Analysis

  • max time kernel
    72s
  • max time network
    67s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/07/2024, 23:35

General

  • Target

    Solara.html

  • Size

    14KB

  • MD5

    7320a47e529642f8a8a1db906737b4a7

  • SHA1

    64adc95a896b2d896e5eb45ca1b5fa27a3b0282e

  • SHA256

    639f9787d93bda50aefd07e6ef5a98695fade95074818e22a10481ec4e7d20ce

  • SHA512

    b0f69efaec8a06f00c15881752a29c644103f52a58810dddf7a65a0b018a19ee334c8c9763ecd66249939d0927fd640c2fb8a4132d1b57fa9a852a1d33beb791

  • SSDEEP

    384:BDn9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSia79:BD9TilUlC9fvOflS5/u01/8xWApJingA

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 46 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Solara.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffb2a73cb8,0x7fffb2a73cc8,0x7fffb2a73cd8
      2⤵
        PID:2292
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:4872
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3960
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
          2⤵
            PID:792
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
            2⤵
              PID:3676
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:2676
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                2⤵
                  PID:2712
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1108
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                  2⤵
                    PID:2136
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                    2⤵
                      PID:2192
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:8
                      2⤵
                      • NTFS ADS
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4824
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6380 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4652
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:1
                      2⤵
                        PID:5320
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:1
                        2⤵
                          PID:5332
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:1
                          2⤵
                            PID:5632
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,12582071057662090696,5386453223342572941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:1
                            2⤵
                              PID:5636
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1908
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2508
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2508
                                • C:\Users\Admin\Downloads\SolaraB\SolaraB\Solara\SolaraBootstrapper.exe
                                  "C:\Users\Admin\Downloads\SolaraB\SolaraB\Solara\SolaraBootstrapper.exe"
                                  1⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2872
                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
                                    2⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks whether UAC is enabled
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5108
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=5108.4596.3971239473125086339
                                      3⤵
                                      • Enumerates system info in registry
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3984
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x1d0,0x7fffb2a73cb8,0x7fffb2a73cc8,0x7fffb2a73cd8
                                        4⤵
                                          PID:3932
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1920,14686992976232340719,13433441592864462659,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:2
                                          4⤵
                                            PID:4628
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,14686992976232340719,13433441592864462659,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2024 /prefetch:3
                                            4⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2544
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,14686992976232340719,13433441592864462659,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2752 /prefetch:8
                                            4⤵
                                              PID:1076
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1920,14686992976232340719,13433441592864462659,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1
                                              4⤵
                                                PID:5364
                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,14686992976232340719,13433441592864462659,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4448 /prefetch:8
                                                4⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5780
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3908
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5180

                                            Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    fc52695a78aa4e8734d73b7446ba59d1

                                                    SHA1

                                                    15dfb5759ff566206ebd6b8a864e9e43182d7f44

                                                    SHA256

                                                    fc18d4b0cbcbb89e7f9cbe630c18c94ddecf8b59e74718cc5ad1f66fe638cf9e

                                                    SHA512

                                                    dbddeb1e9678141910933db917260164cfd07d5f2fcf3c7e82fc2c6db486be7dc47fb193a676e7a23d4ad6936c946ede8def1c555332e41a829d94c207cbfd51

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    ce971e4ab1f7a51b5b9def5887018d15

                                                    SHA1

                                                    2f280b61a4c3297a3129d59b84ae971e90fdf9d9

                                                    SHA256

                                                    12e7606eaa7e67b697c8b098266fcb8cb066cd9f8f60ce43ba8405102a63af1b

                                                    SHA512

                                                    5358fb373e7ef29ac278c33161fbd06b4ac59b24be16e4c34f37ae88383655a182e30fa71cb7881cffc3af5ab055aad25d57f53f3114e6d79b946dbfaa228594

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    72B

                                                    MD5

                                                    28980881e397954d48809cc2dbe8c893

                                                    SHA1

                                                    43f76f7ed4b7696f61b510ea48f3ccfedaa39abf

                                                    SHA256

                                                    a2124a52b1cb65a6f21521d8e740ce0cd8f7b792cb11670131ad11e2dd221769

                                                    SHA512

                                                    52909ba62e78ac3343f9ec46b86326c7376f386d330be1e5d1e82ec07ef52e7afa228b1c9b4e0423fae107a63b7802380c373c81d435585347e50e3740be3c54

