Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: http://https://https/:://websocketpp.processorGeneric |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: solara-executor.exe, solara-executor.exe, 00000000.00000003.2232020317.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2074279633.00000222F319A000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2199653922.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2227059974.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2082613170.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2072756351.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2145303034.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2178686050.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2067030788.00000222F319A000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2184889497.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2219899723.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2074279633.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2166260271.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2080366895.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2156057324.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2175367925.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2100840137.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2071892141.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2137868973.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/ |
Source: solara-executor.exe, 00000000.00000003.2232020317.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2199653922.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2227059974.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2082613170.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2072756351.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2145303034.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2178686050.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2184889497.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2219899723.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2074279633.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2166260271.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2080366895.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2156057324.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2175367925.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2100840137.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2071892141.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2137868973.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2060606863.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2117905861.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2097898815.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2067030788.00000222F31AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/# |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | String found in binary or memory: https://api.myip.com/Russia |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: solara-executor.exe | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage |
Source: solara-executor.exe | String found in binary or memory: https://github.com/ocornut/imgui/blob/master/docs/FAQ.md#qa-usage(Hold |
Source: solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: solara-executor.exe, 00000000.00000003.2052513631.00000222F4D23000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2052513631.00000222F4C1E000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2051057335.00000222F4C15000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: solara-executor.exe, 00000000.00000003.2057269427.00000222F4C49000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2160548698.00000222F4CE7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2196586491.00000222F4D52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E48905C4 | 0_2_00007FF6E48905C4 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E48905BC | 0_2_00007FF6E48905BC |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45897AC | 0_2_00007FF6E45897AC |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E4573F78 | 0_2_00007FF6E4573F78 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E459A920 | 0_2_00007FF6E459A920 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E458A110 | 0_2_00007FF6E458A110 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45A121C | 0_2_00007FF6E45A121C |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45AC1D0 | 0_2_00007FF6E45AC1D0 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E457AB6C | 0_2_00007FF6E457AB6C |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45A2C90 | 0_2_00007FF6E45A2C90 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45A251C | 0_2_00007FF6E45A251C |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00007FF6E45AACE4 | 0_2_00007FF6E45AACE4 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00000222F2D63841 | 0_2_00000222F2D63841 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00000222F2D2BA30 | 0_2_00000222F2D2BA30 |
Source: C:\Users\user\Desktop\solara-executor.exe | Code function: 0_2_00000222F2E00FD0 | 0_2_00000222F2E00FD0 |
Source: solara-executor.exe, 00000000.00000003.3388060075.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2156197563.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2166761806.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2118627342.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2109491663.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2549868778.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2755972358.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.3030464268.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.4114104576.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2273256199.00000222F4BEF000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE server_addresses (id VARCHAR, company_name VARCHAR, street_address VARCHAR, address_1 VARCHAR, address_2 VARCHAR, address_3 VARCHAR, address_4 VARCHAR, postal_code VARCHAR, sorting_code VARCHAR, country_code VARCHAR, language_code VARCHAR, recipient_name VARCHAR, phone_number VARCHAR)LGB@;8 |
Source: solara-executor.exe, 00000000.00000002.4465244474.00000222EE591000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE web_app_manifest_section ( expire_date INTEGER NOT NULL DEFAULT 0, id VARCHAR, min_version INTEGER NOT NULL DEFAULT 0, fingerprints BLOB)taEM32; |
Source: solara-executor.exe, 00000000.00000003.2882854120.00000222F4BA7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2238530225.00000222F4BA7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.4114104576.00000222F4BA7000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4468931771.00000222F4BA7000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE clusters_and_visits(cluster_id INTEGER NOT NULL,visit_id INTEGER NOT NULL,score NUMERIC DEFAULT 0 NOT NULL,engagement_score NUMERIC DEFAULT 0 NOT NULL,url_for_deduping LONGVARCHAR NOT NULL,normalized_url LONGVARCHAR NOT NULL,url_for_display LONGVARCHAR NOT NULL,interaction_state INTEGER DEFAULT 0 NOT NULL,PRIMARY KEY(cluster_id,visit_id))WITHOUT ROWIDGER DEFAU; |
Source: solara-executor.exe, 00000000.00000003.2266396067.00000222F4C11000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2415984426.00000222F4C01000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: xinput1_4.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: devobj.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: inputhost.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: solara-executor.exe, 00000000.00000002.4473615130.00007FF6E4877000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware ToolsNOPQRSTUVWXYZABCDEFGHIJKLMnopqrstuvwxyzabcdefghijklm0123456789+/LoadLibraryA |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655x |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsdvboxserviceu |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxservice |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtrayx64dbgh |
