Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    178s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2025, 17:08

General

  • Target

    SOLARA_ROBLOX.html

  • Size

    8KB

  • MD5

    3adc548fd20f4f7a7a504e96e64ce5c1

  • SHA1

    fe17430f9849d7f95666bd2bcc8991371ec06bfc

  • SHA256

    5eb5b908e559e2974fccbf6c59984a7e9341688cef7fa9463ef7ada3d357c779

  • SHA512

    d08a83fdf93daf5245fd257d83e7eab30dab81f337f746c0b03a983698a10030aee0218acbe3de0852d89aab0ed79a4515e42b91e30a070754116a70aeb34f26

  • SSDEEP

    192:PN2x2BxukTqfEWnclA0EzrKKRXV1P4N4gPiayCN:AxIuKqDKKRHPkggN

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Extracted

Family

lumma

C2

https://abruptyopsn.shop/api

https://wholersorie.shop/api

https://framekgirus.shop/api

https://tirepublicerj.shop/api

https://noisycuttej.shop/api

https://rabidcowse.shop/api

https://cloudewahsj.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • A potential corporate email address has been identified in the URL: [email protected]
  • Executes dropped EXE 19 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\SOLARA_ROBLOX.html
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8bb53cc40,0x7ff8bb53cc4c,0x7ff8bb53cc58
      2⤵
        PID:3728
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1232,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:2
        2⤵
          PID:5108
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1968 /prefetch:3
          2⤵
            PID:3160
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:8
            2⤵
              PID:2028
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1
              2⤵
                PID:3840
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:1
                2⤵
                  PID:628
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4480,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:8
                  2⤵
                    PID:544
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4920,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:1
                    2⤵
                      PID:5032
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5348,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:1
                      2⤵
                        PID:4344
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5548,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:1
                        2⤵
                          PID:3444
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4960,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5408 /prefetch:1
                          2⤵
                            PID:2208
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5040,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5740 /prefetch:1
                            2⤵
                              PID:4680
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3284,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5864 /prefetch:1
                              2⤵
                                PID:4160
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5340,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5776 /prefetch:8
                                2⤵
                                  PID:5096
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5268,i,3154419303729168350,11914144433924144657,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3096
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:904
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:384
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:2392
                                    • C:\Program Files\7-Zip\7zG.exe
                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\solarafdh3wy\" -spe -an -ai#7zMap27604:86:7zEvent9114
                                      1⤵
                                        PID:1504
                                      • C:\Program Files\7-Zip\7zG.exe
                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\" -spe -an -ai#7zMap23309:110:7zEvent7990
                                        1⤵
                                          PID:3132
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:4972
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:4768
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:4256
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:2972
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1472
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:3544
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:2524
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:956
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:544
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:3748
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1580
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:4192
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:768
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:4712
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:4452
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:3536
                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                          "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:5076
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:1080
                                          • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe
                                            "C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1016

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                          Filesize

                                          40B

                                          MD5

                                          1fd21a5228803360e7498b21377bd349

                                          SHA1

                                          c028d9a423b995bb2f9d9b56ef09e5a4f9535b38

                                          SHA256

                                          920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3

                                          SHA512

                                          c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          2140264a76638a4a61fc08863ecf0462

                                          SHA1

                                          87862d1418088f4b7243f19957534ad62b3ffdde

                                          SHA256

                                          34bad21e4e97af3a633fdd715bae94c3a6090bc06a1270cfe2b372192bcfcc11

                                          SHA512

                                          6a2f8d4b61c076ce7bbbe4618ab02004caf6cfae6f46aa06420b683fa5950d74daec5c978e8b339b7598ccf9b62a76317beaa218e261d6aae8b80a34a6cfea40

