Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    63s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 15:40

General

  • Target

    SolaraBETA3.rar

  • Size

    14.3MB

  • MD5

    a6d8949e3f607cdcc0dab3a8a238e392

  • SHA1

    cebd6a5f7119992718631c1c31dbeb836f60a8eb

  • SHA256

    168a76679d03d1e2e72cfc68f665ac3e9a498a8f1c3e603b808dd92723694c4f

  • SHA512

    71d6417939c535cc0dd6e60b1772d22c840d95977a662d3e18d8f7debde41cd5d343095ca14a7ccc6226b437c8c6c66127a1b2a2d99c053fcbf4ba7f18226d03

  • SSDEEP

    393216:G0RI7Li3FBN4K5aF6XCH/fy7yrcL4MErc7k/hPlvJ:G04Ak6Xwn54EMEok/hL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\SolaraBETA3.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SolaraBETA3.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2492
  • C:\Users\Admin\Desktop\SolaraBETA3\X89vM9vMa.exe
    "C:\Users\Admin\Desktop\SolaraBETA3\X89vM9vMa.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2828 -s 920
      2⤵
        PID:2644
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feec039758,0x7feec039768,0x7feec039778
        2⤵
          PID:2448
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:2
          2⤵
            PID:1028
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:8
            2⤵
              PID:588
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:8
              2⤵
                PID:2340
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                2⤵
                  PID:2116
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                  2⤵
                    PID:2672
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1556 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:2
                    2⤵
                      PID:2172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1204 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                      2⤵
                        PID:2952
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3364 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:8
                        2⤵
                          PID:1468
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3236 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:8
                          2⤵
                            PID:1700
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:8
                            2⤵
                              PID:1748
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3784 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                              2⤵
                                PID:2516
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2484 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                                2⤵
                                  PID:640
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2524 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                                  2⤵
                                    PID:1468
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3736 --field-trial-handle=1196,i,2632268019338682768,15648973238624921264,131072 /prefetch:1
                                    2⤵
                                      PID:2284
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:1896
                                    • C:\Users\Admin\Desktop\SolaraBETA3\X89vM9vMa.exe
                                      "C:\Users\Admin\Desktop\SolaraBETA3\X89vM9vMa.exe"
                                      1⤵
                                        PID:2572

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        68KB

                                        MD5

                                        29f65ba8e88c063813cc50a4ea544e93

                                        SHA1

                                        05a7040d5c127e68c25d81cc51271ffb8bef3568

                                        SHA256

                                        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                                        SHA512

                                        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        adf8611e93c89c56d541f5ba342d9191

                                        SHA1

                                        c42e24087448bac1d89db233fab6546692ea7ab0

                                        SHA256

                                        a1408ab2d28b2964811ea67b8d896790ff8b17760e18f44810c7fa5a9dc5793e

                                        SHA512

                                        0f955a0e8dae65310e2ad1cb343e9ebfccfd057cef02de5d2cf7671773caa4a458da3b576c688a1a7653c407302a0ea0db65856fe46e3174fc0185b087ffbd96

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\7d302bd1-1d8b-418b-a3d6-587491694d11.tmp

                                        Filesize

                                        267KB

                                        MD5

                                        39024041ab7aef8b2d4f959f6f7a4968

                                        SHA1

                                        497b10e518633739f1e3b614d57a5e0509df653a

                                        SHA256

                                        7fde64d8806f65aaca758ab36d86c071b0dc09d1ddec7bab0a5ae6166d45068b

                                        SHA512

                                        dc823fb949a22975fc6da69152d1e0fc17e869b648ecfa451c90159d6208e21b1ca9ceb22943a8bb1d54afba3f59f6dbdb6c44a72b831ab801c2eb31d55141c8

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\818758be-a9e0-48f1-8b3a-34d7da257b72.tmp

                                        Filesize

                                        5KB

                                        MD5

                                        3888a8630c9ee73cfaf5f23d462ab2aa

                                        SHA1

                                        2e036e539565e46c559d8c61fe9379a0092ca4ee

                                        SHA256

                                        b82c55429ce828c6d293149c77402049884eedf8f6b74f47999e30630358866d

                                        SHA512

                                        566da542125be4d5b8d7847d9a97f8f76e818373bfca61c8e1c0eb03b0fa30dc97bb29e00388b4ac8a0a8b5c0c8667777c6cdf255dbb0e56b811ff6ddf56355d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        361B

