Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 20:32

General

  • Target

    Bootstrapper V1.23.exe

  • Size

    800KB

  • MD5

    02c70d9d6696950c198db93b7f6a835e

  • SHA1

    30231a467a49cc37768eea0f55f4bea1cbfb48e2

  • SHA256

    8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

  • SHA512

    431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

  • SSDEEP

    12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 19 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • cURL User-Agent 8 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:1080
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4008
    • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe
      "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe" --oldBootstrapper "C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe" --isUpdate true
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3180
      • C:\ProgramData\Solara\Solara.exe
        "C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Unexpected DNS network traffic destination
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=3680.1688.14823757665204965440
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7ffc1769b078,0x7ffc1769b084,0x7ffc1769b090
            5⤵
              PID:428
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1720,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=1716 /prefetch:2
              5⤵
                PID:5036
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2040,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:3
                5⤵
                • Unexpected DNS network traffic destination
                PID:4192
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2348,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=2364 /prefetch:8
                5⤵
                  PID:4088
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3656,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:1
                  5⤵
                    PID:4836

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Solara\Microsoft.Web.WebView2.Core.dll

            Filesize

            557KB

            MD5

            b037ca44fd19b8eedb6d5b9de3e48469

            SHA1

            1f328389c62cf673b3de97e1869c139d2543494e

            SHA256

            11e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197

            SHA512

            fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b

          • C:\ProgramData\Solara\Microsoft.Web.WebView2.Wpf.dll

            Filesize

            50KB

            MD5

            e107c88a6fc54cc3ceb4d85768374074

            SHA1

            a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6

            SHA256

            8f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8

            SHA512

            b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe

          • C:\ProgramData\Solara\Monaco\combined.html

            Filesize

            14KB

            MD5

            2a0506c7902018d7374b0ec4090c53c0

            SHA1

            26c6094af2043e1e8460023ac6b778ba84463f30

            SHA256

            cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a

            SHA512

            4a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b

          • C:\ProgramData\Solara\Monaco\index.html

            Filesize

            14KB

            MD5

            610eb8cecd447fcf97c242720d32b6bd

            SHA1

            4b094388e0e5135e29c49ce42ff2aa099b7f2d43

            SHA256

            107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7

            SHA512

            cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331

          • C:\ProgramData\Solara\Monaco\vs\basic-languages\lua\lua.js

            Filesize

            5KB

            MD5

            8706d861294e09a1f2f7e63d19e5fcb7

            SHA1

            fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23

            SHA256

            fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42

            SHA512

            1f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f

          • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.css

            Filesize

            171KB

            MD5

            6af9c0d237b31c1c91f7faa84b384bdf

            SHA1

            c349b06cad41c2997f5018a9b88baedd0ba1ea11

            SHA256

            fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0

            SHA512

            3bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff

          • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.js

            Filesize

            2.0MB

            MD5

            9399a8eaa741d04b0ae6566a5ebb8106

            SHA1

            5646a9d35b773d784ad914417ed861c5cba45e31

            SHA256

            93d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18

            SHA512

            d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8

          • C:\ProgramData\Solara\Monaco\vs\editor\editor.main.nls.js

            Filesize

            31KB

            MD5

            74dd2381ddbb5af80ce28aefed3068fc

            SHA1

            0996dc91842ab20387e08a46f3807a3f77958902

            SHA256

            fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48

            SHA512

            8841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e

          • C:\ProgramData\Solara\Monaco\vs\loader.js

            Filesize

            27KB

            MD5

            8a3086f6c6298f986bda09080dd003b1

            SHA1

            8c7d41c586bfa015fb5cc50a2fdc547711b57c3c

            SHA256

            0512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9

            SHA512

            9e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017

          • C:\ProgramData\Solara\Newtonsoft.Json.dll

            Filesize

            695KB

            MD5

            195ffb7167db3219b217c4fd439eedd6

            SHA1

            1e76e6099570ede620b76ed47cf8d03a936d49f8

            SHA256

            e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

            SHA512

            56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

          • C:\ProgramData\Solara\Solara.exe

            Filesize

            619KB

            MD5

            91f5d6abf1fc57cb3e6222f10c51bff1

            SHA1

            fd1183ba06cf793f12de674d8aa31bd8bfbe1172

            SHA256

            c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840

            SHA512

            4538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

            Filesize

            280B

            MD5

            ba7ce530c93f43a45cd9a8f0989686e9

            SHA1

            47813a5ba2fefe8821f668b21351cbc0b223649a

            SHA256

            94f6d1d35763f33fa818b1a12d19b0284ec57c348d039d8086c2732bde80c2bd

            SHA512

            6bf0d5f9937228bcc8f21487d6675198cce3c89235efeeba712fce13f287ee4d416015486f7ed66a8709249d8e368561e993a4c43b65c9d858dfc07c210bef4a

