Windows
Analysis Report
Solara-Roblox-Executor-v3.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Solara-Roblox-Executor-v3.exe (PID: 5344 cmdline:
"C:\Users\ user\Deskt op\Solara- Roblox-Exe cutor-v3.e xe" MD5: D2B09B1BDA10143724A24534E31D44DB) - conhost.exe (PID: 5756 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Solara-Roblox-Executor-v3.exe (PID: 3136 cmdline:
"C:\Users\ user\Deskt op\Solara- Roblox-Exe cutor-v3.e xe" MD5: D2B09B1BDA10143724A24534E31D44DB) - Solara-Roblox-Executor-v3.exe (PID: 5696 cmdline:
"C:\Users\ user\Deskt op\Solara- Roblox-Exe cutor-v3.e xe" MD5: D2B09B1BDA10143724A24534E31D44DB) - Solara-Roblox-Executor-v3.exe (PID: 4324 cmdline:
"C:\Users\ user\Deskt op\Solara- Roblox-Exe cutor-v3.e xe" MD5: D2B09B1BDA10143724A24534E31D44DB) - Solara-Roblox-Executor-v3.exe (PID: 2828 cmdline:
"C:\Users\ user\Deskt op\Solara- Roblox-Exe cutor-v3.e xe" MD5: D2B09B1BDA10143724A24534E31D44DB)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["nearycrepso.shop", "fancywaxxers.shop", "cloudewahsj.shop", "noisycuttej.shop", "abruptyopsn.shop", "wholersorie.shop", "rabidcowse.shop", "framekgirus.shop", "tirepublicerj.shop"], "Build id": "yau6Na--899083440"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:06.923281+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.463581+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:09.664220+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:10.741890+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:12.278928+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:13.856635+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:15.337203+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:18.415376+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49711 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:07.532015+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.907058+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:07.532015+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:08.907058+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:06.923281+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.463581+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:09.664220+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:10.741890+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:12.278928+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:13.856635+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:15.337203+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:18.415376+0100 | 2058657 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49711 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:06.437136+0100 | 2058656 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 57343 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:14.427599+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 6_2_0041726D |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0030B6E8 | |
Source: | Code function: | 0_2_0030B799 | |
Source: | Code function: | 3_2_0030B6E8 | |
Source: | Code function: | 3_2_0030B799 |
Source: | Code function: | 6_2_0043A940 | |
Source: | Code function: | 6_2_0043E910 | |
Source: | Code function: | 6_2_0040DA95 | |
Source: | Code function: | 6_2_00426470 | |
Source: | Code function: | 6_2_004374E0 | |
Source: | Code function: | 6_2_004374E0 | |
Source: | Code function: | 6_2_00417058 | |
Source: | Code function: | 6_2_0043B060 | |
Source: | Code function: | 6_2_00426800 | |
Source: | Code function: | 6_2_00422810 | |
Source: | Code function: | 6_2_00426820 | |
Source: | Code function: | 6_2_00426820 | |
Source: | Code function: | 6_2_00426820 | |
Source: | Code function: | 6_2_004160E7 | |
Source: | Code function: | 6_2_004160E7 | |
Source: | Code function: | 6_2_004160E7 | |
Source: | Code function: | 6_2_0043C8EF | |
Source: | Code function: | 6_2_0041A0F0 | |
Source: | Code function: | 6_2_0041C8B0 | |
Source: | Code function: | 6_2_004240B0 | |
Source: | Code function: | 6_2_004240B0 | |
Source: | Code function: | 6_2_00417957 | |
Source: | Code function: | 6_2_0042D109 | |
Source: | Code function: | 6_2_00422130 | |
Source: | Code function: | 6_2_00422130 | |
Source: | Code function: | 6_2_0041993B | |
Source: | Code function: | 6_2_00425A00 | |
Source: | Code function: | 6_2_00424200 | |
Source: | Code function: | 6_2_00424200 | |
Source: | Code function: | 6_2_0042C20F | |
Source: | Code function: | 6_2_0042C20F | |
Source: | Code function: | 6_2_0043B210 | |
Source: | Code function: | 6_2_0043B210 | |
Source: | Code function: | 6_2_0043B210 | |
Source: | Code function: | 6_2_0043DAC5 | |
Source: | Code function: | 6_2_0042A2E0 | |
Source: | Code function: | 6_2_00420A90 | |
Source: | Code function: | 6_2_00402B40 | |
Source: | Code function: | 6_2_0042635C | |
Source: | Code function: | 6_2_0042C20A | |
Source: | Code function: | 6_2_00415B6C | |
Source: | Code function: | 6_2_0040D32F | |
Source: | Code function: | 6_2_004073A0 | |
Source: | Code function: | 6_2_004073A0 | |
Source: | Code function: | 6_2_0041644B | |
Source: | Code function: | 6_2_0041644B | |
Source: | Code function: | 6_2_00434C50 | |
Source: | Code function: | 6_2_0042D479 | |
Source: | Code function: | 6_2_00428423 | |
Source: | Code function: | 6_2_00417CC7 | |
Source: | Code function: | 6_2_00416CC8 | |
Source: | Code function: | 6_2_00421D50 | |
Source: | Code function: | 6_2_00437D00 | |
Source: | Code function: | 6_2_00437D00 | |
Source: | Code function: | 6_2_00408DE0 | |
Source: | Code function: | 6_2_004255F0 | |
Source: | Code function: | 6_2_00417582 | |
Source: | Code function: | 6_2_00422D94 | |
Source: | Code function: | 6_2_0042C5AC | |
Source: | Code function: | 6_2_00423DB0 | |
Source: | Code function: | 6_2_00423DB0 | |
Source: | Code function: | 6_2_00423DB0 | |
Source: | Code function: | 6_2_00426DB6 | |
Source: | Code function: | 6_2_00426DB6 | |
Source: | Code function: | 6_2_00426DB6 | |
Source: | Code function: | 6_2_0043AE40 | |