                                        MD5

                                        6beb8640a1dbc762687286e48fb2e048

                                        SHA1

                                        b3f57996abd234bfab2fa6f92dc7de0d791e37e7

                                        SHA256

                                        933fad88b34541c3c89bf8c89e0f0966a54b13c87bea5cfa1dc0babb1ab4b855

                                        SHA512

                                        05781eba0f6eea1b7d74784f52fc628caee9604a41ca667d85811204c693ed9f1b96ea127bbfa1918525c5b8d526e6301b97390d89c149a55c3948494fff175c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        00e9746f00148b0f40e683e11b5c98af

                                        SHA1

                                        846330717c7eb9fd6630ef108c6cfb4b25676504

                                        SHA256

                                        bad22cd749ab9634217b9b7ac572c15c0d5317dbada4a3f0a38d5c86ba440732

                                        SHA512

                                        f4ac07d2b7e01eed6301b32cdd73e0bc775b1ea89daba1f5b6aec62ce871fd22631c34e49bd55830c11c586dce7303642852701a43bcc7d116f902548a2dff89

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        18e723571b00fb1694a3bad6c78e4054

                                        SHA1

                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                        SHA256

                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                        SHA512

                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        267KB

                                        MD5

                                        7bfa89d373a31c3fae085ad469edb8d1

                                        SHA1

                                        2d2e794e245e04055f8d08f63749489b60c6720b

                                        SHA256

                                        a3187b803265d512d533f358d86940198b065876e63fd2017ceae88b819d1be1

                                        SHA512

                                        12613548b24d85e75b5b98dd096ec6370905e5e9712009f830ec724cb32f8eedefcd84bd4e42c3f8ce7c5c5ef9ee1f6b7f7b089db7a1a75f700be14a4367be9d

                                      • C:\Users\Admin\AppData\Local\Temp\7zECB928696\SolaraBETA3\Monaco\fileaccess\node_modules\get-intrinsic\.nycrc

                                        Filesize

                                        139B

                                        MD5

                                        d0104f79f0b4f03bbcd3b287fa04cf8c

                                        SHA1

                                        54f9d7adf8943cb07f821435bb269eb4ba40ccc2

                                        SHA256

                                        997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a

                                        SHA512

                                        daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6

                                      • C:\Users\Admin\AppData\Local\Temp\7zECB928696\SolaraBETA3\Monaco\fileaccess\node_modules\hasown\.eslintrc

                                        Filesize

                                        43B

                                        MD5

                                        c28b0fe9be6e306cc2ad30fe00e3db10

                                        SHA1

                                        af79c81bd61c9a937fca18425dd84cdf8317c8b9

                                        SHA256

                                        0694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641

                                        SHA512

                                        e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9

                                      • C:\Users\Admin\AppData\Local\Temp\7zECB928696\SolaraBETA3\Monaco\fileaccess\node_modules\hasown\.nycrc

                                        Filesize

                                        216B

                                        MD5

                                        c2ab942102236f987048d0d84d73d960

                                        SHA1

                                        95462172699187ac02eaec6074024b26e6d71cff

                                        SHA256

                                        948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a

                                        SHA512

                                        e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479

                                      • C:\Users\Admin\AppData\Local\Temp\7zECB928696\SolaraBETA3\Monaco\fileaccess\node_modules\vary\LICENSE

                                        Filesize

                                        1KB

                                        MD5

                                        13babc4f212ce635d68da544339c962b

                                        SHA1

                                        4881ad2ec8eb2470a7049421047c6d076f48f1de

                                        SHA256

                                        bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400

                                        SHA512

                                        40e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182

                                      • C:\Users\Admin\AppData\Local\Temp\7zECB928696\SolaraBETA3\workspace\.tests\isfile.txt

                                        Filesize

                                        7B

                                        MD5

                                        260ca9dd8a4577fc00b7bd5810298076

                                        SHA1

                                        53a5687cb26dc41f2ab4033e97e13adefd3740d6

                                        SHA256

                                        aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27

                                        SHA512

                                        51e85deb51c2b909a21ec5b8e83b1cb28da258b1be227620105a345a2bd4c6aea549cd5429670f2df33324667b9f623a420b3a0bdbbd03ad48602211e75478a7

                                      • C:\Users\Admin\AppData\Local\Temp\TarB6F7.tmp

                                        Filesize

                                        177KB

                                        MD5

                                        435a9ac180383f9fa094131b173a2f7b

                                        SHA1

                                        76944ea657a9db94f9a4bef38f88c46ed4166983

                                        SHA256

                                        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                                        SHA512