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\settings.dat

            Filesize

            280B

            MD5

            655c168d3b3913cf72dff61dca1d5442

            SHA1

            d4661ca1b8ed2b544759f53bdc74789d3562ad74

            SHA256

            a32df82c8f17e7361acb87386c501137bf40dde38d227aca82d6f8dbed50af49

            SHA512

            c39acf1716eb5056d7d74524c39145c6669b79e51515e1853be4aa4f07f7ecff81455142995d9cd54d8d2d8d43b1e2756b86f9e86cabebd0ffc9ad24fa7d631f

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad\throttle_store.dat

            Filesize

            20B

            MD5

            9e4e94633b73f4a7680240a0ffd6cd2c

            SHA1

            e68e02453ce22736169a56fdb59043d33668368f

            SHA256

            41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

            SHA512

            193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_0

            Filesize

            8KB

            MD5

            cf89d16bb9107c631daabf0c0ee58efb

            SHA1

            3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

            SHA256

            d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

            SHA512

            8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_1

            Filesize

            264KB

            MD5

            d0d388f3865d0523e451d6ba0be34cc4

            SHA1

            8571c6a52aacc2747c048e3419e5657b74612995

            SHA256

            902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

            SHA512

            376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_2

            Filesize

            8KB

            MD5

            0962291d6d367570bee5454721c17e11

            SHA1

            59d10a893ef321a706a9255176761366115bedcb

            SHA256

            ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

            SHA512

            f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\DawnWebGPUCache\data_3

            Filesize

            8KB

            MD5

            41876349cb12d6db992f1309f22df3f0

            SHA1

            5cf26b3420fc0302cd0a71e8d029739b8765be27

            SHA256

            e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

            SHA512

            e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Extension Rules\MANIFEST-000001

            Filesize

            41B

            MD5

            5af87dfd673ba2115e2fcf5cfdb727ab

            SHA1

            d5b5bbf396dc291274584ef71f444f420b6056f1

            SHA256

            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

            SHA512

            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\SCT Auditing Pending Reports

            Filesize

            2B

            MD5

            d751713988987e9331980363e24189ce

            SHA1

            97d170e1550eee4afc0af065b78cda302a97674c

            SHA256

            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

            SHA512

            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Site Characteristics Database\CURRENT

            Filesize

            16B

            MD5

            46295cac801e5d4857d09837238a6394

            SHA1

            44e0fa1b517dbf802b18faf0785eeea6ac51594b

            SHA256

            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

            SHA512

            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\eb2e057a-dce8-4234-ad42-7d879bb2412c.tmp

            Filesize

            6KB

            MD5

            9fdaa87b4abaea65cbff96897b1800a5

            SHA1

            22e74966dbb0f0f2b05e58b41b690ed1a7bb4274

            SHA256

            d306e3ad8b2092a14654eeebe4c5fd7e59d0a9ac871cb0d43bb3199ba364af5b

            SHA512

            d7278adbc2e32e69957806d6bb3d24391a75303db8128eef56655f61405c0a2133c15935b4ab5951c13dc7541fb49bb17f4b47cb95984fb16e75b2684e13c85d

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

            Filesize

            1KB

            MD5

            6decfd3bdc968dbcf927d29c2962d9bc

            SHA1

            999b9e17af4615cd6fb659ed1873b98b26ec7243

            SHA256

            cb1617029ba5ef0c5fea6da5b5ba5b7860d0ad3f31ea7e5135b18552e8dd9373

            SHA512

            f80ab3b15c5edc76fc812376e3c8023f3a1fde093954a4085d349e7fbd54e277429b5b667519d5d42ba434a436d1e07cfa0ab4e6ea760bd53843e7797d957085

