Analysis
-
max time kernel
900s -
max time network
773s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2025, 08:15
Static task
static1
General
-
Target
BootstrapperNew (2).exe
-
Size
2.9MB
-
MD5
f227cdfd423b3cc03bb69c49babf4da3
-
SHA1
3db5a97d9b0f2545e7ba97026af6c28512200441
-
SHA256
cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
-
SHA512
b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
SSDEEP
49152:xlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:DZXfHaFoCIvqkqXf0FglY1XOe97vLn
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002b026-912.dat family_meduza -
Meduza family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3280 powershell.exe 5004 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 Solara.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 Solara.exe 2188 Solara.exe -
resource yara_rule behavioral1/files/0x001900000002ae9f-125.dat themida behavioral1/memory/2188-127-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-128-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-129-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-130-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-305-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-332-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-333-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-334-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-353-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-354-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-355-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-383-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-404-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-415-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-435-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-445-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-460-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-739-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-749-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-763-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-773-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-774-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-775-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-794-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-804-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-805-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-837-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-952-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-953-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-954-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-955-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-956-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-957-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-958-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-959-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-960-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-961-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-962-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-963-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-964-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-965-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-966-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-967-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-968-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-969-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-970-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-971-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-972-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-973-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-974-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-975-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2188-976-0x0000000180000000-0x000000018109B000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 6 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2188 Solara.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1994680866\crl-set msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-en-gb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-tk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-uk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_100701439\ct_config.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Part-RU msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-eu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-hi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-sk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1438557630\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1675352396\Microsoft.CognitiveServices.Speech.core.dll msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-lt.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-nb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-da.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-as.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1994680866\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_2083976744\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_100701439\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_2131995389\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-hr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-hu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-te.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1675352396\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Filtering Rules msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_2131995389\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_2131995389\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-af.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-de-1996.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-mul-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-or.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-und-ethi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1438557630\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1675352396\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Part-NL msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-cs.