Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/05/2024, 05:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1234488074650517647/1235412310994980864/SolaraBETA_2.rar?ex=6635985f&is=663446df&hm=e94a3cc05f802130a65672d25c6941aa982899149b871ee4595683637897c56b&
Resource
win11-20240419-en
General
-
Target
https://cdn.discordapp.com/attachments/1234488074650517647/1235412310994980864/SolaraBETA_2.rar?ex=6635985f&is=663446df&hm=e94a3cc05f802130a65672d25c6941aa982899149b871ee4595683637897c56b&
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2352 Solara.exe -
Loads dropped DLL 8 IoCs
pid Process 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe 2352 Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 27 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SolaraBETA_2.rar:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 4164 msedge.exe 4164 msedge.exe 4764 msedge.exe 4764 msedge.exe 4052 msedge.exe 4052 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 3916 msedgewebview2.exe 3916 msedgewebview2.exe 2140 msedgewebview2.exe 2140 msedgewebview2.exe 2352 Solara.exe 2352 Solara.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4240 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4416 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4240 7zFM.exe Token: 35 4240 7zFM.exe Token: SeSecurityPrivilege 4240 7zFM.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4240 7zFM.exe 4240 7zFM.exe 4416 msedgewebview2.exe 4416 msedgewebview2.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 3900 4164 msedge.exe 79 PID 4164 wrote to memory of 3900 4164 msedge.exe 79 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2612 4164 msedge.exe 80 PID 4164 wrote to memory of 2680 4164 msedge.exe 81 PID 4164 wrote to memory of 2680 4164 msedge.exe 81 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82 PID 4164 wrote to memory of 2444 4164 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1234488074650517647/1235412310994980864/SolaraBETA_2.rar?ex=6635985f&is=663446df&hm=e94a3cc05f802130a65672d25c6941aa982899149b871ee4595683637897c56b&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff86f8f3cb8,0x7ff86f8f3cc8,0x7ff86f8f3cd82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,8758851175743463383,4534791647495710340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3356
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\SolaraBETA_2.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4240
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe"C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=2352.2604.148070966727816177602⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4416 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Crashpad" "--metrics-dir=C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x1d4,0x7ff86f8f3cb8,0x7ff86f8f3cc8,0x7ff86f8f3cd83⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1936,11601950538751605887,12086033182544048953,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1984 /prefetch:23⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,11601950538751605887,12086033182544048953,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2124 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,11601950538751605887,12086033182544048953,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2768 /prefetch:83⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1936,11601950538751605887,12086033182544048953,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:13⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,11601950538751605887,12086033182544048953,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2184 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c16971be0e6f1e01725260be0e299cd
SHA1e7dc1882a0fc68087a2d146b3a639ee7392ac5ed
SHA256b1fa098c668cdf8092aa096c83328b93e4014df102614aaaf6ab8dc12844bdc0
SHA512dc76816e756d27eedc2fe7035101f35d90d54ec7d7c724ad6a330b5dd2b1e6d108f3ae44cedb14a02110157be8ddac7d454efae1becebf0efc9931fdc06e953c
-
Filesize
152B
MD5bdf3e009c72d4fe1aa9a062e409d68f6
SHA17c7cc29a19adb5aa0a44782bb644575340914474
SHA2568728752ef08d5b17d7eb77ed69cfdd1fc73b9d6e27200844b0953aeece7a7fdc
SHA51275b85a025733914163d90846af462124db41a40f1ce97e1e0736a05e4f09fe9e78d72316753317dabea28d50906631f634431a39384a332d66fa87352ff497f8
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5be7d98762793ee0fa1a1d9752127eae2
SHA1ee563418f2fffcab3a729e8c732d1952b245f738
SHA256c3292902a4b6e057e3cefd1c8a67fb70636bccb6adf416a35f9cbf415919ea4c
SHA512aa88d802d973595bd77d4e32f19a2da4c1fad4b95dcde18fe79a1a69354cb275e5b7debd1913098bb5bf72f0d008a178ac5b1e1ba9ca3db701f22aaf9d63cceb
-
Filesize
5KB
MD5f688be938ca559509b41d375559792b8
SHA1327287e1f3676590e38c02434c99def9c105d194
SHA256ede89c34d23f60541cc7f60564608ed64fe364beeb7cc259ad9e87be17ae5099
SHA512d7a69595c53e3d1ed45c8caa6317d4a4e9d52e97ef2fde0a527051f5d4b274efda750f3d2564a2c99cb164151d3de44976ca0b2362bf1f9360ff2efdb6283646
-
Filesize
5KB
MD537f7c6a36752b81a8b7795f78cef70e8
SHA14a27ee899db91c3f996edf665a4c0eac9ec916af
SHA2568b987aff35af96758ff43d03942688937d2f1ccd1710dbbacf275c89aab4bf34
SHA512e29777eff8e9df6b68b3dd436694a00bd3c54b0a9c1b19c85e81c5743006519ac3792bc3e5f2bd843f965ae25f2da7144a8498deb6caddb751363c5a3ae5fafb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5775d0554ad0613fac7231c78bcb0ff8b
SHA15bd4c54029400a6ad7b9361c57d92be9f05ee00c
SHA256ce60a01c41fcd28020ad379ae841fc3279c0420366676ca186d5abe7a845112a
SHA512a3948a4f3fa57ddbfa763462b1be0d512fbbfa24bab3934da8fb29fddfd89a55f1c1469870debf5b47c12f9fe3db886d368b7524d0d943c67effd91cc184c0f9
-
Filesize
12KB
MD52a478c0be72169a848194a09be383dd8
SHA17c9cb84e24970fb7a7f3c3d64f15ed93359eece6
SHA256a9077ab96e3d8d5197229a8a856a796407bb81d9ce92401ef02b89e939b87726
SHA5123cae6bd20b6a3c2407aba8cf7c3892533743a7669089540f71bee17e3c45a1c6e3b9bbd7624246fe93c038161e358900507f8db5e5d22c5574e7e4bc0f9744e4
