Overview
overview
9Static
static
7Solara/Mic...re.dll
windows10-2004-x64
1Solara/Mic...ms.dll
windows10-2004-x64
1Solara/Mic...pf.dll
windows10-2004-x64
1Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...ten.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...ead.js
windows10-2004-x64
3Solara/Mon...son.js
windows10-2004-x64
3Solara/Mon...raw.js
windows10-2004-x64
Solara/Mon...ext.js
windows10-2004-x64
3Solara/Mon...ded.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...und.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...x.html
windows10-2004-x64
3Solara/Mon...lua.js
windows10-2004-x64
3Solara/Mon...ain.js
windows10-2004-x64
3Solara/Mon...nls.js
windows10-2004-x64
3Solara/Mon...der.js
windows10-2004-x64
3Solara/New...on.dll
windows10-2004-x64
1Solara/Solara.dll
windows10-2004-x64
9Solara/Solara.exe
windows10-2004-x64
1Solara/Web...er.dll
windows10-2004-x64
1Solara/Wpf.Ui.dll
windows10-2004-x64
1Solara/libcurl.dll
windows10-2004-x64
1Solara/vcr...40.dll
windows10-2004-x64
1Solara/zlib1.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 15:18 UTC
Behavioral task
behavioral1
Sample
Solara/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Solara/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral4
Sample
Solara/Monaco/fileaccess/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Solara/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
Solara/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Solara/Monaco/fileaccess/node_modules/content-type/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Solara/Monaco/fileaccess/node_modules/cookie-signature/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Solara/Monaco/fileaccess/node_modules/safe-buffer/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Solara/Monaco/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Solara/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Solara/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Solara/Monaco/vs/editor/editor.main.nls.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Solara/Monaco/vs/loader.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Solara/Newtonsoft.Json.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral26
Sample
Solara/Solara.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Solara/Solara.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
Solara/WebView2Loader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Solara/Wpf.Ui.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Solara/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Solara/vcruntime140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
Solara/zlib1.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara/Monaco/index.html
-
Size
20KB
-
MD5
12207f73e175f72175526f73aa23ce83
-
SHA1
1a5184b7cf9505363b02bb8012a802d1032f5238
-
SHA256
8dfd03ab23c85dfb8d60f30e37015fa4e40171292e331c04372f620388799e5f
-
SHA512
d7902c5a36b65b9a2eeaa2a2ce4ed5dcd2c15703362f9c52666c5722dcb10773e8206eda0630358673e2d8a49e16237700d00ae37b38f6e712fd9bea2bb149d1
-
SSDEEP
384:FihTARA5LmClk2P5VvW4NGthbVBJjRBX+BILnoamLR7:FihTnlf+lthbVBJTOyboamLR7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 2072 msedge.exe 2072 msedge.exe 2656 identity_helper.exe 2656 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4436 2072 msedge.exe 81 PID 2072 wrote to memory of 4436 2072 msedge.exe 81 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 1344 2072 msedge.exe 82 PID 2072 wrote to memory of 4252 2072 msedge.exe 83 PID 2072 wrote to memory of 4252 2072 msedge.exe 83 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84 PID 2072 wrote to memory of 4048 2072 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Solara\Monaco\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d6f46f8,0x7ffe7d6f4708,0x7ffe7d6f47182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5565677599135103139,8572685234246234280,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
Network
-
