1c75de9a7f54a7a3e92c2b2

                                              • C:\ProgramData\Solara\bin\version.txt

                                                Filesize

                                                5B

                                                MD5

                                                ab445d6d3a8e97ae94f0cb34f668f884

                                                SHA1

                                                6d36317c57adbe7a73fff03d3c082607bab2961f

                                                SHA256

                                                2a72b92efc7de0a134885e6b893c0a7cdd7ed642e251ca53b3a476ac84fef727

                                                SHA512

                                                a13b328a0725fd7c34f30fc2c8851ab1bf7ab54bacb37c857e40e389fdbe96db2b58edf08bbde79b4eb32b7b8a046be7bfe8a844867a2e73486b738cf83f07ac

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BootstrapperNew.exe.log

                                                Filesize

                                                3KB

                                                MD5

                                                ede267ce211bba2f46e802f160033800

                                                SHA1

                                                2c70ce7e80e43082e6d183874e5d3c84bbc62cda

                                                SHA256

                                                a34776cfc8b1030eb71a108d636d67c51aa73c1759caa65d5fe5e69d49dd6b60

                                                SHA512

                                                e2600730ac724065b72ea42b5fcf6a2e6857ad54905624225a86cac8dfe0233008ef218ca86e88b5db42729aa16c9d330228ab294431a549551ecc040e80acaf

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                SHA1

                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                SHA256

                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                SHA512

                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                968cb9309758126772781b83adb8a28f

                                                SHA1

                                                8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                SHA256

                                                92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                SHA512

                                                4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                56361f50f0ee63ef0ea7c91d0c8b847a

                                                SHA1

                                                35227c31259df7a652efb6486b2251c4ee4b43fc

                                                SHA256

                                                7660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0

                                                SHA512

                                                94582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                0621e31d12b6e16ab28de3e74462a4ce

                                                SHA1

                                                0af6f056aff6edbbc961676656d8045cbe1be12b

                                                SHA256

                                                1fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030

                                                SHA512

                                                bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                144B

                                                MD5

                                                721e5aaf30182dd189a6208167cecf9c

                                                SHA1

                                                d6e6f8171e0ae4da0b729d3fb79e081489293b78

                                                SHA256

                                                2f9a59e7ebb13d592cc19cb1299e24d8ceefa40511137c7231e0434f633ece6c

                                                SHA512

                                                cad6dd4485a028d31286da93600660975e462215e86f18789149bc6f4d8c195568d61a3a28535b04542897412c134068dfe8db6f3c8554d0cb761e3502f2f6a8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                390B

                                                MD5

                                                c32076132c7dff4904bbc16ccbfc46d8

                                                SHA1

                                                0328fe9cd5670d1e0d9c4a0b006ab1af1a3f5f56

                                                SHA256

                                                a9df8c86ec2a8537441e0836a3e115145d062c2dc5b6ccbe85c91a33f5241800

                                                SHA512

                                                c61ff661447b97ee860d13a7b5b036cbf68226e87ba9575774be9f062f580989e27ec28cab6c61fb27abda898bab47a65a2d6dcddc4fe65e8bf6e6f90384a99e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                34eb40d5a02c897d102046d7ab90af84

                                                SHA1

                                                2c91fa34c5168816765a3d5df7ad38593d67f9ba

                                                SHA256

                                                de52ec2c345d8d3e53dda6869d2e42f28b263b48e2ed16ecf320e898017ab066

                                                SHA512

                                                0bcb924b2df342b10e466af252b971fb41b5cdba4c055e6031f1d445b461ebe4ccba897ae1ce1a5a5b63c0fb4b8ac47a54c2127fdf968f7370bf48eba309edba

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                d111b51056aa871c226560b660a9f1a1

                                                SHA1

                                                667e41fd5a1eab3aed87ebec4c7fd307cc071eda

                                                SHA256

                                                2ea72ada132e074ead10061e65d311aa2db34af5e16c20a241b8a2317a077550

                                                SHA512

                                                84323193eeaceaa9a605e6fe02137465026af10d50b1812d5d7fe1f771aa1202615d2795bb8ea894151d670e3154d25049f66c60897dc9602fe3bc0d36d33207

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                278d7ac551948f733afebfb198ea5e85