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000032

                                          Filesize

                                          20KB

                                          MD5

                                          87e8230a9ca3f0c5ccfa56f70276e2f2

                                          SHA1

                                          eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7

                                          SHA256

                                          e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9

                                          SHA512

                                          37690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

                                          Filesize

                                          1KB

                                          MD5

                                          2fd3b1b8832cfa6471f3665196ff610a

                                          SHA1

                                          d1bf17af38c110514acd814379d7ed3cc5653125

                                          SHA256

                                          63babb24828b52f8fe0a5d8f4027584035d3a374dd6fcd69e26ce90a956544b4

                                          SHA512

                                          de0f8f3b09af554e099037f4cc774d34035bb65eb8e0d08d279cf3a08ce5a6951bf47afa3695f75ee097adbff3ee84295bb9d9bd9885149d3fb1954c4f6dd343

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          0c2737fe69fe50e8a4d01b04be405a5e

                                          SHA1

                                          b9b2d9b7473b00656df6dc884341c971744439e6

                                          SHA256

                                          eddd69c3bd738a3a94364811907d627c29b116c9edd6ac131c94ede4e49ca9a6

                                          SHA512

                                          e8e855a78a3f9459c3277073e51ee0ea095e1fc60bf7e5d0dafa60dbf2432e419a61a6557c0e431fb70e449469eff0cbe74504257db877c7113f508df62c21b7

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          a149d22af2fa930fdea213cfaaf9ed98

                                          SHA1

                                          3e6268c79b2daa9272a4dbd98085c14b6c1ec2bc

                                          SHA256

                                          b6714c5c176ccca4eda271464150d694c93eee17d5f2aed1384f1d3095c19c4c

                                          SHA512

                                          addde54fb0674e4732215585ce8c553daeaf337e29f48e12f05cf9895b33e7025936aa86c1a30141aed67ce115095b8d2ec33bbe76e471a516eeebf837a0af85

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          14KB

                                          MD5

                                          2610b84ea72ff6197f71b72c3d39d58e

                                          SHA1

                                          695a6d1541c34116bfb9dda8f5aad806e34a6ffc

                                          SHA256

                                          8b2b63a1e0e18febb33a912291089e741a219bf463bb5967d34979c526039f04

                                          SHA512

                                          1d495fb121391b4e4dc8fba7bf16f684581893efb672c086215854cb3756073306a76c72c2178f58e09c4c47fda7725b33c69e31e956641e71d29407f46c4d33

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          9KB

                                          MD5

                                          11aba277ad576a75970e2886a20697a2

                                          SHA1

                                          ade9430276e517bb47d4dcea2c8664614cb792c0

                                          SHA256

                                          f85845d442fab1e80d070a5f146ad061b2dc64ab57944684f0407533dd76f69d

                                          SHA512

                                          036044d8600543a2bbcd3a4ac0e2ad1289c758f8658beb1e17caf3d19d26e8459166ef96cd153b9d81635e9f22b150f711c8ddb4cba91a591d326868e454b1e2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          1a59162bfc8a4e5844bc1d1e68ffd4aa

                                          SHA1

                                          535a7aac64b905742b0a2bb78b59bedd54a824ac

                                          SHA256

                                          24c78720ec6f97627525274126dda790d777582c95e77d0c094648421f5a03af

                                          SHA512

                                          1d347a3c2a56e8510dc263d44bca97b734eab017abe2fb634319471f7f0c1ed3c43054621ffde36c3773a7bd3021777d2b0c3f216d60687ff2bdcb810a43e764

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          584755ef82d3446c57fa0ae63aed3bda

                                          SHA1

                                          25912760f9e691455d3a0ec441222747b9d638b6

                                          SHA256

                                          63b3d2aafc72daa2444d69be96bb94f093df6c5117f5a9134d5f6f3b30debd62

                                          SHA512

                                          970b6e348644a2491603055deda9741f997ddb3add89f8879f076cc67b5d13b1a4d00fb76ba4dc48652495a9d75d1ed5e3ffa20af9262567230ffd030c2fc9ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          eef291298880518d2f3e315592abfa21