Source: | Code function: | 6_2_0041E660 | |
Source: | Code function: | 6_2_0042C569 | |
Source: | Code function: | 6_2_0042C600 | |
Source: | Code function: | 6_2_0043E630 | |
Source: | Code function: | 6_2_004296D5 | |
Source: | Code function: | 6_2_00416ED8 | |
Source: | Code function: | 6_2_00416ED8 | |
Source: | Code function: | 6_2_004386F9 | |
Source: | Code function: | 6_2_00414EA0 | |
Source: | Code function: | 6_2_0040C6B5 | |
Source: | Code function: | 6_2_00417F48 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_0041C7A2 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 6_2_00433070 |
Source: | Code function: | 6_2_00433070 |
Source: | Code function: | 6_2_00433210 |
Source: | Code function: | 0_2_0030EA8E | |
Source: | Code function: | 0_2_00303440 | |
Source: | Code function: | 0_2_00310502 | |
Source: | Code function: | 0_2_002FDDE2 | |
Source: | Code function: | 0_2_002F96DB | |
Source: | Code function: | 3_2_0030EA8E | |
Source: | Code function: | 3_2_00303440 | |
Source: | Code function: | 3_2_00310502 | |
Source: | Code function: | 3_2_002FDDE2 | |
Source: | Code function: | 3_2_002F96DB | |
Source: | Code function: | 6_2_00423811 | |
Source: | Code function: | 6_2_0042B8C3 | |
Source: | Code function: | 6_2_0043A940 | |
Source: | Code function: | 6_2_0043EA10 | |
Source: | Code function: | 6_2_0040DA95 | |
Source: | Code function: | 6_2_0043F370 | |
Source: | Code function: | 6_2_0040CBF6 | |
Source: | Code function: | 6_2_00410BB3 | |
Source: | Code function: | 6_2_00426470 | |
Source: | Code function: | 6_2_004374E0 | |
Source: | Code function: | 6_2_00421570 | |
Source: | Code function: | 6_2_00408690 | |
Source: | Code function: | 6_2_00418F2D | |
Source: | Code function: | 6_2_00426800 | |
Source: | Code function: | 6_2_00422810 | |
Source: | Code function: | 6_2_0042781B | |
Source: | Code function: | 6_2_004058C0 | |
Source: | Code function: | 6_2_004160E7 | |
Source: | Code function: | 6_2_004298E8 | |
Source: | Code function: | 6_2_0041A0F0 | |
Source: | Code function: | 6_2_00409090 | |
Source: | Code function: | 6_2_004038B0 | |
Source: | Code function: | 6_2_0041D0B0 | |
Source: | Code function: | 6_2_0041C8B0 | |
Source: | Code function: | 6_2_004240B0 | |
Source: | Code function: | 6_2_00406140 | |
Source: | Code function: | 6_2_0043E170 | |
Source: | Code function: | 6_2_0043C11D | |
Source: | Code function: | 6_2_0043B920 | |
Source: | Code function: | 6_2_00428125 | |
Source: | Code function: | 6_2_00422130 | |
Source: | Code function: | 6_2_0041993B | |
Source: | Code function: | 6_2_0042D1E2 | |
Source: | Code function: | 6_2_00429195 | |
Source: | Code function: | 6_2_00404260 | |
Source: | Code function: | 6_2_00425A00 | |
Source: | Code function: | 6_2_00424200 | |
Source: | Code function: | 6_2_0043B210 | |
Source: | Code function: | 6_2_0043E220 | |
Source: | Code function: | 6_2_0042CA26 | |
Source: | Code function: | 6_2_0043DAC5 | |
Source: | Code function: | 6_2_004287C5 | |
Source: | Code function: | 6_2_0041DA80 | |
Source: | Code function: | 6_2_00412290 | |
Source: | Code function: | 6_2_0043E2B0 | |
Source: | Code function: | 6_2_0041536B | |
Source: | Code function: | 6_2_00415B6C | |
Source: | Code function: | 6_2_0043CB72 | |
Source: | Code function: | 6_2_0040C321 | |
Source: | Code function: | 6_2_0041B330 | |
Source: | Code function: | 6_2_0040EBD0 | |
Source: | Code function: | 6_2_0041E3F0 | |
Source: | Code function: | 6_2_00404B90 | |
Source: | Code function: | 6_2_004073A0 | |
Source: | Code function: | 6_2_00436BB0 | |
Source: | Code function: | 6_2_0041644B | |
Source: | Code function: | 6_2_0042D479 | |
Source: | Code function: | 6_2_0042B8C3 | |
Source: | Code function: | 6_2_0042EC22 | |
Source: | Code function: | 6_2_00432C30 | |
Source: | Code function: | 6_2_0043ECC0 | |
Source: | Code function: | 6_2_004094E0 | |
Source: | Code function: | 6_2_0042BCED | |
Source: | Code function: | 6_2_0041848E | |
Source: | Code function: | 6_2_00445CA9 | |
Source: | Code function: | 6_2_00421D50 | |
Source: | Code function: | 6_2_0040955D | |
Source: | Code function: | 6_2_00438560 | |
Source: | Code function: | 6_2_0041DD00 | |
Source: | Code function: | 6_2_0042FD39 | |
Source: | Code function: | 6_2_0043BDEE | |
Source: | Code function: | 6_2_00405D80 | |
Source: | Code function: | 6_2_00417582 | |
Source: | Code function: | 6_2_00425D87 | |
Source: | Code function: | 6_2_00422D94 | |
Source: | Code function: | 6_2_0042B5A2 | |
Source: | Code function: | 6_2_0042C5AC | |
Source: | Code function: | 6_2_00423DB0 | |
Source: | Code function: | 6_2_00426DB6 | |
Source: | Code function: | 6_2_0041E660 | |
Source: | Code function: | 6_2_00435E62 | |
Source: | Code function: | 6_2_00414670 | |
Source: | Code function: | 6_2_0042C600 | |
Source: | Code function: | 6_2_00436E10 | |
Source: | Code function: | 6_2_0043E630 | |
Source: | Code function: | 6_2_0040AE34 | |
Source: | Code function: | 6_2_0041F6E0 | |
Source: | Code function: | 6_2_004386F9 | |
Source: | Code function: | 6_2_00402E80 | |
Source: | Code function: | 6_2_00414EA0 | |
Source: | Code function: | 6_2_00417F48 | |
Source: | Code function: | 6_2_00437F50 | |
Source: | Code function: | 6_2_0043DF60 | |
Source: | Code function: | 6_2_0041171D | |
Source: | Code function: | 6_2_0043571D | |
Source: | Code function: | 6_2_004287C5 | |
Source: | Code function: | 6_2_0040A7D0 | |
Source: | Code function: | 6_2_0043EFF0 | |
Source: | Code function: | 6_2_0040E7AC |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 6_2_004374E0 |
Source: | Mutant created: |
Source: | Command line argument: | 0_2_00305440 | |
Source: | Command line argument: | 3_2_00305440 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_002F9DBD | |
Source: | Code function: | 3_2_002F9DBD | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_0302A072 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_02FC0F11 | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA | |
