Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper V1.23.exe
Resource
win10v2004-20250217-en
General
-
Target
Bootstrapper V1.23.exe
-
Size
800KB
-
MD5
02c70d9d6696950c198db93b7f6a835e
-
SHA1
30231a467a49cc37768eea0f55f4bea1cbfb48e2
-
SHA256
8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
-
SHA512
431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
-
SSDEEP
12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
pid Process 3928 powershell.exe 3180 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 39 3552 Bootstrapper V1.23.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation Bootstrapper V1.23.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation BootstrapperV2.20.exe -
Executes dropped EXE 2 IoCs
pid Process 1076 BootstrapperV2.20.exe 3680 Solara.exe -
Loads dropped DLL 2 IoCs
pid Process 3680 Solara.exe 3680 Solara.exe -
resource yara_rule behavioral1/files/0x0007000000023e05-131.dat themida behavioral1/memory/3680-134-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-136-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-137-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-135-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-292-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-341-0x0000000180000000-0x00000001810A0000-memory.dmp themida behavioral1/memory/3680-354-0x0000000180000000-0x00000001810A0000-memory.dmp themida -
Unexpected DNS network traffic destination 19 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 134 1.0.0.1 4192 msedgewebview2.exe Destination IP 141 1.0.0.1 4192 msedgewebview2.exe Destination IP 61 1.0.0.1 1976 Process not Found Destination IP 67 1.0.0.1 1976 Process not Found Destination IP 84 1.0.0.1 1976 Process not Found Destination IP 92 1.0.0.1 1976 Process not Found Destination IP 122 1.0.0.1 4192 msedgewebview2.exe Destination IP 64 1.0.0.1 3680 Solara.exe Destination IP 74 1.0.0.1 1976 Process not Found Destination IP 142 1.0.0.1 4192 msedgewebview2.exe Destination IP 59 1.0.0.1 1976 Process not Found Destination IP 76 1.0.0.1 1976 Process not Found Destination IP 98 1.0.0.1 1976 Process not Found Destination IP 125 1.0.0.1 4192 msedgewebview2.exe Destination IP 133 1.0.0.1 4192 msedgewebview2.exe Destination IP 62 1.0.0.1 3680 Solara.exe Destination IP 75 1.0.0.1 1976 Process not Found Destination IP 123 1.0.0.1 4192 msedgewebview2.exe Destination IP 124 1.0.0.1 4192 msedgewebview2.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 62 pastebin.com 63 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3680 Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1080 ipconfig.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133855940336317364" msedgewebview2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 BootstrapperV2.20.exe 3928 powershell.exe 3928 powershell.exe 3180 powershell.exe 3180 powershell.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe 3680 Solara.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3180 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4008 WMIC.exe Token: SeSecurityPrivilege 4008 WMIC.exe Token: SeTakeOwnershipPrivilege 4008 WMIC.exe Token: SeLoadDriverPrivilege 4008 WMIC.exe Token: SeSystemProfilePrivilege 4008 WMIC.exe Token: SeSystemtimePrivilege 4008 WMIC.exe Token: SeProfSingleProcessPrivilege 4008 WMIC.exe Token: SeIncBasePriorityPrivilege 4008 WMIC.exe Token: SeCreatePagefilePrivilege 4008 WMIC.exe Token: SeBackupPrivilege 4008 WMIC.exe Token: SeRestorePrivilege 4008 WMIC.exe Token: SeShutdownPrivilege 4008 WMIC.exe Token: SeDebugPrivilege 4008 WMIC.exe Token: SeSystemEnvironmentPrivilege 4008 WMIC.exe Token: SeRemoteShutdownPrivilege 4008 WMIC.exe Token: SeUndockPrivilege 4008 WMIC.exe Token: SeManageVolumePrivilege 4008 WMIC.exe Token: 33 4008 WMIC.exe Token: 34 4008 WMIC.exe Token: 35 4008 WMIC.exe Token: 36 4008 WMIC.exe Token: SeIncreaseQuotaPrivilege 4008 WMIC.exe Token: SeSecurityPrivilege 4008 WMIC.exe Token: SeTakeOwnershipPrivilege 4008 WMIC.exe Token: SeLoadDriverPrivilege 4008 WMIC.exe Token: SeSystemProfilePrivilege 4008 WMIC.exe Token: SeSystemtimePrivilege 4008 WMIC.exe Token: SeProfSingleProcessPrivilege 4008 WMIC.exe Token: SeIncBasePriorityPrivilege 4008 WMIC.exe Token: SeCreatePagefilePrivilege 4008 WMIC.exe Token: SeBackupPrivilege 4008 WMIC.exe Token: SeRestorePrivilege 4008 WMIC.exe Token: SeShutdownPrivilege 4008 WMIC.exe Token: SeDebugPrivilege 4008 WMIC.exe Token: SeSystemEnvironmentPrivilege 4008 WMIC.exe Token: SeRemoteShutdownPrivilege 4008 WMIC.exe Token: SeUndockPrivilege 4008 WMIC.exe Token: SeManageVolumePrivilege 4008 WMIC.exe Token: 33 4008 WMIC.exe Token: 34 4008 WMIC.exe Token: 35 4008 WMIC.exe Token: 36 4008 WMIC.exe Token: SeDebugPrivilege 3552 Bootstrapper V1.23.exe Token: SeDebugPrivilege 1076 BootstrapperV2.20.