Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 17:55
Static task
static1
General
-
Target
SolaraV2.exe
-
Size
2.9MB
-
MD5
941c8d7c47b633c3b0cfa0d77242ae95
-
SHA1
58fa3881583d3d9ce7ed6a9f313fe6386573154f
-
SHA256
2cc420fbc43a2bedcf6a1bba99bda592a7a8c1735762f252cf7835c47143ef20
-
SHA512
c544ee958de70f84f97c096493f0a518645ae917d9e7286be8edb58c00db2d9d8d7045613195463177ca54da1b71dd433b8eb26ccba8e145631e1a4087479dbd
-
SSDEEP
49152:UbQt8UYUie2O71VYPw6oCE0AnswzlFr8SJVmle0yi+Ekhq+R74hW9auxGHSc8D6S:U8tSUTHXr46swJFoiSy1EEV7eLutcC6S
Malware Config
Extracted
xworm
5.0
earth-northwest.gl.at.ply.gg:49617
UwTPnsdni7XLUZ30
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023d1d-4.dat family_xworm behavioral1/memory/2184-20-0x0000000000BE0000-0x0000000000BF0000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2168 powershell.exe 4400 powershell.exe 4704 powershell.exe 2404 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 49 1764 BootstrapperNew.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation SolaraV2.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation Bootstrapper_v2.21.exe -
Executes dropped EXE 4 IoCs
pid Process 2184 Solara.exe 1764 BootstrapperNew.exe 1592 Bootstrapper_v2.21.exe 4444 Solara.exe -
Loads dropped DLL 2 IoCs
pid Process 4444 Solara.exe 4444 Solara.exe -
resource yara_rule behavioral1/files/0x0007000000023dea-222.dat themida behavioral1/memory/4444-224-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-226-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-227-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-225-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-228-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-427-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-448-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-459-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-461-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-487-0x0000000180000000-0x00000001810AA000-memory.dmp themida behavioral1/memory/4444-687-0x0000000180000000-0x00000001810AA000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Solara.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 63 pastebin.com 65 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4444 Solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolaraV2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedgewebview2.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133860166052192633" msedgewebview2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 powershell.exe 2216 powershell.exe 4704 powershell.exe 4704 powershell.exe 2168 powershell.exe 2168 powershell.exe 2168 powershell.exe 1764 BootstrapperNew.exe 1764 BootstrapperNew.exe 1592 Bootstrapper_v2.21.exe 2404 powershell.exe 2404 powershell.exe 2404 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 4444 Solara.exe 4444 Solara.exe 1708 taskmgr.exe 4444 Solara.exe 1708 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4768 msedgewebview2.exe 5912 msedge.exe 5912 msedge.exe 5912 msedge.exe 5912 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2184 Solara.exe Token: SeDebugPrivilege 2216 powershell.