Source: | Code function: | 6_3_030267BA |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_0030B6E8 | |
Source: | Code function: | 0_2_0030B799 | |
Source: | Code function: | 3_2_0030B6E8 | |
Source: | Code function: | 3_2_0030B799 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 6_2_0043C6B0 |
Source: | Code function: | 0_2_00301A60 |
Source: | Code function: | 0_2_0032019E | |
Source: | Code function: | 0_2_002F1BA0 | |
Source: | Code function: | 3_2_002F1BA0 |
Source: | Code function: | 0_2_00307020 |
Source: | Code function: | 0_2_002F9A67 | |
Source: | Code function: | 0_2_00301A60 | |
Source: | Code function: | 0_2_002F9A73 | |
Source: | Code function: | 0_2_002F96B3 | |
Source: | Code function: | 3_2_002F9A67 | |
Source: | Code function: | 3_2_00301A60 | |
Source: | Code function: | 3_2_002F9A73 | |
Source: | Code function: | 3_2_002F96B3 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_0032019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_003068FD | |
Source: | Code function: | 0_2_0030B0C5 | |
Source: | Code function: | 0_2_0030B110 | |
Source: | Code function: | 0_2_0030B1B7 | |
Source: | Code function: | 0_2_0030AA37 | |
Source: | Code function: | 0_2_0030B2BD | |
Source: | Code function: | 0_2_003063F5 | |
Source: | Code function: | 0_2_0030AC88 | |
Source: | Code function: | 0_2_0030AD30 | |
Source: | Code function: | 0_2_0030AF83 | |
Source: | Code function: | 0_2_0030AFF0 | |
Source: | Code function: | 3_2_003068FD | |
Source: | Code function: | 3_2_0030B0C5 | |
Source: | Code function: | 3_2_0030B110 | |
Source: | Code function: | 3_2_0030B1B7 | |
Source: | Code function: | 3_2_0030AA37 | |
Source: | Code function: | 3_2_0030B2BD | |
Source: | Code function: | 3_2_003063F5 | |
Source: | Code function: | 3_2_0030AC88 | |
Source: | Code function: | 3_2_0030AD30 | |
Source: | Code function: | 3_2_0030AF83 | |
Source: | Code function: | 3_2_0030AFF0 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_002FA335 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 241 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 11 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 33 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.96.1 | true | false | high | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.96.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582867 |
Start date and time: | 2024-12-31 17:22:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 14s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Solara-Roblox-Executor-v3.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@10/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Solara-Roblox-Executor-v3.exe, PID 3136 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Solara-Roblox-Executor-v3.exe
Time | Type | Description |
---|---|---|
11:23:07 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.96.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | Vidar | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Babadeda, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.820425867551472 |
TrID: |
|
File name: | Solara-Roblox-Executor-v3.exe |
File size: | 814'592 bytes |
MD5: | d2b09b1bda10143724a24534e31d44db |
SHA1: | 6838edf7603b3a2be8195f5029223c808cdde9a4 |
SHA256: | 0336d6c3b8629f426c417a0999b65f74e804d11b28412482d72a004a9c6019a1 |
SHA512: | 0274d0ac02d12c5a71d1b03e38be8a1ce6c3b2bd4553f96f3225cd68ef25f8097e22ec516b06d72d9cdafc20dbaed4424a52e9b1abb2eec7a9f7ee5a3c86f4d8 |
SSDEEP: | 24576:FK1PSMZAM9AlqJkztYouKM9AlqJkztYoub:A1PS4AM9WqJTKM9WqJTb |
TLSH: | 2905021134C08072D9B7357B19F9D7B6563EE9200F12AADF5B880F7A8F361C19B7462A |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....sg.................H........................@.......................................@.....................................(.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40a2e0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6773E4A4 [Tue Dec 31 12:33:40 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 019ac8c6e24f80fb88de699b6749f599 |
Instruction |
---|
call 00007F01787E026Ah |
jmp 00007F01787E00CDh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007F01787E0266h |
test esi, ecx |
jne 00007F01787E0288h |
call 00007F01787E0291h |
mov ecx, eax |
cmp ecx, edi |
jne 00007F01787E0269h |
mov ecx, BB40E64Fh |
jmp 00007F01787E0270h |
test esi, ecx |
jne 00007F01787E026Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E8D8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E894h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E890h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E920h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431AB8h |
call dword ptr [0042E8F8h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e6c4 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x34000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x1b90 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e834 | 0x148 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x247da | 0x24800 | ba0610d1e4ecb6f5f64959d9eb5b455a | False | 0.5549951840753424 | data | 6.559506263512015 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9eb4 | 0xa000 | 53eba87ddc7d2455b0ac2836680b1660 | False | 0.428271484375 | DOS executable (COM) | 4.9181666163124085 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2280 | 0x1600 | 112d0c9e43893ae5b7f96d23807996ac | False | 0.39506392045454547 | data | 4.581141173428789 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x33000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x34000 | 0xe8 | 0x200 | 03d6bf5d1e31277fc8fb90374111d794 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1b90 | 0x1c00 | 3080b38ba0e27b64b3ab5ca0f93c1c7c | False | 0.7785993303571429 | data | 6.532705218372571 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x37000 | 0x4a400 | 0x4a400 | f0bfd66820f6bd7ba7131c8790d125ce | False | 1.0003320970117846 | data | 7.999394684755566 