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeDebugPrivilege 3680 Solara.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3680 Solara.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4384 3552 Bootstrapper V1.23.exe 88 PID 3552 wrote to memory of 4384 3552 Bootstrapper V1.23.exe 88 PID 4384 wrote to memory of 1080 4384 cmd.exe 90 PID 4384 wrote to memory of 1080 4384 cmd.exe 90 PID 3552 wrote to memory of 4556 3552 Bootstrapper V1.23.exe 98 PID 3552 wrote to memory of 4556 3552 Bootstrapper V1.23.exe 98 PID 4556 wrote to memory of 4008 4556 cmd.exe 100 PID 4556 wrote to memory of 4008 4556 cmd.exe 100 PID 3552 wrote to memory of 1076 3552 Bootstrapper V1.23.exe 104 PID 3552 wrote to memory of 1076 3552 Bootstrapper V1.23.exe 104 PID 1076 wrote to memory of 3928 1076 BootstrapperV2.20.exe 106 PID 1076 wrote to memory of 3928 1076 BootstrapperV2.20.exe 106 PID 1076 wrote to memory of 3180 1076 BootstrapperV2.20.exe 108 PID 1076 wrote to memory of 3180 1076 BootstrapperV2.20.exe 108 PID 1076 wrote to memory of 3680 1076 BootstrapperV2.20.exe 110 PID 1076 wrote to memory of 3680 1076 BootstrapperV2.20.exe 110 PID 3680 wrote to memory of 3180 3680 Solara.exe 115 PID 3680 wrote to memory of 3180 3680 Solara.exe 115 PID 3180 wrote to memory of 428 3180 msedgewebview2.exe 116 PID 3180 wrote to memory of 428 3180 msedgewebview2.exe 116 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 PID 3180 wrote to memory of 5036 3180 msedgewebview2.exe 117 -
cURL User-Agent 8 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 73 curl/8.9.1-DEV HTTP User-Agent header 89 curl/8.9.1-DEV HTTP User-Agent header 90 curl/8.9.1-DEV HTTP User-Agent header 66 curl/8.9.1-DEV HTTP User-Agent header 69 curl/8.9.1-DEV HTTP User-Agent header 70 curl/8.9.1-DEV HTTP User-Agent header 71 curl/8.9.1-DEV HTTP User-Agent header 72 curl/8.9.1-DEV
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe"1⤵
- Downloads MZ/PE file
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1080
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c wmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\Wbem\WMIC.exewmic nicconfig where (IPEnabled=TRUE) call SetDNSServerSearchOrder ("1.1.1.1", "1.0.0.1")3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe" --oldBootstrapper "C:\Users\Admin\AppData\Local\Temp\Bootstrapper V1.23.exe" --isUpdate true2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\BootstrapperV2.20.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Unexpected DNS network traffic destination
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=3680.1688.148237576652049654404⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7ffc1769b078,0x7ffc1769b084,0x7ffc1769b0905⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1720,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=1716 /prefetch:25⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2040,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:35⤵
- Unexpected DNS network traffic destination
PID:4192
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2348,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=2364 /prefetch:85⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3656,i,10045318319128687216,7654140612750878294,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:15⤵PID:4836
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b037ca44fd19b8eedb6d5b9de3e48469
SHA11f328389c62cf673b3de97e1869c139d2543494e
SHA25611e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197
SHA512fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b
-
Filesize
50KB
MD5e107c88a6fc54cc3ceb4d85768374074
SHA1a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6
SHA2568f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8
SHA512b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe
-
Filesize
14KB
MD52a0506c7902018d7374b0ec4090c53c0
SHA126c6094af2043e1e8460023ac6b778ba84463f30