Source: solara-executor.exe, 00000000.00000002.4473615130.00007FF6E4877000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: Kernel32.dllKernel32.dll\\.\VBoxMiniRdrDN |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: discord.comVMware20,11696428655f |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.co.inVMware20,11696428655d |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - COM.HKVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwareuser |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: global block list test formVMware20,11696428655 |
Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4473615130.00007FF6E4877000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: \\.\VBoxMiniRdrDN |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Transaction PasswordVMware20,11696428655} |
Source: solara-executor.exe, 00000000.00000003.3877800093.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2253178530.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2162048817.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2113628517.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.4395331320.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2062141274.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2072067263.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2088520036.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000003.2200173257.00000222F2CD4000.00000004.00000020.00020000.00000000.sdmp, solara-executor.exe, 00000000.00000002.4466413673.00000222F2C6F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655^ |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: account.microsoft.com/profileVMware20,11696428655u |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmwaretray |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: secure.bankofamerica.comVMware20,11696428655|UE |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.comVMware20,11696428655} |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - EU WestVMware20,11696428655n |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office365.comVMware20,11696428655t |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: microsoft.visualstudio.comVMware20,11696428655x |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-gaVGAuthServicevmwaretrayv |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Canara Change Transaction PasswordVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: outlook.office.comVMware20,11696428655s |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: www.interactivebrokers.co.inVMware20,11696428655~ |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: ms.portal.azure.comVMware20,11696428655 |
Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vboxtray |
Source: solara-executor.exe, solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: qemu-ga |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: AMC password management pageVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: tasks.office.comVMware20,11696428655o |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: turbotax.intuit.comVMware20,11696428655t |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: interactivebrokers.comVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: dev.azure.comVMware20,11696428655j |
Source: solara-executor.exe, 00000000.00000002.4473615130.00007FF6E4877000.00000004.00000001.01000000.00000003.sdmp | Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: netportal.hdfcbank.comVMware20,11696428655 |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: wiresharkvmwareuseri |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Interactive Brokers - HKVMware20,11696428655] |
Source: solara-executor.exe, 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp | Binary or memory string: vmtoolsd |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: bankofamerica.comVMware20,11696428655x |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: trackpan.utiitsl.comVMware20,11696428655h |
Source: solara-executor.exe, 00000000.00000003.2173256789.00000222F4B6D000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Test URL for global passwords blocklistVMware20,11696428655 |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQuerySystemInformation: Direct from: 0x7FF6E49F914E | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQuerySystemInformation: Direct from: 0x7FF6E49D97C5 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQuerySystemInformation: Direct from: 0x7FF6E49C6F8F | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQueryInformationProcess: Direct from: 0x7FF6E49D846F | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQuerySystemInformation: Direct from: 0x7FF6E49E0143 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtQuerySystemInformation: Direct from: 0x7FF6E4A23BD8 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtSetInformationThread: Direct from: 0x7FF6E49FA46E | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtProtectVirtualMemory: Direct from: 0x7FF6E4A1D1F7 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtSetInformationThread: Direct from: 0x7FF6E49AD260 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtProtectVirtualMemory: Direct from: 0x7FF6E49B6188 | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | NtProtectVirtualMemory: Direct from: 0x7FF6E4A111CC | Jump to behavior |
Source: solara-executor.exe | String found in binary or memory: Electrum |
Source: solara-executor.exe | String found in binary or memory: ElectronCash |
Source: solara-executor.exe | String found in binary or memory: \com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb |
Source: solara-executor.exe | String found in binary or memory: \Exodus\exodus.wallet |
Source: solara-executor.exe | String found in binary or memory: \Ethereum\keystore |
Source: solara-executor.exe | String found in binary or memory: \Exodus\exodus.wallet |
Source: solara-executor.exe | String found in binary or memory: \Ethereum\keystore |
Source: solara-executor.exe | String found in binary or memory: \Coinomi\Coinomi\wallets |
Source: solara-executor.exe | String found in binary or memory: \Ethereum\keystore |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\solara-executor.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: Yara match | File source: 0.2.solara-executor.exe.222f2e581d0.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000003.2761532245.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2056776668.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2420217075.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2739690961.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2196586491.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2213922376.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2423302535.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2415984426.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2150461752.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2759173267.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2160548698.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2238530225.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2273256199.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2224476182.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2066825845.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4467869232.00000222F2D10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2109491663.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2129395801.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2448092011.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2266396067.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2258876051.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2189727230.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2250896575.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2755972358.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2229406171.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2125885837.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000003.2173256789.00000222F4AF3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: solara-executor.exe PID: 5628, type: MEMORYSTR |