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.BSS | 0x82000 | 0x4a400 | 0x4a400 | f0bfd66820f6bd7ba7131c8790d125ce | False | 1.0003320970117846 | data | 7.999394684755566 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x34060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:23:06.437136+0100 | 2058656 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fancywaxxers .shop) | 1 | 192.168.2.5 | 57343 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:23:06.923281+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:06.923281+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:07.532015+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:07.532015+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.463581+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.463581+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.907058+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:08.907058+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:09.664220+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:09.664220+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:10.741890+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:10.741890+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:12.278928+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:12.278928+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:13.856635+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:13.856635+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:14.427599+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:15.337203+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:15.337203+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:18.415376+0100 | 2058657 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (fancywaxxers .shop in TLS SNI) | 1 | 192.168.2.5 | 49711 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:23:18.415376+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49711 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:23:06.457516909 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:06.457534075 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:06.457617044 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:06.458987951 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:06.458995104 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:06.923199892 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:06.923280954 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:06.929646015 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:06.929653883 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:06.929847002 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:06.977802038 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.111864090 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.111888885 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.111979008 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:07.532030106 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:07.532140970 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:07.532197952 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.559921026 CET | 49704 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.559941053 CET | 443 | 49704 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:07.849612951 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.849638939 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:07.849713087 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.850034952 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:07.850052118 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.463354111 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.463581085 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.465022087 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.465035915 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.465291023 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.466490984 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.466521978 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.466557980 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907066107 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907126904 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907155037 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907180071 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.907195091 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907206059 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907358885 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.907373905 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907421112 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.907675028 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907741070 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.907785892 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.907793045 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.908253908 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.908287048 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.908304930 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.908313990 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.908360004 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.911674023 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.962137938 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.995542049 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995635033 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995666027 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995692968 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.995702982 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995744944 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.995750904 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995786905 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.995831013 