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-lv.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-mn-cyrl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Part-IT msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-cy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-be.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1994680866\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-hy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-it.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-kn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_100701439\crs.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-de-ch-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-fr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-nl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-pa.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-pt.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Filtering Rules-AA msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Part-DE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\Part-ES msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-bn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-de-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-gl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-ru.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_100701439\kp_pinslist.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_2131995389\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_1032564298\hyph-bg.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping464_448173691\manifest.fingerprint msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133845129855315398" msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 powershell.exe 5004 powershell.exe 3280 powershell.exe 3280 powershell.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe 2188 Solara.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 464 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 3280 powershell.exe Token: SeDebugPrivilege 900 BootstrapperNew (2).exe Token: SeDebugPrivilege 2188 Solara.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 5004 900 BootstrapperNew (2).exe 86 PID 900 wrote to memory of 5004 900 BootstrapperNew (2).exe 86 PID 900 wrote to memory of 3280 900 BootstrapperNew (2).exe 88 PID 900 wrote to memory of 3280 900 BootstrapperNew (2).exe 88 PID 900 wrote to memory of 2188 900 BootstrapperNew (2).exe 90 PID 900 wrote to memory of 2188 900 BootstrapperNew (2).exe 90 PID 2188 wrote to memory of 464 2188 Solara.exe 91 PID 2188 wrote to memory of 464 2188 Solara.exe 91 PID 464 wrote to memory of 4652 464 msedgewebview2.exe 92 PID 464 wrote to memory of 4652 464 msedgewebview2.exe 92 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2812 464 msedgewebview2.exe 93 PID 464 wrote to memory of 2148 464 msedgewebview2.exe 94 PID 464 wrote to memory of 2148 464 msedgewebview2.exe 94 PID 464 wrote to memory of 836 464 msedgewebview2.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2188.3140.74262198622494971753⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffe4489b078,0x7ffe4489b084,0x7ffe4489b0904⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1692,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=1584 /prefetch:24⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2000,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:114⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2272,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:134⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3580,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:14⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4816,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:144⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4052,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4832 /prefetch:144⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4880,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4844 /prefetch:104⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4948,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4840 /prefetch:144⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4480,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:144⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4124,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:144⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2200,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4140 /prefetch:144⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4060,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:144⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4172,i,4508141062957376753,7241289760928858069,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:144⤵PID:4912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b037ca44fd19b8eedb6d5b9de3e48469
SHA11f328389c62cf673b3de97e1869c139d2543494e
SHA25611e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197
SHA512fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b
-
Filesize
50KB
MD5e107c88a6fc54cc3ceb4d85768374074
SHA1a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6
SHA2568f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8
SHA512b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe
-
Filesize
14KB
MD52a0506c7902018d7374b0ec4090c53c0
SHA126c6094af2043e1e8460023ac6b778ba84463f30
SHA256cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a
SHA5124a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b
-
Filesize
14KB
MD5610eb8cecd447fcf97c242720d32b6bd
SHA14b094388e0e5135e29c49ce42ff2aa099b7f2d43
SHA256107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7
SHA512cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331
-
Filesize
5KB
MD58706d861294e09a1f2f7e63d19e5fcb7
SHA1fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23
SHA256fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42
SHA5121f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f
-
Filesize
171KB
MD56af9c0d237b31c1c91f7faa84b384bdf
SHA1c349b06cad41c2997f5018a9b88baedd0ba1ea11
SHA256fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0