                                          SHA1

                                          d0ffd5d74869a9e1f2ccfa57f5b2d70647e387f4

                                          SHA256

                                          e980c39205c7c0811e773fd200e6f8d59254e876ac58941d2d1ba309c2538e59

                                          SHA512

                                          4bf64888cb169f3ebcacae57b9eb6bb7245fd9e550874e6d9f6bea72fde0f894525b8a18b82142cbfe71574d277523b889db68bc144e318fcc5336532d90ab45

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          f7a78a4778d2515aa86364e4e14cf972

                                          SHA1

                                          0bf485d0374abdca6f657f81a8b9aa25adbe7114

                                          SHA256

                                          3b0e6090ee894f6acd79429a34370c2e85157d5434a1d50fe4a99fa1f534df10

                                          SHA512

                                          3e442d97e0daf2bd4197a9d4942f432a02825432e3c26722cf9508a9777547aa8d00f87c87ccdd475e664e73739a511c165df341356a5015d7d314fbed8bc6ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          03b75f7fa9d9d6d8f3676a815b098f3b

                                          SHA1

                                          630e08135ba2d6e41cd5d0a88628f43daa9aa9ce

                                          SHA256

                                          03ab61a7c70625acf4c0971815c7467f3de7f5099df0613191de65a0f40016c4

                                          SHA512

                                          585725fccfee3fa03cf47d66b6e5e86a6c6cc94ceeaa3e0498bac17ccf79c833af00de90f60f7d1193c4b2e95f1e0cd2d45f83add62f037e84ae80b0bf2caa77

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          440b1cbbde6b986062cbcef5637599d5

                                          SHA1

                                          e26d66b1eed699bb3ba58f48931ebd70895de166

                                          SHA256

                                          7eec5ef67559a607db9d26a5e6741d5868a777183ab38b9c73dcd1af936111c6

                                          SHA512

                                          37edd9f199429b9268e528a6a14df8bc8311bdfd056da3163bcbbcf4331fe629c603365e7228f3c3e3ffd070102b2f915b12d25b05c929ca8a3c25d4b031a5d0

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          ec57fdd0a4f53700ec05205d053b4f57

                                          SHA1

                                          5e03819a9d3e23142510334aec26ced0bccdc33e

                                          SHA256

                                          2a2d828e575d2425aa27c97a5aae211bf14b3ee9f03415bdc3494c7734761eff

                                          SHA512

                                          503ecfbddc803a2f03c61493ba64c73627121379618251220f52fe4da0ef45f010ed6306f0f14506a392d7ccb79dd8bfc2a344594b05b4c8db524a2bf36b84c5

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          1bd6a02835c0b1255fea7fdd1cbad2a5

                                          SHA1

                                          be5258fb6130558439a1f8c381d1159b419a9d3c

                                          SHA256

                                          dda2c20a8465864594af631c2305b45b909efe16eac4840b46b34e434fc2b3cb

                                          SHA512

                                          4f89d81dc49f7071674f9c03a5075877c2825104573c10252aa49b270239906f49cad761e49b1d011fdf366b2a1d5b25ef836eb61806d2b88e4e12ea83b882a9

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          75585eb2772cb4139de5a6808b7b9ffd

                                          SHA1

                                          c9b5c676ba3acafaf4fc8d5d34028bde07d7b32e

                                          SHA256

                                          6e0d704a1342ddb7ae2aa9f7c40de3ee3d76550d9ef4878a1a4d4737604c41a8

                                          SHA512

                                          c13f99472901ba2211bd124d88eda2eb5c12bd7232f6763c32ab322e92d2f8ac3fe1ed27173922f787b2c7cd11e798f289efbf0393bb5b0e48bfc79b6313010d

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          4deba0e0da4013bd314e7536a6ee9761

                                          SHA1

                                          a046d9a741e1c2b2f6f479b4cdacea109ac8fbab

                                          SHA256

                                          1d0c40b9a0ad153f539c67b8a89d59db598ab7bc0c63cf2ae0fde5bf24e2cf74

                                          SHA512

                                          726e0b9bd92a56dee5d696411a2c175df0f4c0995053990465e775a022f57be4fa4317b5bf53d3cf9ef9a49ecb8f9732d173e237e8beb1a4d4196d4996dae8ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          50d227d6f0deb08486fe0ecf8172c176