                                        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                                      • C:\Users\Admin\AppData\Local\Temp\bdfe1398330148c085d9bc6215bd335b\WebView2Loader.dll

                                        Filesize

                                        133KB

                                        MD5

                                        a0bd0d1a66e7c7f1d97aedecdafb933f

                                        SHA1

                                        dd109ac34beb8289030e4ec0a026297b793f64a3

                                        SHA256

                                        79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                        SHA512

                                        2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                      • C:\Users\Admin\Desktop\SolaraBETA3\Microsoft.Web.WebView2.Core.dll

                                        Filesize

                                        175KB

                                        MD5

                                        5aa9881f82850a619545d02f193c932d

                                        SHA1

                                        54d704e857e2f5a53e2fe910bff52aa88cb60398

                                        SHA256

                                        b98024a78f475933d8fd12cb41b577e470ffd612dd1fed88d70f2588eb4d5a97

                                        SHA512

                                        51baef9fa3ddbff1bfde2e7b473e5dcc51a2323c46a7fd3ce5f565d20250a683d17ef1137a5e5d73fd782be6563e97c8f78243ca61b904b5dc3068020432a01c

                                      • C:\Users\Admin\Desktop\SolaraBETA3\Microsoft.Web.WebView2.Wpf.dll

                                        Filesize

                                        32KB

                                        MD5

                                        9dc64e263f13ea91d91c82f8b8d49566

                                        SHA1

                                        4f9a5c3e82d8d65f950f188d66881427b6c85105

                                        SHA256

                                        ea6e6875dc3783743d1cfdfaa7f67529cfd05fa74c2ca388435e9bcb9c9be674

                                        SHA512

                                        0612e2a0ec23852ce4d887ad6411ccb88a44d9b6aa8f702bb9dff350fdbe661213c652d59027edb40f0f2a85747f7d72ceff6920d1c344f6f0d58cc73ce9a119

                                      • C:\Users\Admin\Desktop\SolaraBETA3\Wpf.Ui.dll

                                        Filesize

                                        5.2MB

                                        MD5

                                        aead90ab96e2853f59be27c4ec1e4853

                                        SHA1

                                        43cdedde26488d3209e17efff9a51e1f944eb35f

                                        SHA256

                                        46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                        SHA512

                                        f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                      • C:\Users\Admin\Desktop\SolaraBETA3\X89vM9vMa.exe

                                        Filesize

                                        769KB

                                        MD5

                                        91f3d54d71a0751d55fc066d7831f356

                                        SHA1

                                        990c18b063c78cecfac1ae3d870058e5f1619613

                                        SHA256

                                        5b459f91fab604c2630768e0423c7d0004aab701978154e1a1ce8d2460ab945f

                                        SHA512

                                        e40818039bc0855b108d4e4cb703a399ccbdb86c1df577b81cb9e7a07fd588a18e31f3d805af01d3d8e37ecc4a87d819641408526b7ae12a13e981d351528551

                                      • memory/2572-1836-0x00000000001C0000-0x0000000000286000-memory.dmp

                                        Filesize

                                        792KB

                                      • memory/2572-1858-0x00000000007F0000-0x00000000007FA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2572-1857-0x00000000007F0000-0x00000000007FA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2572-1843-0x0000000001ED0000-0x0000000001F00000-memory.dmp

                                        Filesize

                                        192KB

                                      • memory/2572-1842-0x00000000007F0000-0x00000000007FC000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2572-1840-0x00000000007F0000-0x00000000007FA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2572-1841-0x00000000007F0000-0x00000000007FA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2572-1839-0x000000001B170000-0x000000001B6AC000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/2828-1501-0x0000000000410000-0x000000000041A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2828-1500-0x0000000000410000-0x000000000041A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2828-1503-0x0000000000410000-0x000000000041C000-memory.dmp

                                        Filesize

                                        48KB

                                      • memory/2828-1505-0x0000000000430000-0x0000000000460000-memory.dmp

                                        Filesize

                                        192KB

                                      • memory/2828-1510-0x0000000000410000-0x000000000041A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2828-1511-0x0000000000410000-0x000000000041A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2828-1499-0x000000001B380000-0x000000001B8BC000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/2828-1497-0x0000000000250000-0x0000000000266000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/2828-1492-0x0000000000A80000-0x0000000000B46000-memory.dmp

                                        Filesize

                                        792KB