Remote address:8.8.8.8:53Requestcdn.jsdelivr.netIN AResponsecdn.jsdelivr.netIN CNAMEjsdelivr.map.fastly.netjsdelivr.map.fastly.netIN A151.101.65.229jsdelivr.map.fastly.netIN A151.101.1.229jsdelivr.map.fastly.netIN A151.101.129.229jsdelivr.map.fastly.netIN A151.101.193.229
-
Remote address:8.8.8.8:53Requestkit-pro.fontawesome.comIN AResponsekit-pro.fontawesome.comIN CNAMEkit-pro.fontawesome.com.cdn.cloudflare.netkit-pro.fontawesome.com.cdn.cloudflare.netIN A104.18.19.62kit-pro.fontawesome.com.cdn.cloudflare.netIN A104.18.18.62
-
Remote address:8.8.8.8:53Requestcdnjs.cloudflare.comIN AResponsecdnjs.cloudflare.comIN A104.17.25.14cdnjs.cloudflare.comIN A104.17.24.14
-
Remote address:104.18.19.62:443RequestGET /releases/v6.2.0/css/pro.min.css HTTP/2.0
host: kit-pro.fontawesome.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/css,*/*;q=0.1
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: style
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: text/css
x-amz-id-2: jPbqiqwjng1ymPwr6hqoft4BfreGjsSBVxPs1e5ULko4i0AxQkWPE7kB4LvZbkbw31FdWNwXkNE=
x-amz-request-id: B5VT5AZ07GXWHVC1
last-modified: Tue, 30 Aug 2022 16:40:41 GMT
etag: W/"32b07840650d89a6955ec02980a5213d"
cache-control: public, max-age=31556926
cf-cache-status: HIT
age: 11829790
expires: Sat, 02 Aug 2025 21:08:17 GMT
vary: Accept-Encoding
server: cloudflare
cf-ray: 8acf0bf6392a48b3-LHR
content-encoding: gzip
-
Remote address:151.101.65.229:443RequestGET /npm/bootstrap@5.0.2/dist/css/bootstrap.min.css HTTP/2.0
host: cdn.jsdelivr.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
origin: null
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: text/css,*/*;q=0.1
sec-fetch-site: cross-site
sec-fetch-mode: cors
sec-fetch-dest: style
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
access-control-expose-headers: *
timing-allow-origin: *
cache-control: public, max-age=31536000, s-maxage=31536000, immutable
cross-origin-resource-policy: cross-origin
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains; preload
content-type: text/css; charset=utf-8
x-jsd-version: 5.0.2
x-jsd-version-type: version
etag: W/"260c5-fByeBXPlzqi603M74vxjqoxo6o0"
content-encoding: br
accept-ranges: bytes
date: Fri, 02 Aug 2024 15:19:32 GMT
age: 2554170
x-served-by: cache-fra-eddf8230097-FRA, cache-lon420109-LON
x-cache: HIT, HIT
vary: Accept-Encoding
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 25360
-
Remote address:151.101.65.229:443RequestGET /npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js HTTP/2.0
host: cdn.jsdelivr.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
origin: null
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
access-control-expose-headers: *
timing-allow-origin: *
cache-control: public, max-age=31536000, s-maxage=31536000, immutable
cross-origin-resource-policy: cross-origin
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains; preload
content-type: application/javascript; charset=utf-8
x-jsd-version: 5.0.2
x-jsd-version-type: version
etag: W/"13397-kBFpUnUH/55mLPZNjjYfNZMIlw0"
content-encoding: br
accept-ranges: bytes
date: Fri, 02 Aug 2024 15:19:32 GMT
age: 827774
x-served-by: cache-fra-eddf8230080-FRA, cache-lon420109-LON
x-cache: HIT, HIT
vary: Accept-Encoding
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 23943
-
Remote address:151.101.65.229:443RequestGET /npm/toastify-js/src/toastify.min.css HTTP/2.0
host: cdn.jsdelivr.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/css,*/*;q=0.1
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: style
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
access-control-expose-headers: *
timing-allow-origin: *
cache-control: public, max-age=604800, s-maxage=43200
cross-origin-resource-policy: cross-origin
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains; preload
content-type: application/javascript; charset=utf-8
x-jsd-version: 1.12.0
x-jsd-version-type: version
etag: W/"1a78-gnILcfEIGOTS9BOxr62w14J/AJM"
content-encoding: br
accept-ranges: bytes
date: Fri, 02 Aug 2024 15:19:32 GMT
age: 6507
x-served-by: cache-fra-etou8220096-FRA, cache-lon4257-LON
x-cache: HIT, HIT
vary: Accept-Encoding
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 2158
