Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 17:55

General

  • Target

    SolaraV2.exe

  • Size

    2.9MB

  • MD5

    941c8d7c47b633c3b0cfa0d77242ae95

  • SHA1

    58fa3881583d3d9ce7ed6a9f313fe6386573154f

  • SHA256

    2cc420fbc43a2bedcf6a1bba99bda592a7a8c1735762f252cf7835c47143ef20

  • SHA512

    c544ee958de70f84f97c096493f0a518645ae917d9e7286be8edb58c00db2d9d8d7045613195463177ca54da1b71dd433b8eb26ccba8e145631e1a4087479dbd

  • SSDEEP

    49152:UbQt8UYUie2O71VYPw6oCE0AnswzlFr8SJVmle0yi+Ekhq+R74hW9auxGHSc8D6S:U8tSUTHXr46swJFoiSy1EEV7eLutcC6S

Malware Config

Extracted

Family

xworm

Version

5.0

C2

earth-northwest.gl.at.ply.gg:49617

Mutex

UwTPnsdni7XLUZ30

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • cURL User-Agent 8 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SolaraV2.exe
    "C:\Users\Admin\AppData\Local\Temp\SolaraV2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAZwBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGgAeABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAeQBuACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGkAZgBqACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2216
    • C:\Users\Admin\AppData\Local\Temp\Solara.exe
      "C:\Users\Admin\AppData\Local\Temp\Solara.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2184
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
      2⤵
      • Downloads MZ/PE file
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4704
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
      • C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe
        "C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe" BootstrapperNew
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1592
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2404
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4400
        • C:\ProgramData\Solara\Solara.exe
          "C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=4444.4592.1282852973939624662
            5⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of WriteProcessMemory
            PID:4768
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7fffb25db078,0x7fffb25db084,0x7fffb25db090
              6⤵
                PID:1748
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1752,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=1728 /prefetch:2
                6⤵
                  PID:4264
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2056,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:3
                  6⤵
                    PID:4044
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2376,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:8
                    6⤵
                      PID:2460
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3704,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=3724 /prefetch:1
                      6⤵
                        PID:5532
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /4
              1⤵
              • Checks SCSI registry key(s)
              • Checks processor information in registry
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1708
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:5380
              • C:\Windows\System32\r8lvv3.exe
                "C:\Windows\System32\r8lvv3.exe"
                1⤵
                  PID:5356
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=r8lvv3.exe r8lvv3.exe"
                  1⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:5912
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffba7a46f8,0x7fffba7a4708,0x7fffba7a4718
                    2⤵
                      PID:6020
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                      2⤵
                        PID:5204
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
                        2⤵
                          PID:5220
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:8
                          2⤵
                            PID:5292
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                            2⤵
                              PID:2988
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                              2⤵
                                PID:2712
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:1
                                2⤵
                                  PID:5540
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1
                                  2⤵
                                    PID:5568
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:8
                                    2⤵
                                      PID:1504
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:8
                                      2⤵
                                        PID:6044
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:388
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5640

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\Solara\Microsoft.Web.WebView2.Core.dll

