Analysis
-
max time kernel
899s -
max time network
772s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2025, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
BootstrapperNew (2).exe
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
BootstrapperNew (2).exe
Resource
win7-20241010-en
General
-
Target
BootstrapperNew (2).exe
-
Size
2.9MB
-
MD5
f227cdfd423b3cc03bb69c49babf4da3
-
SHA1
3db5a97d9b0f2545e7ba97026af6c28512200441
-
SHA256
cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
-
SHA512
b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
SSDEEP
49152:xlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:DZXfHaFoCIvqkqXf0FglY1XOe97vLn
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002b086-982.dat family_meduza -
Meduza family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
pid Process 4004 powershell.exe 5672 powershell.exe 3048 powershell.exe 3064 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Executes dropped EXE 2 IoCs
pid Process 2424 Solara.exe 4904 Solara.exe -
Loads dropped DLL 4 IoCs
pid Process 2424 Solara.exe 2424 Solara.exe 4904 Solara.exe 4904 Solara.exe -
resource yara_rule behavioral1/files/0x001900000002af1f-124.dat themida behavioral1/memory/2424-129-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-131-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-132-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-130-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-246-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/4904-334-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/4904-336-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/4904-335-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/4904-337-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-353-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/4904-359-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-360-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-362-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-364-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-384-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-387-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-396-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-428-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-439-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-720-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-731-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-747-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-768-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-779-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-781-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-793-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-808-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-819-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-821-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-823-0x0000000180000000-0x000000018109B000-memory.dmp themida behavioral1/memory/2424-843-0x0000000180000000-0x000000018109B000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 pastebin.com 56 pastebin.com 1 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2424 Solara.exe 4904 Solara.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-cs.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-el.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-ta.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Part-DE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-gl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-da.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-de-ch-1901.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-nl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-pt.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1039153021\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-de-1996.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-te.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1332459417\crl-set msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_247354308\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_2041502312\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-lv.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1332459417\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-hi.