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

            Filesize

            2KB

            MD5

            5f6cbc4529c6a17e2c9115fdcd45c01c

            SHA1

            cb2d95facfeb4ee86f1100000a778019a42ea69d

            SHA256

            8007652597cf5a07cff359a088c9f1eeccbd7287db0f25370fb3c1eff5247fe9

            SHA512

            95a3882115d0233dce8a672563981fa077d21cc394cc0631972c6127f8e0f3c7a1026fc020d17f895348ef409679fbc759cdbd759736ed1b20087f1f766e106b

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

            Filesize

            3KB

            MD5

            94e739f7acbf3b016c1b12e818d81d6e

            SHA1

            0cc43f6617f4813a56ca86ff561ce66e3e92634e

            SHA256

            86dcbfea3db474a85abfe3d6d65e8ef199c59978e78b919ce2d500f2edd6862b

            SHA512

            9bf10ce333cd0192e948aee8f1018de5881538841b5a0044fe39985df1c42f4dad3830b034404cb8cc34d961d47532a3daa63e15711d95096e3c9453d8feb097

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

            Filesize

            16KB

            MD5

            f7faebd0c5bdfa0204d1e2d52ae81555

            SHA1

            62c980a5c8a3ad908ac000e21657cd95f8740753

            SHA256

            6891334220b0f8bed59bc47549050472a3bc746470d21e1e7577236312306cf4

            SHA512

            80f8c155e269cc6a3069b9e5264cea456013c52b5aa39ff0ad252298f83c84dd263800f6db2a3819e6fb31e2528a966df8a89a7dc4c1f4dd8cdff4fbf9fea7e4

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State

            Filesize

            16KB

            MD5

            75e20c96fcea7095914269b806d749b1

            SHA1

            a86f141427d3b043ba1dcd188079a728f9af6224

            SHA256

            40438ff9a4a34bf9943dc9e33aeac5b34c02439fbd4e9833752e6439b0f9c6f8

            SHA512

            e1895c6fef5544583b477092ab83e8c0c36e2051f318e48e8bdd015227877e41da7d442771193347870d19fbc3ea6b0374eaa41c80bfe0cb87b39a3e51da7591

          • C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Local State~RFe583e7b.TMP

            Filesize

            1KB

            MD5

            7b38fb52d15d9c332b814d57f253d4fe

            SHA1

            82765ece6f25f351bb6daa2ea5ec7a78ae749084

            SHA256

            8a140cc07c1290d8d13b23035403b3b691e35b32d9fa9fbd0fec3577972c3111

            SHA512

            198d5f45d4f9e061f2782ea961015c654fea7560c0795682f0d9131e86c1f4ab6260a396e432c0e601dbb71dac38d0c3e42903c7518e00c1ae40450863d94538

          • C:\ProgramData\Solara\SolaraV3.dll

            Filesize

            6.4MB

            MD5

            b0914d647a3b6c303a86a894b1259248

            SHA1

            3698197a1ab8d731371c81354ae03fe4ce71fb6f

            SHA256

            9bfd22fbe424bb730df0f1fefd82932834cfca67176f749699bdd4bfe55534ff

            SHA512

            a34506beccd72b8bd5542e4a4ca54db221a609a1c7c63b7d6375a14e322fbf9642bd76e58dd2cdcc39210b1f0505ab501697998c94b093e7009af14d3c0d4232

          • C:\ProgramData\Solara\WebView2Loader.dll

            Filesize

            133KB

            MD5

            a0bd0d1a66e7c7f1d97aedecdafb933f

            SHA1

            dd109ac34beb8289030e4ec0a026297b793f64a3

            SHA256

            79d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36

            SHA512

            2a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50

          • C:\ProgramData\Solara\Wpf.Ui.dll

            Filesize

            5.2MB

            MD5

            aead90ab96e2853f59be27c4ec1e4853

            SHA1

            43cdedde26488d3209e17efff9a51e1f944eb35f

            SHA256

            46cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed

            SHA512

            f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            6d42b6da621e8df5674e26b799c8e2aa

            SHA1

            ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

            SHA256

            5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

            SHA512

            53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

          • C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe

            Filesize

            2.9MB

            MD5

            f227cdfd423b3cc03bb69c49babf4da3

            SHA1

            3db5a97d9b0f2545e7ba97026af6c28512200441

            SHA256

            cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

            SHA512

            b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oarfcm05.02e.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1076-27-0x000001E683710000-0x000001E683718000-memory.dmp