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.996834993 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.996850967 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:08.996862888 CET | 49705 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:08.996866941 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.190922976 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.190962076 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.191030025 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.191288948 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.191297054 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.664005995 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.664220095 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.665476084 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.665481091 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.665712118 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:09.666884899 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.667011976 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:09.667037010 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.168680906 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.168797016 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.168966055 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.169003963 CET | 49706 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.169018030 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.285511971 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.285577059 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.285657883 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.285933971 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.285952091 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.741821051 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.741889954 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.768934965 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.768951893 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.769215107 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.814692020 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.814912081 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.814946890 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:10.815006971 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:10.815013885 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:11.637209892 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:11.637317896 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:11.637376070 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:11.637482882 CET | 49707 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:11.637506008 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:11.819955111 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:11.819994926 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:11.820067883 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:11.820446014 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:11.820462942 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.278779984 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.278928041 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.279979944 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.279992104 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.280194998 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.281213999 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.281348944 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.281380892 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.281455994 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.281466007 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.890795946 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.890902996 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:12.890990973 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.893824100 CET | 49708 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:12.893845081 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.388387918 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.388418913 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.388530016 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.388819933 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.388832092 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.856425047 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.856635094 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.970096111 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.970114946 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.970323086 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:13.971477985 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.971574068 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:13.971580982 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:14.427613020 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:14.427712917 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:14.427809000 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:14.428220034 CET | 49709 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:14.428236008 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:14.868647099 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:14.868697882 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:14.868782043 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:14.869168043 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:14.869184971 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.336997986 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.337203026 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.339087009 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.339097023 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.339333057 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.384015083 