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Extension State\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Extension State\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Shared Dictionary\cache\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\GraphiteDawnCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\GraphiteDawnCache\data_1
Filesize264KB
MD539b220c1a87953fc4b5dc54a07f3f76e
SHA1bf2a0fcb732014c5ec3178449e986b9f9d54010b
SHA25644c13363d0918cfc5d99528214d40e982f83aaf85bf01a493f5ca52a8ce0ad97
SHA51295aab55ac1bd2f5798a3b3cdae592d0f07d2061a19b7cccf649262daa2297c8b2141c9626a10110d9ffdfb2a91dd893c1a6053570f534fe9bf27be660f1ca6d8
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\GraphiteDawnCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\GraphiteDawnCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\Default\Extension Rules\000003.log
Filesize38B
MD551a2cbb807f5085530dec18e45cb8569
SHA17ad88cd3de5844c7fc269c4500228a630016ab5b
SHA2561c43a1bda1e458863c46dfae7fb43bfb3e27802169f37320399b1dd799a819ac
SHA512b643a8fa75eda90c89ab98f79d4d022bb81f1f62f50ed4e5440f487f22d1163671ec3ae73c4742c11830214173ff2935c785018318f4a4cad413ae4eeef985df
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\Default\Safe Browsing Network\Safe Browsing Cookies
Filesize20KB
MD526fc054d6e2537d0eefc2adccd8aed48
SHA157d91cc39566739e53ee686fdf54a54db586225e
SHA256f1f4cab488693f20a1daa0d0d9bf8d5f4bd066d939fbcb78e3c1eb5b44582e4d
SHA512b674081966ad1cf5318e3e86c628c13cdc67bb53cbea5a49992551033fe9730206d7133aaf0535c95a6245a2e20522a9ea9bc7c414a72cf08be8f5c2d81611b8
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\GrShaderCache\f_000001
Filesize16KB
MD593b26a977cf99c9d7038ce067f3f6c19
SHA1daae119d188382adec6aad4c5c34c64adba38ca8
SHA25663c283447cef315cb5165e4f0b879f2554c854f8de5b9919d2578441b4f92e80
SHA512c3ef41ba6bde3aa36479efae3f15c9dc45487615c58a240728b03b1c2b06e31c14810a1344a22f923387c33de731ab70994c3265a023c13dbaaba3f829884464
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\Subresource Filter\Indexed Rules\36\10.34.0.52\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\hyphen-data\101.0.4906.0\hyph-as.hyb
Filesize703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\hyphen-data\101.0.4906.0\hyph-hi.hyb
Filesize687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
C:\Users\Admin\AppData\Local\Temp\7zE0908C778\SolaraBETA (2)\WpfApp1.exe.WebView2\EBWebView\hyphen-data\101.0.4906.0\hyph-nb.hyb
Filesize141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
488KB
MD5851fee9a41856b588847cf8272645f58
SHA1ee185a1ff257c86eb19d30a191bf0695d5ac72a1
SHA2565e7faee6b8230ca3b97ce9542b914db3abbbd1cb14fd95a39497aaad4c1094ca
SHA512cf5c70984cf33e12cf57116da1f282a5bd6433c570831c185253d13463b0b9a0b9387d4d1bf4dddab3292a5d9ba96d66b6812e9d7ebc5eb35cb96eea2741348f
-
Filesize
43KB
MD534ec990ed346ec6a4f14841b12280c20
SHA16587164274a1ae7f47bdb9d71d066b83241576f0
SHA2561e987b22cd011e4396a0805c73539586b67df172df75e3dded16a77d31850409