                                          SHA1

                                          d19d91f86a2b72175a0114cb9dccde40db142939

                                          SHA256

                                          8c33cb66ea4ca9ce5e7c615446204e269d23a8d8477ef945d5e8bbc50979751b

                                          SHA512

                                          44c0a21b0a1c99796fd57d9081500b67d5f56f99ce916cbbde233fcac43548670261fcdd34411d3164f4299379502df039f428343fd8defbf5d905d9f08b68f6

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          73be5987512bec592f9a05855ef1da27

                                          SHA1

                                          c274b15b042a9a6ae48620b26238316756a26b06

                                          SHA256

                                          f44b1728e698538fd0b27e4928caa713cb9deba11a36c634529782efb61e360b

                                          SHA512

                                          33616eb63e90b6b7c0f2ae9f064c3ba43755c6b4fc9592c3d152826c55f3e62c98c5e8a5caf41fea1da495850274790915e4a4c385b54d8682f8d2a650fbeb2b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          9053c829d91a920f3284933b6aac267d

                                          SHA1

                                          75c92aab5d6f37e7d3584e04f0fb3804859d6f38

                                          SHA256

                                          a74f7ec2ddd3c1f79ddaa8ac9938bfc8a738418956b05a66123135ec0f6208b1

                                          SHA512

                                          cb7699781276665204a4aae90b93b0e92665d956c90848cb404249ef8492de5a4f638e80c752ed4519c8dd013bba6217b277a074b3c98997af3613ac68a14528

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          f1ba6dd0a852a9a4c5b422d5c50f898c

                                          SHA1

                                          4784aee26505cfb9edca59e11b261deb1ebc8c9b

                                          SHA256

                                          27637c4d59535b78190178de48d214cfef8ddcfe064eb994df03b2524781a9a6

                                          SHA512

                                          62874f55b53009ff8d94f4f231e17dcd6025a7419952c8f6db5af61afb7778155c1c7c56732f3ebe6dc29ca67d2124be994eac6fce099033e8dfe53ac58c1a75

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          9KB

                                          MD5

                                          6b6d08ffeb388a357c5e29b13d7430f8

                                          SHA1

                                          acba67d4adb84116ead6509bb0822ee73928da7b

                                          SHA256

                                          2f5a87721d644c078fb0ba011a7f0e5e75e56606afb7df5ffc23f23712aa42e0

                                          SHA512

                                          ffdb7e208e82b7a11efa8cce76df9afbe7aaf1e08ad4d88adac84a600f8c7cb2d822bc6bcaaba6d8819b29cb422c88b17959c6f6dc2f21bc19b3232ccd92b5b3

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                          Filesize

                                          96B

                                          MD5

                                          1a991c4178c4ce41331e2a901fda8994

                                          SHA1

                                          3e4323995cd761b2529dcf9392da3ead6d3aaed2

                                          SHA256

                                          e9cc7bf83d722cffd3aeed8b658cf62f95170ea7a7229703343b5b83c227a61e

                                          SHA512

                                          72a59ebbcdd9ad1d42988f22169707ff42876316cacc0b06e2506fdaeb59c63dfa872a1e037b5ff8012660fcfeba7d1f9e25e569b55992a0b8978393e94268ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          116KB

                                          MD5

                                          9b5ecf13a57edaa21931a8225406e925

                                          SHA1

                                          bfbd4c2c0018f96f5beb56be2aa0992a06d8cbe3

                                          SHA256

                                          50b74e4eb20091690ea25299c41e7c4edd9fddaa006c910800503887a6ace1de

                                          SHA512

                                          925a1b2256888741c1a7db43aefd51b29e48869d8831ca4d2afbae95f6009f44437d084c811117b9e059abef7e67569b7a214e514f6ffc9c96a8d575a23c22f5

