Analysis

  • max time kernel
    45s
  • max time network
    39s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-01-2025 02:39

General

  • Target

    Bootstrapper.exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:1732
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe" --oldBootstrapper "C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe" --isUpdate true
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\ProgramData\Solara\Solara.exe
        "C:\ProgramData\Solara\Solara.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:6044
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=6044.4688.11036689743509922442
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x128,0x7ffc8a163cb8,0x7ffc8a163cc8,0x7ffc8a163cd8
            5⤵
              PID:2484
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1932,4066561383488399165,7610286802783505561,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:2
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:848
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,4066561383488399165,7610286802783505561,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2028 /prefetch:3
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:5712
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,4066561383488399165,7610286802783505561,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2484 /prefetch:8
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:1724
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1932,4066561383488399165,7610286802783505561,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:1
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              PID:4128
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,4066561383488399165,7610286802783505561,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=3348 /prefetch:8
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5932
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:2756
      • C:\Windows\System32\CompPkgSrv.exe
        C:\Windows\System32\CompPkgSrv.exe -Embedding
        1⤵
          PID:1088

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Solara\Microsoft.Web.WebView2.Core.dll

          Filesize

          557KB

          MD5

          b037ca44fd19b8eedb6d5b9de3e48469

          SHA1

          1f328389c62cf673b3de97e1869c139d2543494e

          SHA256

          11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

          SHA512

          fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

        • C:\ProgramData\Solara\Microsoft.Web.WebView2.Wpf.dll

          Filesize

          50KB

          MD5

          e107c88a6fc54cc3ceb4d85768374074

          SHA1

          a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6

          SHA256

          8f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8

          SHA512

          b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe

        • C:\ProgramData\Solara\Monaco\combined.html

          Filesize

          14KB

          MD5

          ee2ef47ebd1b8572818e1828a1a9a09a

          SHA1

          1b429632ab7628cc4c0ab3a4e093d42f24822af5

          SHA256

          1384b03bc607817d9158e74d5b1289f7f29e50628eb903ad46ab857c27d18951

          SHA512

          ef221c739c959b03b414abf25fc18349b80dccae55d4c972dc40622deebe9c5501eba0508e6425a35ba34c24738ae18cec788c95516d948d5e4cf4d888e6ec6e

        • C:\ProgramData\Solara\Monaco\index.html

          Filesize

          14KB

          MD5

          610eb8cecd447fcf97c242720d32b6bd

          SHA1

          4b094388e0e5135e29c49ce42ff2aa099b7f2d43

          SHA256

          107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7

          SHA512

          cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331

        • C:\ProgramData\Solara\Monaco\vs\basic-languages\lua\lua.js

          Filesize

          5KB

          MD5

          8706d861294e09a1f2f7e63d19e5fcb7

          SHA1

          fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

          SHA256

          fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

          SHA512

          1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.css

          Filesize

          171KB

          MD5

          6af9c0d237b31c1c91f7faa84b384bdf

          SHA1

          c349b06cad41c2997f5018a9b88baedd0ba1ea11

          SHA256

          fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0

          SHA512

          3bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff

        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.js

          Filesize

          2.0MB

          MD5

          9399a8eaa741d04b0ae6566a5ebb8106

          SHA1

          5646a9d35b773d784ad914417ed861c5cba45e31

          SHA256

          93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

          SHA512

          d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

        • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.nls.js

          Filesize

          31KB

          MD5

          74dd2381ddbb5af80ce28aefed3068fc

          SHA1

          0996dc91842ab20387e08a46f3807a3f77958902

          SHA256

          fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

          SHA512

          8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

        • C:\ProgramData\Solara\Monaco\vs\loader.js

          Filesize

          27KB

          MD5

          8a3086f6c6298f986bda09080dd003b1

          SHA1

          8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

          SHA256

          0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

          SHA512

          9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

        • C:\ProgramData\Solara\Newtonsoft.Json.dll

          Filesize

          695KB

          MD5

          195ffb7167db3219b217c4fd439eedd6

          SHA1

          1e76e6099570ede620b76ed47cf8d03a936d49f8

          SHA256

          e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

          SHA512

          56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

        • C:\ProgramData\Solara\Solara.exe

          Filesize

          613KB

          MD5

          efa26a96b7af259f6682bc888a8b6a14

          SHA1

          9800a30228504c30e7d8aea873ded6a7d7d133bb

          SHA256

          18f4dca864799d7cd00a26ae9fb7eccf5c7cf3883c51a5d0744fd92a60ca1953

          SHA512

          7ca4539ab544aee162c7d74ac94b290b409944dd746286e35c8a2712db045d255b9907d1ebea6377d1406ddd87f118666121d0ec1abe0e9415de1bba6799f76e