-
Remote address:151.101.65.229:443RequestGET /npm/toastify-js HTTP/2.0
host: cdn.jsdelivr.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
access-control-expose-headers: *
timing-allow-origin: *
cache-control: public, max-age=604800, s-maxage=43200
cross-origin-resource-policy: cross-origin
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; includeSubDomains; preload
content-type: text/css; charset=utf-8
x-jsd-version: 1.12.0
x-jsd-version-type: version
etag: W/"5f3-Gduk9jjIOe//5URKHgjXkQF9pPA"
content-encoding: br
accept-ranges: bytes
date: Fri, 02 Aug 2024 15:19:32 GMT
age: 32290
x-served-by: cache-fra-etou8220126-FRA, cache-lon4257-LON
x-cache: HIT, HIT
vary: Accept-Encoding
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 717
-
Remote address:104.17.25.14:443RequestGET /ajax/libs/jquery/3.6.4/jquery.min.js HTTP/2.0
host: cdnjs.cloudflare.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
origin: null
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
dnt: 1
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: application/javascript; charset=utf-8
content-length: 28035
access-control-allow-origin: *
cache-control: public, max-age=30672000
content-encoding: br
etag: "6408b256-6d83"
last-modified: Wed, 08 Mar 2023 16:05:42 GMT
cf-cdnjs-via: cfworker/kv
cross-origin-resource-policy: cross-origin
timing-allow-origin: *
x-content-type-options: nosniff
vary: Accept-Encoding
cf-cache-status: HIT
age: 839163
expires: Wed, 23 Jul 2025 15:19:31 GMT
accept-ranges: bytes
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B%2BouptLWe59AL%2BwHJTmQjfSEnv5cSYeYgqa9tu0MV7TQJ4rlkN2JQXgAvoAnHgh3E1MjW%2BXjyHsQFlocs%2BRbZFcdcyQWcdE7%2FjrJhKoTvdLgCSFddcd%2BFGEDmMYVG8T8fDI5y9CZ"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security: max-age=15780000
server: cloudflare
cf-ray: 8acf0bf6388793f5-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request62.19.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request94.102.250.142.in-addr.arpaIN PTRResponse94.102.250.142.in-addr.arpaIN PTRrb-in-f941e100net
-
Remote address:8.8.8.8:53Request229.65.101.151.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request229.65.101.151.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request14.25.17.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.27.250.142.in-addr.arpaIN PTRResponse95.27.250.142.in-addr.arpaIN PTRra-in-f951e100net
-
Remote address:8.8.8.8:53Request95.27.250.142.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request226.20.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestgitlab.comIN AResponsegitlab.comIN A172.65.251.78
-
Remote address:8.8.8.8:53Requestgitlab.comIN A
-
Remote address:172.65.251.78:443RequestGET /cmdsoftworks/solara/-/raw/main/Files/docs.txt HTTP/2.0
host: gitlab.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: */*
origin: null
sec-fetch-site: cross-site
sec-fetch-mode: cors
sec-fetch-dest: empty
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 302
content-type: text/html; charset=utf-8
location: https://gitlab.com/users/sign_in
cache-control: no-cache
content-security-policy: base-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' https://gitlab.com/assets/ blob: data:; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com snowplow.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-5Iaq6mouhvL22hgp1wevTQ=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
permissions-policy: interest-cohort=()
referrer-policy: strict-origin-when-cross-origin
set-cookie: _gitlab_session=11db3eadedf922f04259b6516ed123f4; path=/; expires=Fri, 02 Aug 2024 17:19:34 GMT; secure; HttpOnly; SameSite=None
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-gitlab-meta: {"correlation_id":"01J49TSGBA92G8K0CE3C4YTMX3","version":"1"}
x-permitted-cross-domain-policies: none
x-request-id: 01J49TSGBA92G8K0CE3C4YTMX3
x-runtime: 0.034611
x-ua-compatible: IE=edge
x-xss-protection: 1; mode=block
gitlab-lb: haproxy-main-57-lb-gprd
gitlab-sv: web-gke-us-east1-b
cf-cache-status: MISS