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    870B

                                                    MD5

                                                    7065f39f8b9bde0fcb4ed39e20a86671

                                                    SHA1

                                                    5b21d3076ec750cb26755cb326509788f55e0df9

                                                    SHA256

                                                    f7f5c5bd33f1da2281d11af1732bb688f82d76be92f5ef23530acc6ae4ed8a18

                                                    SHA512

                                                    9781a2be3a73b1b930b55e11cc71841feefe36fafe497d369de4c0a4e9bf32781a7409a48a957c3af7e28d55d4ffa5a9bc27896f8fd370ce181bdeaf6d640df6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    ef1c1fd698a8c0e944f80a4efd1482a6

                                                    SHA1

                                                    34194593e3bb79be2a412a53fb61061a8f37c5c9

                                                    SHA256

                                                    257fbf6b945d2c83983ce3892d3419d7cc6a937f82e653862f72134aa59aee49

                                                    SHA512

                                                    fc2a1f319ee375f8c0002382e8a93ee28fe6ef24057039ec93a8e09682d50ad7215b0a83afa68fa92afa35c0ff20f26d3c9d8f1304247e8e59d3c38eb4d6e16b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    8f059ef49786379e25e5516078679c6d

                                                    SHA1

                                                    974fbf19ab1fbd91afb751f7e688ffb39790bfac

                                                    SHA256

                                                    b68986f7d227f08df8f6d81423bb9162040003dbcf3186ad5aec8b23edab72ed

                                                    SHA512

                                                    edf581496daefec94a865c4061fc855bb770c3b5b8cface7c8498c4991932b5a862b32423c47f9cc5ae3a384531cd0c53667a3deb25a8b4b506ab69779f8eb8f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    206702161f94c5cd39fadd03f4014d98

                                                    SHA1

                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                    SHA256

                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                    SHA512

                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    379929f7a963421c8a1cbef30b6650ee

                                                    SHA1

                                                    3efdc0be1654414a030f7735758351cd9ac6d8b9

                                                    SHA256

                                                    f00fedfd87a8ee2e3a09bf2735e476ee9203113e8f60759fcbf7ecc317cf8c2a

                                                    SHA512

                                                    cbe7228df6719ab0b7ebd7f8fd7f069182a159bd5dea96fb9b2d09d2d718e73dbc058ad65b211ebb95c4dfdfa2d815750c4113e09b1143397230d7f9d69b2a72

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    190664e0911e9c7c6be698c751ff9659

                                                    SHA1

                                                    6ec45d17c65b3a2a9848b68c4aa7bf1c2143f13c

                                                    SHA256

                                                    4dc43572b38ff2da0747b8529f4b096c31e8d2df071785037f455433615c77e9

                                                    SHA512

                                                    207f9ed684376d4e8a6974499b36cbfac872d9e46c4fa6c26b1d4925fa06031d24ab55d2ff6698de242f6cba7376c73625f433ace3f102ba7e241083824bbc2b

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dll

                                                    Filesize

                                                    488KB

                                                    MD5

                                                    851fee9a41856b588847cf8272645f58

                                                    SHA1

                                                    ee185a1ff257c86eb19d30a191bf0695d5ac72a1

                                                    SHA256

                                                    5e7faee6b8230ca3b97ce9542b914db3abbbd1cb14fd95a39497aaad4c1094ca

                                                    SHA512

                                                    cf5c70984cf33e12cf57116da1f282a5bd6433c570831c185253d13463b0b9a0b9387d4d1bf4dddab3292a5d9ba96d66b6812e9d7ebc5eb35cb96eea2741348f

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.WinForms.dll

                                                    Filesize

                                                    37KB

                                                    MD5

                                                    4cf94ffa50fd9bdc0bb93cceaede0629

                                                    SHA1

                                                    3e30eca720f4c2a708ec53fd7f1ba9e778b4f95f

                                                    SHA256

                                                    50b2e46c99076f6fa9c33e0a98f0fe3a2809a7c647bb509066e58f4c7685d7e6

                                                    SHA512

                                                    dc400518ef2f68920d90f1ce66fbb8f4dde2294e0efeecd3d9329aa7a66e1ab53487b120e13e15f227ea51784f90208c72d7fbfa9330d9b71dd9a1a727d11f98