                                                SHA1

                                                593ca9d1addcb852995964a5a6ad9fd69a5a5a15

                                                SHA256

                                                06059672a53331a535339fa71812e58d5b6f1f39c4ba80ff362997e8a9f33781

                                                SHA512

                                                a6d70002885630094de80e37e30b966e691dc9b6595a14eea898912543aeed93009a51dafffa3fc84a4373499c3a9a7d4e2a215675ec543704b761c297987c04

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                1edb7c5d338f4e2607e2445aea6e2390

                                                SHA1

                                                481579172f19cb23f1c8d487c5447db8d2eee2c1

                                                SHA256

                                                280c10412929eaa3746d739393b862fb19cd11f397d64d45f8637eb5eb8e46b0

                                                SHA512

                                                18d3bfc2997536ac842d216c9c75e8efab3e984404d92ea75d9b318f239cbb260370bf9475e455fb498ff8dd19cc2ca615b12b87c58b8d3b3fa7f622f5c125eb

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                5a6854619b23918735e4f116d767ed62

                                                SHA1

                                                8b39e054792377af2f6b649075e9dc9fb5641a52

                                                SHA256

                                                d80ce10ae0e70aa8e6e0031024073f0a90612b3140dafc11fad433afd8442bd6

                                                SHA512

                                                9b6ab206a8dfe1b61f5a79b97767d0b2752195f48be5c0bb5742e7b9f473affb33000d6b87cdd0ea8571ea575d35d70881d72b4a0de37e1b0c2fa2f33abfe7b9

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                12KB

                                                MD5

                                                dca99255be6f35bab9772a43b03ae99a

                                                SHA1

                                                78780b2e5c029e860459730b90c0fddd886f20c7

                                                SHA256

                                                84e65f87866da86f18dcd273314125a5458011103317659bf6ac43ad4f4944cd

                                                SHA512

                                                32698264551d2045d5c75776048135aa75081e546a2e33cbbe4b52ac27e2b7b6629d3c5afac51db2b03bba2f45c226b179c0824488236e335dd6a1cd6d2b4e70

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                18KB

                                                MD5

                                                58ea8401ecdc8f17b284aba6a5064137

                                                SHA1

                                                e5f08efccb09487f8fe32fe5d8bea01b6970d76e

                                                SHA256

                                                a885571f760a60c9c039c6fd567d0241f9ccabe9f0385aa2f54132bd93804b82

                                                SHA512

                                                47ef4b7e6b06930f7cd1de46bd699b09832df8a8ddd37b33f1f5e5780b4d380c2968b28ff20da54c1a1d3d19ae8fb2aa24c5afa7d93f670b97fd047d71976070

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                9b80cd7a712469a4c45fec564313d9eb

                                                SHA1

                                                6125c01bc10d204ca36ad1110afe714678655f2d

                                                SHA256

                                                5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                                SHA512

                                                ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                d71d75c747d8f795832884668ff87eca

                                                SHA1

                                                d146ac499dd2d69b03680e33e8314ac8457a5ece

                                                SHA256

                                                d660c486145df16612a1c5db444aeab230e712d5b8bb6e8cca56fdd97cc8befd

                                                SHA512

                                                d765a41d0366282ae0ae85e03b41fcbf3b011d5f757aa26e5773200b49b1d4df9602e67713a55c77335373557631b214bf4a63695b2e8482aaf013c551194eb4

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                18KB

                                                MD5

                                                68de3ced96bcaa0a2685d136042e3375

                                                SHA1

                                                2ccfab356503ef8a4d4fd274f771588ed179cf3a

                                                SHA256

                                                12b21512d9ba12d4c07b170066690e9abc35287550369415bffffbe4e4e6a495

                                                SHA512

                                                db62bfb7ec95c46336508ccaf41561c9bc00558edf37b25cb902bf29da13330917f40e9c9dfbad19038a3791c3df7e65a238a3e6380e1d2c615cc9a764bd4a98

                                              • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe

                                                Filesize

                                                2.9MB

                                                MD5

                                                f227cdfd423b3cc03bb69c49babf4da3

                                                SHA1

                                                3db5a97d9b0f2545e7ba97026af6c28512200441

                                                SHA256

                                                cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

                                                SHA512

                                                b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gw5qr02k.wk5.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\hehehaw.exe