                                          Filesize

                                          557KB

                                          MD5

                                          b037ca44fd19b8eedb6d5b9de3e48469

                                          SHA1

                                          1f328389c62cf673b3de97e1869c139d2543494e

                                          SHA256

                                          11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

                                          SHA512

                                          fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

                                        • C:\ProgramData\Solara\Microsoft.Web.WebView2.Wpf.dll

                                          Filesize

                                          50KB

                                          MD5

                                          e107c88a6fc54cc3ceb4d85768374074

                                          SHA1

                                          a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6

                                          SHA256

                                          8f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8

                                          SHA512

                                          b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe

                                        • C:\ProgramData\Solara\Monaco\combined.html

                                          Filesize

                                          14KB

                                          MD5

                                          2a0506c7902018d7374b0ec4090c53c0

                                          SHA1

                                          26c6094af2043e1e8460023ac6b778ba84463f30

                                          SHA256

                                          cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a

                                          SHA512

                                          4a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b

                                        • C:\ProgramData\Solara\Monaco\index.html

                                          Filesize

                                          14KB

                                          MD5

                                          610eb8cecd447fcf97c242720d32b6bd

                                          SHA1

                                          4b094388e0e5135e29c49ce42ff2aa099b7f2d43

                                          SHA256

                                          107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7

                                          SHA512

                                          cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331

                                        • C:\ProgramData\Solara\Monaco\vs\basic-languages\lua\lua.js

                                          Filesize

                                          5KB

                                          MD5

                                          8706d861294e09a1f2f7e63d19e5fcb7

                                          SHA1

                                          fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

                                          SHA256

                                          fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

                                          SHA512

                                          1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

                                        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.css

                                          Filesize

                                          171KB

                                          MD5

                                          6af9c0d237b31c1c91f7faa84b384bdf

                                          SHA1

                                          c349b06cad41c2997f5018a9b88baedd0ba1ea11

                                          SHA256

                                          fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0

                                          SHA512

                                          3bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff

                                        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.js

                                          Filesize

                                          2.0MB

                                          MD5

                                          9399a8eaa741d04b0ae6566a5ebb8106

                                          SHA1

                                          5646a9d35b773d784ad914417ed861c5cba45e31

                                          SHA256

                                          93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                                          SHA512

                                          d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                                        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.nls.js

                                          Filesize

                                          31KB

                                          MD5

                                          74dd2381ddbb5af80ce28aefed3068fc

                                          SHA1

                                          0996dc91842ab20387e08a46f3807a3f77958902

                                          SHA256

                                          fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                                          SHA512

                                          8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                                        • C:\ProgramData\Solara\Monaco\vs\loader.js

                                          Filesize

                                          27KB

                                          MD5

                                          8a3086f6c6298f986bda09080dd003b1

                                          SHA1

                                          8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                                          SHA256

                                          0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                                          SHA512

                                          9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                                        • C:\ProgramData\Solara\Newtonsoft.Json.dll

                                          Filesize

                                          695KB

                                          MD5

                                          195ffb7167db3219b217c4fd439eedd6

                                          SHA1

                                          1e76e6099570ede620b76ed47cf8d03a936d49f8

                                          SHA256

                                          e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                          SHA512

                                          56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                        • C:\ProgramData\Solara\Solara.exe

                                          Filesize

                                          619KB

                                          MD5

                                          91f5d6abf1fc57cb3e6222f10c51bff1

                                          SHA1

                                          fd1183ba06cf793f12de674d8aa31bd8bfbe1172

                                          SHA256

                                          c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840

                                          SHA512

                                          4538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          5ded13d537e1ee9d34535901c6660765

                                          SHA1

                                          319fbf4d54582f21b546b7319f8c7e999a4dc424

                                          SHA256

                                          759d648eb1c3ba3e3e6a6cce4f250caebaf92f59333742afde91f02281a9ce5b

                                          SHA512

                                          84a90bafca3ec8452c7bdc0c1940e0db419ec5a6dd9ba0883bd099fbe3b01c1d9bc376b26ddcf3e44b5de7ea8bacee916a8db99172e8e5b66fee8b545e51e418

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

                                          Filesize

                                          280B

                                          MD5

                                          bda39d5d9a72cca859a6b6697c265de6

                                          SHA1

                                          5e3bbf7a1082f27e61587ffa61a859a40b4f5f57

                                          SHA256

                                          e38160d709c1dafe0e5aa0f0aafc1c8f45b83725b64542d645a4cb0b9666f5b8

                                          SHA512

                                          9415a9c3370974431ab58b8d955936c5a4939dab2a7933b4c83fbfc84109b0c227bd6d25903c4900d036c93ca20e7ac90519183d4394af48a4dc881a1a211bcc

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                                          Filesize

                                          20B

                                          MD5

                                          9e4e94633b73f4a7680240a0ffd6cd2c

                                          SHA1

                                          e68e02453ce22736169a56fdb59043d33668368f

                                          SHA256

                                          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                          SHA512