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-et.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-ml.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Part-ES msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Part-NL msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-eu.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Filtering Rules-CA msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Part-IT msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-bg.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-kn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-mn-cyrl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-mr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1039153021\keys.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1039153021\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Part-RU msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-cy.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-fr.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-la.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-nn.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-pa.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-sl.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1039153021\_metadata\verified_contents.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-gu.hyb msedgewebview2.exe File opened for modification C:\Windows\SystemTemp msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-en-us.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-es.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-sk.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1332459417\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_2146586914\manifest.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_247354308\Microsoft.CognitiveServices.Speech.core.dll msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_2041502312\protocols.json msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-en-gb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_247354308\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\Filtering Rules-AA msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\crs.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\ct_config.pb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-ga.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-nb.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_368906656\hyph-ru.hyb msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\LICENSE msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_659157230\manifest.fingerprint msedgewebview2.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3508_1675602519\kp_pinslist.pb msedgewebview2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133845119415448711" msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4004 powershell.exe 4004 powershell.exe 3048 powershell.exe 3048 powershell.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 5672 powershell.exe 5672 powershell.exe 5672 powershell.exe 3064 powershell.exe 3064 powershell.exe 3064 powershell.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 4904 Solara.exe 4904 Solara.exe 4904 Solara.exe 4904 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 4904 Solara.exe 4904 Solara.exe 4904 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 4904 Solara.exe 4904 Solara.exe 4904 Solara.exe 2424 Solara.exe 2424 Solara.exe 2424 Solara.exe 4904 Solara.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3508 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4004 powershell.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 5272 BootstrapperNew (2).exe Token: SeDebugPrivilege 2424 Solara.exe Token: SeDebugPrivilege 5672 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 4100 BootstrapperNew (2).exe Token: SeDebugPrivilege 4904 Solara.