SHA512b565015ca4b11b79ecbc8127f1fd40c986948050f1caefdd371d34ed2136af0aabf100863dc6fd16d67e3751d44ee13835ea9bf981ac0238165749c4987d1ae0
-
Filesize
970KB
MD5901c7a2b9a298ca8e012077b3863845b
SHA17c018d58621b963935620eef33a0a53fbe047dd1
SHA2561b3cb085d240d5572d87397a404060114e69f0098a7bf8a0704a370ab21371c7
SHA5121c3f243777e34c7b81e302695f6234fbeffc9e10ef8e0568523e20318776bdb8a6fc323b0bdafebeade622ddb976ef20a3c53fd442d2f9fc7778a61b282b3f29
-
Filesize
87KB
MD5c61ea149a799fad804a6b157a48b713a
SHA136212a1cd7b3cd2d3909d28fcac482977fdc2214
SHA256108c88858bfe52105c794b58d89d423940e7a1a3a2a4502c1a327672defeae09
SHA5125cd298aea469b0d30f84ee04a20077a4bd7ca6c500e07f02d476730442a7e1623dd3ba84615151c949e7966a1fb07c2ea8a14b9aa9086db443051248dded8224
-
Filesize
1.2MB
MD51045bfd216ae1ae480dd0ef626f5ff39
SHA1377e869bc123602e9b568816b76be600ed03dbd0
SHA256439292e489a0a35e4a3a0fe304ea1a680337243fa53b135aa9310881e1d7e078
SHA512f9f8fcc23fc084af69d7c9abb0ef72c4684ac8ddf7fa6b2028e2f19fd67435f28534c0cf5b17453dfe352437c777d6f71cfe1d6ad3542ad9d636263400908fd2
-
Filesize
152B
MD5caa44fc85ed459a8602fe278b189525c
SHA1af6110c55feb60157220fb8f206b9a63b33021b2
SHA2563cdfdf6cdc9887637d3e08c56bd6bf3ded623af12490f12892dfc5df534aeed0
SHA5125e0b86a9a67904caa54effd7362911c2b507857796dccadc4f55451823e45f5400c21c1e3e26443bd5b438d0d920e17f707ac6d05656286b575cbd8ed4739b78
-
Filesize
152B
MD5d765372812a867efba233f7177dc50ff
SHA14b738ad35e8b562542b6f335684cd3e9b0664513
SHA25652d0c7ccc0bbc5a793138944c3a3ff31db4fc856260ec0294a4625889618328b
SHA5121faffd22e4a72090013dd093eddbc790962bfa2e6aa8ba31634e2a3e5961fbbe495a4a3511437660bfee3b2d5f0f447451e74c2e054c99d2e994ccf26c05f04b
-
Filesize
152B
MD5db0896a7d866355097184cbcb1ccb016
SHA168e546d9d0dad5597a6bd8acd00480e2a33849ec
SHA256b680f685bfbd1a523479fea590c754ad4e6f60c71ed5b0486ff2a56cac435491
SHA512ad638848a9daff04a25dc509711b8ade01f906ab6858284aafd1c5193e5c8af4659d27e539882e627f81e18612421ec203c6761458b66048b631f25e82261e97
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
44KB
MD52a1384ce5e354bb7925313371ef80baf
SHA1abb5086078b8c6aa4725cd53550ac225bff83231
SHA256ae7c17aaddaadfaeb7ee09cee5d5c94b62ade5e9dfd692b9bfb705e982a192e1
SHA5125cd94d636511b01a550cce1375da80a7b5375d1479ebc600f5f0983913caa9d726bd507aee3e25609e5af267263904f9f42dc894b1b3a9efa9613135dfca98fb
-
Filesize
264KB
MD5cb0613e8871f0bfe2197e6565c23b815
SHA1f5e0e20478f22eed710fb1fc44172aa4e5cf9c63
SHA256c84c1bb3db833c5e49e69a3f2e572c86195dd9ed7e2e89885e4ce3d6f6bbe717
SHA512465a2e2e1c39cf467a5321ba519942713ddc2f3d94dbf396453848384385987a7f5b7dabc15198bc4ec260419161594f09a3f74b91520860de5b46e2fe772701
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5e71ba01ada2db83016c499df122b0fa7
SHA177859fcb58639238aa7d28267ecc768f75485dee
SHA2561acb904ba7463ef0f080c2fdfa504b087d45b82b63de7986c85e560da1bb2414
SHA5121248d0a68731e3af58cd2ca6b8a80ae29dbf46bae7ae5170f3389f4b429bca2b397091199eef8fe3ae1b05d775d18e83bf17a2316e2f444782874915975f6ca8
-
Filesize
20KB
MD5f56e431b1d09b7ee9076ac27c118cd1e