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

          Filesize

          152B

          MD5

          a93febc3218c86fda321a29cc5551380

          SHA1

          213fcd688206e9602a32444d83dc90189dcd17e4

          SHA256

          234860f76faa2a65e3c28a4157b56ec7fcb5d2a48e53f8982f792920bce43136

          SHA512

          fa0a097235181a6a5f36d0d95ca043360c52cf5ce1aec5f426d5c1b1942e66117e034dc73e10c8fdf60982f61e4f6fb4a69e1d75e4de8c1ffc9877a4eb3fb57e

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

          Filesize

          152B

          MD5

          7181eb1cb55ac1c10646e4c737dc0f73

          SHA1

          39d331146871fd82caf4d4b42bfef1e4c33ef7e0

          SHA256

          464089bf7ecf0d3fc9a90578465f1cae40503606f95d6f18d60475684be653c8

          SHA512

          09e9183d027ed0b7ae91600be15ab1cbc5bfc3950c0223dd0e20a9b0fdb130de1dbd4b5f56422e89c4be50b0674a96c25501615162a94e193a3da1c547c18378

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

          Filesize

          20B

          MD5

          9e4e94633b73f4a7680240a0ffd6cd2c

          SHA1

          e68e02453ce22736169a56fdb59043d33668368f

          SHA256

          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

          SHA512

          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

          Filesize

          41B

          MD5

          5af87dfd673ba2115e2fcf5cfdb727ab

          SHA1

          d5b5bbf396dc291274584ef71f444f420b6056f1

          SHA256

          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

          SHA512

          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Sync Data\LevelDB\CURRENT

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\data_reduction_proxy_leveldb\CURRENT

          Filesize

          16B

          MD5

          206702161f94c5cd39fadd03f4014d98

          SHA1

          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

          SHA256

          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

          SHA512

          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

        • C:\ProgramData\Solara\SolaraV3.dll

          Filesize

          6.4MB

          MD5

          2f7ea8031c29dbeb932e81e52db18ea4

          SHA1

          6caddaefee360abc606f7ef32fd5c816ce0791ac

          SHA256

          3566a976e565621dc41da7f01dd74e402d68c6500142ccd03e2e2f56a0ec8dc3

          SHA512

          738f6cc4600f0f7a01b5ee5c92810566f07a484c785d1e754acc03f57398b1c8afe7cc80bc5214477eb771b52b07ee4c87d1f9dfa19d7c931732b6b002b7423f

        • C:\ProgramData\Solara\WebView2Loader.dll

          Filesize

          133KB

          MD5

          a0bd0d1a66e7c7f1d97aedecdafb933f

          SHA1

          dd109ac34beb8289030e4ec0a026297b793f64a3

          SHA256

          79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

          SHA512

          2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

        • C:\ProgramData\Solara\Wpf.Ui.dll

          Filesize

          5.2MB

          MD5

          aead90ab96e2853f59be27c4ec1e4853

          SHA1

          43cdedde26488d3209e17efff9a51e1f944eb35f

          SHA256

          46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

          SHA512

          f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

        • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.14.exe

          Filesize

          2.9MB

          MD5

          ec429587b94b0288039bf1492e3350af

          SHA1

          acfd0ea4f9d321a898fed79e2e8e41e04620625b

          SHA256

          c372c94338eaaa7ab2eb7c5b6d1c9fc5658ec62da7f5fcd04e2d4c72d900ea9f

          SHA512

          79090e46a9f6e2cc4728aa4cb5e48eab80d18151ae3257cbede4d685b80d40b56e2ef57a4ab37ddf90ccd67e5cd54a728f559fcf9fc32c6971bb88468c1ec88d