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5272 wrote to memory of 4004 5272 BootstrapperNew (2).exe 82 PID 5272 wrote to memory of 4004 5272 BootstrapperNew (2).exe 82 PID 5272 wrote to memory of 3048 5272 BootstrapperNew (2).exe 84 PID 5272 wrote to memory of 3048 5272 BootstrapperNew (2).exe 84 PID 5272 wrote to memory of 2424 5272 BootstrapperNew (2).exe 86 PID 5272 wrote to memory of 2424 5272 BootstrapperNew (2).exe 86 PID 2424 wrote to memory of 3508 2424 Solara.exe 90 PID 2424 wrote to memory of 3508 2424 Solara.exe 90 PID 3508 wrote to memory of 1808 3508 msedgewebview2.exe 91 PID 3508 wrote to memory of 1808 3508 msedgewebview2.exe 91 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 5256 3508 msedgewebview2.exe 92 PID 3508 wrote to memory of 6048 3508 msedgewebview2.exe 93 PID 3508 wrote to memory of 6048 3508 msedgewebview2.exe 93 PID 3508 wrote to memory of 4644 3508 msedgewebview2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=2424.4900.171396651665015463993⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x164,0x168,0x16c,0x140,0x174,0x7ffe6792b078,0x7ffe6792b084,0x7ffe6792b0904⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1660,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=1672 /prefetch:24⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1844,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=1992 /prefetch:114⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=1984,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:134⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3608,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:14⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4828,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4820 /prefetch:144⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4340,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:144⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4228,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:104⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4740,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:144⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4272,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:144⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=788,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:144⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=5008,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:144⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=764,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=4876 /prefetch:144⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=4968,i,2895279539165934542,11391063608117156788,262144 --variations-seed-version --mojo-platform-channel-handle=2968 /prefetch:144⤵PID:2876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (2).exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b037ca44fd19b8eedb6d5b9de3e48469
SHA11f328389c62cf673b3de97e1869c139d2543494e
SHA25611e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197
SHA512fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b
-
Filesize
50KB
MD5e107c88a6fc54cc3ceb4d85768374074
SHA1a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6
SHA2568f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8
SHA512b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe
-
Filesize
14KB
MD52a0506c7902018d7374b0ec4090c53c0
SHA126c6094af2043e1e8460023ac6b778ba84463f30
SHA256cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a
SHA5124a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b
-
Filesize
14KB
MD5610eb8cecd447fcf97c242720d32b6bd
SHA14b094388e0e5135e29c49ce42ff2aa099b7f2d43
SHA256107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7
SHA512cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331
-
Filesize
5KB
MD58706d861294e09a1f2f7e63d19e5fcb7
SHA1fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23
SHA256fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42
SHA5121f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f
-
Filesize
171KB
MD56af9c0d237b31c1c91f7faa84b384bdf
SHA1c349b06cad41c2997f5018a9b88baedd0ba1ea11
SHA256fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0
SHA5123bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff
-
Filesize
2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
Filesize
31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
619KB
MD591f5d6abf1fc57cb3e6222f10c51bff1
SHA1fd1183ba06cf793f12de674d8aa31bd8bfbe1172
SHA256c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840
SHA5124538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a
-
Filesize
21KB