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 1764 BootstrapperNew.exe Token: SeDebugPrivilege 1592 Bootstrapper_v2.21.exe Token: SeDebugPrivilege 2404 powershell.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeDebugPrivilege 4444 Solara.exe Token: SeDebugPrivilege 1708 taskmgr.exe Token: SeSystemProfilePrivilege 1708 taskmgr.exe Token: SeCreateGlobalPrivilege 1708 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 4444 Solara.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 5912 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 1708 taskmgr.exe 5912 msedge.exe 5912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2216 2552 SolaraV2.exe 84 PID 2552 wrote to memory of 2216 2552 SolaraV2.exe 84 PID 2552 wrote to memory of 2216 2552 SolaraV2.exe 84 PID 2552 wrote to memory of 2184 2552 SolaraV2.exe 87 PID 2552 wrote to memory of 2184 2552 SolaraV2.exe 87 PID 2552 wrote to memory of 1764 2552 SolaraV2.exe 88 PID 2552 wrote to memory of 1764 2552 SolaraV2.exe 88 PID 1764 wrote to memory of 4704 1764 BootstrapperNew.exe 102 PID 1764 wrote to memory of 4704 1764 BootstrapperNew.exe 102 PID 1764 wrote to memory of 2168 1764 BootstrapperNew.exe 104 PID 1764 wrote to memory of 2168 1764 BootstrapperNew.exe 104 PID 1764 wrote to memory of 1592 1764 BootstrapperNew.exe 109 PID 1764 wrote to memory of 1592 1764 BootstrapperNew.exe 109 PID 1592 wrote to memory of 2404 1592 Bootstrapper_v2.21.exe 110 PID 1592 wrote to memory of 2404 1592 Bootstrapper_v2.21.exe 110 PID 1592 wrote to memory of 4400 1592 Bootstrapper_v2.21.exe 112 PID 1592 wrote to memory of 4400 1592 Bootstrapper_v2.21.exe 112 PID 1592 wrote to memory of 4444 1592 Bootstrapper_v2.21.exe 117 PID 1592 wrote to memory of 4444 1592 Bootstrapper_v2.21.exe 117 PID 4444 wrote to memory of 4768 4444 Solara.exe 127 PID 4444 wrote to memory of 4768 4444 Solara.exe 127 PID 4768 wrote to memory of 1748 4768 msedgewebview2.exe 128 PID 4768 wrote to memory of 1748 4768 msedgewebview2.exe 128 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 PID 4768 wrote to memory of 4264 4768 msedgewebview2.exe 129 -
cURL User-Agent 8 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 94 curl/8.9.1-DEV HTTP User-Agent header 97 curl/8.9.1-DEV HTTP User-Agent header 99 curl/8.9.1-DEV HTTP User-Agent header 100 curl/8.9.1-DEV HTTP User-Agent header 104 curl/8.9.1-DEV HTTP User-Agent header 105 curl/8.9.1-DEV HTTP User-Agent header 79 curl/8.9.1-DEV HTTP User-Agent header 84 curl/8.9.1-DEV
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraV2.exe"C:\Users\Admin\AppData\Local\Temp\SolaraV2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAZwBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGgAeABlACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAeQBuACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGkAZgBqACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"2⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe" BootstrapperNew3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-MpPreference | Select-Object -ExpandProperty ExclusionPath"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Solara'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\ProgramData\Solara\Solara.exe"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\Admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\Admin\AppData\Local\Temp\Bootstrapper_v2.21.