                                          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0

                                          Filesize

                                          8KB

                                          MD5

                                          cf89d16bb9107c631daabf0c0ee58efb

                                          SHA1

                                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                          SHA256

                                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                          SHA512

                                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          d0d388f3865d0523e451d6ba0be34cc4

                                          SHA1

                                          8571c6a52aacc2747c048e3419e5657b74612995

                                          SHA256

                                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                          SHA512

                                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2

                                          Filesize

                                          8KB

                                          MD5

                                          0962291d6d367570bee5454721c17e11

                                          SHA1

                                          59d10a893ef321a706a9255176761366115bedcb

                                          SHA256

                                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                          SHA512

                                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3

                                          Filesize

                                          8KB

                                          MD5

                                          41876349cb12d6db992f1309f22df3f0

                                          SHA1

                                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                                          SHA256

                                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                          SHA512

                                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

                                          Filesize

                                          41B

                                          MD5

                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                          SHA1

                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                          SHA256

                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                          SHA512

                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\TransportSecurity

                                          Filesize

                                          858B

                                          MD5

                                          79cfab5ff1735526f40995dd9ace92f7

                                          SHA1

                                          92c6eb05c4a91e2483d7a08e87e5f573a834b04d

                                          SHA256

                                          f6fab4bcbe3897d3daa1fc8e1b9f8240025235d779adbffcc7f43998c06625ee

                                          SHA512

                                          60a525e41bec77c5df684850e396eca5a242b768c653da26d2859b7a08fe059674434853d5bb18c88c55dff92daa020078a1e5b78ad96b228a678aa1dafc2417

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\TransportSecurity~RFe58c8d9.TMP

                                          Filesize

                                          858B

                                          MD5

                                          23fda2b448da08b31fd9112ceabaf7a0

                                          SHA1

                                          a1fff80fcc0695eff45c0f65e2302acc3df718d5

                                          SHA256

                                          5b49d35d26c15237a10f804b3d418e360c42ac974774d17105e68f93978e27c3

                                          SHA512

                                          3b0ebd0cbafbf0171f87d75055339777ec1dff558cfbddd6a3dbbb2cb62b06ae7efbbad3512a5f2972051a68ec6c4c068a7ff1fa15ed78f314160901af958b59

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\f5f2f6ac-1b1e-4678-a0f4-73a4236e9032.tmp

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          ceee476b6dc924574a37ef5e58b44b0c

                                          SHA1

                                          6fdf441b416b7c28169c0d1f154fc5a3b05a3058

                                          SHA256

                                          2d2587252338d11578c1b18f41b218e5166b8e9386e006d2bb2ac781ecd2b4d4

                                          SHA512

                                          476a524c9afaa7d38620282beb29ea797c04c22d745b80fa34a1c4ab12acdca6cd98ac4276daf096bfc9fb6386ad7a91c9680d3d8b89a1c74f035f7334aad1a7

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Preferences~RFe5914d6.TMP

                                          Filesize

                                          6KB

                                          MD5

                                          84bbafdbd1de7f10e2dc40d484e3327e

                                          SHA1

                                          7587a59484757157e92d5b252a32779e3ec603c2

                                          SHA256

                                          a65e53a2054c872de24dc68a71eac95d2bb2514926d29f7f58c01c2433cef4cf

                                          SHA512

                                          74e56bf6fc6f0f1e0adf82353e20f94f98da2924584ef986a34b03caa34619778789c179be6bce8305d55e69ab83ea1dcff8d0f06842a6ea218140ce9efc7a12

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                          Filesize

                                          1KB

                                          MD5

                                          02f47f4a85223f73eb50834bd24f6532

                                          SHA1

                                          f8be934f98a8172228e2717d84799e6ec3516f01

                                          SHA256

                                          96ff011cbab8d7c35eaac79b97e722e44effdeccb32add7bcee3c85a5cd7f533

                                          SHA512

                                          d0a9622718c0223f64242e4bb2a28ee268005ad4c3b613929b91560bed3718871efa412f0ea16b1dfada37b9d708635eba017189b0edea28af1e216b84cb7c70

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                          Filesize