MD5846feb52bd6829102a780ec0da74ab04
SHA1dd98409b49f0cd1f9d0028962d7276860579fb54
SHA256124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4
SHA512c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9
-
Filesize
280B
MD57b030f3ea54cc1ca230877a7c1dfd3c3
SHA1aa899fe5f777b0db1f0a51d9fb8ffe5a43665d35
SHA2567f23fd18a16ecfef902ee0ceada945cdca5fdc0116ae7e2e1b4533822cc5c6c0
SHA512436045210d36fbc78f0cc1d68607122f5debee8a3c89b2ba0425fcf77fba4ac7fc4935b0648d261e8405bf28efaf44c53eb9d6e7a868fef7e92f5ecb22f4dc56
-
Filesize
280B
MD570e6242ae9f273a092463ac44c971f63
SHA1df68cf49cf3de3a758a187f521db830d1045a5e9
SHA256fe4bbf38512ab7ecf73566bc368e6981a39df0651a1f47de7178646e17ff3f89
SHA512d3c12e9a776cb1ea18d6e283bc67845510aca4c254fd6dcf24aaba521e961389d1c09fbbfc9db185d45cb28e372d200c223d1e42a0dc7d4c4fb869a4e672bee0
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5680c8bb9c0c88d45ec6ffd8dfdd6b1ca
SHA1a3ff0092164bc15176aeb9a24a9ccb19922be3e1
SHA256250a40935d811788992864c3c67b34277d19e6de64a9f43db72aa4869afae5a1
SHA51213667fe0f94c8db3d7c86bba828634a7864861bc6b0b08eaa02672488c68b9088aa8a6dac12da084316800ed9539e4f4b7f06a10bf33949247d6c3c5386d90f9
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\Network Persistent State~RFe5914e6.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD588b7a042a50305781bbd6fcfb3f46333
SHA133ae42a95983029081a7bc01d63c358d677d1de8
SHA2564998905c20a7e44e7f41e1a29feb6552821606eab967b50252a7bc164cf38041
SHA5126e4113a50281bdf0226f52fae239e5a440a3413a184bbade2dd9c0540a2e53e98ba96f3356179a5118e71f4a93a8e0be06daa97df4c3199cc3a8683f13fa1776
-
Filesize
6KB
MD544c549157e0ebf2beb700946a94c4185
SHA1a96e71eb7cc22b9b279a31445188a087890abcf2
SHA256f3817dc1a6e2d4898b51f0d2a758678005ba64d9296e90a1e87bbd66d013e367
SHA5122b7f6010266934ded8708ecf2be7b70b2f9ae6f6143bd817315be314cd995e42a980afd47fbc5447bd5efd02dd3eb02250319a5950f7fc0bf7bfbcbb6aae2aa7
-
Filesize
6KB
MD5c3617073ddf6792dd6858e6a8848d0b2
SHA167b5b82958835807f95ce1c0107bb7d8627703f6
SHA256594846836957b0d0a045bd479d38adc9c45a5bd19e0888ca5008e2a290bb8988
SHA512f9341dcc4ac89c35d8efc930a0565e256c53d374801f8fac041f6a2c01cb2f4592c116c2c8764e3f010e04b1c6144247590131a6db70124f4f2a17c05e881a17
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD572dc181f20a387cb6e7c2bf108508c1c
SHA1b17bff879b92d504a90960e0c6fa6ac73eff56a9
SHA256baf4c9c2d4be6ca73d2b01cc5a20c8aa544b686f7d959df6ace4fcd2d4a3fa70
SHA512fc05202146f8e81e8d60e7b4fc48793fab43f8e7fd95eeecac966439c78344c551571eddb60b76bfa3fd1644c57dce19a2c23d5129709cbb63632f5743dc9d56
-
Filesize
2KB
MD5050db11fbb9b888c11cc4864815a5c76
SHA1b3fee1f0b6e2bb151c2089ce8690e0e598325775
SHA2564b9a099bf78403567dd8704e060d236c7ac3e3c4580c98e6098e4326e7a90f1b
SHA512198ad774f51b837ea1fb20f1227a54542035c8927467938d2fb5b9599740c9a3459e50764b483764ae42d05059b0994c2683eec35b28d5f2d693bf0b0da0c9db
-
Filesize
3KB
MD5f4b03c217be63f22ee22e40d4090930e
SHA147bdeda5354fe23c208c80cb48137494a92497dc
SHA256442651ad3ae54ce2f457a056a8784f0fb595497742a10556218d02f1ec8ee820
SHA512a6c2f3e62e2629f25efe1b63546e95f95b27a6082d3879b98e010030c4405fdf85537c547c4f163c093545c2336aea909154fe4a8a1e8d0f3952f6304e65036d
-
Filesize
4KB
MD51aac94fb0407316a9891984c25b77adc
SHA1a18cf9064260974b5f59df5bb7fd4323511a3281
SHA256aa2b85959953de33be0f04485b275d939c2bfd61f8364a8ad22664aac97d3b2c
SHA512b2a3a1810711dfe76dc13ef435dcd015206f10005b67bf22301bef9e4c2b5884543add45d56a6a38037958d197a110d25cecb346603b85bb8abd1ae47c13adca
-
Filesize
17KB
MD58f2862eddfb8b17d6023d1c5573fbf79
SHA1f0f279430dbbfb00ed5b0bf1d9789e77319ecd88
SHA2560b58c1b70925896f78e2047afcd3723a3da7d4abb068824acc83e470fcb20a25
SHA51249dffa65baf20ca3e31adba63743056d1511e99aa4074a0f7a455abab3286ed7ed7f6505ca9a0e02afafa4318cfaea8e4e099ac4abc3a52e2ebbb9de65757445
-
Filesize
4KB
MD5c315f375051a30aa8404807a371a1e1a
SHA1096c1f3cfbc72edbcb3d7289298db1ce69b60457
SHA2560946d41df0e4060691186bf31892c19262887324a399cdf21406985add4faf20
SHA512c582adb2f0df97dc03525ec6aab35f82f2a7217537545a319805717791bb95de98dec4cd9212364c184ebdf8bee6b27f4c3b9583def48fe2082daafaa5e274c9
-
Filesize
1KB
MD5d75cba57a929510764801b9a08e78ad1
SHA1e63d5225ab89d7e128fd89455c5ba5c0c1f87ef5
SHA2564f0d881dd0f4f0ed3095be343d047e4d5e2f458ae7b07688368705f9889b9b0e