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --mojo-named-platform-channel-pipe=4444.4592.12828529739396246625⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7fffb25db078,0x7fffb25db084,0x7fffb25db0906⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1752,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=1728 /prefetch:26⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2056,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:36⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --always-read-main-dll --field-trial-handle=2376,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:86⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView" --webview-exe-name=Solara.exe --webview-exe-version=3.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3704,i,5487429571486148032,10020360306702367189,262144 --variations-seed-version --mojo-platform-channel-handle=3724 /prefetch:16⤵PID:5532
-
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5380
-
C:\Windows\System32\r8lvv3.exe"C:\Windows\System32\r8lvv3.exe"1⤵PID:5356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=r8lvv3.exe r8lvv3.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffba7a46f8,0x7fffba7a4708,0x7fffba7a47182⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8376048973607829015,6183314879611925861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:6044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5640
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b037ca44fd19b8eedb6d5b9de3e48469
SHA11f328389c62cf673b3de97e1869c139d2543494e
SHA25611e88b2ca921e5c88f64567f11bd83cbc396c10365d40972f3359fcc7965d197
SHA512fa89ab3347fd57486cf3064ad164574f70e2c2b77c382785479bfd5ab50caa0881de3c2763a0932feac2faaf09479ef699a04ba202866dc7e92640246ba9598b
-
Filesize
50KB
MD5e107c88a6fc54cc3ceb4d85768374074
SHA1a8d89ae75880f4fca7d7167fae23ac0d95e3d5f6
SHA2568f821f0c818f8d817b82f76c25f90fde9fb73ff1ae99c3df3eaf2b955653c9c8
SHA512b39e07b0c614a0fa88afb1f3b0d9bb9ba9c932e2b30899002008220ccf1acb0f018d5414aee64d92222c2c39f3ffe2c0ad2d9962d23aaa4bf5750c12c7f3e6fe
-
Filesize
14KB
MD52a0506c7902018d7374b0ec4090c53c0
SHA126c6094af2043e1e8460023ac6b778ba84463f30
SHA256cad1e2eef6e20e88699fac5ef31d495890df118e58c86fc442ea6337aac7a75a
SHA5124a9856512e7866b8623565886e5f3aebf15c824cb127e24be9afa2a5501a83fa95d209875a8777566bcac9973b38881e18caf6ad160c8d01366a508cafc2164b
-
Filesize
14KB
MD5610eb8cecd447fcf97c242720d32b6bd
SHA14b094388e0e5135e29c49ce42ff2aa099b7f2d43
SHA256107d8d9d6c94d2a86ac5af4b4cec43d959c2e44d445017fea59e2e0a5efafdc7
SHA512cf15f49ef3ae578a5f725e24bdde86c33bbc4fd30a6eb885729fd3d9b151a4b13822fa8c35d3e0345ec43d567a246111764812596fd0ecc36582b8ee2a76c331
-
Filesize
5KB