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll

                                                    Filesize

                                                    43KB

                                                    MD5

                                                    34ec990ed346ec6a4f14841b12280c20

                                                    SHA1

                                                    6587164274a1ae7f47bdb9d71d066b83241576f0

                                                    SHA256

                                                    1e987b22cd011e4396a0805c73539586b67df172df75e3dded16a77d31850409

                                                    SHA512

                                                    b565015ca4b11b79ecbc8127f1fd40c986948050f1caefdd371d34ed2136af0aabf100863dc6fd16d67e3751d44ee13835ea9bf981ac0238165749c4987d1ae0

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\index.html

                                                    Filesize

                                                    20KB

                                                    MD5

                                                    7ed00e10ff463cc9afd05d41fc77ac06

                                                    SHA1

                                                    66e162bdbf6df1e1d5b994b8db39fa67ab080783

                                                    SHA256

                                                    808f2c68960e6e521975c8c8efaa90a4053cfb207c4042687ea7afdd091543ee

                                                    SHA512

                                                    4b598cc17654a866c758c33982e776e522f0177f3c987908a18f62385b393338582efbca149817df7cea66eb8cfaa11d566ebfcb59c88d22156f0f1f4d224285

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\basic-languages\lua\lua.js

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    8706d861294e09a1f2f7e63d19e5fcb7

                                                    SHA1

                                                    fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

                                                    SHA256

                                                    fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

                                                    SHA512

                                                    1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.css

                                                    Filesize

                                                    171KB

                                                    MD5

                                                    233217455a3ef3604bf4942024b94f98

                                                    SHA1

                                                    95cd3ce46f4ca65708ec25d59dddbfa3fc44e143

                                                    SHA256

                                                    2ec118616a1370e7c37342da85834ca1819400c28f83abfcbbb1ef50b51f7701

                                                    SHA512

                                                    6f4cb7b88673666b7dc1beab3ec2aec4d7d353e6da9f6f14ed2fee8848c7da34ee5060d9eb34ecbb5db71b5b98e3f8582c09ef3efe4f2d9d3135dea87d497455

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.js

                                                    Filesize

                                                    2.0MB

                                                    MD5

                                                    9399a8eaa741d04b0ae6566a5ebb8106

                                                    SHA1

                                                    5646a9d35b773d784ad914417ed861c5cba45e31

                                                    SHA256

                                                    93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

                                                    SHA512

                                                    d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\editor\editor.main.nls.js

                                                    Filesize

                                                    31KB

                                                    MD5

                                                    74dd2381ddbb5af80ce28aefed3068fc

                                                    SHA1

                                                    0996dc91842ab20387e08a46f3807a3f77958902

                                                    SHA256

                                                    fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

                                                    SHA512

                                                    8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\vs\loader.js

                                                    Filesize

                                                    27KB

                                                    MD5

                                                    8a3086f6c6298f986bda09080dd003b1

                                                    SHA1

                                                    8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

                                                    SHA256

                                                    0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

                                                    SHA512

                                                    9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dll

                                                    Filesize

                                                    695KB

                                                    MD5

                                                    195ffb7167db3219b217c4fd439eedd6

                                                    SHA1

                                                    1e76e6099570ede620b76ed47cf8d03a936d49f8

                                                    SHA256

                                                    e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                                    SHA512

                                                    56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\WebView2Loader.dll

                                                    Filesize

                                                    133KB

                                                    MD5

                                                    a0bd0d1a66e7c7f1d97aedecdafb933f

                                                    SHA1

                                                    dd109ac34beb8289030e4ec0a026297b793f64a3

                                                    SHA256

                                                    79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

                                                    SHA512

                                                    2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dll

                                                    Filesize

                                                    5.2MB

                                                    MD5

                                                    aead90ab96e2853f59be27c4ec1e4853

                                                    SHA1

                                                    43cdedde26488d3209e17efff9a51e1f944eb35f

                                                    SHA256

                                                    46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

                                                    SHA512

                                                    f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\bin\path.txt

                                                    Filesize

                                                    48B

                                                    MD5

                                                    be2a7d7f566380c227aee6c9352ba882

                                                    SHA1

                                                    b8b1236b1ce17f295b2780622cad96f4a1694b46

                                                    SHA256

                                                    fa95da2b65d081614dc31c4ec93f5443a42fca6f0fec3552d341b7588cd0a0e6

                                                    SHA512

                                                    771cacef95bf3f9564fa59f72654e269b280b08ed388910c60d911a5a265c3ccdadb75060e502981301c38041eb25d7097731901aa431822f47208d10a73c67b