SHA51285ec747ad26a0f4f3ce738ac2eaeb33c2b1465375de66f4059523bffd6d0eaa90064487f11ef735dee03b5d0d6945e842aa6816efda214418a186bcb62328b1c
-
Filesize
289KB
MD524a3775317d74ceea8fba6f0cfbce562
SHA1fed5009eb51938d0894a9bb7aee8a97873d9b6f3
SHA256192b206ad6f649f6c8767f6a3b11d9c5354710602bf0aeb4157eea08d7461ef7
SHA512245951359283bff026aad50f7768a9aa59c1926ca7aa441c8f6a3715be34925332eeef4115a442a7841429400105d59d13937ee3aa9b80e83f1982893aefaa8e
-
Filesize
10KB
MD509b6469de61db3473bdfe04951f08529
SHA1d64b455ae9c65d8d8629a128a9f3505ef3df3555
SHA2561c435f4448dcf1784637fa9470546d12d7db2420a11cf8b5d6343439dd401c60
SHA512049d3c0e05aa3ab1d4d51cc5bd72603f47aa33141bf771cb86baedc19b8973911445ce74256ff1118483175cf4a104262a22ae9431a6366cbd1f7d28553fcbb0
-
Filesize
11KB
MD52d8bcb7c4b2dc669429bd40f7048f62a
SHA143a332c99105dcfb67893ea167879c3ce6bac8db
SHA2567a0866cdd7bd21b8b08d166edb3f6adf8c859b47988b9b3ba3f0eaafabe10ff2
SHA51215d3c7c6df2c3c75daf7ea9165687c5a6f8acac3dfe83573e20aa1bd425dde8fc659fc2c1b050b3e8ddb28358a96b9e0c083e61fa5d63ae34fa4b0bb63db8a76
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
Filesize
6KB
MD5b4434830c4bd318dba6bd8cc29c9f023
SHA1a0f238822610c70cdf22fe08c8c4bc185cbec61e
SHA256272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070
SHA512f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335
-
Filesize
6.4MB
MD5fd5fbbc0cb077f4e0cf0a95c4a4ae159
SHA1e0a5dee5b66c63888dac139eb45def546db30f33
SHA2564427f0651a65b4cb1499b9d150d47795547be6592f8fb5c0553e34be20d7113c
SHA51272f2e6dcf20e5c96fad112ad6a6e3611b8a018e2bd7340fd78c74f6b67b1bd8e2cecfec4abcfbf0024d9c682f6d50c54c27ea18ac3c1836b46896f3f45f99570
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
5B
MD5ab445d6d3a8e97ae94f0cb34f668f884
SHA16d36317c57adbe7a73fff03d3c082607bab2961f
SHA2562a72b92efc7de0a134885e6b893c0a7cdd7ed642e251ca53b3a476ac84fef727
SHA512a13b328a0725fd7c34f30fc2c8851ab1bf7ab54bacb37c857e40e389fdbe96db2b58edf08bbde79b4eb32b7b8a046be7bfe8a844867a2e73486b738cf83f07ac
-
Filesize
3KB
MD55733c3b9a719d2ded8760ccebeffd150
SHA1971d77338f9745f1977f5593878cd74f70680a68
SHA2565b18dcba1a77565d3d2fae4b2a5f5692dc12fa02844959ed93f7e5a0982824ab
SHA5123fd0ccd54213024bdf945dd058a8cef0cb0291982a7248fb9f02acc31d4e1904ceb1eff1285a0a9f4608b578adf198e8209c201fa35f24461f05349a6b3a93a9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD54093e5ab3812960039eba1a814c2ffb0
SHA1b5e4a98a80be72fccd3cc910e93113d2febef298
SHA256c0794e2b7036ce5612446a8b15e0c8387773bbc921f63cf8849f8a1f4ef3878c
SHA512f3555b45aa1a1dd5214716dc81a05905c4ecd5a3e1276d35e08c65623ab1d14d469b3b576a5d9638264c1222d73889d2cc1ee43fb579d9ca3fcddd9f557cac7b
-
Filesize
944B
MD534e3230cb2131270db1af79fb3d57752
SHA121434dd7cf3c4624226b89f404fd7982825f8ac6
SHA2560f162f27548a84db1638bcf46d03661b5bcb3032e765fafdb597cc107639ba39
SHA5123756cb01e82dbda681b562eae74d0b8ef8b3787b126119a51a92c51a78204a7805b9bdd60c00c50a3be23b843e78bb153b656540767069f739ce421b9bc02335
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
79B
MD50284fa0391784125ad3b12be8c92c6ae
SHA1e4fe938288c6804d9c79947ad2e39939a595e9f3
SHA256789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0
SHA5129dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
80B
MD59e72659142381870c3c7dfe447d0e58e
SHA1ba27ed169d5af065dabde081179476beb7e11de2
SHA25672bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2
SHA512b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01
-
Filesize
114B
MD5e6cd92ad3b3ab9cb3d325f3c4b7559aa
SHA10704d57b52cf55674524a5278ed4f7ba1e19ca0c
SHA25663dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d
SHA512172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8
-
Filesize
102B
MD52c2e90b63e0f7e54ffc271312a3d4490
SHA14eb9d97e1efc368420691acb2e6df1c61c75f7e4
SHA25672dbb7d6b647b664ef64b6a14771c2549c979b9c57712f3f712966edb02d7b2e
SHA5129ec9e8a34cc56a694ac845a4344600b479d11347ec5279d955ab4cf55590440f3491e0a1b635ddb9db821630885e5fd63c269fc2a5d1abd0a0d0062ae21dea8b
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
70KB
MD5ffa9db945f0f0c15b8bba75a6e064880
SHA149217a9d5bb7a868464403b4e3c82e80df53456c
SHA2565487ee44a4cd706d0086522e90c59c76cdf2ac68ce506fd3eae6054b9220c0cf
SHA512cc67b2dfbbb009dd3fdb999fe86410425455613c12dac755a3cded435cd25ca4363782d70f3b7bb7c0fdd63e2eb649ae6a4053d929f463b646b43d7dbfda79c0
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656