                                          2KB

                                          MD5

                                          5df2eabff954b7a80c085f9065a638e0

                                          SHA1

                                          d04e6bcd336932bcfab0bf4d2ebe8a89d5688bd7

                                          SHA256

                                          b992e231cd82543f0fc6ff5f95cd0b6d05507ee496872816b9b29cd69dd2c0fd

                                          SHA512

                                          a5d15fee7f4fe997a71629d00f1c539d060f594e97a194f87463e6c283e8fb12827dc09d30539cd93d87e3cf795e1be7a3086caa259321d730dd2b2466c9d2b7

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                          Filesize

                                          3KB

                                          MD5

                                          fcea4ba8a8268a90f8915e223771e6b4

                                          SHA1

                                          2aea7690886dcd2586d25ba6d09273611d1283a2

                                          SHA256

                                          533c227f9c7e5eaf591e07b9af4960c07ce2d98b51c22b5137529e91276f2d4a

                                          SHA512

                                          d596d69554a5ea50d42f08b53d9fe1e66f738c367c8b45037d6a83c7e7b3870f0a6df754ef9264d7e2dde69a2d23f74543b4ca8ab4f25038ee3117f6274918bb

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

                                          Filesize

                                          16KB

                                          MD5

                                          3fbc8a4292595c2f459d6c7425151c28

                                          SHA1

                                          ea7a7bffebc46aa3096da620568b474d18446b42

                                          SHA256

                                          1e124a15f0929aa011d3bd59704c945251191dc7eaf15bb4002e206befd35220

                                          SHA512

                                          3ba2fe16dc5da70ee235083a0f7b26000f2fccd0e3588a92ecc9be961f46e528fc1ccae6f321b28f81d9e5d48a02260ad0f8f217f777e6653824db8dbbf2c9eb

                                        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe58772f.TMP

                                          Filesize

                                          1KB

                                          MD5

                                          56306001cf4f658a0b91f363081c2a4f

                                          SHA1

                                          766ab0cc191ff24bedb1884fd6415007a9a7d8e7

                                          SHA256

                                          ac4e7e19f52de5e19daf54e776d4edf65558ef9904fef0f0844b86a91e2364fb

                                          SHA512

                                          83ac868dad3418a2b3523520c89fae08c4efd23453fc50835c9fc710c993b00724d86a6d249865b2cb6c99bebb4ee83e2d82bd4d5d720ab33ae35f2576211c99

                                        • C:\ProgramData\Solara\SolaraV3.dll

                                          Filesize

                                          6.4MB

                                          MD5

                                          22a100971f552b0aaca41291d65fa169

                                          SHA1

                                          6bdf503d13a53931417af4600225875361feba78

                                          SHA256

                                          66dde01c27784da1882a6444df7dbb69bf671cf3ef0cfa2e3373ece1930928a3

                                          SHA512

                                          9b58e305a3819e75f585a1ea74cf8edac817045d839b27b90794c8eb6e0fe350cfb28f44f9a4bc0005c62259aaa9d66a5f2f99623acdf69c1d3d7d6efb482bdc

                                        • C:\ProgramData\Solara\WebView2Loader.dll

                                          Filesize

                                          133KB

                                          MD5

                                          a0bd0d1a66e7c7f1d97aedecdafb933f

                                          SHA1

                                          dd109ac34beb8289030e4ec0a026297b793f64a3

                                          SHA256

                                          79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                          SHA512

                                          2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                        • C:\ProgramData\Solara\Wpf.Ui.dll

                                          Filesize

                                          5.2MB

                                          MD5

                                          aead90ab96e2853f59be27c4ec1e4853

                                          SHA1

                                          43cdedde26488d3209e17efff9a51e1f944eb35f

                                          SHA256

                                          46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                          SHA512

                                          f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          d85ba6ff808d9e5444a4b369f5bc2730

                                          SHA1

                                          31aa9d96590fff6981b315e0b391b575e4c0804a

                                          SHA256

                                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                          SHA512

                                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          0621e31d12b6e16ab28de3e74462a4ce