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dll

                                                    Filesize

                                                    4.1MB

                                                    MD5

                                                    59267336c1fe47aa25e6000032ca954f

                                                    SHA1

                                                    158e84501d5066d12fea68269233666c8c41ced2

                                                    SHA256

                                                    0564c0d73f3cdccf8c503248de285bd846be90a27972429e3b70f1ab1e619150

                                                    SHA512

                                                    4aeba8de76a1d7a2dced451dc51c3381453c1124958563faf80ba82226d0c082f85f28984a84fb1a1a2d454d20d602501bdee712471c12651887b7bbbf22050d

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe

                                                    Filesize

                                                    90KB

                                                    MD5

                                                    d84e7f79f4f0d7074802d2d6e6f3579e

                                                    SHA1

                                                    494937256229ef022ff05855c3d410ac3e7df721

                                                    SHA256

                                                    dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227

                                                    SHA512

                                                    ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    2787573d5f9bc47021403a9bd1036c33

                                                    SHA1

                                                    0d449824660de5f437ce4f024d92ea66ba91ed6d

                                                    SHA256

                                                    83867235b4855963c4ab7780e09330ac135d968225edcd9dc8aea79ba2c456a9

                                                    SHA512

                                                    8baff59e00dc06d90e675e87d8af0132daa714714ed68cae37241a2c331412a4acdceb8636b2bc4d4e19bcc8948d9bc4c8f6b2c80ae86422aefe07a050a93a9e

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    135342d45cbdc1d6860034066c12cae7

                                                    SHA1

                                                    6b8f6df90132950b9a1d80220059863cc0539754

                                                    SHA256

                                                    6475ddc2cf0b65835994956580084da597a3a483f4bd8bbd0a96fa7ccf01b34e

                                                    SHA512

                                                    dabd3f230dea36934588ed1e28a0d58385470dfec72432ec18b94df2e9722586e0a75b51cdec449f0e15bf55e73c2604346f65463d38cb10f641c5024f60fabc

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    68314508fcd6d9c74deac721e0622f16

                                                    SHA1

                                                    250b00f7979681c6a885c68b16b0688cdccd6431

                                                    SHA256

                                                    2ffb4fddf78e25410b371548fa2d410f4b279171f28c536ba8f4e975f4fa418c

                                                    SHA512

                                                    d5f085f73863ed849ed443831e5b8eee5be55e076175a87c8a4c5825c2345338b93bf4fd126ff16648f6eaa298b5486fc1bafc551e55ef7d85183a25241dccb8

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

                                                    Filesize

                                                    20B

                                                    MD5

                                                    9e4e94633b73f4a7680240a0ffd6cd2c

                                                    SHA1

                                                    e68e02453ce22736169a56fdb59043d33668368f

                                                    SHA256

                                                    41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                    SHA512

                                                    193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                                                    Filesize

                                                    41B

                                                    MD5

                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                    SHA1

                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                    SHA256

                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                    SHA512

                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    ed28e1c79443bef081a89339e1283e46

                                                    SHA1

                                                    3f6d9e424ab57d8cce0423ee368bec46c091b3de

                                                    SHA256

                                                    18a162826771fa29b49d0c8cecdfbb51c5b1323eb3c831338bb99b6532af046c

                                                    SHA512

                                                    835f2e4f47f5faaeb297a30996d06d05fc5f090f78bd35dcc64c97782edaeb96953edca4e23cf82aa8f76a3b775de38315fc59d2f8e298c8d2ac184d08c66e02

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State~RFe5856a7.TMP

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    ce614e5a93e9246d927e90c5e6ff8100

                                                    SHA1

                                                    b30b639dd3a3a1886da6011308ff5b165d61fdf2

                                                    SHA256

                                                    66c2ff61e2adeb5f22b7b635a0f073893d74618466efbef405123892ca6304b0

                                                    SHA512

                                                    f78714359d9b8cc9d6197daf7bfdae05cf6709b1cf52a27c1661b67100ed02695295897a9959f20087f49384ac71eebb5285d8c9147188a1acae4bfd3e0f3a4f