MD58706d861294e09a1f2f7e63d19e5fcb7
SHA1fa5f4bdc6c2f1728f65c41fb5c539211a24b6f23
SHA256fc2d6fb52a524a56cd8ac53bfe4bad733f246e76dc73cbec4c61be32d282ac42
SHA5121f9297eb4392db612630f824069afdc9d49259aba6361fb0b87372123ada067bc27d10d0623dc1eb7494da55c82840c5521f6fef74c1ada3b0fd801755234f1f
-
Filesize
171KB
MD56af9c0d237b31c1c91f7faa84b384bdf
SHA1c349b06cad41c2997f5018a9b88baedd0ba1ea11
SHA256fb2cbf2ee64286bc010a6c6fe6a81c6c292c145a2f584d0240c674f56e3015b0
SHA5123bda519fed1cfa5352f463d3f91194122cf6bf7c3c7ab6927c8ca3eea159d35deb39328576e7cbd982cfdf1f101b2a46c3165221501b36919dbde6f1e94bf5ff
-
Filesize
2.0MB
MD59399a8eaa741d04b0ae6566a5ebb8106
SHA15646a9d35b773d784ad914417ed861c5cba45e31
SHA25693d28520c07fbca09e20886087f28797bb7bd0e6cf77400153aab5ae67e3ce18
SHA512d37ef5a848e371f7db9616a4bf8b5347449abb3e244a5527396756791583cad455802450ceeb88dce39642c47aceaf2be6b95bede23b9ed68b5d4b7b9022b9c8
-
Filesize
31KB
MD574dd2381ddbb5af80ce28aefed3068fc
SHA10996dc91842ab20387e08a46f3807a3f77958902
SHA256fdd9d64ce5284373d1541528d15e2aa8aa3a4adc11b51b3d71d3a3953f8bcc48
SHA5128841e0823905cf3168f388a7aeaf5edd32d44902035ba2078202193354caf8cd74cb4cab920e455404575739f35e19ea5f3d88eab012c4ebefc0ccb1ed19a46e
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
619KB
MD591f5d6abf1fc57cb3e6222f10c51bff1
SHA1fd1183ba06cf793f12de674d8aa31bd8bfbe1172
SHA256c48c486f8655d33b4b0d7fc169adf5cbc964c723161953ef5877e99e45833840
SHA5124538dc6b1c0c21f09fcce5a496538c25cbbc88bd5bb484806fa9426753691df7d798882085be0bdf4ee542da793c04a0d45675265a6ced2f4ea61b691909597a
-
Filesize
280B
MD55ded13d537e1ee9d34535901c6660765
SHA1319fbf4d54582f21b546b7319f8c7e999a4dc424
SHA256759d648eb1c3ba3e3e6a6cce4f250caebaf92f59333742afde91f02281a9ce5b
SHA51284a90bafca3ec8452c7bdc0c1940e0db419ec5a6dd9ba0883bd099fbe3b01c1d9bc376b26ddcf3e44b5de7ea8bacee916a8db99172e8e5b66fee8b545e51e418
-
Filesize
280B
MD5bda39d5d9a72cca859a6b6697c265de6
SHA15e3bbf7a1082f27e61587ffa61a859a40b4f5f57
SHA256e38160d709c1dafe0e5aa0f0aafc1c8f45b83725b64542d645a4cb0b9666f5b8
SHA5129415a9c3370974431ab58b8d955936c5a4939dab2a7933b4c83fbfc84109b0c227bd6d25903c4900d036c93ca20e7ac90519183d4394af48a4dc881a1a211bcc
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
858B
MD579cfab5ff1735526f40995dd9ace92f7
SHA192c6eb05c4a91e2483d7a08e87e5f573a834b04d
SHA256f6fab4bcbe3897d3daa1fc8e1b9f8240025235d779adbffcc7f43998c06625ee
SHA51260a525e41bec77c5df684850e396eca5a242b768c653da26d2859b7a08fe059674434853d5bb18c88c55dff92daa020078a1e5b78ad96b228a678aa1dafc2417
-
Filesize
858B
MD523fda2b448da08b31fd9112ceabaf7a0
SHA1a1fff80fcc0695eff45c0f65e2302acc3df718d5
SHA2565b49d35d26c15237a10f804b3d418e360c42ac974774d17105e68f93978e27c3
SHA5123b0ebd0cbafbf0171f87d75055339777ec1dff558cfbddd6a3dbbb2cb62b06ae7efbbad3512a5f2972051a68ec6c4c068a7ff1fa15ed78f314160901af958b59
-
C:\ProgramData\Solara\Solara.exe.WebView2\EBWebView\Default\Network\f5f2f6ac-1b1e-4678-a0f4-73a4236e9032.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5ceee476b6dc924574a37ef5e58b44b0c
SHA16fdf441b416b7c28169c0d1f154fc5a3b05a3058