                                          SHA1

                                          0af6f056aff6edbbc961676656d8045cbe1be12b

                                          SHA256

                                          1fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030

                                          SHA512

                                          bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          56361f50f0ee63ef0ea7c91d0c8b847a

                                          SHA1

                                          35227c31259df7a652efb6486b2251c4ee4b43fc

                                          SHA256

                                          7660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0

                                          SHA512

                                          94582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          960B

                                          MD5

                                          ec002e0acc9a1e8e596e0f99d5ee5ba5

                                          SHA1

                                          b118f94d264e46c070e67ace7f0097be17109ab9

                                          SHA256

                                          c8533c1be547d9f38c91092d982c6d0dbe3a8538c91061fb6d6682a113e2d89b

                                          SHA512

                                          3c30dcda047279ad5afda936bf843be8a228113ec3b031939b52e1e5c55748e4be187b46d11990859ffc010b4dc9385513eca5a2774699fab4f4e6b6a6d5ce22

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          471B

                                          MD5

                                          4269f37611fbf49d423c9266a834a806

                                          SHA1

                                          5e1edfd6b8e40af86b5293d82c21b12b32aa24a0

                                          SHA256

                                          f9b844cd7d0b10d2cea570e7f5fe612d03b72e36a4aa4234294a907376dae66e

                                          SHA512

                                          120fddde4546aa9976697063ddff168a2289e26fffa569da20aa148ff0131ce71ac84e3dd24d8fc475dbc70b610e98da3b5707b14cf1c26f48c2c6483ffac59a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          b2868513d7b71ee2909aca4e498cc182

                                          SHA1

                                          9104881c66267289d956644a8652302a3f7f6ade

                                          SHA256

                                          a2e47b41466f8825ad98d1cadf688f2e8876d564add2b55a6d913d5e2928f503

                                          SHA512

                                          f96e5710e277d9da55e0b8903378b066bdfdc73dbb82142c7203bcff08dc2346f4f1713d757ee342d8d06ff6655d25fd07f7778b3f4d6e781d5dcb7715ba94dc

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          833c869b8e1536561a2d3742bdf994b1

                                          SHA1

                                          0c08a8381941d38d462b1612bcbbdcf9990bd3ed

                                          SHA256

                                          0b43d8b32576acb8bba16cb5b15098535b41c93816707f893458682cf57b351f

                                          SHA512

                                          f060d3f9386f647c4325b78102fa808113f1f0742babf5fc1592ae0b5e8d4cf15831354b27675dd24a0b2d6999452c678f91073843e74393df1fd86065af18fb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          2764802ab4167d09f03c33dc3eb69492

                                          SHA1

                                          89db77b0cd5c72aabec0b1a2a4db8c064b5a5275

                                          SHA256

                                          dec8498062f4a329c8b381ac14f1ab222d52c0bb4e2c25c057405e9e714d4b28

                                          SHA512

                                          cf7c9093f8dcdfee9f66b97c50701520b8b61e6c6c875531f856a81f0c42b1ded63ceaeb1388448e0b72cb1e4887433619dd3072b3fae92566fd70bf56ce2781

                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                          Filesize

                                          2KB

                                          MD5

                                          69cd578dc5b228a93dec98102ca47aa9

                                          SHA1

                                          370f6a7260f5e6215f1fbe9a3d4cacc74fcdf662

                                          SHA256

                                          9c9495cce36e377483700ef4b5d99080e2097a3b89e213e65031c2c69c9d3cc2

                                          SHA512

                                          a2e1b4b1cf5bbd30fca8decd91835152a8a376832a4b5c1d0e4418c6aea478cb56bab7f439e6b01e5f874cb9f131d00f77f587d6cb575ae36c5fa2502cda96a4

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          9b80cd7a712469a4c45fec564313d9eb

                                          SHA1

                                          6125c01bc10d204ca36ad1110afe714678655f2d

                                          SHA256

                                          5a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d

                                          SHA512

                                          ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          22310ad6749d8cc38284aa616efcd100