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          116KB

                                          MD5

                                          e05fe8d18df183d42e2e3d36ed22600d

                                          SHA1

                                          f1efec8742fb8d7db5486c719110338411eaa9c6

                                          SHA256

                                          25862d1842c134b271ac75be63fd25c4b2f723ec8f392814ad436f0ad26a2b91

                                          SHA512

                                          1a10cb5886cb5b0a45a472373b42fc245628f95227498f70dae734f870dcb00a3bfe77864c0d7127d6b9d4a1f4a8b76c650c2dfb7b93d21aa0e1c0ba9bc8ebf1

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          116KB

                                          MD5

                                          c779183e23fe76714bbddee3b9f948b6

                                          SHA1

                                          858f585c79f4c17e8785ad81c45e05d1df23a1cb

                                          SHA256

                                          21541e73118b30bff3df9c466d6418fd20b5effd1648c80c85cd73a8b8ea56df

                                          SHA512

                                          7ca9b36c19751538e1961400776aecb66a2acf6d587a3b226539afe3998dee1f7fb0effafd800199fe62730bdf463a6e7500c34fc43f97cc7263fb778b72637a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          116KB

                                          MD5

                                          5682a746b2dfa36ee4b23aa33b59bb6d

                                          SHA1

                                          165d7bdd9486fd56f4cf9104fdb11651ea755714

                                          SHA256

                                          dfa73a7ceec5ab0b51129bb5581987843197f64cbad1a4bd9fba554419d52501

                                          SHA512

                                          7842581003aecd79f13d185c7591bdb653b1360990c41a1abedc6dabfca9d43563fb9db524e0050a7d6d8976924a5540c18af6651bb5834f8671603f2624e6f0

                                        • C:\Users\Admin\Downloads\solarafdh3wy.zip

                                          Filesize

                                          11.7MB

                                          MD5

                                          5ddea5141ed88d618c761f010d6353c3

                                          SHA1

                                          e7332378851fa6f10c2ff7810958209aeed8c025

                                          SHA256

                                          d8a54bd7f053c08b287c1689ea241c3585ce171282a8870df250adf514993bf6

                                          SHA512

                                          3bcdceee67c647693b80d6a7cdfc6a1f1fdc626ed847f00ac02bac62e4dfb60cdd28b9cc30a4ea2b8de7353fb93c75819df3f2291fdda6028d69d260108f58be

                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD.rar

                                          Filesize

                                          11.7MB

                                          MD5

                                          867a83c560a788bf31991395b6ff62a3

                                          SHA1

                                          1b9430a986fc3a14d74b8a89e5935088727f0257

                                          SHA256

                                          e75fca4d227ff814676e5216bc2010cdf3d24d5095ff13165e3ef8a20f783ab6

                                          SHA512

                                          be91472453b6d4914d154a1ae4e0f41f84215db0131320c100f9daec809669d359429636e2db31a2c1ec5ca6ac87d6eb49ff9fdafe41a57c1e5a26f10ff6f4db

                                        • C:\Users\Admin\Downloads\solarafdh3wy\SOLARA3VUPD\Solara.exe

                                          Filesize

                                          526KB

                                          MD5

                                          51749a96a9d6c32d40c490e370f1c6c5

                                          SHA1

                                          e4c5b079a557e452b19c24ee8e09d45c0d87df23

                                          SHA256

                                          7494b75566c33c247a381887f26054acc2ea068c2485d5d0cef2fca6812e70e6

                                          SHA512

                                          e4c20bd1bab6f0ef9cea473498d108eda1cf01a29c59da986c350a0834b8fc2d892f6a8810268a2233091d266d4adc4d79699946d974f38672f9815f3b1116f8

                                        • memory/4768-511-0x0000000000400000-0x000000000045C000-memory.dmp

                                          Filesize

                                          368KB

                                        • memory/4768-513-0x0000000000400000-0x000000000045C000-memory.dmp

                                          Filesize

                                          368KB