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\libcurl.dll

                                                    Filesize

                                                    522KB

                                                    MD5

                                                    e31f5136d91bad0fcbce053aac798a30

                                                    SHA1

                                                    ee785d2546aec4803bcae08cdebfd5d168c42337

                                                    SHA256

                                                    ee94e2201870536522047e6d7fe7b903a63cd2e13e20c8fffc86d0e95361e671

                                                    SHA512

                                                    a1543eb1d10d25efb44f9eaa0673c82bfac5173055d04c0f3be4792984635a7c774df57a8e289f840627754a4e595b855d299070d469e0f1e637c3f35274abe6

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\vcruntime140.dll

                                                    Filesize

                                                    99KB

                                                    MD5

                                                    7a2b8cfcd543f6e4ebca43162b67d610

                                                    SHA1

                                                    c1c45a326249bf0ccd2be2fbd412f1a62fb67024

                                                    SHA256

                                                    7d7ca28235fba5603a7f40514a552ac7efaa67a5d5792bb06273916aa8565c5f

                                                    SHA512

                                                    e38304fb9c5af855c1134f542adf72cde159fab64385533eafa5bb6e374f19b5a29c0cb5516fc5da5c0b5ac47c2f6420792e0ac8ddff11e749832a7b7f3eb5c8

                                                  • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\zlib1.dll

                                                    Filesize

                                                    113KB

                                                    MD5

                                                    75365924730b0b2c1a6ee9028ef07685

                                                    SHA1

                                                    a10687c37deb2ce5422140b541a64ac15534250f

                                                    SHA256

                                                    945e7f5d09938b7769a4e68f4ef01406e5af9f40db952cba05ddb3431dd1911b

                                                    SHA512

                                                    c1e31c18903e657203ae847c9af601b1eb38efa95cb5fa7c1b75f84a2cba9023d08f1315c9bb2d59b53256dfdb3bac89930252138475491b21749471adc129a1

                                                  • C:\Users\Admin\Downloads\SolaraB.zip:Zone.Identifier

                                                    Filesize

                                                    108B

                                                    MD5

                                                    63dacf6b95b547374e6c1f9b42b6e785

                                                    SHA1

                                                    42cb19febec56ac4454c87b1d12851266a8faac9

                                                    SHA256

                                                    0654da2800aeb5b4c9f7b561b3681c779e76b0db4dc244252b57e7cf79f42d48

                                                    SHA512

                                                    e0e7f0840a8290e76ad8b9684130ac2dfc0f2013df59487e74d8a06bf9c94311f28522b95a180e123b1cc4cd4e8c466ca7f30107683eb7084516be7a51175cbc

                                                  • memory/2872-110-0x0000000004FD0000-0x0000000004FDA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/2872-112-0x0000000005C20000-0x0000000005C32000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/2872-109-0x0000000000500000-0x000000000050A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4628-578-0x00007FFFC0DC0000-0x00007FFFC0DC1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5108-534-0x000002675E560000-0x000002675E56E000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/5108-536-0x000002675F140000-0x000002675F1BE000-memory.dmp

                                                    Filesize

                                                    504KB

                                                  • memory/5108-532-0x000002675E570000-0x000002675E592000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/5108-556-0x000002675E8F0000-0x000002675E8FE000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/5108-529-0x000002675E480000-0x000002675E53A000-memory.dmp

                                                    Filesize

                                                    744KB

                                                  • memory/5108-528-0x000002675E900000-0x000002675EE3C000-memory.dmp

                                                    Filesize

                                                    5.2MB

                                                  • memory/5108-526-0x0000026743CD0000-0x0000026743CEA000-memory.dmp

                                                    Filesize

                                                    104KB

                                                  • memory/5108-555-0x0000026762410000-0x0000026762448000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/5108-554-0x000002675E830000-0x000002675E838000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/5108-531-0x000002675E600000-0x000002675E6B2000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/5108-549-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-703-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-723-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-550-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-548-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-733-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-735-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-747-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB

                                                  • memory/5108-547-0x0000000180000000-0x0000000180AE6000-memory.dmp

                                                    Filesize

                                                    10.9MB