IOC Report
Solara-3.0.exe

loading gif

Files

File Path
Type
Category
Malicious
Solara-3.0.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Solara-3.0.exe_21f26f2be0e9e9802a2c187ddde573df4cf61f70_1d855bed_8f1bc4db-ab38-4420-a0b7-6f92aa229a8b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C33.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Dec 21 18:51:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E28.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FCF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Solara-3.0.exe
"C:\Users\user\Desktop\Solara-3.0.exe"
malicious
C:\Users\user\Desktop\Solara-3.0.exe
"C:\Users\user\Desktop\Solara-3.0.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6464 -s 292

URLs

Name
IP
Malicious
https://discokeyus.lat/apic
unknown
sweepyribs.lat
necklacebudi.lat
https://discokeyus.lat/
unknown
https://discokeyus.lat/m
unknown
sustainskelet.lat
crosshuaht.lat
http://upx.sf.net
unknown
https://discokeyus.lat/H
unknown
rapeflowwj.lat
https://discokeyus.lat/api
172.67.197.170
aspecteirs.lat
grannyejh.lat
energyaffai.lat
discokeyus.lat
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discokeyus.lat
172.67.197.170
grannyejh.lat
unknown
sweepyribs.lat
unknown

IPs

IP
Domain
Country
Malicious
172.67.197.170
discokeyus.lat
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
ProgramId
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
FileId
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
LowerCaseLongPath
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
LongPathHash
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Name
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
OriginalFileName
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Publisher
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Version
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
BinFileVersion
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
BinaryType
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
ProductName
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
ProductVersion
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
LinkDate
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
BinProductVersion
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
AppxPackageFullName
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
AppxPackageRelativeId
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Size
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Language
\REGISTRY\A\{27ad08e8-d632-1cbb-c43e-bab0d98ec3fa}\Root\InventoryApplicationFile\solara-3.0.exe|8c17f6ad001c6e99
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
578C000
heap
page read and write
malicious
55FF000
stack
page read and write
461000
unkown
page execute read
5821000
heap
page read and write
6AFE000
stack
page read and write
48BC000
heap
page read and write
4DCC000
stack
page read and write
4785000
heap
page read and write
491000
unkown
page readonly
482D000
stack
page read and write
6460000
heap
page read and write
59C4000
heap
page read and write
4899000
heap
page read and write
491000
unkown
page readonly
4870000
heap
page read and write
6AAF000
stack
page read and write
5670000
heap
page read and write
5820000
heap
page read and write
49F000
unkown
page read and write
5345000
heap
page read and write
48B0000
heap
page read and write
531D000
heap
page read and write
6AB0000
remote allocation
page read and write
4B6E000
stack
page read and write
531D000
heap
page read and write
50FD000
stack
page read and write
48A0000
heap
page read and write
1F0000
heap
page read and write
461000
unkown
page execute read
4A7000
unkown
page write copy
4A7000
unkown
page write copy
461000
unkown
page execute read
19B000
stack
page read and write
4740000
heap
page read and write
6AB0000
remote allocation
page read and write
4895000
heap
page read and write
52FD000
stack
page read and write
644E000
stack
page read and write
460000
unkown
page readonly
5300000
heap
page read and write
5200000
heap
page read and write
47ED000
stack
page read and write
48CC000
heap
page read and write
640D000
stack
page read and write
6C6E000
stack
page read and write
5120000
heap
page read and write
5345000
heap
page read and write
4914000
heap
page read and write
491000
unkown
page readonly
69AF000
stack
page read and write
479B000
trusted library allocation
page read and write
4A7000
unkown
page write copy
6DB0000
heap
page read and write
460000
unkown
page readonly
527E000
stack
page read and write
5230000
heap
page read and write
592C000
heap
page read and write
48CC000
heap
page read and write
6AB0000
remote allocation
page read and write
530E000
heap
page read and write
48DF000
heap
page read and write
6BFC000
stack
page read and write
488C000
heap
page read and write
4A3000
unkown
page readonly
4A3000
unkown
page readonly
453000
remote allocation
page execute and read and write
52BE000
stack
page read and write
49E000
unkown
page write copy
530A000
heap
page read and write
48BC000
heap
page read and write
491000
unkown
page readonly
4A3000
unkown
page readonly
4914000
heap
page read and write
48C0000
heap
page read and write
48DF000
heap
page read and write
48E0000
heap
page read and write
460000
unkown
page readonly
5346000
heap
page read and write
4780000
heap
page read and write
48B0000
heap
page read and write
473E000
stack
page read and write
4790000
heap
page read and write
4898000
heap
page read and write
48BE000
heap
page read and write
460000
unkown
page readonly
4A6E000
stack
page read and write
486E000
stack
page read and write
4A3000
unkown
page readonly
5A9E000
heap
page read and write
577D000
stack
page read and write
461000
unkown
page execute read
49E000
unkown
page write copy
46FE000
stack
page read and write
45EC000
stack
page read and write
49E000
unkown
page execute and read and write
5325000
heap
page read and write
4A7000
unkown
page write copy
54FF000
stack
page read and write
68AE000
stack
page read and write
48A0000
heap
page read and write
6D6F000
stack
page read and write
4878000
heap
page read and write
49E000
unkown
page write copy
There are 94 hidden memdumps, click here to show them.