SHA1fd00bdd050f91f04e12091c5786438f7f9b0b28f
SHA2560db6438854d1086c869c9bda01877547517cd155cc8336dc1838abe3458b4bf6
SHA51254f7b298f2f7447fa071f58bdb1bb80acbdb1c0de4ea46760d391427649b8f255f040c650ab758700289ad5b35096ef8192eff77c4e3c47d72713148a4ad3714
-
Filesize
164KB
MD5470b0aca58e863f371e24a1a2f1a3fc6
SHA1bc811ed566137fa3683ca8a61c43f3b5565458ac
SHA256822601ed7607f8a64b017e2b67f26ac2dc79e79d90c7ce4fc891a795007684d2
SHA5121ad0e5cb6a95be27b0db0992b88120feb3e3461dd3cce8df9b31193c363104299ce4b58a26f2999eae7c08e1491b716c73bc445a2ea7c13148c6df34f38784bb
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Local Storage\leveldb\LOG
Filesize364B
MD5111969dcd721e4759f29a7bb8bc311e5
SHA13dad10eb8dfee6f75462e559ac2365afba220bc5
SHA2566a8b251714c515131c0aa69e4dbe2aaf8d4afbe7fb398f1bf803940527718e5a
SHA5129c7fd99f6cbb9a5a2610de7dafa5fa1a8aa8e5b6d5ee6f49f04a15be09d4d83bbce8c84db8715dc42d44126692cb4582f8ea5bb2cda3f1e2a318847531fbe3c9
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Local Storage\leveldb\LOG.old
Filesize364B
MD5696646d6a363026f44634685a9a441dc
SHA199ff6a8953f582dc7a1b5ed7d750ad967cf920d6
SHA2567241119f9627f3efe43d2a0c273018dad71f205fbd7f046e0b75f45108538b71
SHA5123d37bbaaf34b56def3cee37da2d0db264673e10b51f159ba96a60a51d80d90ddfc0058d2a1cb476843de0edce4252d753357a3cb4620c8296784f76a90c46647
-
Filesize
42KB
MD55cdbe5fe7b39e0617a15efa1daca1f6b
SHA1eace7b5e04c4d3fcb5a48baf00a9f1aa41ff7e13
SHA256ee6731dd6cdae816e48422f6f77482460ec71446d7450e7d9c363bc4f76a0842
SHA5128e85f436537d2a15fdbb1199af7f1df7eed3f31a9b8b1c2e299bfd6bb9c511279eace1dac6a3edb62b7be458d68e4c24e82e466dc2095bff5f6cfa8d844e6e42
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Network Persistent State
Filesize382B
MD51aaae890e92228636d429cce39f63a2c
SHA17d0a6957ac5e88e6772358a00ca5ca2f5d5bfcd9
SHA256bab1e1c07d1767dc77d6253394a5e6db9ffd6569e4598c54ce1ba61e886b0f5b
SHA5121d683fc27547d7047209f78ea55663a8b47dfc15e87a3155a961d1593694a104f238ea6d4838ed787e4c4d0c641897135e08fd62a1af750a27d85f1484eca31a
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Network Persistent State~RFe58d2bc.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
7KB
MD5ce180dc9cb4c9f54fdda6007ffa8f0c7
SHA1cc95558eef2019fc6fda1876f41a6f393547886d
SHA256830e9db603774869b1db26ce8dcd241772a43b1528e30713be39a5d0ab3ef53b
SHA512fd217d76a8071bdc1d741fb50bc0937cf2638d9b9a9d4a24c4a2af576f831abab37357bdf3900e7d973523dbea580ece64c3180cd6fee1aa808d21b27e42e0d5
-
Filesize
8KB
MD5ba036fd328a33f8bd8d20427cae85eaf
SHA13c95aa60aceee4db937ac810715f7560f7fc6de6
SHA256706a2eaff026a9ccc2e9b42a2d064ae676848424bc5603b6415c95773c9d9b1a
SHA5126b69c8980d5c3f04af09c16d042d9df227fb963c45fa413cb5488f3e41f54517d83cfbd5095105c5bf3887d8e76949a110c99fd6119c125af9d6b189e7cae11d
-
Filesize
8KB
MD5428499259e8f66224c6d56c57f822d29
SHA14b6afd993dd28a870683ee9a556b7b50aed37477
SHA256862af02abe47ea3ec481d9527f30e71260b6fc7d0712b0f2d94582b119910608
SHA5127ff2ebbde816d978b7afba9ea75fcd736d7492c955d0c5a119d54af1220709b9f739fa245307d802fa7fccc8c5bfa10d3ed7d5dd885332a0a97ccc99d3dfbc16