            Filesize

            32KB

          • memory/1076-25-0x000001E6836B0000-0x000001E6836BA000-memory.dmp

            Filesize

            40KB

          • memory/1076-30-0x000001E6836C0000-0x000001E6836CA000-memory.dmp

            Filesize

            40KB

          • memory/1076-59-0x000001E6FFC60000-0x000001E6FFC6A000-memory.dmp

            Filesize

            40KB

          • memory/1076-61-0x000001E6FFF20000-0x000001E6FFF32000-memory.dmp

            Filesize

            72KB

          • memory/1076-56-0x000001E6C1B90000-0x000001E6C1C42000-memory.dmp

            Filesize

            712KB

          • memory/1076-19-0x000001E6E4930000-0x000001E6E4C12000-memory.dmp

            Filesize

            2.9MB

          • memory/1076-20-0x000001E6E4FF0000-0x000001E6E5000000-memory.dmp

            Filesize

            64KB

          • memory/1076-21-0x000001E6FFC30000-0x000001E6FFC38000-memory.dmp

            Filesize

            32KB

          • memory/1076-23-0x000001E6FFC40000-0x000001E6FFC4E000-memory.dmp

            Filesize

            56KB

          • memory/1076-29-0x000001E683700000-0x000001E68370A000-memory.dmp

            Filesize

            40KB

          • memory/1076-28-0x000001E683720000-0x000001E683736000-memory.dmp

            Filesize

            88KB

          • memory/1076-22-0x000001E6FFC80000-0x000001E6FFCB8000-memory.dmp

            Filesize

            224KB

          • memory/1076-58-0x000001E6C1B60000-0x000001E6C1B7E000-memory.dmp

            Filesize

            120KB

          • memory/1076-24-0x000001E683B90000-0x000001E683C90000-memory.dmp

            Filesize

            1024KB

          • memory/1076-31-0x000001E6FFC50000-0x000001E6FFC58000-memory.dmp

            Filesize

            32KB

          • memory/1076-26-0x000001E6836D0000-0x000001E6836F6000-memory.dmp

            Filesize

            152KB

          • memory/3552-18-0x00007FFC24A60000-0x00007FFC25521000-memory.dmp

            Filesize

            10.8MB

          • memory/3552-1-0x000002D91FA90000-0x000002D91FB5E000-memory.dmp

            Filesize

            824KB

          • memory/3552-2-0x00007FFC24A60000-0x00007FFC25521000-memory.dmp

            Filesize

            10.8MB

          • memory/3552-0-0x00007FFC24A63000-0x00007FFC24A65000-memory.dmp

            Filesize

            8KB

          • memory/3552-4-0x00007FFC24A63000-0x00007FFC24A65000-memory.dmp

            Filesize

            8KB

          • memory/3552-5-0x000002D93B680000-0x000002D93B6A2000-memory.dmp

            Filesize

            136KB

          • memory/3680-116-0x000001E9160E0000-0x000001E916180000-memory.dmp

            Filesize

            640KB

          • memory/3680-341-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-128-0x000001E930BA0000-0x000001E930C30000-memory.dmp

            Filesize

            576KB

          • memory/3680-137-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-136-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-134-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-119-0x000001E930920000-0x000001E9309DA000-memory.dmp

            Filesize

            744KB

          • memory/3680-292-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-121-0x000001E9309E0000-0x000001E930A92000-memory.dmp

            Filesize

            712KB

          • memory/3680-354-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-135-0x0000000180000000-0x00000001810A0000-memory.dmp

            Filesize

            16.6MB

          • memory/3680-118-0x000001E930CB0000-0x000001E9311EC000-memory.dmp

            Filesize

            5.2MB

          • memory/3680-123-0x000001E917F10000-0x000001E917F20000-memory.dmp

            Filesize

            64KB

          • memory/4088-187-0x00007FFC42330000-0x00007FFC42331000-memory.dmp

            Filesize

            4KB

          • memory/4088-186-0x00007FFC42230000-0x00007FFC42231000-memory.dmp

            Filesize

            4KB

          • memory/4836-272-0x00007FFC42330000-0x00007FFC42331000-memory.dmp

            Filesize

            4KB

          • memory/5036-164-0x00007FFC42330000-0x00007FFC42331000-memory.dmp

            Filesize

            4KB