                                                Filesize

                                                60KB

                                                MD5

                                                ac249750523ccb7b1bc90ec04454c9fb

                                                SHA1

                                                d8d9decf849298c55194c6fca624a86290e43851

                                                SHA256

                                                1f3dea74eea16531e9e517ee09be45e610ec6109132aa0935fe56a17ce8929ad

                                                SHA512

                                                0307d17d9f7dd0f36b7140a89a356e02c0d3170243c261bcef0b6b7e8462b51a0643e1e89e7d15c15d617cedf6b4dc0032b96eef8b4aa94967fcbd10dabd5c3a

                                              • C:\Users\Admin\Downloads\BootstrapperNew.zip

                                                Filesize

                                                2.7MB

                                                MD5

                                                782e8abd3729fd5eef96ec28ca7db168

                                                SHA1

                                                355bcde31d488cc903543f653c2abcebc596d329

                                                SHA256

                                                1d0c5987cb50dd7c41268c83ee4c6c3410a21663c8719b3213e19c8c6916dfd6

                                                SHA512

                                                7ab5522cb581603cc98d206a6bdfbfadb0a9b3f44b2ab08182268294a42883d1bb41ebd089b4aed7d527f94b3c26561f7cfdd1b81e7d65a2930f8a5822098212

                                              • C:\Users\Admin\Downloads\BootstrapperNew\BootstrapperNew.exe

                                                Filesize

                                                2.9MB

                                                MD5

                                                64e2dc26f864d67318fdb9d32f7fdd0e

                                                SHA1

                                                b578768a76c274c7dbae07170e02ecde2a5e97d8

                                                SHA256

                                                75dd76132ac4b896749f24031b0aa0a18eeaeebdda7e323d1343b9a08d71bc59

                                                SHA512

                                                9398de54ad696947094910b010eaedd75453f7a255722e7a53a3e3f2c01b2fc14ce2ffa080f6cb1db698c9e8a83ff98de07fab8bcee3db3553ea93a105eeacca

                                              • C:\Users\Admin\Downloads\BootstrapperNew\CONFIG

                                                Filesize

                                                79B

                                                MD5

                                                0284fa0391784125ad3b12be8c92c6ae

                                                SHA1

                                                e4fe938288c6804d9c79947ad2e39939a595e9f3

                                                SHA256

                                                789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0

                                                SHA512

                                                9dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235

                                              • memory/428-189-0x000001E6BAF80000-0x000001E6BAFA2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/5524-630-0x000002D2F0F40000-0x000002D2F0FDE000-memory.dmp

                                                Filesize

                                                632KB

                                              • memory/5524-605-0x000002D2F0F40000-0x000002D2F0FDE000-memory.dmp

                                                Filesize

                                                632KB

                                              • memory/5524-567-0x000002D2F0F40000-0x000002D2F0FDE000-memory.dmp

                                                Filesize

                                                632KB

                                              • memory/5524-755-0x000002D2F0F40000-0x000002D2F0FDE000-memory.dmp

                                                Filesize

                                                632KB

                                              • memory/5524-366-0x00007FFFCD590000-0x00007FFFCD591000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/5600-444-0x00007FFFCDB50000-0x00007FFFCDB51000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/5600-445-0x00007FFFCD8A0000-0x00007FFFCD8A1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/5848-502-0x00000000077D0000-0x0000000007873000-memory.dmp

                                                Filesize

                                                652KB

                                              • memory/5848-492-0x0000000071010000-0x000000007105C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/5848-330-0x0000000005FF0000-0x0000000006344000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/5848-518-0x0000000007B80000-0x0000000007B94000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/5848-517-0x0000000007B30000-0x0000000007B41000-memory.dmp

                                                Filesize

                                                68KB

                                              • memory/5848-342-0x00000000066E0000-0x000000000672C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/5904-175-0x00000000078A0000-0x00000000078AE000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/5904-158-0x0000000074930000-0x000000007497C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/5904-142-0x0000000005D30000-0x0000000006084000-memory.dmp

                                                Filesize

                                                3.3MB

                                              • memory/5904-132-0x0000000005CA0000-0x0000000005D06000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/5904-131-0x0000000005C30000-0x0000000005C96000-memory.dmp

                                                Filesize

                                                408KB

                                              • memory/5904-155-0x0000000006370000-0x00000000063BC000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/5904-153-0x0000000006330000-0x000000000634E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/5904-129-0x0000000005460000-0x0000000005482000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/5904-127-0x0000000004D90000-0x0000000004DC6000-memory.dmp