                                          SHA1

                                          440ef4a0a53bfa7c83fe84326a1dff4326dcb515

                                          SHA256

                                          55b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf

                                          SHA512

                                          2ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          944B

                                          MD5

                                          eb1ad317bd25b55b2bbdce8a28a74a94

                                          SHA1

                                          98a3978be4d10d62e7411946474579ee5bdc5ea6

                                          SHA256

                                          9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

                                          SHA512

                                          d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          18KB

                                          MD5

                                          1d4f5a4de134a39f41d70add20cb93c2

                                          SHA1

                                          a690b85b7e463d866704f196bb83e4978c620420

                                          SHA256

                                          3bc9d13841fde79b6bcd9470af57fb71b87b7fc04af4962fe5c70ba17570e484

                                          SHA512

                                          13ddefbaa07133caab5f925200073d159ffccb745db0825e7e5a7ba3bbf5d869c0c401d5f02cb38e28fbb25c9ae0c1a594572762acfd5402a8a18e018d6f41e7

                                        • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe

                                          Filesize

                                          2.9MB

                                          MD5

                                          f227cdfd423b3cc03bb69c49babf4da3

                                          SHA1

                                          3db5a97d9b0f2545e7ba97026af6c28512200441

                                          SHA256

                                          cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

                                          SHA512

                                          b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

                                        • C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe

                                          Filesize

                                          3.4MB

                                          MD5

                                          37d3fcd5058c45d2c2bba065a5c22296

                                          SHA1

                                          22debc7d8cdf3efd9b65ad099592c68ad7fa2713

                                          SHA256

                                          774cc2deb69d990bb908b5b4a77314e474b357268dad92d917dcd85176f43ffd

                                          SHA512

                                          fcad1f64c733180c7812a673379a35e488ed3306ca6146b187c7627a670012cec2a9166bf88815fbc1468cb70e7a1215a54e34aab37cba0f4ded8ce914323bdc

                                        • C:\Users\Admin\AppData\Local\Temp\CONFIG

                                          Filesize

                                          79B

                                          MD5

                                          0284fa0391784125ad3b12be8c92c6ae

                                          SHA1

                                          e4fe938288c6804d9c79947ad2e39939a595e9f3

                                          SHA256

                                          789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0

                                          SHA512

                                          9dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235

                                        • C:\Users\Admin\AppData\Local\Temp\Solara.exe

                                          Filesize

                                          40KB

                                          MD5

                                          3cd497079c5032b0f9147561383b9bfe

                                          SHA1

                                          19dc9ee49b125e82dbb6d6e4aaea309de57dddaa

                                          SHA256

                                          51b315cbd60cd505af61f72e2d5616048edb4948d2d97b5421e87a4c269bcd3e

                                          SHA512

                                          18382fb279658c390ad95a3af62346840cfd1393c0072111a795e21f4c02ddcce051cb77bb5bc664e183a6dfc9ac4c76c8ae51c50750ce7dd2a59a32cde7bd31

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sv0ynfov.bwl.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • memory/1592-149-0x0000017DCE3A0000-0x0000017DCE3AA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1592-151-0x0000017DC7B20000-0x0000017DC7B32000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1592-122-0x0000017DAB7F0000-0x0000017DABB60000-memory.dmp

                                          Filesize

                                          3.4MB

                                        • memory/1592-126-0x0000017DCC970000-0x0000017DCC98E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/1708-239-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-241-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-240-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-230-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-231-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-229-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-238-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-237-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-236-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1708-235-0x000002074B470000-0x000002074B471000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1764-54-0x0000024320C20000-0x0000024320C2A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1764-52-0x0000024320C30000-0x0000024320C38000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1764-110-0x00000243634F0000-0x00000243635A2000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/1764-84-0x00007FFFC0930000-0x00007FFFC13F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1764-83-0x00007FFFC0930000-0x00007FFFC13F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1764-24-0x0000024304880000-0x0000024304B62000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/1764-56-0x0000024320C70000-0x0000024320C78000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1764-55-0x0000024320AA0000-0x0000024320AAA000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1764-47-0x0000024320AB0000-0x0000024320AE8000-memory.dmp