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.390537024 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.391273022 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.391308069 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.392070055 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.392107010 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.392915010 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.392951012 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.393071890 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.393110037 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.393588066 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.393623114 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.393779039 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.393801928 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.393811941 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.393825054 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.393999100 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.394025087 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.394043922 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.394280910 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.394309044 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.402010918 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.402168989 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.402201891 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.402205944 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.402226925 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:15.402241945 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.402277946 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:15.406722069 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:17.996165037 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:17.996280909 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:17.996340990 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:17.996503115 CET | 49710 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:17.996526003 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:18.030714035 CET | 49711 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:18.030755997 CET | 443 | 49711 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:18.030965090 CET | 49711 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:18.031116009 CET | 49711 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:18.031128883 CET | 443 | 49711 | 104.21.96.1 | 192.168.2.5 |
Dec 31, 2024 17:23:18.415375948 CET | 49711 | 443 | 192.168.2.5 | 104.21.96.1 |
Dec 31, 2024 17:23:25.314273119 CET | 52375 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 31, 2024 17:23:25.320036888 CET | 53 | 52375 | 1.1.1.1 | 192.168.2.5 |
Dec 31, 2024 17:23:25.320125103 CET | 52375 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 31, 2024 17:23:25.324908972 CET | 53 | 52375 | 1.1.1.1 | 192.168.2.5 |
Dec 31, 2024 17:23:25.792817116 CET | 52375 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 31, 2024 17:23:25.799599886 CET | 53 | 52375 | 1.1.1.1 | 192.168.2.5 |
Dec 31, 2024 17:23:25.799662113 CET | 52375 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:23:06.437135935 CET | 57343 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 31, 2024 17:23:06.451248884 CET | 53 | 57343 | 1.1.1.1 | 192.168.2.5 |
Dec 31, 2024 17:23:25.312870026 CET | 53 | 65181 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:23:06.437135935 CET | 192.168.2.5 | 1.1.1.1 | 0xe903 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:06.451248884 CET | 1.1.1.1 | 192.168.2.5 | 0xe903 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:24.831779957 CET | 1.1.1.1 | 192.168.2.5 | 0xac6e | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 31, 2024 17:23:24.831779957 CET | 1.1.1.1 | 192.168.2.5 | 0xac6e | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:07 UTC | 264 | OUT | |
2024-12-31 16:23:07 UTC | 8 | OUT | |
2024-12-31 16:23:07 UTC | 1131 | IN | |
2024-12-31 16:23:07 UTC | 7 | IN | |
2024-12-31 16:23:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:08 UTC | 265 | OUT | |
2024-12-31 16:23:08 UTC | 51 | OUT | |
2024-12-31 16:23:08 UTC | 1136 | IN | |
2024-12-31 16:23:08 UTC | 233 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 277 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN | |
2024-12-31 16:23:08 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49706 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:09 UTC | 278 | OUT | |
2024-12-31 16:23:09 UTC | 12809 | OUT | |
2024-12-31 16:23:10 UTC | 1138 | IN | |
2024-12-31 16:23:10 UTC | 20 | IN | |
2024-12-31 16:23:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49707 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:10 UTC | 284 | OUT | |
2024-12-31 16:23:10 UTC | 15087 | OUT | |
2024-12-31 16:23:11 UTC | 1137 | IN | |
2024-12-31 16:23:11 UTC | 20 | IN | |
2024-12-31 16:23:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49708 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:12 UTC | 283 | OUT | |
2024-12-31 16:23:12 UTC | 15331 | OUT | |
2024-12-31 16:23:12 UTC | 5240 | OUT | |
2024-12-31 16:23:12 UTC | 1137 | IN | |
2024-12-31 16:23:12 UTC | 20 | IN | |
2024-12-31 16:23:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49709 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:13 UTC | 278 | OUT | |
2024-12-31 16:23:13 UTC | 1236 | OUT | |
2024-12-31 16:23:14 UTC | 1134 | IN | |
2024-12-31 16:23:14 UTC | 20 | IN | |
2024-12-31 16:23:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49710 | 104.21.96.1 | 443 | 2828 | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:23:15 UTC | 280 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:15 UTC | 15331 | OUT | |
2024-12-31 16:23:17 UTC | 1137 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:23:04 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2f0000 |