                                                Filesize

                                                216KB

                                              • memory/5904-157-0x0000000006910000-0x0000000006942000-memory.dmp

                                                Filesize

                                                200KB

                                              • memory/5904-168-0x0000000006950000-0x000000000696E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/5904-178-0x00000000078E0000-0x00000000078E8000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/5904-177-0x0000000007990000-0x00000000079AA000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/5904-176-0x00000000078B0000-0x00000000078C4000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/5904-128-0x00000000054D0000-0x0000000005AF8000-memory.dmp

                                                Filesize

                                                6.2MB

                                              • memory/5904-169-0x0000000007550000-0x00000000075F3000-memory.dmp

                                                Filesize

                                                652KB

                                              • memory/5904-174-0x0000000007860000-0x0000000007871000-memory.dmp

                                                Filesize

                                                68KB

                                              • memory/5904-173-0x00000000078F0000-0x0000000007986000-memory.dmp

                                                Filesize

                                                600KB

                                              • memory/5904-170-0x0000000007CA0000-0x000000000831A000-memory.dmp

                                                Filesize

                                                6.5MB

                                              • memory/5904-172-0x00000000076D0000-0x00000000076DA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/5904-171-0x0000000007660000-0x000000000767A000-memory.dmp

                                                Filesize

                                                104KB

                                              • memory/5964-124-0x00000000009A0000-0x00000000009B6000-memory.dmp

                                                Filesize

                                                88KB

                                              • memory/6012-303-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-276-0x0000023DFF1E0000-0x0000023DFF71C000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/6012-694-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-302-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-304-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-301-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-606-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-295-0x0000023DFF0D0000-0x0000023DFF160000-memory.dmp

                                                Filesize

                                                576KB

                                              • memory/6012-274-0x0000023DE45D0000-0x0000023DE4670000-memory.dmp

                                                Filesize

                                                640KB

                                              • memory/6012-491-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-286-0x0000023DFEE50000-0x0000023DFEF0A000-memory.dmp

                                                Filesize

                                                744KB

                                              • memory/6012-652-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-288-0x0000023DFEF10000-0x0000023DFEFC2000-memory.dmp

                                                Filesize

                                                712KB

                                              • memory/6012-290-0x0000023DE4B50000-0x0000023DE4B60000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/6012-631-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6012-578-0x0000000180000000-0x00000001810A0000-memory.dmp

                                                Filesize

                                                16.6MB

                                              • memory/6032-216-0x0000017874900000-0x000001787491E000-memory.dmp

                                                Filesize

                                                120KB

                                              • memory/6032-152-0x0000017835CC0000-0x0000017835CCA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/6032-150-0x0000017836C60000-0x0000017836C76000-memory.dmp

                                                Filesize

                                                88KB

                                              • memory/6032-148-0x0000017835D10000-0x0000017835D36000-memory.dmp

                                                Filesize

                                                152KB

                                              • memory/6032-145-0x0000017835CA0000-0x0000017835CAE000-memory.dmp

                                                Filesize

                                                56KB

                                              • memory/6032-144-0x0000017835CD0000-0x0000017835D08000-memory.dmp

                                                Filesize

                                                224KB

                                              • memory/6032-143-0x0000017835C50000-0x0000017835C58000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/6032-219-0x000001787ECC0000-0x000001787ECD2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/6032-151-0x0000017835D40000-0x0000017835D4A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/6032-147-0x0000017835CB0000-0x0000017835CBA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/6032-149-0x0000017835D50000-0x0000017835D58000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/6032-146-0x0000017836B60000-0x0000017836C60000-memory.dmp

                                                Filesize

                                                1024KB

                                              • memory/6032-130-0x0000017817950000-0x0000017817960000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/6032-154-0x0000017836C90000-0x0000017836C98000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/6032-126-0x00000178172B0000-0x0000017817592000-memory.dmp

                                                Filesize

                                                2.9MB

                                              • memory/6032-214-0x0000017874850000-0x0000017874902000-memory.dmp

                                                Filesize

                                                712KB

                                              • memory/6032-217-0x0000017874930000-0x000001787493A000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/6252-477-0x00007FFFCD590000-0x00007FFFCD591000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/6252-579-0x00000232ADD50000-0x00000232ADDEE000-memory.dmp

                                                Filesize

                                                632KB