SHA5123bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff
-
Filesize
2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
Filesize
31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
619KB
MD591f5d6abf1fc57cb3e6222f10c51bff1
SHA1fd1183ba06cf793f12de674d8aa31bd8bfbe1172
SHA256c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840
SHA5124538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
Filesize
280B
MD5ef6b551b3e749bd643cdb54475814d19
SHA1189822cf042084a6e4c2d41def5c41cbaaa9de4d
SHA256c6a0445ab399b1dd2353ce25c9b89b74b92b502fe413e774ab732c331827d0be
SHA51204f57e6f5dacf1d9fc17a98833eff2fb1736d79466e3d731983cda18171103790d4e648b72c2009c82b49e1ae7f90d7e006f86e81850152c05cdfd9c368a7d01
-
Filesize
280B
MD510b9929f52a24e8613f13feaef9147c3
SHA143683dde692df833dd1ab3f56c6d025ab45e1a53
SHA256ac080d5f4ae2424ba7afecb73f794321700fcdcbdee558d70a1a42d2b6dfa292
SHA512a0699b94180fa0b6c445ae6fbf033fefedce44cfd6c1d4f362836a6b7b70821114c5d4d70f7ac632069f0c4f0d2b9d9fde4c2eaf78690e842704f431daf38fa3
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD55be90645a0886c228fe948e81aa25bfe
SHA1d84b53826c301a9bbd98f93fe7659d8f7bfeb76c
SHA2565ee6cd47862e9241afd55b5bd42354bb78dbd5b5f0ac4bab1528e4b8240be43d
SHA5125f59a5b90efed22c49c306d3e1cacca4b01b639ae678e09468af228afc2ff1d3b8fd8da4cc1b24e3c1608d2b0ff9b5e0d78311939b6f2cf022faf51c883aad7f
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe58fa1a.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD53411521357c207c64e83fb7b65ca98f2
SHA1e066ce52a8f64ac4e52effcbcb8528d098d111c3
SHA2569899b9dac9234de2a11c3499d0334c6675b04419632bee2e4cc39370497b8d3d
SHA51239813514945abb78e61d83a3e61ec58298e2d7d0b3a4c743f144dc475263809bde8ec0d32814819e75225af4b16ce367eef4feb47b228424be817150f4ff6fe7
-
Filesize
6KB
MD5e853d1cee95683b42f0685db53ca1a35
SHA1b7b84d02e0c420b82dfb6e261a0c3b5516c86ebc
SHA2565075c8c77071ca191411dd11091671689b8c28423097567ac69add15e34b6039
SHA512266691aef15bc618dc0b87b99d2c329de89c811c12c9fd99ba5f955c05f262282b4edc1e9c62f85023ef6829c07fa058caa9412c9af1646b89248efea36679bf
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5412d4456a7e8ec4acc9509b8928dc5cb
SHA101f86e4e4f2c7e8e0a1e1e87c72324d70faa074b
SHA2568d2dbb14ce78402562275e89196614fc8abe24251de96932714dfb4def485e27
SHA512c0cafe4422eb071cf1c77764967478aa345c87841f3d1eac5754242c49a40f84edeb987a558be648cf21f41a0aa8d28ef5776a5d0f1815aad059feca8ff25b9f
-
Filesize
2KB
MD520a04de8212a4ecc0f49df379d8b085e
SHA1bc44b68b454f2375d06af53b025dbd04a422707e
SHA256821cacda571f841580dc172d253baa7fb5e27150be44274beedea11a655fa3a0
SHA512f2039ae1aee5eb4836de87ec627865b6c4b44a4d986984d3f9e6386f1d49d599ae361874577d37f0164b32cc485b99e48131accd05157488826615bc3f9c8353
-
Filesize
3KB
MD58a9f23de0cded19d7b11ba913e12d4f8
SHA15cc3200185575d0eb822716bd49c76b7d9bd8601
SHA256c3778e8951e586fd0a7e62579ca72c0e2ef622d125e25045c8b0640e0a74367f
SHA512a4da215c7db1d1343032e09edea5a169c511b1f55577aefd51b74618b44dca06d774475ce8b6d8f7ae9eca93dc4ab7881baf8b1e349beaa2b4ec7b0dd6014686
-
Filesize
16KB
MD5dfe8acfeff18e679ac2707a8a4822269
SHA1ac0c304475d8ecbbc1eb6ba8d3e27a212a7bd9aa
SHA256b4b3d65aebd8e79687738fa5c9932de5ea7d73fc7349d242e9bdf417e73ae66f
SHA512d82018177d57ffc1cabb2268c17df98fff897901cbd7f487dce2ec9a2af11e4948ac170bffa36de867289380e9f77918cd44cf609ce3c8fa7ca973e3aa3712e9
-
Filesize
1KB
MD5bdc48b8ab6379351a7c03a47dfefd0a7
SHA1b64308bf7f7fb4936f3e33120e01f5b900bc8e10
SHA2565c1ebb0b078e37bb4650c0516d201b1fd98a508ba435c7fa110153553f9e6484
SHA512e5d08c28ef4592055a8ce4fb2ece1ba525900269123c23925fad0e05532dd5123e042bd946b000ce21e6e4eb4c8fd9d48ff5257cdbce9a2e770a4912a88f8838
-
Filesize
289KB
MD524a3775317d74ceea8fba6f0cfbce562
SHA1fed5009eb51938d0894a9bb7aee8a97873d9b6f3
SHA256192b206ad6f649f6c8767f6a3b11d9c5354710602bf0aeb4157eea08d7461ef7
SHA512245951359283bff026aad50f7768a9aa59c1926ca7aa441c8f6a3715be34925332eeef4115a442a7841429400105d59d13937ee3aa9b80e83f1982893aefaa8e
-
Filesize
10KB
MD509b6469de61db3473bdfe04951f08529
SHA1d64b455ae9c65d8d8629a128a9f3505ef3df3555
SHA2561c435f4448dcf1784637fa9470546d12d7db2420a11cf8b5d6343439dd401c60
SHA512049d3c0e05aa3ab1d4d51cc5bd72603f47aa33141bf771cb86baedc19b8973911445ce74256ff1118483175cf4a104262a22ae9431a6366cbd1f7d28553fcbb0
-
Filesize
11KB
MD52d8bcb7c4b2dc669429bd40f7048f62a
SHA143a332c99105dcfb67893ea167879c3ce6bac8db
SHA2567a0866cdd7bd21b8b08d166edb3f6adf8c859b47988b9b3ba3f0eaafabe10ff2
SHA51215d3c7c6df2c3c75daf7ea9165687c5a6f8acac3dfe83573e20aa1bd425dde8fc659fc2c1b050b3e8ddb28358a96b9e0c083e61fa5d63ae34fa4b0bb63db8a76
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
Filesize
6KB
MD5b4434830c4bd318dba6bd8cc29c9f023
SHA1a0f238822610c70cdf22fe08c8c4bc185cbec61e
SHA256272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070
SHA512f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335
-
Filesize
6.4MB
MD5fd5fbbc0cb077f4e0cf0a95c4a4ae159
SHA1e0a5dee5b66c63888dac139eb45def546db30f33
SHA2564427f0651a65b4cb1499b9d150d47795547be6592f8fb5c0553e34be20d7113c
SHA51272f2e6dcf20e5c96fad112ad6a6e3611b8a018e2bd7340fd78c74f6b67b1bd8e2cecfec4abcfbf0024d9c682f6d50c54c27ea18ac3c1836b46896f3f45f99570
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
102B
MD52c2e90b63e0f7e54ffc271312a3d4490
SHA14eb9d97e1efc368420691acb2e6df1c61c75f7e4
SHA25672dbb7d6b647b664ef64b6a14771c2549c979b9c57712f3f712966edb02d7b2e
SHA5129ec9e8a34cc56a694ac845a4344600b479d11347ec5279d955ab4cf55590440f3491e0a1b635ddb9db821630885e5fd63c269fc2a5d1abd0a0d0062ae21dea8b
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
21KB
MD5846feb52bd6829102a780ec0da74ab04
SHA1dd98409b49f0cd1f9d0028962d7276860579fb54
SHA256124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4
SHA512c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9
-
Filesize
114B
MD5e6cd92ad3b3ab9cb3d325f3c4b7559aa
SHA10704d57b52cf55674524a5278ed4f7ba1e19ca0c
SHA25663dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d
SHA512172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
80B
MD59e72659142381870c3c7dfe447d0e58e
SHA1ba27ed169d5af065dabde081179476beb7e11de2
SHA25672bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2
SHA512b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656