-
Filesize
6KB
MD5cd5363037004091bfb7c8d1b77b514ad
SHA15ae7b9c0ed921e6dc2399318afac972586db27be
SHA2560fb47c5b7db15881a141325295458cfd8e77b2a31566749eb8243ea0f8e55b49
SHA512030b27a55776472099ce03ea339ccc3bad5891758986584e5bd7d4280a18e59a85e58b972bf9cb87f3c8dec326e7890499c638cc86f281ad760ef08f09e08bd6
-
Filesize
6KB
MD5a41624d72273a66f740cbe6e106bda96
SHA17225f8201f0c89e89bb549ee692bf19ea829920e
SHA256d64e4367569476837af8b5c09991f3afd56ada08c226c9d333fc32cde4ea9fa8
SHA51227902b1c89c1e5ea8cee09a7becf102477b3591a40b785d8dd485a10b50d427f6dba3341a6a4dfab06e968ebaaa3418912b33bc76e836c3cfc16de9b8e5aee1a
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\LOG
Filesize380B
MD528da6d86f7637cde27ffb494446c8180
SHA1ac9db300751a651b9b6219bca869fe98b4626b16
SHA256a4c1ac955d6e946b29efefaa0427696076ccf4d1a215a1374ac9ff43de60676c
SHA51200f365bd2739bf0c1c35a44d936ed5abbac968920d8d2540ae533f75bbfc13ada2e24e553269a5c7ed8a53e237a527a35bbd80a173609dceed9fa227bcb739db
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\LOG.old
Filesize380B
MD50601459aceba2a0b4e104604060369b7
SHA1e790eddae8a1c7345b87eec2c3b92d0eec726bfc
SHA256afe3d91e869e2432922a885810e1df1b7dd9d99b69f50b465cbfba619f591bc4
SHA512aebe6c455213d100043752586166fb0df38247942db03954ce45a79594a4db0283c994a3ee5c254fe27fd41e482a3506351d1ee36660fef3f778d4ace88edd92
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\000003.log
Filesize46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
356B
MD52d089aa48bd5889cd4e8c40bd65a1df5
SHA1850a364849d46e2ef36dbe47e6ab0c3242eaf966
SHA256e12de488e3d5080fa313beadfbccd41391a43c87b10c54b6e7ce51d00746736d
SHA5121cae48577e3c799a0a1ea3881d95135e2d4ebccd432647e3079042b89c30a85074bdc4b9eb056dbced0655cf9a51db457fa86dd17c5e74e562d244d95b1c9860
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\LOG.old
Filesize356B
MD5071e52d6fbe543359ce41378b031e5cc
SHA12c36b6050c97046766690976cc7bdfdf6c19c00e
SHA256289cb94a317c7f531046097c70695f821d6523a98c381e7cb11d997fe04b7a63
SHA512accd09f5c2cb6f4179b475c4d6c654fec8da0acb73608d0f8880d984cd6d455b5d8e465971e5b2fdf081ccaf0100669ec090ed49e2a084d80437a5769d6d13e2
-
Filesize
128KB
MD524dbc70a733803c1831a0d072e858e3c
SHA1ac6ab2ddc25e558964f32515f2f9d5ab4d663883
SHA25612933a2599d1671191a0cc270847f5d29ecbfb8a7f54472b6f01d25b6f6567ab
SHA51278237ad1aa466aa68f040082a041629e8d83672f05da40351c021e0c02b924f7af3e36296dcf32d8d9714a91d051a841a67a9f2b2940422ce81a99a44cffd2ed
-
Filesize
218KB
MD5d3a5bc0dab12828db8665b07822206bf
SHA136712ab4c0a9ab1575ee4af4fa1dccbaf8ce4739
SHA2567c205bcbb08d009543afb360b3912ce1dfe67e3bb411a9ee952fdac60aebe74c
SHA5127584b02e66bf37a1d02cc49979a4a718d9aebee48b907737995439a7b92a2e93f243056823bb24030ff67233b53beabf70c8ac1b8601776665dfcb7556a12fc5
-
C:\Users\Admin\Desktop\SolaraBETA (2)\Solara.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
Filesize
18KB
MD5e3624115eb1874c81fab26e5db1e7749
SHA1289eb4b4cad1f2cc761b0fff9be6152a23ab5749