                                          Filesize

                                          224KB

                                        • memory/1764-50-0x0000024320A90000-0x0000024320A9A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/1764-51-0x0000024320BF0000-0x0000024320C16000-memory.dmp

                                          Filesize

                                          152KB

                                        • memory/1764-124-0x00007FFFC0930000-0x00007FFFC13F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1764-53-0x0000024320C40000-0x0000024320C56000-memory.dmp

                                          Filesize

                                          88KB

                                        • memory/1764-48-0x0000024320A80000-0x0000024320A8E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/1764-49-0x0000024320AF0000-0x0000024320BF0000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1764-43-0x0000024324930000-0x0000024324938000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1764-37-0x00007FFFC0930000-0x00007FFFC13F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1764-28-0x0000024306730000-0x0000024306740000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1764-27-0x00007FFFC0930000-0x00007FFFC13F1000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2184-74-0x000000001B850000-0x000000001B860000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2184-14-0x00007FFFC0933000-0x00007FFFC0935000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2184-20-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2216-71-0x0000000007DC0000-0x000000000843A000-memory.dmp

                                          Filesize

                                          6.5MB

                                        • memory/2216-45-0x0000000006370000-0x000000000638E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/2216-25-0x0000000004DA0000-0x0000000004DD6000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/2216-26-0x0000000005540000-0x0000000005B68000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/2216-29-0x00000000053B0000-0x00000000053D2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/2216-31-0x0000000005D50000-0x0000000005DB6000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/2216-30-0x0000000005CE0000-0x0000000005D46000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/2216-42-0x00000000753AE000-0x00000000753AF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2216-44-0x0000000005DC0000-0x0000000006114000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/2216-46-0x00000000063C0000-0x000000000640C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/2216-59-0x00000000710B0000-0x00000000710FC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/2216-58-0x0000000006930000-0x0000000006962000-memory.dmp

                                          Filesize

                                          200KB

                                        • memory/2216-69-0x0000000006970000-0x000000000698E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/2216-70-0x0000000007360000-0x0000000007403000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/2216-72-0x0000000007490000-0x00000000074AA000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/2216-73-0x0000000007500000-0x000000000750A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/2216-75-0x0000000007930000-0x00000000079C6000-memory.dmp

                                          Filesize

                                          600KB

                                        • memory/2216-80-0x0000000007920000-0x0000000007928000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2216-79-0x00000000079D0000-0x00000000079EA000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/2216-78-0x00000000078F0000-0x0000000007904000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/2216-77-0x00000000078E0000-0x00000000078EE000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/2216-76-0x00000000078A0000-0x00000000078B1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/2460-303-0x00007FFFDD690000-0x00007FFFDD691000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2460-302-0x00007FFFDED10000-0x00007FFFDED11000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4264-445-0x000001FAC1BC0000-0x000001FAC1BF0000-memory.dmp

                                          Filesize

                                          192KB

                                        • memory/4264-268-0x00007FFFDD9A0000-0x00007FFFDD9A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4444-211-0x000001EC75EF0000-0x000001EC75FA2000-memory.dmp

                                          Filesize

                                          712KB

                                        • memory/4444-487-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-208-0x000001EC761C0000-0x000001EC766FC000-memory.dmp

                                          Filesize

                                          5.2MB

                                        • memory/4444-209-0x000001EC75E30000-0x000001EC75EEA000-memory.dmp

                                          Filesize

                                          744KB

                                        • memory/4444-459-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-461-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-687-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-206-0x000001EC59F50000-0x000001EC59FF0000-memory.dmp

                                          Filesize

                                          640KB

                                        • memory/4444-228-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-448-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-427-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-218-0x000001EC76700000-0x000001EC76790000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/4444-213-0x000001EC75B50000-0x000001EC75B60000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4444-224-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-226-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-225-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4444-227-0x0000000180000000-0x00000001810AA000-memory.dmp

                                          Filesize

                                          16.7MB

                                        • memory/4704-85-0x0000028C65910000-0x0000028C65932000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/5532-362-0x00007FFFDD9A0000-0x00007FFFDD9A1000-memory.dmp

                                          Filesize

                                          4KB