SHA2562d2587252338d11578c1b18f41b218e5166b8e9386e006d2bb2ac781ecd2b4d4
SHA512476a524c9afaa7d38620282beb29ea797c04c22d745b80fa34a1c4ab12acdca6cd98ac4276daf096bfc9fb6386ad7a91c9680d3d8b89a1c74f035f7334aad1a7
-
Filesize
6KB
MD584bbafdbd1de7f10e2dc40d484e3327e
SHA17587a59484757157e92d5b252a32779e3ec603c2
SHA256a65e53a2054c872de24dc68a71eac95d2bb2514926d29f7f58c01c2433cef4cf
SHA51274e56bf6fc6f0f1e0adf82353e20f94f98da2924584ef986a34b03caa34619778789c179be6bce8305d55e69ab83ea1dcff8d0f06842a6ea218140ce9efc7a12
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD502f47f4a85223f73eb50834bd24f6532
SHA1f8be934f98a8172228e2717d84799e6ec3516f01
SHA25696ff011cbab8d7c35eaac79b97e722e44effdeccb32add7bcee3c85a5cd7f533
SHA512d0a9622718c0223f64242e4bb2a28ee268005ad4c3b613929b91560bed3718871efa412f0ea16b1dfada37b9d708635eba017189b0edea28af1e216b84cb7c70
-
Filesize
2KB
MD55df2eabff954b7a80c085f9065a638e0
SHA1d04e6bcd336932bcfab0bf4d2ebe8a89d5688bd7
SHA256b992e231cd82543f0fc6ff5f95cd0b6d05507ee496872816b9b29cd69dd2c0fd
SHA512a5d15fee7f4fe997a71629d00f1c539d060f594e97a194f87463e6c283e8fb12827dc09d30539cd93d87e3cf795e1be7a3086caa259321d730dd2b2466c9d2b7
-
Filesize
3KB
MD5fcea4ba8a8268a90f8915e223771e6b4
SHA12aea7690886dcd2586d25ba6d09273611d1283a2
SHA256533c227f9c7e5eaf591e07b9af4960c07ce2d98b51c22b5137529e91276f2d4a
SHA512d596d69554a5ea50d42f08b53d9fe1e66f738c367c8b45037d6a83c7e7b3870f0a6df754ef9264d7e2dde69a2d23f74543b4ca8ab4f25038ee3117f6274918bb
-
Filesize
16KB
MD53fbc8a4292595c2f459d6c7425151c28
SHA1ea7a7bffebc46aa3096da620568b474d18446b42
SHA2561e124a15f0929aa011d3bd59704c945251191dc7eaf15bb4002e206befd35220
SHA5123ba2fe16dc5da70ee235083a0f7b26000f2fccd0e3588a92ecc9be961f46e528fc1ccae6f321b28f81d9e5d48a02260ad0f8f217f777e6653824db8dbbf2c9eb
-
Filesize
1KB
MD556306001cf4f658a0b91f363081c2a4f
SHA1766ab0cc191ff24bedb1884fd6415007a9a7d8e7
SHA256ac4e7e19f52de5e19daf54e776d4edf65558ef9904fef0f0844b86a91e2364fb
SHA51283ac868dad3418a2b3523520c89fae08c4efd23453fc50835c9fc710c993b00724d86a6d249865b2cb6c99bebb4ee83e2d82bd4d5d720ab33ae35f2576211c99
-
Filesize
6.4MB
MD522a100971f552b0aaca41291d65fa169
SHA16bdf503d13a53931417af4600225875361feba78
SHA25666dde01c27784da1882a6444df7dbb69bf671cf3ef0cfa2e3373ece1930928a3
SHA5129b58e305a3819e75f585a1ea74cf8edac817045d839b27b90794c8eb6e0fe350cfb28f44f9a4bc0005c62259aaa9d66a5f2f99623acdf69c1d3d7d6efb482bdc
-
Filesize
133KB
MD5a0bd0d1a66e7c7f1d97aedecdafb933f
SHA1dd109ac34beb8289030e4ec0a026297b793f64a3
SHA25679d7e45f8631e8d2541d01bfb5a49a3a090be72b3d465389a2d684680fee2e36
SHA5122a50ae5c7234a44b29f82ebc2e3cfed37bf69294eb00b2dc8905c61259975b2f3a059c67aeab862f002752454d195f7191d9b82b056f6ef22d6e1b0bb3673d50
-
Filesize
5.2MB
MD5aead90ab96e2853f59be27c4ec1e4853
SHA143cdedde26488d3209e17efff9a51e1f944eb35f
SHA25646cfbe804b29c500ebc0b39372e64c4c8b4f7a8e9b220b5f26a9adf42fcb2aed
SHA512f5044f2ee63906287460b9adabfcf3c93c60b51c86549e33474c4d7f81c4f86cd03cd611df94de31804c53006977874b8deb67c4bf9ea1c2b70c459b3a44b38d
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5ec002e0acc9a1e8e596e0f99d5ee5ba5
SHA1b118f94d264e46c070e67ace7f0097be17109ab9