File size: | 814'592 bytes |
MD5 hash: | D2B09B1BDA10143724A24534E31D44DB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:23:04 |
Start date: | 31/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 11:23:05 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x2f0000 |
File size: | 814'592 bytes |
MD5 hash: | D2B09B1BDA10143724A24534E31D44DB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 11:23:05 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x2f0000 |
File size: | 814'592 bytes |
MD5 hash: | D2B09B1BDA10143724A24534E31D44DB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 11:23:05 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x2f0000 |
File size: | 814'592 bytes |
MD5 hash: | D2B09B1BDA10143724A24534E31D44DB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 11:23:05 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Solara-Roblox-Executor-v3.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2f0000 |
File size: | 814'592 bytes |
MD5 hash: | D2B09B1BDA10143724A24534E31D44DB |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 8.2% |
Dynamic/Decrypted Code Coverage: | 0.4% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 29 |
Graph
Function 0032019E Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F1C10 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00306642 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F20C0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 33libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00306E2A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F1DB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003072A8 Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00307192 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F2010 Relevance: 3.0, APIs: 2, Instructions: 34COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003056B7 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F14C0 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00307837 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F8570 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003056F1 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B1B7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00303440 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B799 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F9A73 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FA335 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030AD30 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F96DB Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B6E8 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030AFF0 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FDDE2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B110 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B2BD Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F9A67 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00307020 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F1BA0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003085B6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00304D4C Relevance: 10.8, APIs: 2, Strings: 4, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00312E9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FF1F8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030F6B0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B576 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FCA12 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030C96E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030A126 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00305170 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003049DC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030AA37 Relevance: 7.7, APIs: 5, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00303440 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B799 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F9A73 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F1C10 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 108libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003141D2 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003085B6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FF1F8 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00312E9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030446D Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00306E2A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F1DB0 Relevance: 7.1, APIs: 1, Strings: 3, Instructions: 78libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002F20C0 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 33libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030F6B0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030D74E Relevance: 6.3, APIs: 4, Instructions: 333fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030B576 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 002FCA12 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0030C96E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00314490 Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 003062F6 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 22memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 34.6% |
Total number of Nodes: | 240 |
Total number of Limit Nodes: | 17 |
Graph