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LIm5cv%2BCwfQhngE69tWjdvMp9Y38ANLBCirlMupG%2FRiyxSOUI2i4PJq%2B%2BHigh6cWwAbBCvMW9T5nBSbqAk3%2BGqP5BDkTj3%2BqmbPsTYwQl89YQ3ui6VjmbBO%2BQh4%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
strict-transport-security: max-age=31536000
set-cookie: _cfuvid=XB64Oa9nsFIs9puFJ5AtLTWi.E1ls6Up1FfYMJwacX0-1722611974598-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None
server: cloudflare
cf-ray: 8acf0c083afd6343-LHR
-
Remote address:8.8.8.8:53Request78.251.65.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
104.18.19.62:443https://kit-pro.fontawesome.com/releases/v6.2.0/css/pro.min.csstls, http2msedge.exe9.9kB 179.7kB 150 150
HTTP Request
GET https://kit-pro.fontawesome.com/releases/v6.2.0/css/pro.min.cssHTTP Response
200 -
1.1kB 7.9kB 11 12
-
151.101.65.229:443https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.jstls, http2msedge.exe3.9kB 60.5kB 51 54
HTTP Request
GET https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.cssHTTP Request
GET https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.jsHTTP Response
200HTTP Response
200 -
1.0kB 5.5kB 10 10
-
1.9kB 11.9kB 17 20
HTTP Request
GET https://cdn.jsdelivr.net/npm/toastify-js/src/toastify.min.cssHTTP Request
GET https://cdn.jsdelivr.net/npm/toastify-jsHTTP Response
200HTTP Response
200 -
104.17.25.14:443https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.4/jquery.min.jstls, http2msedge.exe2.6kB 33.5kB 34 34
HTTP Request
GET https://cdnjs.cloudflare.com/ajax/libs/jquery/3.6.4/jquery.min.jsHTTP Response
200 -
-
-
172.65.251.78:443https://gitlab.com/cmdsoftworks/solara/-/raw/main/Files/docs.txttls, http2msedge.exe2.5kB 8.4kB 21 21
HTTP Request
GET https://gitlab.com/cmdsoftworks/solara/-/raw/main/Files/docs.txtHTTP Response
302 -
-
-
62 B 160 B 1 1
DNS Request
cdn.jsdelivr.net
DNS Response
151.101.65.229151.101.1.229151.101.129.229151.101.193.229
-
69 B 157 B 1 1
DNS Request
kit-pro.fontawesome.com
DNS Response
104.18.19.62104.18.18.62
-
66 B 98 B 1 1
DNS Request
cdnjs.cloudflare.com
DNS Response
104.17.25.14104.17.24.14
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
62.19.18.104.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
94.102.250.142.in-addr.arpa
-
146 B 133 B 2 1
DNS Request
229.65.101.151.in-addr.arpa
DNS Request
229.65.101.151.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
14.25.17.104.in-addr.arpa
-
144 B 105 B 2 1
DNS Request
95.27.250.142.in-addr.arpa
DNS Request
95.27.250.142.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
226.20.18.104.in-addr.arpa
-
112 B 72 B 2 1
DNS Request
gitlab.com
DNS Request
gitlab.com
DNS Response
172.65.251.78
-
72 B 134 B 1 1
DNS Request
78.251.65.172.in-addr.arpa
-
457 B 7
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
731B
MD502fb018b1516f95a544647fb94359d75
SHA1706294b22a0b96c445e9ebe15a298a49b07d0e3b
SHA25667f43b8dd7bf72253c068acb49259c574c9ef918fc4e807a253f150c3e8cf2a2
SHA512a339bf29abe489a9c585fa5fbc552038d6e47ed055cf85ab731bffc9a153964d0e8183968da36f042ab73297d670dc7741fc0fb887e2598efd41d405172ea788
-
Filesize
6KB
MD55a6caad565eebd1b0c90d90460c79284
SHA1ad8a6f0e67457b049c9e97056e983273561db15e
SHA256f798237d40366658f3ba9fda8d84dccc6af8b36aafee17dabf353d707b31d189
SHA51214667efdb8c04b0bd0b3479b3b1c85fe5c060c5e1bcc3ca0af8c834da1cd9fd98337b19c576a8037f71454555c0fc34dd111c07030d9744f12a725b44453498e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c6618e21-c69b-411f-9148-0e83bffbbb17.tmp
Filesize6KB
MD55d8439d3fb60be464a9113a9febe7953
SHA170726f1b65c1e922e3004a722aa3c3d5d7b7028d
SHA2562cb5a90f849dec980c3a87fbc170149cc1a64388791a7fe6f7644f3b22808b3a
SHA51220e84af790d1516e7510fa8ea939c3e5349bd08be12e009dfe3f3be6fcbf6a819b92b0d1713cbb056aa830ab63ec8a191b084b1786ca323dedd9d0c5d5d0262e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9c75b2e0eb10245f18336f5dbeb768a
SHA1cc134b7b3c842be4dfb5eda78e8fa9d3a7eb7724
SHA256e26d7deea924342ae08398924403065ff2da597b9d1569f9bfced83ea5f57ceb
SHA5126a6c1ae3b8acd9c327ef0eb3059e894db0281101fab184323dce04cc41329969f2ef0b39b09f76c90ad1ecba150ebe3f23cb2137df8657990c0d171153852085