        • memory/848-137-0x00007FFCB17D0000-0x00007FFCB17D1000-memory.dmp

          Filesize

          4KB

        • memory/1660-27-0x000001DB007B0000-0x000001DB007B8000-memory.dmp

          Filesize

          32KB

        • memory/1660-20-0x000001DB626B0000-0x000001DB626C0000-memory.dmp

          Filesize

          64KB

        • memory/1660-37-0x000001DB7FD70000-0x000001DB7FD7A000-memory.dmp

          Filesize

          40KB

        • memory/1660-17-0x00007FFC91840000-0x00007FFC92302000-memory.dmp

          Filesize

          10.8MB

        • memory/1660-36-0x000001DB45F70000-0x000001DB45F8E000-memory.dmp

          Filesize

          120KB

        • memory/1660-19-0x000001DB60580000-0x000001DB60862000-memory.dmp

          Filesize

          2.9MB

        • memory/1660-39-0x000001DB7FE20000-0x000001DB7FE32000-memory.dmp

          Filesize

          72KB

        • memory/1660-34-0x000001DB45D30000-0x000001DB45DE2000-memory.dmp

          Filesize

          712KB

        • memory/1660-21-0x000001DB7F7F0000-0x000001DB7F7F8000-memory.dmp

          Filesize

          32KB

        • memory/1660-22-0x000001DB7FDB0000-0x000001DB7FDE8000-memory.dmp

          Filesize

          224KB

        • memory/1660-33-0x00007FFC91840000-0x00007FFC92302000-memory.dmp

          Filesize

          10.8MB

        • memory/1660-31-0x000001DB7F810000-0x000001DB7F818000-memory.dmp

          Filesize

          32KB

        • memory/1660-30-0x000001DB00460000-0x000001DB0046A000-memory.dmp

          Filesize

          40KB

        • memory/1660-29-0x000001DB007A0000-0x000001DB007AA000-memory.dmp

          Filesize

          40KB

        • memory/1660-23-0x000001DB7F800000-0x000001DB7F80E000-memory.dmp

          Filesize

          56KB

        • memory/1660-28-0x000001DB007C0000-0x000001DB007D6000-memory.dmp

          Filesize

          88KB

        • memory/1660-24-0x000001DB00670000-0x000001DB00770000-memory.dmp

          Filesize

          1024KB

        • memory/1660-25-0x000001DB00450000-0x000001DB0045A000-memory.dmp

          Filesize

          40KB

        • memory/1660-26-0x000001DB00770000-0x000001DB00796000-memory.dmp

          Filesize

          152KB

        • memory/1660-115-0x00007FFC91840000-0x00007FFC92302000-memory.dmp

          Filesize

          10.8MB

        • memory/2632-4-0x0000020C7E3C0000-0x0000020C7E3E2000-memory.dmp

          Filesize

          136KB

        • memory/2632-2-0x00007FFC91840000-0x00007FFC92302000-memory.dmp

          Filesize

          10.8MB

        • memory/2632-1-0x0000020C7BD10000-0x0000020C7BDDE000-memory.dmp

          Filesize

          824KB

        • memory/2632-18-0x00007FFC91840000-0x00007FFC92302000-memory.dmp

          Filesize

          10.8MB

        • memory/2632-0-0x00007FFC91843000-0x00007FFC91845000-memory.dmp

          Filesize

          8KB

        • memory/6044-105-0x0000013FD2310000-0x0000013FD23A0000-memory.dmp

          Filesize

          576KB

        • memory/6044-100-0x0000013FD0A10000-0x0000013FD0A20000-memory.dmp

          Filesize

          64KB

        • memory/6044-93-0x0000013FB63A0000-0x0000013FB643C000-memory.dmp

          Filesize

          624KB

        • memory/6044-110-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB

        • memory/6044-95-0x0000013FD1DD0000-0x0000013FD230C000-memory.dmp

          Filesize

          5.2MB

        • memory/6044-98-0x0000013FD1B00000-0x0000013FD1BB2000-memory.dmp

          Filesize

          712KB

        • memory/6044-111-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB

        • memory/6044-113-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB

        • memory/6044-112-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB

        • memory/6044-96-0x0000013FD1A40000-0x0000013FD1AFA000-memory.dmp

          Filesize

          744KB

        • memory/6044-253-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB

        • memory/6044-264-0x0000000180000000-0x0000000181096000-memory.dmp

          Filesize

          16.6MB