Function 00433210 Relevance: 30.0, APIs: 16, Strings: 1, Instructions: 245windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004374E0 Relevance: 26.9, APIs: 11, Strings: 4, Instructions: 670memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408690 Relevance: 7.7, APIs: 5, Instructions: 211threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410BB3 Relevance: 2.4, APIs: 1, Instructions: 888COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C6B0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D479 Relevance: 1.4, Strings: 1, Instructions: 174COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E910 Relevance: 1.3, Strings: 1, Instructions: 89COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426470 Relevance: .3, Instructions: 331COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A940 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BFE5 Relevance: 3.1, APIs: 2, Instructions: 87COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BFE3 Relevance: 3.1, APIs: 2, Instructions: 69COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BF95 Relevance: 1.6, APIs: 1, Instructions: 67COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D863 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004366F3 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C50F Relevance: 1.5, APIs: 1, Instructions: 49libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C640 Relevance: 1.5, APIs: 1, Instructions: 42memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430999 Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432527 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C650 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C683 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C7B9 Relevance: 1.5, APIs: 1, Instructions: 16COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A910 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043A8DB Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C6B5 Relevance: 22.8, Strings: 18, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422810 Relevance: 20.4, Strings: 16, Instructions: 446COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426800 Relevance: 10.6, Strings: 8, Instructions: 618COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C8B0 Relevance: 8.2, Strings: 6, Instructions: 694COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E660 Relevance: 7.1, Strings: 5, Instructions: 827COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041644B Relevance: 4.3, Strings: 3, Instructions: 580COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426DB6 Relevance: 4.3, Strings: 3, Instructions: 503COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422130 Relevance: 4.2, Strings: 3, Instructions: 455COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420A90 Relevance: 4.2, Strings: 3, Instructions: 444COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416CC8 Relevance: 4.0, Strings: 3, Instructions: 298COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C5AC Relevance: 3.9, Strings: 3, Instructions: 191COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C600 Relevance: 3.9, Strings: 3, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417957 Relevance: 3.9, Strings: 3, Instructions: 186COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C569 Relevance: 3.9, Strings: 3, Instructions: 142COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C20A Relevance: 3.8, Strings: 3, Instructions: 32COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417582 Relevance: 2.8, Strings: 2, Instructions: 344COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425A00 Relevance: 2.8, Strings: 2, Instructions: 262COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408DE0 Relevance: 2.8, Strings: 2, Instructions: 255COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004296D5 Relevance: 2.6, Strings: 2, Instructions: 52COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422D94 Relevance: 2.0, Strings: 1, Instructions: 723COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B210 Relevance: 1.8, Strings: 1, Instructions: 592COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417F48 Relevance: 1.7, Strings: 1, Instructions: 424COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004386F9 Relevance: 1.7, Strings: 1, Instructions: 423COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421D50 Relevance: 1.6, Strings: 1, Instructions: 355COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041993B Relevance: 1.6, Strings: 1, Instructions: 317COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415B6C Relevance: 1.6, Strings: 1, Instructions: 311COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004160E7 Relevance: 1.5, Strings: 1, Instructions: 266COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428423 Relevance: 1.5, Strings: 1, Instructions: 247COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E630 Relevance: 1.5, Strings: 1, Instructions: 224COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417058 Relevance: 1.4, Strings: 1, Instructions: 195COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417CC7 Relevance: 1.4, Strings: 1, Instructions: 162COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042635C Relevance: 1.3, Strings: 1, Instructions: 90COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004073A0 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437F50 Relevance: .5, Instructions: 455COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414EA0 Relevance: .3, Instructions: 311COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DAC5 Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AE40 Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437D00 Relevance: .2, Instructions: 200COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426820 Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416ED8 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C7A2 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B060 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004255F0 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434C50 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A2E0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C8EF Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D32F Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B40 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D109 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432198 Relevance: 8.9, APIs: 1, Strings: 4, Instructions: 143memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|