SHA256cd9f65e9c2fc582fa673c525a148791397783cf8a8e62a21c3246d738084787b
SHA51295a8d056f993b61b4f6f46843e0606a9f57e9dded6f6871ebf40154400eb30f66197e842e1251ef10974def012f41c8be8cef24f625ca9beefbfd09b4df1b394
-
Filesize
22KB
MD5c15a0dc4a524a7403692620a4b5e64e2
SHA159ca876481212afaf7fc834ffd2aa7500c6a1ac6
SHA256072941d456cfc31082422d8c97a8c371570782863295fd7c818b1a4825d23301
SHA5125ee00a328a4c00d31e3fe28885531614b969e460431ad9e0ab2e3f32d008a3e4927b427db958ec5534f34477cb5454fe59d92d3b546a9b0dfea443a81579e1b5
-
Filesize
22KB
MD55da5e6bfc07944d06e54c2d27432b6b1
SHA1f549c2392cf132864308991ccdc5ab1259a17c85
SHA2564afbc8e61a033e73e896b5b18ece3360d6dfd0cab939c17a3b653f9407465737
SHA5125c877a218eb305de6666e74c0ad540942b5a843feefa6cf213d3be9d3b117e360305f142b1a85f23ed8d67d98dcbc1fee97926cf8467061ba329899a0fb69507
-
Filesize
99KB
MD57a2b8cfcd543f6e4ebca43162b67d610
SHA1c1c45a326249bf0ccd2be2fbd412f1a62fb67024
SHA2567d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f
SHA512e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8
-
Filesize
134KB
MD57bf24896b80f336c1d16b488f89fef34
SHA150db3c6002a85894f7b960aee1d01b5537a7057b
SHA25628cee166d574b246aa076eb59e24567026c7782f9a70a05b48a61508589e6840
SHA51207a660ab26343cb45602710a2935c6b948c80976de612ac403a6e354f7bedbe56e1e92f95cfb0ffa746625a3da5108c9a796941a0db462621ecb653a752766f0
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
522KB
MD5e31f5136d91bad0fcbce053aac798a30
SHA1ee785d2546aec4803bcae08cdebfd5d168c42337
SHA256ee94e2201870536522047e6d7fe7b903a63cd2e13e20c8fffc86d0e95361e671
SHA512a1543eb1d10d25efb44f9eaa0673c82bfac5173055d04c0f3be4792984635a7c774df57a8e289f840627754a4e595b855d299070d469e0f1e637c3f35274abe6
-
Filesize
576KB
MD57b92a6cb5d2cad407c457ab12d2b211d
SHA1e04020b3448fc6084fa31b7f791f22ff15e31328
SHA2563c6a772319fff3ee56d4cedbe332bb5c0c2f394714cf473c6cdf933754114784
SHA512b28740c1aca4f0f60a9e4a9ab5a0561af774d977ab6d42a7eea70c9e560c77c50be5d9d869f05d0435e2923f4f600219335d22425807ab23cbbcda75442c4b42
-
Filesize
158KB
MD5aee20ef43cf692c9080c5973b1b79855
SHA1b3885791b0e122f8360d6fb7c0e0ac7fe4fa14fb
SHA25631423e905e29c8a40a483e81dae1491990805fa066634d218b35bb96692bef0d
SHA512eab6684095c0a7555d921fb1a2e136fa1d761c5766c48571000a97403e6d437a3a4833c571f86c039aa8307fb2fc3fae1acffd63085ae9d2ea0d9e7f9ec1ace6
-
Filesize
113KB
MD575365924730b0b2c1a6ee9028ef07685
SHA1a10687c37deb2ce5422140b541a64ac15534250f
SHA256945e7f5d09938b7769a4e68f4ef01406e5af9f40db952cba05ddb3431dd1911b
SHA512c1e31c18903e657203ae847c9af601b1eb38efa95cb5fa7c1b75f84a2cba9023d08f1315c9bb2d59b53256dfdb3bac89930252138475491b21749471adc129a1
-
Filesize
17.4MB
MD5c8329bc1693c97fe73418d0e9738a7ed
SHA15ac4f0af641f02a39e9be7fb73c3507a25f6dbfc
SHA256f2da3ad65646e73981fd8fb1dc25f2ca331a662600bfb7ff41696fe5dbf74ad4
SHA512a515a362a2d947b396e28cda531b7130d72c2dc6b6f966ffffab98ff84fdfed76efd8a71add44ed8f8e5d327b21edc38c92ed2792fdaeed213d501ffcaca03fb
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98