SHA256cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a
SHA5124a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b
-
Filesize
14KB
MD5610eb8cecd447fcf97c242720d32b6bd
SHA14b094388e0e5135e29c49ce42ff2aa099b7f2d43
SHA256107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7
SHA512cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331
-
Filesize
5KB
MD58706d861294e09a1f2f7e63d19e5fcb7
SHA1fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23
SHA256fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42
SHA5121f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f
-
Filesize
171KB
MD56af9c0d237b31c1c91f7faa84b384bdf
SHA1c349b06cad41c2997f5018a9b88baedd0ba1ea11
SHA256fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0
SHA5123bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff
-
Filesize
2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
Filesize
31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
619KB
MD591f5d6abf1fc57cb3e6222f10c51bff1
SHA1fd1183ba06cf793f12de674d8aa31bd8bfbe1172
SHA256c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840
SHA5124538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a
-
Filesize
280B
MD5ba7ce530c93f43a45cd9a8f0989686e9
SHA147813a5ba2fefe8821f668b21351cbc0b223649a
SHA25694f6d1d35763f33fa818b1a12d19b0284ec57c348d039d8086c2732bde80c2bd
SHA5126bf0d5f9937228bcc8f21487d6675198cce3c89235efeeba712fce13f287ee4d416015486f7ed66a8709249d8e368561e993a4c43b65c9d858dfc07c210bef4a
-
Filesize
280B
MD5655c168d3b3913cf72dff61dca1d5442
SHA1d4661ca1b8ed2b544759f53bdc74789d3562ad74
SHA256a32df82c8f17e7361acb87386c501137bf40dde38d227aca82d6f8dbed50af49
SHA512c39acf1716eb5056d7d74524c39145c6669b79e51515e1853be4aa4f07f7ecff81455142995d9cd54d8d2d8d43b1e2756b86f9e86cabebd0ffc9ad24fa7d631f
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\eb2e057a-dce8-4234-ad42-7d879bb2412c.tmp
Filesize6KB
MD59fdaa87b4abaea65cbff96897b1800a5
SHA122e74966dbb0f0f2b05e58b41b690ed1a7bb4274
SHA256d306e3ad8b2092a14654eeebe4c5fd7e59d0a9ac871cb0d43bb3199ba364af5b
SHA512d7278adbc2e32e69957806d6bb3d24391a75303db8128eef56655f61405c0a2133c15935b4ab5951c13dc7541fb49bb17f4b47cb95984fb16e75b2684e13c85d
-
Filesize
1KB
MD56decfd3bdc968dbcf927d29c2962d9bc
SHA1999b9e17af4615cd6fb659ed1873b98b26ec7243
SHA256cb1617029ba5ef0c5fea6da5b5ba5b7860d0ad3f31ea7e5135b18552e8dd9373
SHA512f80ab3b15c5edc76fc812376e3c8023f3a1fde093954a4085d349e7fbd54e277429b5b667519d5d42ba434a436d1e07cfa0ab4e6ea760bd53843e7797d957085
-
Filesize
2KB
MD55f6cbc4529c6a17e2c9115fdcd45c01c
SHA1cb2d95facfeb4ee86f1100000a778019a42ea69d
SHA2568007652597cf5a07cff359a088c9f1eeccbd7287db0f25370fb3c1eff5247fe9
SHA51295a3882115d0233dce8a672563981fa077d21cc394cc0631972c6127f8e0f3c7a1026fc020d17f895348ef409679fbc759cdbd759736ed1b20087f1f766e106b
-
Filesize
3KB
MD594e739f7acbf3b016c1b12e818d81d6e
SHA10cc43f6617f4813a56ca86ff561ce66e3e92634e
SHA25686dcbfea3db474a85abfe3d6d65e8ef199c59978e78b919ce2d500f2edd6862b
SHA5129bf10ce333cd0192e948aee8f1018de5881538841b5a0044fe39985df1c42f4dad3830b034404cb8cc34d961d47532a3daa63e15711d95096e3c9453d8feb097
-
Filesize
16KB
MD5f7faebd0c5bdfa0204d1e2d52ae81555
SHA162c980a5c8a3ad908ac000e21657cd95f8740753
SHA2566891334220b0f8bed59bc47549050472a3bc746470d21e1e7577236312306cf4
SHA51280f8c155e269cc6a3069b9e5264cea456013c52b5aa39ff0ad252298f83c84dd263800f6db2a3819e6fb31e2528a966df8a89a7dc4c1f4dd8cdff4fbf9fea7e4
-
Filesize
16KB
MD575e20c96fcea7095914269b806d749b1
SHA1a86f141427d3b043ba1dcd188079a728f9af6224
SHA25640438ff9a4a34bf9943dc9e33aeac5b34c02439fbd4e9833752e6439b0f9c6f8
SHA512e1895c6fef5544583b477092ab83e8c0c36e2051f318e48e8bdd015227877e41da7d442771193347870d19fbc3ea6b0374eaa41c80bfe0cb87b39a3e51da7591
-
Filesize
1KB
MD57b38fb52d15d9c332b814d57f253d4fe
SHA182765ece6f25f351bb6daa2ea5ec7a78ae749084
SHA2568a140cc07c1290d8d13b23035403b3b691e35b32d9fa9fbd0fec3577972c3111
SHA512198d5f45d4f9e061f2782ea961015c654fea7560c0795682f0d9131e86c1f4ab6260a396e432c0e601dbb71dac38d0c3e42903c7518e00c1ae40450863d94538
-
Filesize
6.4MB
MD5b0914d647a3b6c303a86a894b1259248
SHA13698197a1ab8d731371c81354ae03fe4ce71fb6f
SHA2569bfd22fbe424bb730df0f1fefd82932834cfca67176f749699bdd4bfe55534ff
SHA512a34506beccd72b8bd5542e4a4ca54db221a609a1c7c63b7d6375a14e322fbf9642bd76e58dd2cdcc39210b1f0505ab501697998c94b093e7009af14d3c0d4232
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82