SHA256c8533c1be547d9f38c91092d982c6d0dbe3a8538c91061fb6d6682a113e2d89b
SHA5123c30dcda047279ad5afda936bf843be8a228113ec3b031939b52e1e5c55748e4be187b46d11990859ffc010b4dc9385513eca5a2774699fab4f4e6b6a6d5ce22
-
Filesize
471B
MD54269f37611fbf49d423c9266a834a806
SHA15e1edfd6b8e40af86b5293d82c21b12b32aa24a0
SHA256f9b844cd7d0b10d2cea570e7f5fe612d03b72e36a4aa4234294a907376dae66e
SHA512120fddde4546aa9976697063ddff168a2289e26fffa569da20aa148ff0131ce71ac84e3dd24d8fc475dbc70b610e98da3b5707b14cf1c26f48c2c6483ffac59a
-
Filesize
5KB
MD5b2868513d7b71ee2909aca4e498cc182
SHA19104881c66267289d956644a8652302a3f7f6ade
SHA256a2e47b41466f8825ad98d1cadf688f2e8876d564add2b55a6d913d5e2928f503
SHA512f96e5710e277d9da55e0b8903378b066bdfdc73dbb82142c7203bcff08dc2346f4f1713d757ee342d8d06ff6655d25fd07f7778b3f4d6e781d5dcb7715ba94dc
-
Filesize
6KB
MD5833c869b8e1536561a2d3742bdf994b1
SHA10c08a8381941d38d462b1612bcbbdcf9990bd3ed
SHA2560b43d8b32576acb8bba16cb5b15098535b41c93816707f893458682cf57b351f
SHA512f060d3f9386f647c4325b78102fa808113f1f0742babf5fc1592ae0b5e8d4cf15831354b27675dd24a0b2d6999452c678f91073843e74393df1fd86065af18fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52764802ab4167d09f03c33dc3eb69492
SHA189db77b0cd5c72aabec0b1a2a4db8c064b5a5275
SHA256dec8498062f4a329c8b381ac14f1ab222d52c0bb4e2c25c057405e9e714d4b28
SHA512cf7c9093f8dcdfee9f66b97c50701520b8b61e6c6c875531f856a81f0c42b1ded63ceaeb1388448e0b72cb1e4887433619dd3072b3fae92566fd70bf56ce2781
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD569cd578dc5b228a93dec98102ca47aa9
SHA1370f6a7260f5e6215f1fbe9a3d4cacc74fcdf662
SHA2569c9495cce36e377483700ef4b5d99080e2097a3b89e213e65031c2c69c9d3cc2
SHA512a2e1b4b1cf5bbd30fca8decd91835152a8a376832a4b5c1d0e4418c6aea478cb56bab7f439e6b01e5f874cb9f131d00f77f587d6cb575ae36c5fa2502cda96a4
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
18KB
MD51d4f5a4de134a39f41d70add20cb93c2
SHA1a690b85b7e463d866704f196bb83e4978c620420
SHA2563bc9d13841fde79b6bcd9470af57fb71b87b7fc04af4962fe5c70ba17570e484
SHA51213ddefbaa07133caab5f925200073d159ffccb745db0825e7e5a7ba3bbf5d869c0c401d5f02cb38e28fbb25c9ae0c1a594572762acfd5402a8a18e018d6f41e7
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
3.4MB
MD537d3fcd5058c45d2c2bba065a5c22296
SHA122debc7d8cdf3efd9b65ad099592c68ad7fa2713
SHA256774cc2deb69d990bb908b5b4a77314e474b357268dad92d917dcd85176f43ffd
SHA512fcad1f64c733180c7812a673379a35e488ed3306ca6146b187c7627a670012cec2a9166bf88815fbc1468cb70e7a1215a54e34aab37cba0f4ded8ce914323bdc
-
Filesize
79B
MD50284fa0391784125ad3b12be8c92c6ae
SHA1e4fe938288c6804d9c79947ad2e39939a595e9f3
SHA256789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0
SHA5129dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235
-
Filesize
40KB
MD53cd497079c5032b0f9147561383b9bfe
SHA119dc9ee49b125e82dbb6d6e4aaea309de57dddaa
SHA25651b315cbd60cd505af61f72e2d5616048edb4948d2d97b5421e87a4c269bcd3e
SHA51218382fb279658c390ad95a3af62346840cfd1393c0072111a795e21f4c02ddcce051cb77bb5bc664e183a6dfc9ac4c76c8ae51c50750ce7dd2a59a32cde7bd31
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82